For a campaign that has spent days insisting Bernie Sanders should not launch attacks against her, the Hillary Clinton campaign sure engaged in some dishonest hackery last night.
During the debate in Flint, Hillary attacked Bernie for “vot[ing] against the money that ended up saving the auto industry.” She was talking about a January 15, 2009 attempt to withhold the second $350 billion of TARP funding that failed (here’s the resolution); Bernie voted not to release those funds. But the vote was not directly about auto bailout funding. It was about bailing out the banks and funding what turned out to be completely ineffective efforts to forestall foreclosures.
It is true that Bush’s failure to fund an auto-specific bailout meant that TARP funds got used to fund the $85 billion auto rescue (Bush had already spent some money on the auto companies — basically just enough to ensure they’d go under on Obama’s watch, but not enough to do anything to save them). But that’s not what the vote was (and there might have been enough money for the auto bailout in any case).
Larry Summers’ two letters in support of the additional funding (January 12, Janaury 15) in support of the additional funding certainly didn’t describe it as an auto bailout bill. He mentioned “auto” just three times between the two of them. In the January 12 letter, in support of auto loans to consumers, and in the January 15 letter, limits on what I believe is a reference to GM Finance (now Ally)’s Christmas holiday move to turn into a bank so it could access funding. Contemporary reporting on the vote also did not mention the auto bailout (though there had been discussion that it might be used the previous month).
Moreover, there had been an auto bailout vote in the Senate (on a bill already passed by the House) on December 11, which failed. Both Bernie and Hillary voted in support.
So while Hillary’s attack was technically correct — Bernie did vote against giving Jamie Dimon more free money, which had the side effect of voting against the second installment on the fund that would eventually become the auto bailout — he did not vote against the auto bailout.
But Hillary’s attack did its work, largely because national reporters appeared completely unaware that they were fighting about TARP much less aware that there had been votes in December that directly pertained to the auto bailout. Even some local reporters now appear unaware of what went down in 2008-9. John Podesta helped matters along by sowing confusion in post-debate speeches.
Here’s one of what will end up being several exceptions to the shitty reporting on this that will come too late for people to figure out what actually happened.
During the testy exchange over the auto bailout, Clinton called Sanders a “one-issue candidate” for voting against the release of $350 billion in Jan. 15, 2009, to continue funding the bailout of the nation’s banks and mortgage lenders.
Sanders joined seven Democratic senators in voting against the second wave of TARP funds. President Barack Obama ended up using some of TARP to fund the $85 billion rescue of GM, Chrysler and their auto lending arms.
“If everybody had voted the way he did, I believe the auto industry would have collapsed, taking 4 million jobs with it,” Clinton said.
David Axelrod, a former top adviser to President Barack Obama, questioned Clinton’s attack on Sanders’ voting record in the middle of the debate.
“It wasn’t explicitly a vote about saving auto industry,” Axelrod wrote on Twitter.
U.S. Sen. Debbie Stabenow, a Clinton supporter, said after the debate that senators, including Sanders, were aware the TARP money would be used to aid the domestic auto industry.
“A lot of folks said we shouldn’t do it because somehow it was helping the banks,” said Stabenow, D-Lansing. “It was the auto bailout we were talking about. I was very clear with colleagues that we had to do this.”
Stabenow’s comment, incidentally, is proof that the money shouldn’t have been granted as it was (it wasn’t spent on auto companies until much later). While she’s right that there had been public discussion of spending some money on the auto bailout, there obviously was still so little limiting what the Executive could do with the money that there needed to be nothing explicit supporting the auto bailout to make it happen. The flimsiness of the guidelines is one of the things that enabled the Obama Administration to avoid providing real foreclosure relief, choosing instead to “foam the runway” for banks.
Don’t get me wrong. Bernie did a number of other things at the debate that hurt him last night, such as his comment about ghettos that suggested all African Americans are poor and no whites are. I think, too, the optics of his efforts to stop Hillary from interrupting him as well as his own gesticulating while she was making responses will go over poorly.
But the auto bailout attack was a pretty shameful ploy, one that otherwise would make it fair game to really hit on Hillary’s own actions in a way Bernie has not yet done. That said, it was also a probably perfectly timed attack, because it will ensure victory for Hillary on Tuesday, eliminating one of the last possibilities that Bernie might really challenge Hillary.
Update: As it turns out, Hillary should be attacking Stabenow according to her own standards, because Stabenow voted no on the first TARP vote that actually paid for the first tranche of funding to the auto companies. (Here’s the second, January 2009 one.)
Several times over the course of Jim Comey’s crusade against strong encryption, I have noted that, if Comey wants to eliminate the tools “bad guys” use to commit crimes, you might as well eliminate the corporation. After all, the corporate structure helped a bunch of banksters do trillions of dollars of damage to the US economy and effectively steal the homes from millions with near-impunity.
It’d be crazy to eliminate the corporation because it’s a tool “bad guys” sometimes use, but that’s the kind of crazy we see in the encryption debate.
Yesterday, Ron Wyden pointed to a more narrow example of the way “bad guys” abuse corporate structures to — among other things — commit terrorism: the shell corporation.
In a letter to Treasury Secretary Jack Lew, he laid out several cases where American shell companies had been used to launder money for crime — including terrorism, broadly defined.
He then asked for answers about several issues. Summarizing:
They’re good questions but point, generally, to something more telling. We’re not doing what we need to to prevent our own financial system from being used as a tool for terrorism. Unlike encryption, shell companies don’t have many real benefits to society. Worse, it sounds like Treasury is making the problem worse, not better.
Of course, the really powerful crooks have reasons to want to retain the status quo. And so FBI Director Jim Comey has launched no crusade about this much more obvious tool of crime.
Two and a half years ago, I first started pointing to the evidence that several of the guys on the Osama bin Laden operation took trophy photos.
[O]n February 15, 2013, DOJ informed Judicial Watch that CIA had found 7 more photos responsive to their FOIA. That happened just 4 days after Esquire published a splashy story about the guy who claimed to have been the SEAL who actually killed OBL. The current version includes this line.
In the compound, I thought about getting my camera, and I knew we needed to take pictures and ID him.
I had made the connection at the time, and I have a distinct suspicion the language was slightly different in the original (Esquire was making factual corrections along the way but the original is not on Internet Archive), making it clear that the Shooter and possibly others did take pictures, though perhaps not for operational purposes.
What kind of amped up warrior who had just helped kill the bogeyman could resist taking souvenir pictures? Could you blame them, if so?
In any case, I suspected at the time that the reason CIA “located” new photos was because they read about another set of photos in the possession in one of the guys who participated in the op, if not shot the lethal bullet. The ambiguity in the description of McRaven’s order seems to support that.
That is, what SOCOM and CIA appear to be protecting are — in significant part — the personal photos taken by the guys who did the operation.
The Intercept has a story describing how Matt Bissonnette — the guy who wrote No Easy Day — is under continued investigation as a result of having done just that.
It appears the government went after Bissonnette after he published his book, and demanded a cut of his profits and that he turn over a hard drive that had an “unauthorized” picture of OBL.
The retired SEAL voluntarily provided investigators with a copy of his hard drive as part of an agreement not to prosecute him for unlawfully possessing classified material, according to the two people familiar with the deal.
Luskin said that he had negotiated a deal in 2014 with the Pentagon and the Justice Department to hand over to the government some of the millions of dollars in book profits Bissonnette had received.
He would not confirm Bissonnette’s possession of the bin Laden photo or whether any investigation still remains open.
But once DOJ got Bissonnette’s hard drive — which according to the Intercept was technically turned over voluntarily (meaning there’d be no warrant to limit the scope of what the government could do with it), they found evidence he may have had side deals associated with his procurement role for the team.
During their search of his hard drive, investigators subsequently found emails and records dealing with Bissonnette’s work as a consultant while he was on active duty at SEAL Team 6. Those records, which were not part of the non-prosecution agreement, led to the widening probe. Federal investigators then became interested in whether Bissonnette’s business ventures with companies that supply military equipment — including companies whose products were used by SEAL Team 6 — were helped by his role in the elite unit’s procurement process, according to one of the people familiar with the case.
Element Group, a company Bissonnette helped set up in Virginia Beach about five years ago, is among the companies NCIS is said to be investigating. According to a former SEAL Team 6 operator familiar with Element Group’s business arrangements, the firm, which has since been shut down, designed prototypes for, and advised, private companies that make sporting and tactical equipment.
According to several former SEAL Team operators familiar with the company, Element Group also did business with at least one Defense Department contractor that sold equipment to SEAL Team 6. The defense contractor, Atlantic Diving Supply, or ADS, has military supply and equipment contracts with SEAL Team 6, according to several former SEAL Team 6 operators, as well as other parts of the departments of Defense and Homeland Security. Federal investigators have been looking into the business relationship between Element Group and ADS.
I don’t defend Bissonnette if his side deals were corrupt. But this is bullshit on several levels.
Of course, many people, including me, have noted that Bissonnette’s book was an attempt to push back on the information asymmetry — and with it, propaganda — that the government uses classification to pull off.
Prosecuting Bissonnette would require admitting that the government used its unilateral authority over the nation’s secrets to tell a fiction–not an egregious one, but still one that served a significant political objective.
Now there are probably legal ways around that problem (they could prosecute Bissonnette for revealing obscure details that no one really cares about, for example). But probably not political ways around it, because at best, it would seem like retaliation for exposing the Administration’s fluffing of the facts.
It appears that Bissonnette has shown that the Administration used its control over secrecy as a political tool, not just an operational one, and to prosecute him, they’d have to make that point even more clear.
In addition, as I noted in a series of posts, DOD did a lot of things that arguably violate classification laws to hide those trophy photos by retroactively classifying them and sending them over to CIA where they’d be further hidden from Judicial Watch and other FOIAs that had already been filed.
[I]f the photos were classified after their FOIA, they would have had to have been classified on a photo by photo basis by the Director of CIA, Deputy Director, or a Senior Agency Official in charge of classifications, the CIA responded by saying that, after the CIA got the photos (which by all appearances happened after the FOIA), they were derivatively classified in accordance with the SAO’s guidance.
CIA doesn’t say whether that official reviewed the photos individually or not. Nor does it explain who wrote “TOP SECRET” on them, without adding all the other required classification markers.
And note how the CIA claims these photos “were always considered to be classified” by them — but not necessarily by SOCOM, which originally had the photos. But they don’t even claim they were always considered to be Top Secret.
If I’m right about the DOD’s efforts to avoid its obligation under FOIA, then it basically went after Bissonnette for improperly handling classified information while it was doing the same thing (albeit to withhold previously unclassified information). Plus, if these photos were unauthorized, classifying them to hide them would amount to classification to hide misconduct.
Finally, whatever the ethical conflicts with Bissonnette’s side deals (they remain under investigation and it’s not clear there was a conflict, in which case this feels like DOJ’s pursuit of NSA whistleblowers Bill Binney et al for their effort to start a business), they’re being investigated at a time when the Intelligence Community has just eliminated some measures designed to facilitate oversight of precisely this kind of conflict. I sure take from that that the powers that be in our IC want to continue to engage in the kind of conflicted business deals that Bissonnette is being investigated for.
Here’s the irony though: I noted James Clapper had pushed that conflict change through, in part because it is so much work to ride herd on conflicts, even while accepting a requirement that his office increase its surveillance of line personnel. I concluded that Clapper has some really funny ideas about insider threats, finding abusive incompetents trading on their position to be less of a problem than leakers.
Clapper’s perfectly willing to expand his bureaucracy to look for leakers, but not to weed out the dangerously incompetent people ordering potential leakers around.
Bissonnette’s problem, I guess, is he was allegedly both, someone who shared information that undercut official propaganda, and someone who traded on his position.
Had he just done the latter everything would have been fine, I guess.
Update: For those who haven’t already read it, this post, Sean Penn, Intelligence Dangle, will help explain this one.
The frenzy among journalists about Sean Penn’s Chapo Guzmán story has continued over two days now. As is typical of press frenzies, it is largely divorced from the actual details involved.
So I’d like to revisit the question of what Penn may have withheld from his story — because the press is frenzying over the wrong thing.
The Rolling Stone says “Some names have had to be changed, locations not named.” As with the rest of the disclosure statement, the language here is notable, as the passive voice avoids saying not only whose names got withheld, but who made the decision to withhold them.
Subsequent reporting, handed over from Mexican intelligence, makes clear that authorities know those details pertaining to Chapo’s side. Kate del Castillo and Penn first went to Guadalajara, where they stayed in Villa Ganz. From there they were driven to an air strip in Tepic, Nayarait, where they were flown in a private plane to Cosalá, Sinaloa and then driven to a location on the border of Durango. Del Castillo’s primary interlocutor is named as Andrés Granados Flores, though she also met with Óscar Manuel Gómez Núñez (the latter of whom was arrested weeks after the Penn meeting as the mastermind of Chapo’s escape last year).
Penn’s own narrative makes it clear that both Alfredo and Iván Guzmán, Chapo’s sons, attended the meeting. The only Sinaloans whose names he may have changed were “Alonzo” (who is likely to be Granados) and, possibly, some bodyguard type in Chapo’s presence, Rodrigo. He may have protected the identity of others, but not by changing their name, as the disclosure describes.
In other words, the key players in this story whose names were changed were not Chapo’s men, but the two men who linked him with del Castillo in the first place, Espinoza (whom I call Spiny) and El Alto. It is true Rolling Stone did not name locations; at it turns out, Mexican authorities were following so closely, with cameras, anyway, hiding the locations didn’t help Chapo much.
Curiously, those two men, Spiny and El Alto, don’t show up in the pictures released to the press, even though the caption on one describes them as del Castillo, Penn, and “their companions.”
So the Rolling Stone protected these mysterious interlocutors more religiously than they did Chapo’s family. As Jann Wenner described to the NYT (which, of course, played a complicit role in magnifying all this), Chapo didn’t actually have an interest in “editing” Penn’s work.
Mr. Guzmán, he said, did not speak English and seemed to have little interest in editing Mr. Penn’s work. “In this case, it was a small thing to do in exchange for what we got,” Mr. Wenner said.
But there is one detail, in addition to the locations, that Penn did withhold, purportedly at the request of Chapo, one which I haven’t seen any participant in the press frenzy complain about.
He cites (but asks me not to name in print) a host of corrupt major corporations, both within Mexico and abroad. He notes with delighted disdain several through which his money has been laundered, and who take their own cynical slice of the narco pie.
This is particularly odd, given that the complicity of Americans, including our banks, is one theme of Penn’s own framing of this adventure.
The laws of conscience, which we pretend to be derived from nature, proceed from custom.” —Montaigne
Still, today, there are little boys in Sinaloa who draw play-money pesos, whose fathers and grandfathers before them harvested the only product they’d ever known to morph those play pesos into real dollars. They wonder at our outrage as we, our children, friends, neighbors, bosses, banks, brothers and sisters finance the whole damn thing.
If Penn is sincere in his stated desire to end the war on drugs, ending the profits for American banks tied to illicit trafficking would need to be one of the first steps.
But he doesn’t name those companies that are laundering Chapo’s money, which will continue to be laundering Sinaloa cartel money even as Guzmán gets removed from the network.
Of course, Spiny and El Alto probably share Chapo’s desire to keep those names out of print, in part because they’re part of the power structure that the banks bolster, in part because banks sometimes narc on their customers to save their own hides.
But it’s funny how the press, too, seems uninterested in learning the names of the banks that continue to prop up both our own country’s power structure as well as facilitate traffickers like Guzmán.
Last week, I suggested that most commentators were misinterpreting a speech John Brennan made, assuming he intended to implicate just encryption and Edward Snowden in the Paris attack. Given that he repeatedly invoked changes the Europeans have to make, I think he was also complaining about European efforts to reclaim some data (or Internet software) sovereignty, with the effect that US counterterrorism programs are not as comprehensive. For example, to the extent terrorists use non-US based Internet services, they will elude PRISM, with its easy access to metadata and often content. In the wake of the Paris attack, Berlin-based Telegram shut down a bunch of channels ISIS was using, which suggests that may have been what Brennan was complaining about.
Yet that highlights a key issue: before the Snowden revelations, the US (with the UK and other Five Eyes members) largely could claim to exercise counterterrorism hegemony, in part because of our preferential position on the global telecommunications fiber network, in part because our tech companies served much of the world, and in part because many of our allies preferred to have us do the job. Some of the Snowden revelations — and the German investigation into BND’s partnership with NSA — have shown the cost of that: that the US gets European spooks’ help to spy on European targets of interest solely to the US.
It’s probably most effective to have one hegemonic dragnet, but it’s not clear whether it’s healthy (and now that US hegemony is beginning to crack, the dragnet will likely become less effective).
Given the comments of French Finance Minister Sapin today, US dragnet hegemony will continue to crumble. Along with a call to change certain laws on asset seizures and pre-paid bank cards, Sapin called for Europe to develop its own capability to access and analyze SWIFT data.
Sapin said that the SWIFT system had two computer servers, one in Europe and one in the United States, but that Europe currently relied on U.S. authorities to collect and analyze the vast amounts of data flowing through it to detect security issues.
“We Europeans don’t have the capacity to exploit our own data. I don’t think this can carry on this way,” Sapin told a news conference. “Since we do not have the means to analyze the data located in Europe, we transfer all of this data to the Americans, who have the capacity to analyze it.”
As a reminder, access to SWIFT — Society for Worldwide Interbank Financial Telecommunication, the international bank transfer system through which most international transactions take place — has been a contentious issue for some time. Europe tried to demand more equitable access in 2009-2010 when one of the servers for the system got moved to Brussels, only to find the US was cheating on the spirit of the agreement in 2011. What Sapin describes — Europe just sending all its data to the US in bulk — is what came out of that effort to reclaim some control over the data. In the last few years, it has become clear how US control of SWIFT makes it easier to dictate policy, especially regarding sanctions, to allies (I suspect, too, it has been used to collect embarrassing details about EU elite ties to unsavory characters, like Qaddafi). Obviously, having exclusive access to records of who is transferring money to whom can be incredibly valuable for the US, in ways that go well beyond terrorism.
From his comments, it’s unclear whether Sapin says Europe doesn’t have the technical capability or bureaucratic/legal authority to access and analyze this data. Given his explicit comment that the Paris terrorists used pre-paid bank cards to plan their attack (which would probably be adequate to transfer money between Belgium and France), it’s also not clear that the attackers used international transfers that would have shown up on SWIFT. But he’s going to use this opportunity to demand equitable access to the data.
The US would surely love to maintain a monopoly on omniscience. In the name of counterterrorism efficacy, they might be able to make an argument to do so. But either because they’ve already lost that omniscience — or because their dragnet failed to keep France safe — they’re likely to continue to lose that monopoly. It’s not clear that has any benefit for privacy (redundant dragnets are more invasive than single ones). It will likely have consequences for US hegemony more generally.
The policy discussion about the many ways that the Cyber Information Sharing Act not only doesn’t do much to prevent the hacking of public and private networks, but in key ways will make it worse, must be making its mark. Because the Financial Services Roundtable, one of the key corporatist groups backing the bill, released this YouTube full of scary warnings but absolutely zero explanation about what CISA might do to increase cybersecurity.
Indeed, the YouTube is so context free, it doesn’t note that Susan Collins, the first person who appears in the video, has called for mandatory reporting from some sectors (notably, aviation), which is not covered in the bill and might be thwarted by the bill. Nor does it mention that the agency of the second person that appears in the video, Department of Homeland Security Secretary Jeh Johnson, has raised concerns about the complexity of the scheme set up in CISA, not to mention privacy concerns. It doesn’t note that the third person shown, House Homeland Security Chair Michael McCaul, favored an approach that more narrowly targeted the information being shared and reinforced the existing DHS structure with his committee’s bill.
Instead of that discussion … “Death, destruction, and devastation!” “Another organization being hacked!” “Costing jobs!” “One half of America affected!” “What is it going to take to do something?!?!?!”
All that fearmongering and only one mention of the phrase “information sharing,” much less a discussion of what the bill in question really does.
In August, the head of the FSR, Tim Pawlenty, was more honest about what this bill does and why his banks like it so much: because it would help to hide corporate negligence.
“If I think you’ve attacked me and I turn that information over to the government, is that going to be subject to the Freedom of Information Act?” he said, highlighting a major issue for senators concerned about privacy.
“If so, are the trial lawyers going to get it and sue my company for negligent maintenance of data or cyber defenses?” Pawlenty continued. “Are my regulators going to get it and come back and throw me in jail, or fine me or sanction me? Is the public going to have access to it? Are my competitors going to have access to it? Are they going to be able to see my proprietary cyber systems in a way that will give up competitive advantage?”
That is, the banks want to share information with the government so it can help those private corporations protect themselves (without paying for it, really, since banks do so well at dodging taxes), without any responsibility or consequences in return. “Are my regulators going to get [information about how banks got attacked] and come back and throw me in jail, or fine me, or sanction me?” the banks’ paid lobbyist worries. As the author of this bill confirmed last week, this bill will undercut regulators’ authority in case of corporate neglect.
The example of banks dodging responsibility in the past — possibly aided by a similar (albeit more rigorous) information sharing regime under the Bank Secrecy Act — provides all the evidence for how stupid this bill would be. We need corporations to start bearing liability for outright negligence. And this bill provides several ways for them to avoid such liability.
Don’t succumb to bankster inciting fear. America will be less safe if you do.
Last week, the Senate Judiciary Committee had a hearing on Electronic Communication Privacy Act reform, the main goal of which is to provide protection for content served on a third party’s server. Because reform is looking more inevitable in Congress (the House version of the bill has more sponsors than any other), government agencies used the hearing as an opportunity to present their wish list for the bill. That includes asking for an expansion of the status quo for civil agencies, with witnesses from SEC, DOJ, and FTC testifying (DOJ also made some other requests that I hope to return to).
Effectively, the civil agencies want to create some kind of court order that will provide them access to stored content. A number of the agencies’ witnesses — especially SEC’s Andrew Ceresney — claimed that a warrant is the same as an order, which culminated in Sheldon Whitehouse arguing (after 45:30) that an order requiring court review is actually less intrusive than a warrant because the latter is conducted ex parte.
It took until CDT policy counsel (and former ACLU lawyer) Chris Calabrese to explain why that’s not true (after 2:08):
We have conflated two really different and very different things in this committee today. One is a court, some kind of court based on a subpoena and one is a probable cause warrant. These are not the same thing. A subpoena gives you access to all information that is relevant. As pursuant, relevant to a civil investigation, a civil infraction. So if you make a mistake on your taxes, that’s a potential civil infraction. Nothing that has been put forward by the SEC would do anything but be a dramatic expansion of their authority to get at ordinary people’s in-boxes. Not just the subjects of investigation, but ordinary folks who may be witnesses. Those people would have the–everything in their in-boxes that was relevant to an investigation, so a dramatic amount of information, as opposed to probable cause of evidence of a crime. That’s a really troubling privacy invasion.
I’m utterly sympathetic with Calabrese’s (and the EFF’s) argument that the bid for some kind of civil investigative order is a power grab designed to bypass probable cause.
But I wonder whether there isn’t another kind of power grab going on as well — a bid to force banks to be investigated in a certain kind of fashion.
It was really hard, to begin with, to have former and (presumably) future Debevoise & Plimpton white collar defense attorney Andrew Ceresney to talk about how seriously SEC takes it job of “the swift and vigorous pursuit of those who have broken the securities laws through the use of all lawful tools available to us,” as he said in his testimony and during the hearing. There’s just been no evidence of it.
Moreover, as Ceresney admitted, SEC hasn’t tried to obtain email records via an order since the US v. Warshak decision required a warrant in the 6th Circuit, even though SEC believes its approach — getting an order but also providing notice to the target — isn’t governed by Warshak. As SEC Chair Mary Jo White (another revolving door Debevoise & Plimpton white collar defense attorney) said earlier this year,
“We’ve not, to date, to my knowledge, proceeded to subpoena the ISPs,” White said. “But that is something that we think is a critical authority to be able to maintain, done in the right way and with sufficient solicitousness.”
For five years, the SEC hasn’t even tried to use this authority, all while insisting they needed it — even while promising they would remain “solicitous,” if there were any worries about that.
Claims that the SEC needed such authority might be more convincing if SEC was actually pursuing crooks, but there’s little evidence of that.
Which is why I’m interested in this passage, from a letter White sent to Pat Leahy in April 2013 and appended to Ceresney’s testimony, explaining why SEC can’t have DOJ obtain orders for this material.
DOJ only has authority to seek search warrants to advance its own investigations, not SEC investigations. Thus, the Commission cannot request that the DOJ apply for a search warrant on the SEC’s behalf. Second, many SEC investigations of potential civil securities law violations do not involve a parallel criminal investigation, and thus there is no practical potential avenue for obtaining a search warrant in those cases. The large category of cases handled by the SEC without criminal involvement, however, have real investor impact, and are vital to our ability to protect- and, where feasible, make whole – harmed investors.
The only times when SEC would need their fancy new order is if the subject of an investigation refuses to turn information voluntarily, and the threat that they could obtain an order anyway is, according to Ceresney, they key reason SEC wants to maintain this authority (though he didn’t argue the apparent absence of authority has been responsible for SEC’s indolence over the last 5 years). But that act, refusing to cooperate, would get companies more closely into criminal action and — especially under DOJ’s purportedly new policy of demanding that companies offer up their criminal employees — into real risk of forgoing any leniency for cooperation. But White is saying (or was, in 2013, when it was clear Eric Holder’s DOJ wasn’t going to prosecute) that SEC can’t ask DOJ to subpoena something because that would entail a potentially criminal investigation.
Well yeah, that’s the point.
Then add in the presumption here. One problem with prosecuting corporations is they hide their crimes behind attorney-client and trade secret privileges. I presume that’s partly what Sally Yates meant in her new “policy” memo, noting that investigations require a “painstaking review of corporate documents … which may be difficult to collect because of legal restrictions.” SEC’s policy would be designed for maximal privilege claims, because it would involve the subject in the process.
If the legislation were so structured, an individual would have the ability to raise with a court any privilege, relevancy, or other concerns before the communications are provided by an ISP, while civil law enforcement would still maintain a limited avenue to access existing electronic communications in appropriate circumstances from ISPs.
Other criminals don’t get this treatment. Perhaps the problems posed by financial crime — as well as the necessity for broader relevancy based evidence requests — are unique, though I’m not sure I buy that.
But that does seem to be a presumption behind this SEC power grab: retention of the special treatment financial criminals get that has thus far resulted in their impunity.
The NYT had a great editorial that echoes my amazement that the Department of Homeland Security sent an army of agents to take down RentBoy.com this week.
It’s somewhat baffling, though, that taking down a website that operated in plain sight for nearly two decades suddenly became an investigative priority for the Department of Homeland Security and federal prosecutors in Brooklyn. This week, the website’s founder and six employees were charged with violating federal law by facilitating paid sexual encounters.
Kelly Currie, the acting United States attorney for the Eastern District of New York, trumpeted the case against Rentboy.com, calling it an “Internet brothel” that “made millions of dollars from the promotion of illegal prostitution.” The website pulled in $10 million over the past five years, charging escorts for publishing their profiles, according to prosecutors. That’s less revenue than an average McDonald’s franchise generates.
Prosecutors can credibly argue that the site’s operators were breaking the law. But they have provided no reasonable justification for devoting significant resources, particularly from an agency charged with protecting America from terrorists, to shut down a company that provided sex workers with a safer alternative to street walking or relying on pimps. The defendants have not been accused of exploiting sex workers, featuring minors on the website, financial crimes or other serious offenses that would warrant a federal prosecution.
DHS doesn’t seem to know why DHS was involved either. In a statement to the NYT, ICE’s spokesperson, Khaalid Walls, suggests ICE’s jurisdiction arises because this involves the illegitimate movement of people, goods and currency in domestic and foreign transactions, which suggesting the things moved were prostitutes.
Mr. Walls said: “As the investigative arm of the Department of Homeland Security, ICE is responsible for the enforcement of laws that promote the legitimate movement of people, goods and currency in domestic and foreign transactions. Our allegation with this case is that the business and its principals purported itself to be an escort service while promoting criminal acts, namely illegal prostitution.”
I’m rather curious that DHS claims jurisdiction over the movement of goods domestically. But I’m also not sure how a website constitutes moving anything.
But the claim this is about prostitution seems to conflict with ICE’s description of the bust on its website, which claims it’s a financial crime.
As I’ve suggested, I wouldn’t be surprised if ICE used all those hard drives they seized this week to put together the money laundering case they leaked to some outlets. But they haven’t charged it yet. Which would mean they used the prostitution claim to take down an advertising site to be able to get the evidence to charge something that might be more squarely in ICE’s jurisdiction.
Add in the fact that NY DA Cy Vance — the entity that would have direct jurisdiction over prostitution headquartered in NYC — took his office off this release, and I’m genuinely confused about what DHS is doing.
None of that will mean the RentBoy defendants will be able to challenge this on jurisdictional grounds. But it does raise questions about what DHS is really doing.
Motherboard has an interesting new detail on the Silk Road investigation from a mostly refused FOIA.
The few pages released show the following timeline:
June 1, 2011: Gawker publishes this story describing Silk Road.
The DEA has confirmed they are aware of the site, and while they won’t confirm or deny that an investigation is underway, from my years of experience, I’d bet my bottom dollar in this instance there is one underway,
June 6, 2011: NY Organized Crime Drug Enforcement Strike Force gets tasked with investigating Silk Road.
June 15, 2011: DEA opened a Personal History Report for its investigation into Silk Road
I find the Gawker to Schumer to New York law enforcement to feds very interesting given yesterday’s events.
Yesterday, federal officers (overwhelmingly Department of Homeland Security, not FBI) busted the 7 people who run RentBoy.com, the largest online portal for male escorts. In doing so, they put 10,000 sex workers out of business — or pushed them into more dangerous means of meeting customers.
This is the second time the Feds have taken down a sex worker portal. In June 2014, Feds took down RedBook, which included links to ads but also had a lot of chat rooms. At one level, then, that bust was even more of an assault on First Amendment rights, but the operators were also indicted on money laundering charges (and FBI found profiles of people under 18 posting advertisements, which it used to ratchet up the pressure). Thus far, at least, there’s no indication of additional charges against RentBoy’s operators, even though two outlets yesterday claimed there were money laundering charges involved. Though as I’ll explain, I wouldn’t be surprised to see immigration charges, I bet the government will charge the money laundering they’ve already leaked to the press, and I fully expect once the government wades through the servers they seized yesterday, they’ll come up with a list of advertisers who were also underage.
The bust leaves me with several questions. As Conor Friedersdorf asks, why is this a priority of law enforcement? Aren’t there more pressing crimes — like bank money laundering — to pursue, or more dangerous forms of sex trafficking?
Some potential answers may lie in some observations from the complaint.
RentBoy has been operating happily since 1997. So why did the Feds choose to take it down yesterday?
One hint about where this inquiry may have come from is on page 19-20 of the complaint, after all the salacious descriptions of slang for kinds of sex and discussions of a few escorts’ profiles that have been highlighted in other reporting on this. RentBoy twice applied for an H1B for its accountant, Marco Soto Decker.
In September 2010 and March 2013, EASY RENT SYSTEMS, INC. applied to the United States Department of Homeland Security, Citizenship and Immigration Services for an H1-B non-immigrant work visa on behalf of SOTO DECKER. The application identified that EASY RENT SYSTEMS, INC. runs RENTBOY.COM which “revolutionized the escorting industry by moving it online and away from agencies and disreputable bars.” The application also said that SOTO DECKER had been operating as the accountant from July 2012, a position that reported directly to JEFFREY HURANT and which required him to prepare all financial statements and to strategically analyze, manipulate, and interpret financial data “in order to develop strategies and make recommendations critical for the CEO to utilize in his work to successfully mange and grow the company.”
In connection with the application, EASY RENT SYSTEMS, INC. also submitted a job offer letter addressed to SOTO DECKER dated July 20, 2012, which identified the duties and responsibilities of the position. Among those duties was meeting with market, IT, sales, and customer service staff to review monthly expenses and see revenue and expenses optimization; supervising the company’s daily e-commerce transactions; managing the entire accounting, budgeting and reconciliation process for the company’s events, including the HOOKIES [an awards ceremony RentBoy puts on].
The application also included some of EASY RENT SYSTEM, INC.’s books and records. Among the expenses identified was a listing for “Viagra — Sean.” In addition, the application included numerous articles about RENTBOY.COM. Man of those articles identified unambiguously that the escorts advertising on RENTBOY.COM were having sex with their customers in exchange for money.
In other words, RentBoy’s parent company twice applied to DHS for an H1B visa for its accountant, the more recent application of which DOJ alleges included clear evidence the company was buying Viagra for an employee and reporting on the company made it clear that RentBoy sold sex.
Note, the complaint didn’t tell us what happened with those applications. That there were two of them suggests Soto Decker may have either gotten it renewed (I need to double check but I believe it is still the case you can get two H1Bs for a total of 6 years, then you have to go home to your home country for a period) or been denied in the first application. Assuming he got the H1B would also suggest that immigration authorities not only agreed with Easy Rent that Soto Decker was a skilled employee (there’s no reason to doubt that) but also that the company could find no Americans to do an accounting job. Immigration authorities are very lenient with those H1B determinations, but they almost certainly could have refused that visa back in 2013.
Still, that application to DHS in March 2013 was almost 30 months ago, and there’s just one sign I saw of active investigation since in the complaint. That detail appears on page 14.
HURANT was present at the 2015 HOOKIES, where he provided an undercover agent a card with the RENTBOY.COM name on one side. On the opposite side the card says “Jeffrey Davids, Principal.” It also lists his email address as “[email protected]” HURANT was asked by the undercover agent how the Hookies awards started. HURANT responded “Have you ever had sex with anyone and it was so good you had to tell someone? That’s what it’s all about!”
In other words, in March 2013, Easy Rent submitted an H1B application that may have given DHS an opening to start this investigation. Two years later, they had an undercover officer attend the Hookies and get RentBoy’s CEO to say some damning things.
That timeline — if it indeed shows the span of the investigation — is interesting for several reasons.
First, it would suggest the investigation was started while Loretta Lynch was still US Attorney in Eastern District of NY (more on that in a sec). If this investigation started in 2013, it means Lynch, now the Attorney General, may well have been the one ultimately overseeing the investigation.
Second, the investigation — with an undercover officer attending awards ceremonies and who knows what else — was active after the time the head of RedBook pled guilty in December 2014. DOJ had a proof of concept in that earlier bust.
Finally, as a reader noted, the investigation had already started before the time, in July, when a RentBoy escort exposed his discussions with Tim Geithner’s brother, David, at Gawker. That is, this investigation is not retaliation for a RentBoy escort embarrassing the family member of a very powerful New Yorker. But the bust did happen after that. (And if I were that escort, I’d be very worried about what evidence that DHS seized yesterday might be used in a blackmail case against me.)
One more note on timing: One of the employees busted yesterday, Diana Milagros Mattos, left Easy Rent in June, in spite of being its highest commissioned sales agent. There’s no explanation of why she left. I find that worth noting.
I always ask this question, but you have to ask it. Why was this charged in the Eastern District of NY, when RentBoy is headquartered in Manhattan, in the Southern District, and only one of the employees appears to live in EDNY (though the complaint reviews three profiles whose owners live in Brooklyn)? When asked yesterday, one of the Feds apparently simply said, “the Internet is everywhere.” But that response raises more questions than it answers.
I raise this not just for the Loretta Lynch connection, but also because by virtue of JFK airport’s location in EDNY, where many defendants get flown into, the district has developed a slew of precedents having to do with asserting a fairly aggressive jurisdiction overseas. Again, it’s possible this whole thing started from an immigration inquiry. But I wonder whether there’s some more to it, especially since RentBoy has facilities in England.
In other words, is this just the first step in a larger, more international crackdown?
As noted, someone leaked to several outlets yesterday this case involved money laundering, but there’s no hint of that in this complaint or even that they used investigative methods to prove it. While RentBoy’s ISP, Cogent Communications, is mentioned in an aside — in the context of how communications with the ISP described Soto Decker’s responsibilities — there’s no mention of any orders for traffic logs or other electronic service provider records. Still, it’s fairly clear the Feds do have some records from Cogent they aren’t yet telling us about.
Then there’s the means by which the agent who wrote this, Susan Ruiz, identified aliases of some of the employees. In footnote after footnote, she says she compared the defendant’s driver’s license picture with an online picture and decided they were the same person. Neither those aliases nor the means by which she identified them are critical at this point. But I would suggest she almost certainly used more reliable means to connect the identities of these people. That could just be an insider’s testimony, but it could also include traffic logs connecting certain computers with the online profiles using those aliases.
In other words, I suspect they’ve got electronic records they don’t want to tell us about, even as simply as records obtained from Cogent using a subpoena.
As the complaint makes clear, RentBoy has clear warnings against advertising sex and prices (which will be one of the defenses the accused will use). It bills itself as an escort site that will not permit the selling of sex.
To prove that the profiles the complaint describes in depth involve prostitution, it relies heavily on DaddysReviews.com, which is a review site that not only describes completed acts of sex, but the price paid for that sex.
I’m going to ask people who know the industry better than I about this. But I do wonder why DHS and DOJ chose to bust the site that doesn’t explicitly tie sex to payment, but didn’t bust the one that does.
Update: One suggestion on this question is that DaddysReviews wouldn’t be prosecuted because they don’t take money.