Lavabit and The Definition of US Government Hubris

Graphic by Darth

Graphic by Darth

Well, you know, if you do not WANT the United States Government sniffing in your and your family’s underwear, it is YOUR fault. Silly American citizens with your outdated stupid piece of paper you call the Constitution.

Really, get out if you are a citizen, or an American communication provider, that actually respects American citizen’s rights. These trivialities the American ethos was founded on are “no longer operative” in the minds of the surveillance officers who claim to live to protect us.

Do not even think about trying to protect your private communications with something so anti-American as privacy enabling encryption like Lavabit which only weakly, at best, even deigned to supply.

Any encryption that is capable of protecting an American citizen’s private communication (or even participating in the TOR network) is essentially inherently criminal and cause for potentially being designated a “selector“, if not target, of any number of searches, whether domestically controlled by the one sided ex-parte FISA Court, or hidden under Executive Order 12333, or done under foreign collection status and deemed “incidental”. Lavabit’s Ladar Levinson knows.

Which brings us to where we are today. Let Josh Gerstein set the stage:

A former e-mail provider for National Security Agency leaker Edward Snowden, Lavabit LLC, filed a legal brief Thursday detailing the firm’s offers to provide information about what appear to have been Snowden’s communications as part of a last-ditch offer that prosecutors rejected as inadequate.

The disagreement detailed in a brief filed Thursday with the U.S. Court of Appeals for the Fourth Circuit resulted in Lavabit turning over its encryption keys to the federal government and then shutting down the firm’s secure e-mail service altogether after viewing it as unacceptably tainted by the FBI’s possession of the keys.

I have a different take on the key language from Lavabit’s argument in their appellate brief though, here is mine:

First, the government is bereft of any statutory authority to command the production of Lavabit’s private keys. The Pen Register Statute requires only that a company provide the government with technical assistance in the installation of a pen- trap device; providing encryption keys does not aid in the device’s installation at all, but rather in its use. Moreover, providing private keys is not “unobtrusive,” as the statute requires, and results in interference with Lavabit’s services, which the statute forbids. Nor does the Stored Communications Act authorize the government to seize a company’s private keys. It permits seizure of the contents of an electronic communication (which private keys are not), or information pertaining to a subscriber (which private keys are also, by definition, not). And at any rate it does not authorize the government to impose undue burdens on the innocent target business, which the government’s course of conduct here surely did.

Second, the Fourth Amendment independently prohibited what the government did here. The Fourth Amendment requires a warrant to be founded on probable cause that a search will uncover fruits, instrumentalities, or evidence of a crime. But Lavabit’s private keys are none of those things: they are lawful to possess and use, they were known only to Lavabit and never used by the company to commit a crime, and they do not prove that any crime occurred. In addition, the government’s proposal to examine the correspondence of all of Lavabit’s customers as it searched for information about its target was both beyond the scope of the probable cause it demonstrated and inconsistent with the Fourth Amendment’s particularity requirement, and it completely undermines Lavabit’s lawful business model. General rummaging through all of an innocent business’ communications with all of its customers is at the very core of what the Fourth Amendment prohibits.

The legal niceties of Lavabit’s arguments are thus:

The Pen Register Statute does not come close. An anodyne mandate to provide information needed merely for the “unobtrusive installation” of a device will not do. If there is any doubt, this Court should construe the statute in light of the serious constitutional concerns discussed below, to give effect to the “principle of constitutional avoidance” that requires this Court to avoid constructions of statutes that raise colorable constitutional difficulties. Norfolk S. Ry. Co. v. City of Alexandria, 608 F.3d 150, 156–57 (4th Cir. 2010).

And, later in the pleading:

By those lights, this is a very easy case. Lavabit’s private keys are not connected with criminal activity in the slightest—the government has never accused Lavabit of being a co-conspirator, for example. The target of the government’s investigation never had access to those private keys. Nor did anyone, in fact, other than Lavabit. Given that Lavabit is not suspected or accused of any crime, it is quite impossible for information known only to Lavabit to be evidence that a crime has occurred. The government will not introduce Lavabit’s private keys in its case against its target, and it will not use Lavabit’s private keys to impeach its target at trial. Lavabit’s private keys are not the fruit of any crime, and no one has ever used them to commit any crime. Under those circumstances, absent any connection between the private keys and a crime, the “conclusion[] necessary to the issuance of the warrant” was totally absent. Zurcher, 436 U.S., at 557 n.6 (quoting, with approval, Comment, 28 U. Chi. L. Rev. 664, 687 (1961)).

What this boils down to is, essentially, the government thinks the keys to Lavabit’s encryption for their customers belong not just to Lavabit, and their respective customers, but to the United States government itself.

Your private information cannot be private in the face of the United States Government. Not just Edward Snowden, but anybody, and everybody, is theirs if they want it. That is the definition of bullshit.

[Okay, big thanks to Darth, who generously agreed to let us use the killer Strangelovian graphic above. Please follow Darth on Twitter]

Share this entry

Further Implications of UndieBomb II Leaker Guilty Plea

As you have likely heard by now, a former FBI agent has agreed to plead guilty to leaking material about the second underwear bomb attempt to reporters in May of 2012. Charlie Savage of the New York Times has the primary rundown:

A former Federal Bureau of Investigation agent has agreed to plead guilty to leaking classified information to The Associated Press about a foiled bomb plot in Yemen last year, the Justice Department announced on Monday. Federal investigators said they identified him after obtaining phone logs of Associated Press reporters.

The retired agent, a former bomb technician named Donald Sachtleben, has agreed to serve 43 months in prison, the Justice Department said. The case brings to eight the number of leak-related prosecutions brought under President Obama’s administration; under all previous presidents, there were three such cases.

“This prosecution demonstrates our deep resolve to hold accountable anyone who would violate their solemn duty to protect our nation’s secrets and to prevent future, potentially devastating leaks by those who would wantonly ignore their obligations to safeguard classified information,” said Ronald C. Machen Jr., the United States attorney for the District of Columbia, who was assigned to lead the investigation by Attorney General Eric H. Holder Jr.

In a twist, Mr. Sachtleben, 55, of Carmel, Ind., was already the subject of a separate F.B.I. investigation for distributing child pornography, and has separately agreed to plead guilty in that matter and serve 97 months. His total sentence for both sets of offenses, should the plea deal be accepted by a judge, is 140 months.

Here is the DOJ Press Release on the case.

Here is the information filed in SDIN (Southern District of Indiana). And here is the factual basis for the guilty plea on the child porn charges Sachtleben is also pleading guilty to.

So Sachtleben is the leaker, he’s going to plead guilty and this all has a nice beautiful bow on it! Yay! Except that there are several troubling issues presented by all this tidy wonderful case wrap up.

First off, the information on the leak charges refers only to “Reporter A”, “Reporter A’s news organization” and “another reporter from Reporter A’s news organization”. Now while the DOJ may be coy about the identities, it has long been clear that the “news organization” is the AP and “Reporter A” and “another reporter” are AP national security reporters Matt Apuzzo and Adam Goldman (I’d hazard a guess probably in that order) and the subject article for the leak is this AP report from May 7, 2012.

What is notable about who the reporters are, and which story is involved, is that this is the exact matter that was the subject of the infamous AP phone records subpoenas that were incredibly broad – over 20 business and personal phone lines. These subpoenas, along with those in the US v. Steven Kim case collected against James Rosen and Fox News, caused a major uproar about the sanctity of First Amendment press and government intrusion thereon.

The issue here is that Attorney General Eric Holder and the DOJ, as a result of the uproar over the Read more

Share this entry

Say Hello To Our New Friends At Just Security

Screen shot 2013-09-23 at 11.46.58 AMWe do a lot of things here at Emptywheel including occasionally, goofing off. But our primary focus has always been the intersection of security issues, law and politics. I think I can speak for Marcy and Jim, and I certainly do for myself, we would love it if that intersection were not so critical in today’s world. But, alas, it is absolutely critical and, for all the voices out there in the community, there are precious few that deep dive into the critical minutiae.

Today we welcome a new and important player in the field, the Just Security Blog. It has a truly all star and broad lineup of contributors (most all of whom are listed as “editors” of one fashion or another), including good friends such as Steve Vladeck, Daphne Eviatar, Hina Shamsi, Julian Sanchez, Sarah Knuckey and many other quality voices. It is an ambitious project, but one that, if the content already posted on their first day is any indication, will be quite well done. The home of Just Security is the New York University School of Law, so they will have ample resources and foundation from which to operate for the long run.

Ironically, it was little more than three years ago (September 1, 2010 actually) that the Lawfare Blog went live to much anticipation (well, at least from me). Whether you always agree with Ben Wittes, Bobby Chesney, Jack Goldsmith and their contributors or not, and I don’t always, they have done this field of interest a true service with their work product, and are a fantastic and constantly evolving resource. There is little question but that Just Security intends to occupy much of the same space, albeit it in a complimentary as opposed to confrontational manner. In fact, it was Ben Wittes who hosted the podcast with Steve Vladeck and Ryan Goodman that serves as the multi-media christening of Just Security.

Orin Kerr (who is also a must read at Volokh conspiracy), somewhat tongue in cheek, tweeted that the cage match war was on between Lawfare and Just Security. That was pretty funny actually, but Orin made a more serious point in his welcome post today, and a point that I think will greatly interest the readers of Emptywheel:

Whereas Lawfare tend to have a center or center-right ideological orientation, for the most part, Just Security‘s editorial board suggests that it will have a progressive/liberal/civil libertarian voice.

From my understanding, and my knowledge of the people involved, I believe that to be very much the case. And that is a very good thing for us here, and the greater discussion on so much of our work.

So, say hello to our new friends at Just Security, bookmark them and give them a read. Follow them on Twitter. You will be better informed for having done so.

Share this entry

Fund Unchained Journalism of Emptywheel: It’s All Because Of You

[Note from Jim: There have some issues with the PayPal buttons taking you to PayPal’s main page instead of the page set up for Emptywheel donations. Please use the link below and it will give a functioning button. On my machine and browser, though, you have to click the button and stay in the same browser tab for it to work. If you do “cntrl-click” to open in a new tab, you get the main PayPal home page. If there are any issues, please let us know. If you prefer snail mail, checks made out to “Emptywheel, LLC” can be mailed to this address:Emptywheel, LLC
P.O. Box 1673
Grand Rapids, Michigan 49501-1673Thank you one and all, you are the best readers an supports on the web!]

Okay, the Emptywheel blog has run a fundraiser for a week now. For the most insightful, deep weed analyzing, cutting edge and kick ass journalism on the web.We continue to need your support.

We started this ask a week ago, and I should know because I agreed for it to start just ahead of my Trash Talk post at the open of the NFL football season a week ago last night.

But I am going to extend the ask for a short time; such as through the weekend, because it is a more than worthy effort. And it will stay on top of this blog until some time Monday with the hope that the Emptywheel model is kickstarted, so to speak, further into success. Please, help us make it so by going to this page and donating.

If there is a more neutral, deep fact based, deeply analytic, independent and proven insightful blog, or voice than Ms. Marcy T. Wheeler, better serving the relevant niche, than this one, I would like to see it. Whether you are on the right or the left, this blog is incredibly valuable for its depth and consistency of analysis.

The lioness share of this history is by Marcy Wheeler and she alone deserves the support; but you also get the cogent analysis of Jim White, Rayne and, every now and then, me. I won’t speak for my own, but the rest is damn good work. And worthy of your support as a critical voice, whether you agree or disagree with us politically, legally, and/or policy wise.

We need your support as independent journalistic voices in the mass media milieu. Make no mistake, your support of all of our work here helps establish all of us as protected and respected journalists, and we are thankful for the same.

If you are reading this, you either know, or should know, precisely what level of outstanding journalism goes down daily on, and at, the Emptywheel blog.

As they say in my business, there is a certified record. And it stands up. Help us keep up that record, and add to it, with all that is going on in the world every day.

It is not about us. It is about you, and all of us, and what we should and can be. Support this journalism. From me, to Marcy, to Jim, to Rayne, to everything that is, and always has been, the Emptywheel blog, thank you.

Some people get squashed crossing the tracks
Some people got high rises on their backs
I’m not broke but you can see the cracks
You can make me perfect again
All because of you

We can help check the government in its tracks, help fill the gaping cracks. The Emptywheel blog is indeed all because of you. True independent journalism, not bought off by anybody in the main; not subject to any corporate ball and chain. Real independent deep analysis, reportage and journalism.

Help us continue the tradition.

You can donate here.
Thank you!
Share this entry

Bradley Manning’s Sentence, Parole and Appeal Implications

CryingJusticeOn Monday I laid out the dynamics that would be in play for the court in considering what sentence to give Bradley Manning in light of both the trial evidence and testimony, and that presented during the sentencing phase after the guilty verdict was rendered. Judge Lind has entered her decision, and Bradley Manning has been sentenced to a term of 35 years, had his rank reduced to E-1, had all pay & allowances forfeited, and been ordered dishonorably discharged. This post will describe the parole, appeal and incarceration implications of the sentence just imposed.

Initially, as previously stated, Pvt. Manning was credited with the 112 days of compensatory time awarded due to the finding that he was subjected to inappropriate pre-trial detention conditions while at Quantico. Pvt. Manning was credited with a total 1294 days of pre-trial incarceration credit for the compensatory time and time he has already served since the date of his arrest.

Most importantly at this point, Manning was sentenced today to a prison term of 35 years and the issue of what that sentence means – above and beyond the credit he was given both for compensatory time and time served – is what is critical going forward. The following is a look at the process, step by step, Bradley Manning will face.

The first thing that will happen now that Judge Lind has gaveled her proceedings to a close is the court will start assembling the record, in terms of complete transcript, exhibits and full docket, for transmission to the convening authority for review. It is not an understatement to say that this a huge task, as the Manning record may well be the largest ever produced in a military court martial. It will be a massive undertaking and transmission.

At the same time, the defense will start preparing their path forward in terms of issues they wish to argue. It is my understanding that Pvt. Manning has determined to continue with David Coombs as lead counsel for review and appeal, which makes sense as Coombs is fully up to speed and, at least in my opinion, has done a fantastic job. For both skill and continuity, this is a smart move.

The next step will be designation of issues to raise for review by the “convening authority”. In this case, the convening authority is Major General Jeffrey Buchanan, who heads, as Commanding General, the US Army’s Military District of Washington. This step is quite different than civilian courts, where a defendant proceeds directly to an appellate court.

The accused first has the opportunity to submit matters to the convening authority before the convening authority takes action – it’s not characterized as an “appeal,” but it’s an accused’s first opportunity to seek relief on the findings and/or the sentence. According to the Manual for Courts-Martial, Rule for Court-Martial 1105:

(a) In general. After a sentence is adjudged in any court-martial, the accused may submit matters to the convening authority in accordance with this rule.

(b) Matters which may be submitted.
(1) The accused may submit to the convening au­ thority any matters that may reasonably tend to af­ fect the convening authority’s decision whether to disapprove any findings of guilty or to approve the sentence. The convening authority is only required to consider written submissions.
(2) Submissions are not subject to the Military Rules of Evidence and may include:
(A) Allegations of errors affecting the legality of the findings or sentence;
(B) Portions or summaries of the record and copies of documentary evidence offered or intro­ duced at trial;
(C) Matters in mitigation which were not avail­ able for consideration at the court-martial; and
(D) Clemency recommendations by any mem­ber, the military judge, or any other person. The defense may ask any person for such a recommendation.

Once the convening authority has the full record and the defense has designated its matters for review, Buchanan will perform his review and determine whether any adjustments to the sentence are appropriate, and that will be considered the final sentence. At this point, the only further review is by a traditional appeal process.

Generally, the level of appellate review a case receives depends on the sentence as approved by the Read more

Share this entry

About the Reuters DEA Special Operations Division Story

Reuters is out this morning with what is being hailed as somewhat of an eye opening expose on the Drug Enforcement Agency’s Special Operations Division. The article is very good and should be read in full, but I would like to make a couple of quick points.

First, the headline is misleading. The caption is:

Exclusive: U.S. directs agents to cover up program used to investigate Americans

Well, not really (and, in fairness, the actual body of the article is about a practice that is a result of the SOD). DEA’s Special Ops Division is neither new nor secret in the least, and there is no way to “cover it up”. Google it; I got “About 289,000 results (0.29 seconds)” as a return. You will get something similar. The revelation that SOD was used in the Viktor Bout case is also not new, here is a Time story detailing it from 2011.

In fact, any criminal defense attorney who did cocaine hub conspiracy cases in the 90’s could have told you most of the Reuter’s article in their sleep. That was exactly the scene that DEA-SOD was born from. As the war on drugs went nuclear, the DEA devised what they termed the “Kingpin Strategy”:

In 1992, the DEA instituted the Kingpin Strategy that focused investigative and enforcement efforts on specific drug trafficking organizations. The DEA planned to dis- able major organizations by attacking their most vulnerable areas—the chemicals needed to process the drugs, their finances, communications, transportation, and leadership structure.

The Kingpin Strategy held that the greatest impact on the drug trade took place when major drug organizations were dis- rupted, weakened, and destroyed. This strategy focused enforcement efforts and resources against the highest-level traffickers and their organizations, and provided a systematic way of attacking the various vulnerabilities of the organiza- tions. By systematically attacking each of these vulnerabilities, the strategy aimed to destroy the entire organization, and with it, the organization’s capacity to finance, produce, and distrib- ute massive amounts of illegal drugs. Each blow weakened the organization and improved the prospects for arresting and prosecuting the leaders and managers of the organizations.

The Kingpin Strategy evolved from the DEA’s domestic and overseas intelligence gathering and investigations.

And from Kingpin sprung the Special Operations Division:

Under the original Kingpin Strategy, DEA headquarters often dictated the selection of Kingpin targets. In response to the SACs’ concerns, Administrator Constantine agreed to allow them more latitude in target selection. In conjuction with this decision, he established the Special Operations Division at Newington, Virginia, in 1994 to coordinate multi-jurisdictional investigations against major drug trafficking organizations responsible for the flow of drugs into the United States.

The above is from a history of the DEA right there on the Justice Department’s website, so “covering up” SOD is kind of a non-starter. However, what IS being covered up, and what really is the substance of the body of the Reuter’s article, is the practice of “parallel construction” of cases:

The undated documents show that federal agents are trained to “recreate” the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant’s Constitutional right to a fair trial. If defendants don’t know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence – information that could reveal entrapment, mistakes or biased witnesses.
…..
After an arrest was made, agents then pretended that their investigation began with the traffic stop, not with the SOD tip, the former agent said. The training document reviewed by Reuters refers to this process as “parallel construction.”

The two senior DEA officials, who spoke on behalf of the agency but only on condition of anonymity, said the process is kept secret to protect sources and investigative methods. “Parallel construction is a law enforcement technique we use every day,” one official said. “It’s decades old, a bedrock concept.”

Yes. Exactly. And, as the “senior DEA officials” admitted, this, too, is not new in the least. Again, the Reuter’s quote of the incredulous former Judge Nancy Gertner aside, any number of longtime members of NACDL could have told you all of this at any point in time since the mid 90’s.

The takeaway that is important from the Reuters piece is that all the frothing about “golly, what if those NSA capabilities bleed out of terrorism and into traditional criminal cases” is nuts. It already is, and has been for a long time. It is the “clean teaming” of criminal prosecutions. And it is a direct and tangible fraud upon defendants, the courts, Due Process and several other important Constitutional concepts.

It is not a matter of what if it happens, it IS happening.

Share this entry

Negative Manning Decision and the Future of Investigative Journalism

imagesLittle more than few hours ago, a critical ruling was handed down by Judge Denise Lind in the Bradley Manning UCMJ prosecution ongoing at Fort Meade. The decision was on based on this motion by the defense seeking dismissal of the “Aiding the Enemy” charge, among others in the prosecution.

To make a long, even if sadly predictable, story short, the motion was denied by Judge Lind and the charge will proceed to determination on the merits. This is, to be sure, a nod to the prosecution (which is actually the standard in such motions for directed verdicts during trials; that is the facts are taken in the light most favorable to the non-moving party, the government). It is also, obviously, a blow to the defense, although undoubtedly an expected one for defense attorney David Coombs. There is a very outside chance of a silver lining I will discuss below.

Julie Tate at the Washington Post sets the table:

The motion to dismiss the charge was filed July 4 by Manning’s civilian defense attorney. He argued that the government had failed to show that Manning “had ‘actual knowledge’ that by giving information to WikiLeaks, he was giving information to an enemy of the United States.” He said the government did introduce evidence “which might establish that PFC Manning ‘inadvertently, accidentally, or negligently’ gave intelligence to the enemy,” but that this was not enough to prove the most serious charge against him, known as an Article 104 offense.

On two separate occasions, Lind, an Army colonel, had questioned military prosecutors about whether they would be pursuing the charge if the information had been leaked directly to The Washington Post or the New York Times. Each time, the prosecution said it would. That troubles advocates for whistleblowers, who fear that the leaking of national defense information that appears online, as it inevitably does, can be construed as assisting the enemy.

If convicted of aiding the enemy, Manning, an intelligence analyst who served in Iraq, could face life in prison.

That describes the motion and the stakes as to Manning. Julie’s article also gives more particulars on the denial this morning, and is worth a read. For a tick tock, please see the continuously good coverage by Kevin Gosztola of Firedoglake.

But as enormous as the stakes are for Bradley Manning, the enterprise of investigative journalism is also on trial, even if in an indirect manner.

Yet another journalist who has tirelessly, and superbly, covered the Manning prosecution, Alexis O’Brien, has written at the Daily Beast, the stakes for investigative journalism are also life and/or death in the face of the security/surveillance state. Citing the in court, and on the trial record, compelling testimony of Professor Yochai Benkler of Harvard Law School, Alexis related:

In a historic elocution in court last week, Prof. Yochai Benkler, co-director of the Berkman Center for Internet and Society at Harvard Law School, told Lind that “the cost of finding Pfc. Manning guilty of aiding the enemy would impose” too great a burden on the “willingness of people of good conscience but not infinite courage to come forward,” and “would severely undermine the way in which leak-based investigative journalism has worked in the tradition of [the] free press in the United States.”

“[I]f handing materials over to an organization that can be read by anyone with an internet connection, means that you are handing [it] over to the enemy—that essentially means that any leak to a media organization that can be read by any enemy anywhere in the world, becomes automatically aiding the enemy,” said Benkler. “[T]hat can’t possibly be the claim,” he added.

Benkler testified that WikiLeaks was a new mode of digital journalism that fit into a distributed model of emergent newsgathering and dissemination in the Internet age, what he termed the “networked Fourth Estate.” When asked by the prosecution if “mass document leaking is somewhat inconsistent with journalism,” Benkler responded that analysis of large data sets like the Iraq War Logs provides insight not found in one or two documents containing a “smoking gun.” The Iraq War Logs, he said, provided an alternative, independent count of casualties “based on formal documents that allowed for an analysis that was uncorrelated with the analysis that already came with an understanding of its political consequences.”

Those really are the stakes in the, now, not all that new age of digital journalism. When the prosecutors in the Manning trial, upon direct questioning by Judge Lind as to whether they would still prosecute Manning if his leaks had been delivered straight to the New York Times or Washington Post, it had to be a wake up call for traditional media. Or so you would think. But, really, the outrage has been far greater over the James Rosen/Fox subpoena that could, and arguably should, be considered relative peanuts.

But, Yochai Benkler is right as to the import of the consideration as to Wikileaks in the Manning case.

In closing, the one slim and thin ray of limited hope from today’s ruling by Denise Lind: If I were Lind and cared at all about the ultimate verdict on Pvt. Bradley Manning, I too would have made this ruling. Why, you ask? Well, because a dismissal on the motion would have been the equivalent of a directed verdict on the law and would be far easier to overturn on appeal than a decision on the merits that the government has not met its burden of proof. Is this possible; sure, it certainly is. Is this likely; no, I would not make any substantial bets on it.

Share this entry

The 3 Hop Scotch of Civil Liberties and Privacy

I was in court, so I didn’t see it, but apparently there was a little hearing over at House Judiciary Committee this morning on “Oversight of the Administration’s Use of FISA Authorities“. There was an august roll of Administration authorities and private experts: Mr. James Cole, United States Department of Justice; Mr. John C. Inglis, National Security Agency; Mr. Robert S. Litt, ODNI; Ms. Stephanie Douglas, FBI National Security Branch; Mr. Stewart Baker; Mr. Steven G. Bradbury; Mr. Jameel Jaffer; and Ms. Kate Martin.

Hmmm, let’s take a look and see if anything interesting occurred (as reported by Pete Yost of AP). Uh, well, there was THIS:

For the first time, NSA deputy director John C. Inglis disclosed Wednesday that the agency sometimes conducts what’s known as three-hop analysis. That means the government can look at the phone data of a suspect terrorist, plus the data of all of his contacts, then all of those people’s contacts, and finally, all of those people’s contacts.

If the average person calls 40 unique people, three-hop analysis could allow the government to mine the records of 2.5 million Americans when investigating one suspected terrorist.
….
The government says it stores everybody’s phone records for five years. Cole explained that because the phone companies don’t keep records that long, the NSA had to build its own database.

Go read all of Yost’s report, there is quite a bit in there that is stunning in the blithe attitude the Administration takes on this hoovering of data and personal information. Also clear: Congress has no real grasp or control of the government’s actions. The Article I brakes are out and the Article II car is accelerating and careening down the road.

Share this entry

Federal Court Strikes Down Obama DOJ’s State Secrets Defense

In what can only be described as a significant ruling, Judge Jeffrey White in the Northern California District (CAND) has rejected the federal government’s, via the Obama and Holder Department of Justice, assertion of state secrets privilege in the case of Jewel v. National Security Agency and the related consolidated case of Shubert v. Obama.

The full decision of the court is here, and in the critical active language from the court’s own summary states:

Having thoroughly considered the parties’ papers, Defendants’ public and classified declarations, the relevant legal authority and the parties’ arguments, the Court GRANTS the Jewel Plaintiffs’ motion for partial summary adjudication by rejecting the state secrets defense as having been displaced by the statutory procedure prescribed in 50 U.S.C. § 1806(f) of FISA. In both related cases, the Court GRANTS Defendants’ motions to dismiss Plaintiffs’ statutory claims on the basis of sovereign immunity. The Court further finds that the parties have not addressed the viability of the only potentially remaining claims, the Jewel Plaintiffs’ constitutional claims under the Fourth and First Amendments and the claim for violation of separation of powers and the Shubert Plaintiffs’ fourth cause of action for violation of the Fourth Amendment. Accordingly, the Court RESERVES ruling on Defendants’ motion for summary judgment on the remaining, non-statutory claims.

The Court shall require that the parties submit further briefing on the course of this litigation going forward.

Now, before too much celebration is made, there are some sobering aspects of this decision as well. As can be told from the quote above, several counts in both complaints have been dismissed based on sovereign immunity, and the court has questions about the continued validity of the remaining counts and has requested further briefing in that regard.

With the ultimate status of the litigation left for another day, the big news today is the negation of the dreaded state secrets assertion. To say this is a rare occurrence is to be too kind. In fact, the main instance where the privilege was overcome was the al-Haramain litigation, also in CAND, where Judge Vaughn Walker found non-classified evidence sufficient to proceed in the face of the state secrets assertion, and even that case was later reversed and dismissed by the 9th Circuit.

The court in Jewel mapped out the consideration process for the privilege challenge:

The analysis of whether the state secrets privilege applies involves three distinct steps. First, the Court must ascertain whether the procedural requirements for invoking the privilege have been satisfied. Second, the Court must make an independent determination whether the information is privileged. In determining whether the privilege attaches, the Court may consider a party’s need for access to the allegedly privileged materials. See Reynolds, 345 U.S. 19 at 11. Lastly, the “ultimate question to be resolved is how the matter should proceed in light of the successful privilege claim.” El-Masri v. United States, 479 F.3d 296, 304 (4th Cir. 2007).

Noting that the assertion of state secrets must not cause “a complete surrender of judicial control over access to the courts”, Judge White wrote:

Here, having reviewed the materials submitted for review and having considered the claims alleged and the record as a whole, the Court finds that Defendants have timely invoked the state secrets doctrine. Defendants contend that Plaintiffs’ lawsuits should be dismissed as a result of the application of the privilege because the state secrets information is so central to the subject matter of the suit that permitting further proceedings would jeopardize national security. Given the multiple public disclosures of information regarding the surveillance program, the Court does not find that the very subject matter of the suits constitutes a state secret. Just as in Al-Haramain, and based significantly on the same set of facts in the record here, the Court finds that although there are certainly details that the government has not yet disclosed,

because of the voluntary disclosures made by various officials since December 2005, the nature and purpose of the [Terrorist Surveillance Program], the ‘type’ of persons it targeted, and even some of its procedures are not state secrets. In other words, the government’s many attempts to assuage citizens’ fears that they have not been surveilled now doom the government’s assertion that the very subject matter of this litigation, the existence of a warrantless surveillance program, is barred by the state secrets privilege.

507 F.3d at 1200; see also Hepting v. AT&T Corp., 439 F. Supp. 2d 974, 986-88, 991 (N.D. Cal. 2006) (holding that the existence of a program of monitoring the contents of certain telephone communications was no longer a state secret as a result of the public statements made by the President and the Attorney General). Accordingly, the Court does not find dismissal appropriate based on the subject matter of the suits being a state secret. See Totten, 92 U.S. at 107.

White went on to note that there were significant items of evidence in the Jewel case tending to confirm or negate the factual allegations in Plaintiffs’ complaints that would be subject to state secrets exclusion. However, White held that, as a matter of law, the FISA procedural mechanism prescribed under 50 U.S.C. 26 § 1806(f) preempted application of the state secrets privilege in the litigation at bar.

Citing one of the interlocutory appellate decisions in al-Haramain and the underlying logic of then trial judge Vaughn Walker), Judge White said:

In its opinion on remand in the Al-Haramain matter, this district court found that “FISA preempts the state secrets privilege in connection with electronic surveillance for intelligence purposes ….” In re National Security Agency Telecommunications Records Litigation (“In re N.S.A. Telecommunication Records Litig.”), 564 F. Supp. 2d 1109, 1111 (N.D. Cal. 2008). The undersigned agrees and finds that the in camera review procedure in FISA applies and preempts the determination of evidentiary preclusion under the state secrets doctrine. Section 1806(f) of FISA displaces the state secrets privilege in cases in which electronic surveillance yields potentially sensitive evidence by providing secure procedures under which courts can consider national security evidence that the application of the state secrets privilege would otherwise summarily exclude.

Section 1806 of the FISA enabling statutes in Title 50 of the United States Code provides, inter alia;

… whenever any motion or request is made by an aggrieved person pursuant to any other statute or rule of the United States or any State . . . to discovery or obtain applications or orders or other materials relating to electronic surveillance . . . the United States district court … shall, notwithstanding any other law, if the Attorney General files an affidavit under oath that disclosure or an adversary hearing would harm the national security of the United States, review in camera and ex parte the application, order, and such other materials relating to the surveillance as may be necessary to determine whether the surveillance of the aggrieved person was lawfully authorized and conducted.

This finding by Judge White reaffirmed at least some control by federal trial courts of sweeping assertions of state secrets privilege by the Executive Branch. That is, better than nothing, for sure. But it is rather small comfort in light of the finding of qualified immunity extended to the government on the Jewel and Shubert plaintiffs’ statutory claims under FISA.

In discussing the intersection of the FISA claims with related claims by plaintiffs under the Stored Communication Act and Wiretap Act, the court did leave several more general counts of the complaints active. However, there is no way to look at the entirety of Jeff White’s opinion and come away believing the plaintiffs have any clear path to victory in the long run. The Jewel and Shubert cases live on to fight another day, for now, but the handwriting is on the wall for either the 9th Circuit or Supreme Court to deal the death blow down the road.

Share this entry

Popcorn Futures: Client No. 9 Versus Manhattan Madam in NY Comptroller Race

[photo: Vegan Feast Catering via Flickr]

[photo: Vegan Feast Catering via Flickr]

Get out the biggest popcorn bowl you own and extra napkins, find your cushy tushy pillow, and get ready for some serious entertainment.

Former New York State governor Eliot Spitzer (D) has thrown his hat in the ring for state comptroller. He will be running against Kristin Davis (R) for the same seat, along with other less well-known candidates.

Spitzer, you may recall, resigned in 2008 as governor after it was revealed he was Client No. 9 [PDF] in a federal case in which four defendants (not named Spitzer) were charged in regards to prostitution enterprise over state lines.

Davis, you will further recall, was the so-called “Manhattan Madam” arrested and prosecuted in the sweep of the prostitution ring related to the Spitzer scandal.

The popcorn is done, you may serve yourselves and make yourselves comfortable.

When you’re done laughing, that is.

When you’ve finished wiping the tears from laughing so hard, you may also want to revisit the case that caused Spitzer to resign.

Further, you may also want to take careful note of these key dates and events:

14-FEB-2008 — An op-ed written by Eliot Spitzer, Predatory Lenders’ Partner in Crime, was published in the Washington Post. It called out the White House about its actions which thwarted efforts of states’ attorneys general to prosecute predatory lending.

14-FEB-2008 — Spitzer gave testimony this same date to the U.S. House Committee on Financial Services.

10-MAR-2008 — It was first revealed to the public that Spitzer was linked to a prostitution ring.

12-MAR-2008 — Then-governor Spitzer resigned.

14-MAR-2008 — The Fed Reserve initially agrees to loan Bear Stearns at least $25 billion; within two days, Bear Stearns is sold to J. P. Morgan for only $2/share, a mere fraction of its worth a month earlier when it traded for well over $100/share.

The 2008 financial crisis was set in motion by the cascading pressure for liquidity after Bear Stearns collapsed.

A number of folks near and dear to us looked into the origins of the investigation that caught up Spitzer; it’s been said Spitzer’s bank turned over suspicious activity to the IRS. However, in light of recent disclosures about domestic spying and datamining, it might be worth asking again whether some other surveillance tripped up Spitzer — especially after the hinky extension on the original wiretap that snagged a call related to Spitzer.

Perhaps this is why Spitzer feels comfortable attempting a political comeback.

And perhaps he knows why the rest of the prostitution ring’s clients — a substantive number of them employed by Too-Big-To-Fail financial institutions — weren’t disclosed as he was.

In any event, the New York comptroller’s race ought to be highly entertaining if not informative. Stock up on popcorn, kids, and buy some popcorn futures.

Share this entry