Posts

Our Government’s UnPATRIOTic Investigation of Aaron Swartz

As I noted back in December 2010, as soon as Eric Holder declared WikiLeaks’ purported crime to be Espionage, it opened up a whole slew of investigative methods associated with the PATRIOT Act. It allowed the government to use National Security Letters to get financial and call records. It allowed them to use Section 215 orders to get “any tangible thing.” And all that’s after FISA Amendments Act, which permits the government to bulk collect “foreign intelligence” on a target overseas–whether or not that foreign target is suspected of Espionage–that includes that target’s communications with Americans. The government may well be using Section 215 to later access the US person communications that have been collected under an FAA order, though that detail is one the government refuses to share with the American people.

At no point would a judge have the opportunity to challenge Holder’s assertion that a website publishing documents offered up anonymously is engaged in Espionage. All it would take is Holder’s assertion that it was, and those investigative powers would become available.

No matter how many Americans got sucked up into that investigation.

Which is why I find it interesting that Aaron Swartz’ lawyers were asking, last summer–but got only indirect answers–about how the government had collected some of the evidence, particularly emails, turned over to the grand jury.

This paragraph asked the government to “identify the origin of any and all statements of Aaron Swartz including but not limited to emails, text messages, chats, documents, memoranda or letters, i.e., to identify the source from which each statement was received and the legal procedure used to obtain each such statement of the defendant.” Swartz has received in discovery internet memoranda and chats purporting to be from him. For example, the discovery contains a number of chats on googlegroups.com which contain entries which facially indicate that Swartz was a participant in the communications. The discovery also contains a number of emails which on their faces indicate that they were either to or from Swartz. Swartz requires the additional information requested – the source of these statements and the procedure used by the government to obtain them – to enable him to move to suppress such statements if grounds exist to do so, which he cannot determine without the requested information.

The government offered this explanation.

In Paragraph 15, the defendant would require the government to identify the origin of any and all statements of Aaron Swartz in its possession and the legal procedure used to obtain the statements. All of the emails, text messages, chat sessions, and documents containing statements provided by the defendant relevant to this case were obtained either from individuals with whom the defendant communicated or from publicly available websites stored on the Internet. No emails, texts messages, chat logs, or documents were obtained from Internet service providers using orders under 18 U.S.C. 2703(d). As previously represented to defense counsel, there was no court-authorized electronic surveillance in this case. [my emphasis]

The government admits the defense has asked for the content and origin of all Aaron’s statement in its possession. In response, it described how it had gotten Aaron’s statements relevant to this case–which may well be just a subset of Aaron’s statements in their possession. It also says that it did not obtain any of his statements (presumably referring to the larger potential universe) using 18 USC 2703(d), which is how DOJ demanded Twitter information on four WikiLeaks figures in late 2010 to early 2011. It suggests everything it got relevant to this case was either willingly from people involved in private conversations with him–though it didn’t say whether it asked for them specifically or not–or from publicly available places. And it alludes to an earlier representation to the defense about whether or not it had intercepted Aaron’s communications in this case.

I believe these are the representations in question, which comes from early discovery discussions in August 2011.

C. Electronic Surveillance under Local Rule 1 16.1 (C)(l)(c)

No oral, wire, or electronic communications of the defendant as defined in 18 U.S.C. § 2510 were intercepted relating to the charges in the indictment.

D. Consensual Interceptions under Local Rule 1 16.1 (C)(l)(d)

There were no interceptions (as the term “intercept” is defined in 18 U.S.C. § 2510(4)) of wire, oral, or electronic communications relating to the charges contained in the indictment, made with the consent of one of the parties to the communication in which the defendant was intercepted or which the government intends to offer as evidence in its case-in-chief.

As you can see, in this statement the government made in August 2011 anticipated some of the same dodges the government was making in June 2012.

But in the earlier statement, the limitation on its assertions are even narrower than the later one. Whereas by June 2012 they were making assertions about “this case” in general, when they first discussed the issue, they discussed only the communications related to “the charges contained in the indictment” (though presumably they may have still been considering other charges).

Also, the second paragraph makes it very clear it is discussing intercepts only as defined under the Title III definition for intercept, which pertains to communications collected in transit. I’m not sure what the government considers communications collected under FISA and stored, though I would not be surprised, given all the discussions about the government yoking Section 215 onto FAA if they had some creative treatment of those US person communications.

None of that is proof that they had accessed Swartz’ communications via other means or, indeed, that they have any communications outside those pertaining directly to JSTOR downloads.

But their very careful hedges sure seem to leave that possibility open.

 

Wiretapping Your Business Records: The White House Doesn’t Want You To Be Confused

Sadly, whoever liberated the White House talking points on the FISA Amendments Act extension didn’t get them to TechDirt until after most of the so-called debate was over.

Particularly given this explanation for why the White House opposed Pat Leahy’s efforts to shorten the extension to three years, which would have made the next extension coincide with the PATRIOT Act extension that will be debated in the year before a Presidential election.

Aligning FAA with expiration of provisions of the Patriot Act risks confusing distinct issues.

TechDirt suggested the White House thinks Congress is stupid.

Is the White House really arguing that Congress is too stupid to hold the specifics of the FAA separate from the specifics of the wider Patriot Act? If they’re confused by those issues, then they shouldn’t be in this job. Period.

But I think this talking point is far more telling. Because, in fact, there is a great deal of circumstantial evidence that FAA and one of the three things that will be up for extension in 2015–Section 215–are not at all distinct.

Section 215, remember, is the “Business Records” provision that allows the government to get any tangible thing that is relevant to a national security investigation. We know Section 215 has been used to collect records of acetone and hydrogen peroxide purchases, and there’s abundant reason to believe the government has used Section 215 to get cell geolocation data.

Moreover, Ron Wyden and Mark Udall have pointed to Section 215 as part of the “secret law” they’ve been complaining about, even while they also point to FISA Court opinions tied to that “secret law.”

Historically, too, there seems to be a chronological tie. In the weeks after the May 11, 2004 hospital confrontation, Cheney had a secret meeting with just Robert Mueller; FBI started bypassing DOJ’s Office of Intelligence Policy Review to get Section 215 orders; and FBI obtained its first ever Section 215 order. Then, in the months after the revelation of the illegal program in 2005 (and during that year’s debate on PATRIOT renewal), the government used Section 215 to get subscriber information on trap and trace orders.

In other words, it seems possible that in response to Jim Comey and Jack Goldsmith’s efforts to stop the data mining of US person call records collected without any legal basis, the government started collecting call records under FBI orders to accomplish the same result and they repeatedly turned to Section 215 to provide legal cover for the illegal collection they refused to stop.

In fact, (I’m trying to track this down) Jeff Merkley made a speech on Thursday that invoked the Section 215 relevance standard at one point, not the FAA foreign standard. So Merkley, at least, does seem to think there’s a tie between Section 215 and FAA.

It seems, then, that the White House was (surprise!) being totally disingenuous with its purported worry that people would conflate the warrantless wiretap program with the collection it conducts using Section 215. More likely, they were worried that having these debates at the same time would make it more obvious that they’re conducting part of their warrantless surveillance program under FAA, and part of it under Section 215.

Read more

Remember When Obama Thought the FISA Amendments Act Was Imperfect?

Four years ago, when Obama caved and supported the FISA Amendments Act, he said in part,

I want to take this opportunity to speak directly to those of you who opposemy decision to support the FISA compromise.

This was not an easy call for me. I know that the FISA bill that passed the House is far from perfect. I wouldn’t have drafted the legislation like this, and it does not resolve all of the concerns that we have about President Bush’s abuse of executive power. It grants retroactive immunity to telecommunications companies that may have violated the law by cooperating with the Bush Administration’s program of warrantless wiretapping. This potentially weakens the deterrent effect of the law and removes an important tool for the American people to demand accountability for past abuses.

[snip]

Given the choice between voting for an improved yet imperfect bill, and losing important surveillance tools, I’ve chosen to support the current compromise. I do so with the firm intention — once I’m sworn in as President — to have my Attorney General conduct a comprehensive review of all our surveillance programs, and to make further recommendations on any steps needed to preserve civil liberties and to prevent executive branch abuse in the future.

[snip]

I do promise to listen to your concerns, take them seriously, and seek to earn your ongoing support to change the country. That is why we have built the largest grassroots campaign in the history of presidential politics, and that is the kind of White House that I intend to run as President of the United States — a White House that takes the Constitution seriously,conducts the peoples’ business out in the open, welcomes and listens to dissenting views, and asks you to play your part in shaping our country’s destiny.

Since that time, Obama’s DOJ has litigated the FISA Amendments Act so aggressively that it has, in fact, completely gutted the deterrent effect of the law. It has refused to share with all of Congress what activities the government actually conducts under the law, much less with American citizens. It has refused to tell Congress–even the Intelligence Committees–how many Americans have been spied on under the program. And it has been caught violating the Fourth Amendment.

And yet here’s what Obama’s Administration said today about the extension for the FISA Amendments Act, which essentially will extend the bill Candidate Obama once admitted still had problems for five years, all the way through his second term.

The Administration strongly supports H.R. 5949. The bill would reauthorize Title VII of the Foreign Intelligence Surveillance Act (FISA), which expires at the end of this year. Title VII of FISA allows the Intelligence Community to collect vital foreign intelligence information about international terrorists and other important targets overseas, while providing protection for the civil liberties and privacy of Americans. Intelligence collection under Title VII has produced and continues to produce significant information that is vital to defend the Nation against international terrorism and other threats. The Administration looks forward to working with the Congress to ensure the continued availability of this critical intelligence capability.

Change we can believe in.

Why Are FAA Boosters Satisfied with Inadequate Oversight?

Julian Sanchez hosted a Cato event yesterday that examined surveillance generally and the FISA Amendments Act specifically. At it, Ron Wyden presented his concerns about the FISA Amendments Act and other surveillance, and then ACLU’s Michelle Richardson and NYT’s Eric Lichtblau added their own views.

There was one question asked during the question period claiming that the program undergoes adequate reviews. The questioner was Georgetown’s Director of National Security Studies, Carrie Cordero, who had a role on FISA implementation until 2010, who has now reprised and expanded her comments at Lawfare.

She starts by addressing Wyden’s request that DNI to tell Congress how many Americans have had their communications “collected or reviewed.”

In particular, they have, in a series of letters, requested that the Executive Branch provide an estimate of the number of Americans incidentally intercepted during the course of FAA surveillance. According to the exchanges of letters, the Executive Branch has repeatedly denied the request, on the basis that: i) it would be an unreasonable burden on the workforce (and, presumably, would take intelligence professionals off their national security mission); and ii) gathering the data the senators are requesting would, in and of itself, violate privacy rights of Americans.

The question of whether the data call itself would violate privacy rights is a more interesting one. Multiple oversight personnel independent of the operational and analytical wings of the Intelligence Community – including the Office of Management and Budget, the NSA Inspector General, and just last month, the Inspector General of the Intelligence Community, have all said that the data call requested by the senators is not feasible. The other members of the SSCI appear to accept this claim on its face. Meanwhile, Senator Wyden states he just finds the claim unbelievable. [my emphasis]

Note, first of all, that she mischaracterizes Wyden’s request. He asked about US person communication that had been “collected or reviewed,” whereas she claimed he was asking only about incidental interception. Those are different things, and what Wyden’s interested in is far more invasive than simply having your communications sitting in a data warehouse in UT unread.

That’s important because Cordero treats one aspect of the DNI IG’s response–the privacy claim–as an “interesting question,” but then she proceeds to not answer the question. She instead reverts back to what she had correctly portrayed as NSA’s claim that NSA didn’t have the capacity because it would be “unreasonable burden on the workforce,” then asks why Wyden doesn’t believe that claim.

Remember, the privacy claim was raised solely in terms of whether the NSA’s Inspector General could conduct a review, not whether NSA analysts should be pulled off reviewing intercepts to find out how many of them are Americans. So if that claim is not credible–and ultimately, she doesn’t say it is–then NSA IG’s sole remaining rationale is a manpower one.

Frankly, if it would take that much manpower to come up with an answer, it says the program isn’t being tracked adequately.

Cordero then gets to the jist of a comment she made at the hearing: that there are a bunch of reviews which provide adequate oversight.

Meanwhile, the assertion of today’s program’s title that the FAA enables “mass spying without accountability,” is debunked by the SSCI’s own report issued on June 7. The intelligence committees have been on the receiving end of a mountain of reports describing FAA activities, the FISA Court’s reviews, and the Executive Branch’s own compliance reviews. The SSCI report, and the additional written views of Senator Feinstein (D-CA), the Committee’s Chair, states that the statutorily-mandated reporting requirements “provide the Committee with extensive visibility into the application of…minimization procedures,” and have enabled the Committee to conduct “extensive” and “robust” oversight. The report goes on to detail all of the different categories of reports and briefings that have been provided to the Committee to facilitate their oversight role, in accordance with the National Security Act of 1947, as amended. [my emphasis]

Cordero claims that the SSCI report and DiFi’s additional reviews boast about reporting requirements. But only the word “extensive” appears in the report approved by SSCI as a whole, and it appears to simply repeat language from an appendix Eric Holder and James Clapper provided. The rest comes from this paragraph:

Third, the numerous reporting requirements outlined above provide the Committee with extensive visibility into the application of these minimization procedures and enable the Committee to evaluate the extent to which these procedures are effective in protecting the privacy and civil liberties of U.S. persons. Read more

Ron Wyden: “An Obvious Question I Have Not Answered”

In the background of the larger drama of the leak witch hunts is a paragraph that, to me, summarizes where the balance between secrecy and sanity is in our country.

An obvious question that I have not answered here is whether any warrantless searches for Americans’ communications have already taken place. I am not suggesting that any warrantless searches have or have not occurred, because Senate and committee rules regarding classified information generally prohibit me from discussing what intelligence agencies are actually doing or not doing. However, I believe that we have an obligation as elected legislators to discuss what these agencies should or should not be doing, and it is my hope that a majority of my Senate colleagues will agree with that searching for Americans’ phone calls and emails without a warrant is something that these agencies should not do.

This is the language Ron Wyden used to attempt to persuade his colleagues to join his opposition to the reauthorization of the FISA Amendments Act without first including protections for Americans’ communications. A very similar paragraph appeared at the end of Wyden and Mark Udall’s dissent from the Senate Intelligence Report on the legislation.

Now, I have already shown that even leak witch hunt convert Dianne Feinstein (who supports reauthorization without telling citizens what the legislation really does) made it clear that while NSA may not target Americans under FAA, the agency does query information collected under FAA to find the communications of Americans. That is, DiFi herself made it clear that the communications collected “incidentally” are fair game for review. And both the Wyden/Udall dissent and the exchange Wyden had with Director of National Intelligence James Clapper last year–which he re-released in conjunction with his hold–make it more clear that the government is reviewing Americans’ communications it collects in the guise of “targeting” non-US persons.

Everyone–Wyden, DiFi, DNI Clapper–admit that the government is accessing Americans’ communications under FAA; it’s just the latter two are pretending they’re not doing so by hiding behind the magic word “targeting.”

With that said, let’s look at Wyden’s paragraph closely and what it says about democracy in the age of secrecy. The first sentence reads like CYA, insulation against any accusation that Wyden has revealed classified information.

An obvious question that I have not answered here is whether any warrantless searches for Americans’ communications have already taken place.

Yet at the same time, Wyden defines the question that DiFi refuses to answer clearly: whether or not the government is using FAA to conduct warrantless searches of Americans’ communications.

It’s an obvious question, Wyden continues, but he’s not legally permitted to answer it.

I am not suggesting that any warrantless searches have or have not occurred, because Senate and committee rules regarding classified information generally prohibit me from discussing what intelligence agencies are actually doing or not doing.

That said, Wyden makes it clear he knows the answer. Read more

The Government Doesn’t Want to Talk about Collecting Domestic Communications under FAA

On Friday, the government appealed the 2nd Circuit’s decision that Amnesty International and other NGOs and individuals have standing to challenge the FISA Amendments Act. I’ll have a post on the implications of their substantive argument shortly. But in the meantime, I wanted to note what they’re not even addressing.

The image to the left is a fragment of the government’s references to statutes and regulation mentioned in its brief; it’s the part of the list referring to the part of the FAA in question. As you can see, it almost–but not quite–lists every clause of the law.

One clause notably missing from the almost-sequential list above is 1881a(b)(4), which reads,

[An acquisition authorized under subsection (a)] may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States;

And while it mentions clauses that refer back to this restriction (for example, 1881a(c)(1), 1881a(d), 1881a(g)(2)(A)(i), etc), it never goes back and includes this language–the requirement that the government not intentionally acquire communications that are located entirely within the US–in its argument. (There are other clauses the brief ignores, a number of which pertain to oversight of the certifications the government has made; I may return to these at a future time.)

Or, to put it another way, the government never admits that the FAA permits the purportedly unintentional collection of entirely domestic communication.

And yet that is a part of this lawsuit. The original complaint in this suit invoked this clause:

An acquisition under section 702(a) may not … “intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States

[snip]

Moreover, the Attorney General and the DNI may acquire purely domestic communications as long as there is uncertainly about the location of one party to the communications.

And the 2nd Circuit opinion (authored by Gerard Lynch) referenced this clause:

“Targeting procedures” are procedures designed to ensure that an authorized acquisition is “limited to targeting persons reasonably believed to be located outside the United States,” and is designed to “prevent the intentional acquisition of any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States.”

[snip]

In addition, the certification must attest that the surveillance complies with statutory limitations providing that it:

[snip]

(4) may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States;

[snip]

Under the FAA, in contrast to the preexisting FISA scheme, the FISC may not monitor compliance with the targeting and minimization procedures on an ongoing basis. Instead, that duty falls to the AG and DNI, who must submit their assessments to the FISC, as well as the congressional intelligence committees and the Senate and House Judiciary Committees.

[snip]

But the government has not asserted, and the statute does not clearly state, that the FISC may rely on these assessments to revoke earlier surveillance authorizations.

Now, to some degree, the government might argue it ignored the clause prohibiting intentional–but not accidental–targeting of domestic communications because the plaintiffs’ primary basis for establishing standing is their frequent communication with likely targets overseas. As I’ll show, the government wants to make this case about a particular definition of a target, and key to that argument is a claim that it is impossible for the plaintiffs to be targets.

Yet therein lies one of the key problems with their argument, given that 1881a(b)(4) only prohibits the plaintiffs from being intentional targets; the FAA very pointedly did not prohibit the government from keeping US person information it “unintentionally” collected. In fact, Mike McConnell and Michael Mukasey started issuing veto threats when Russ Feingold tried to restrict the ongoing use of domestic communications identified as such after the fact.

Finally, in the one case that approved this kind of collection (though under the Protect America Act, not the FAA) used targeting procedures to substitute for particularity required under the Fourth Amendment. Under PAA, those procedures were not mapped out by law; under FAA they are, partly in the clause the government wants to ignore.

And yet, remarkably, the government doesn’t want that clause to be part of its discussion with SCOTUS. Seeing as how even the FISA Court of Review finds that substitute for particularity–the targeting procedures–to be a key part of compliance with the Fourth Amendment, you’d think that would be relevant.

Feinstein Tries Again to Fix the Detainee Provisions

Kudos to Dianne Feinstein for trying to eliminate the President’s ability to indefinitely detain (and kill?) American citizens. This time, she’s trying a free-standing bill titled the Due Process Guarantee Act of 2011. It says,

(1) An authorization to use military force, a declaration of war, or any similar authority shall not authorize the detention without charge or trial of a citizen or lawful permanent resident of the United States apprehended in the United States, unless an Act of Congress expressly authorizes such detention.

(2) Paragraph (1) applies to an authorization to use military force, a declaration of war, or any similar authority enacted before, on, or after the date of the enactment of the Due Process Guarantee Act of 2011.

The language seems sound enough to me. And given that this wouldn’t constrain the President’s ability to detain (or kill) Americans in Yemen, the Obama Administration might not put up as big of a fight as it did with the detainee provisions (though I suspect they would fight it, because of all the other things that rely on detention language–they’d have to rewrite a bunch of OLC memos).

Of course all that assumes this would be passed before President Newt takes over; he’d never sign something like this.

But the other thing is that DiFi has a habit of introducing very simple language and getting pushed around by the Executive, effectively letting the President tweak such language out of existence (see also her “exclusivity provision” in the FISA Amendments Act).

I think if she could get a vote, with this language, she might just win.

Unconstitutional Surveillance & United States v. U.S. District Court: Who The Winner Is May Be A Secret – Part 1

[Given the current surveillance state situation in America, the Keith case, formally known as United States v. United States District Court, is one of the most important cases from our recent past. But I don’t really believe you can understand or know the law of a case, without really understanding the facts. The Keith case doesn’t have simple facts, but they are fascinating and instructive. So bear with me – this is going to take awhile, and will be laid out over a series of four posts. What follows today is Part I. – Mary]

It was a time of war. America had been attacked in the Gulf of Tonkin. The National Security Agency (NSA) and our military had reassured us this was true. Our national security apparatus, Congress and press had joined behind the office of the President to lead us into a series of forays (Vietnam, Laos, Cambodia) that would leave tens of thousands of American soldiers dead and many times that wounded physically or mentally, while at the same time decimating over three million Vietnamese and over a 1.5 million Laotians and Cambodians.

At home, we were working our way through the civil rights movement, dealing with the cold war and threats of Russian nuclear weapons and witnessing anti-war protests that left students dead and buildings bombed. Algeria was hosting U.S. fugitives from justice, Eldridge Cleaver and Timothy Leary, while Cuban connections were alleged to be behind much of the organized anti-war movement.

Court martial proceedings had begun for the My Lai killings with polls showing most of America objected to the trial. President Nixon would later pardon Lt. Calley for his role. A trial had also, briefly, seemed to be in the works for the “Green Beret Affair,” the killing of Thai Khac Chuyen by Green Berets running an intelligence program called Project GAMMA. The investigation began after one of the soldiers assigned to the Project became convinced that he was also being scheduled for termination. Charges in the Green Beret Affair would be dropped after the CIA refused to make personnel available, claiming national security privileges.

Against this backdrop, Nixon and his campaign manager – attorney general, John Mitchell (the only Read more

Letter to Earl Blumenauer Re: Indemnification Agreements

Dear Congressman Blumenauer:

I must say, I was both surprised and heartened to see you intrepidly and doggedly pursuing the existence and nature of indemnification agreements from the United States government insulating and immunizing private companies such as Halliburton/KBR from damage liability they would otherwise accrue for heinous, illegal and/or unconscionable acts committed in their participation in national security and the war on terror. Excellent work sir!

However, now that you are up to speed on the insidious use and abuse of such provisions, maybe you would like to continue your fine work – and give honor to your oath of office to defend the Constitution – and ask the same questions, and demand answers thereto, regarding indemnification agreements given to telcos by the Bush Administration in conjunction with the telcos’ participation in the illegal and unconstitutional warrantless wiretapping program instituted by the Bush/Cheney Administration. And we know the program was illegal and unconstitutional because a United States Federal Judge directly and specifically declared it to be just that.

So, what you need to know is that the same type of craven indemnification agreements you have pluckily exposed for Halliburton/KBR were almost certainly given to the telcos participating in the President’s Wiretapping Program, and you owe it to your constituents and the citizens of this country to look into it and get answers just as you have done here.

Now I know this may be a lot to grasp and there is much for you to learn in order to successfully pursue this matter, but by great and fortuitous luck, I have already laid out everything you will need to get going. In fact, I did it nearly three years ago, and here is a taste:

For the foregoing reasons, the telcos are already protected by the immunity of existing statutory safe harbor provisions for legal conduct requested by the Administration and will have indemnity for other acts demanded by the Administration. I respectfully submit that the telcos are already sufficiently protected from the Spectre (some pun intended) of massive financial peril of the existing civil lawsuits; and that the only real reason for the desperate push for immunity is panic among Administration officials that their craven illegality will be exposed and they will be held to account. We now know for a fact, that which we have always suspected, thanks to Mike McConnell, namely that the entire belligerent push for FISA reform is all about immunity, and not about what George Bush would call “protectun Amarikuh”.

The minor issues with FISA that need tweaking could have been easily accomplished and, indeed, Congress offered long ago to work with them to do just that; but, of course, were belligerently spurned because, as Dick Cheney famously bellowed, “We believe… that we have all the legal authority we need”. This furious push has been about immunity, from the start, to prevent discovery of the Administration’s blatant and unconscionable criminal activity. The House of Representatives, and the cave-in Administration cover-up specialists in the Senate as well, should take a long, hard look at what is really going on here and steadfastly refuse the Administration’s self serving craven grab for the cover of telco immunity.

But, alas, Congress, which you were a member of, went along like a bunch of blind lemmings with the Bush/Cheney Administration’s demand for immunity for telcos that, along with the dishonest assertion of state secrets, has completely eviscerated citizens’ ability to know and understand what illegal and unconstitutional actions the US government is taking in their name, not to mention ability to seek proper redress for the crimes and acts.

So, now that you are all hardwired in on indemnification abuse, and on a roll of success, how about you go ahead and pursue this part of it? Come on Earl, it is your duty after all. Thank you in advance for your attention and cooperation in resolving this important matter.

Sincerely,

bmaz