Saturday, October 18, 2014

FERGUSON -- MICHAEL BROWN: WHY IS THE NEW YORK TIMES REVEALING FBI FORENSICS THAT APPEAR TO CLEAR OFFICER DARREN WILSON? ONLY ONE CARTOON NEEDED TO UNDERSTAND THE DEPTHS OF THE FAILURE OF THE OBAMA ADMINISTRATION

One Citizen Speaking...


FERGUSON -- MICHAEL BROWN: WHY IS THE NEW YORK TIMES REVEALING FBI FORENSICS THAT APPEAR TO CLEAR OFFICER DARREN WILSON?

Posted: 18 Oct 2014 02:16 AM PDT

ehAttorney General Eric Holder – the man who looks at everything through a racial prism

Interesting that the New York Times would appear to have leaked exculpatory FBI forensic information that might clear police officer Darren Wilson of civil rights charges and possibly convince the ongoing Grand Jury investigation to forgo indicting Officer Wilson on excessive force charges.

Police Officer in Ferguson Is Said to Recount a Struggle

The police officer who fatally shot Michael Brown in Ferguson, Mo., two months ago has told investigators that he was pinned in his vehicle and in fear for his life as he struggled over his gun with Mr. Brown, according to government officials briefed on the federal civil rights investigation into the matter. 

The officer, Darren Wilson, has told the authorities that during the scuffle, Mr. Brown reached for the gun. It was fired twice in the car, according to forensics tests performed by the Federal Bureau of Investigation. The first bullet struck Mr. Brown in the arm; the second bullet missed.

The forensics tests showed Mr. Brown’s blood on the gun, as well as on the interior door panel and on Officer Wilson’s uniform. Officer Wilson told the authorities that Mr. Brown had punched and scratched him repeatedly, leaving swelling on his face and cuts on his neck.

Source: Police Officer in Ferguson Is Said to Recount a Struggle - NYTimes.com

Bottom line …

It seems that the suspect Michael Brown, a hulking 6’4” male weighing almost 300-pounds, may have invaded Officer Darren Wilson’s vehicle or might have been pulled inside and was shot in a struggle. The shot appears to be non-fatal.

The question then becomes one of why did Darren Wilson exit his vehicle and pursue Brown – or, alternatively, why did Brown turn towards the Officer who may have believed that another attack was imminent? In either case, if the officer feared for his life, the shooting appears justifiable. As for the number of shots fired, that might be explained by vision issues caused by a severe blow to the head or other physical conditions.

Look to see the race-hustlers and grievance industry attempting to spin the forensic evidence to match their story of “Michael Brown as a victim” of police aggression by a White police officer.

As to why a progressive mainstream publication would publish this information before the release of the Grand Jury report may speak to the Obama Administration’s concern that this is just another black mark against President Barack Obama and Attorney General Eric Holder who seemed to support Michael Brown over a law enforcement officer – seemingly injecting racial politics into the case. It was unprecedented that the Attorney General personally traveled to Ferguson and members of his civil rights team were apparently on the ground before anything was known about the case.

By releasing this information early, perhaps community tension might be relieved; although I do not believe that the Administration actually cares for the community other than in a symbolic way to rally their base and sell the progressive socialist democrat meme of minority victimhood.

Since the Department of Justice and the FBI have been hyper-politicized by Obama, and the information appears to be FBI forensic data, then it might give one pause to consider who leaked the information and why.

-- steve  

ONLY ONE CARTOON NEEDED TO UNDERSTAND THE DEPTHS OF THE FAILURE OF THE OBAMA ADMINISTRATION

Posted: 17 Oct 2014 05:42 PM PDT

The facile pen of Michael Ramirez, the editorial cartoonist at Investor’s Business Daily, has captured in a single cartoon the disturbing status of the Obama Administration … 

mrc

If Americans thought that Richard Nixon as guilty of gross political corruption, one need only consider what President Obama and his cadre of progressive socialist democrats have done over the past six years. Each of the issues listed above is related to corruption, malfeasance, criminality, and general incompetence.

That is unless you believe, as I do, that the President is a Manchurian Candidate hiding behind the mask of geniality and seeking to destroy America, its institutions, and its economy from within on behalf of international socialism/communism. And, that the election of another confirmed Marxist, Hillary Clinton, with a similar pattern on corruptions, malfeasance, criminality, and general incompetence will further the goals of international socialism/communism. 

Ramirez’s simple cartoon is deeply disturbing because it is YOU they want to control.

Remember this when voting in the November 4, 2014 congressional election and make sure that the progressive socialist democrats do not get a majority in the House or the Senate – restore Constitutional Checks and Balances to American politics. It’s your life and your future at stake.

-- steve

WILL PRESIDENT OBAMA SIGN AN EXECUTIVE ORDER TO ALLOW NON-CITIZENS WITH EBOLA TO ENTER THE U.S. FOR TREATMENT?

Posted: 17 Oct 2014 05:28 PM PDT

I am having a hard time believing that President Barack Obama would deliberately place America and Americans at risk in the pursuit of his progressive socialist democrat political agenda … even if it means alienating the great majority of American citizens.

BO

Judicial Watch, a reputable watchdog organization that has received Administration documents subpoenaed and denied to Congress, now appears to have stumbled across a plan that would have President Barack Obama issuing an executive order allowing non-American citizens infected with Ebola to enter the United States for treatment under possible humanitarian grounds.

Would President Obama risk the health of Americans to pursue his political agenda?

Obama Plans to Let Ebola-infected Foreigners Into U.S. for Treatment

Judicial Watch has learned that the Obama administration is actively formulating plans to admit Ebola-infected non-U.S. citizens into the United States for treatment.  Specifically, the goal of the administration is to bring Ebola patients into the United States for treatment within the first days of diagnosis.

It is unclear who would bear the high costs of transporting and treating non-citizen Ebola patients.  The plans include special waivers of laws and regulations that ban the admission of non-citizens with a communicable disease as dangerous as Ebola.

One source tells us that the Obama administration is keeping this plan secret from Congress.The source is concerned that the proposal is illegal; endangers the public health and welfare; and should require the approval of Congress.

Obama Plans to Let Ebola-infected Foreigners Into U.S. for Treatment - Judicial Watch

It is not beyond belief …   

  

ins

Ebola Outbreak-related Immigration Relief Measures to Nationals of Guinea, Liberia and Sierra Leone Currently in the United States

U.S. Citizenship and Immigration Services (USCIS) is closely monitoring the Ebola outbreak in West Africa. USCIS offers relief measures to nationals of those three countries who are currently in the United States.

Immigration relief measures that may be available if requested include:

  • Change or extension of nonimmigrant status for an individual currently in the United States, even if the request is filed after the authorized period of admission has expired;
  • Extension of certain grants of parole made by USCIS;
  • Expedited adjudication and approval, where possible, of requests for off-campus employment authorization for F-1 students experiencing severe economic hardship;
  • Expedited processing of immigrant petitions for immediate relatives (currently in the United States) of U.S. citizens; 
  • Expedited adjudication of employment authorization applications, where appropriate; and
  • Consideration for waiver of fees associated with USCIS benefit applications.

To learn more about how USCIS provides assistance to customers affected by unforeseen circumstances in their home country, visit www.uscis.gov/humanitarian/special-situations.

For more information on USCIS and its programs, please visit www.uscis.gov, call the National Customer Service Center at 1-800-375-5283, or follow USCIS on Facebook (/uscis), Twitter (@uscis), YouTube (/uscis) and the USCIS blog The Beacon.

Is this why President Obama is adamantly against any travel ban. And, does this explain why Duncan’s VISA may have received “priority” treatment so he could marry his U.S. girlfriend? I cannot imagine that any of the elite citizens of Ebola-stricken nations wouldn’t want to wait out the crisis, safe and secure, in the United States.

Already the lawyers are jumping on the Ebola bandwagon …

il

Bottom line …

If President Obama allows Ebola-infected non-citizens to enter the United States, there is little doubt in my mind that he is placing the nation’s health at grave risk and should suffer the consequences of his actions. There will come a point where a Biden Presidency may be preferable to Obama’s “destroy America from within” pact to benefit international socialism.

-- steve 

OBAMA'S EBOLA SECRET?

Posted: 17 Oct 2014 03:13 PM PDT

It appears that President Obama wants to keep a tight political lid on the developing Ebola crisis, including the fact that his actions may have doomed American lives to further his political agenda.

So how does President Obama politicize the Ebola response, insure White House control, and contain the knowledge of any “secrets?”

He appoints another unaccountable “Czar” to manage the government’s response to Ebola. But, he makes sure that the appointee has the four requisite qualifications.

  1. He is personally loyal to President Obama – in reality, to Obama’s puppet-master, Valerie Jarrett.
  2. He knows nothing about Ebola, having no medical or healthcare background.
  3. He will take direction from the White House and ignore Congress and others who might have valuable input.
  4. He will report to a known liar, National Security Advisor Susan Rice and to muddle the lines of communication, he will also report to Homeland Security Advisor Lisa Monaco. 

So who is this patsy that will be thrown under the bus should Ebola become a major problem?

rk

It’s Ron Klain, an “American lawyer and political operative best known for serving as Chief of Staff to two Vice Presidents - Al Gore (1995–1999) and Joseph Biden (2009–2011) and Attorney General Janet Reno (1994). There is no doubt that Ron Klain is smart, well-credentialed, well-connected, and ruthless.

Klain is a known political operative and fixer and if his name is at all familiar, he is the one who “green-lighted” the disastrous 2010 Presidential visit to Solyndra, the bankrupt solar panel company with the $535 million loan guarantee from the Department of Energy.

If you need to get a flavor of Klain’s style, it is important to know that Klain was deeply involved with lobbying Congress on behalf of Fannie Mae. Mostly to help convince Congress that Fannie Mae was sound, solvent, and was not engaging in financially risky behaviors that put taxpayers on the hook for massive bailouts. Of course, Fannie Mae was being used as a democrat piggy bank to purchase political power and as a means to reward high-ranking democrats with tens of millions of dollars in salary and benefits. Not to mention, as House Financial Services Chairman Barney Frank claimed, serving as an instrument of public policy. What Barney did not mention is that he got his then boyfriend a job with Fannie Mae lobbying Congress on housing issues.

There is no doubt he is well-connected as his wife, another lawyer, Monica Medina, is a major environmental activist and currently serves as the Principal Deputy Undersecretary for Oceans and Atmosphere of the National Oceanic and Atmospheric Administration. In 2008, after the election, she served on the Presidential Transition Team and led the agency review of NOAA, and the confirmation team of Administrator Lubchenco.

Bottom line …

It appears that President Obama is more interested in putting one more layer of insulation between him and his responsibility as the President of the United States. Inserting a political operative with no medical or healthcare experience into an area that demands informed decisions. More likely, Klain’s actual role is to protect the President at all costs in the run-up to the midterm elections.

Unfortunately, like everything the corrupt, incompetent, and inept Barack Obama does, it is woefully inadequate and appears to, once again, illustrate that the President is tone deaf when it comes to the actual governance of the nation.

One might ask, where is the Surgeon General of the United States? Or, where is Nicole Lurie, M.D., M.S.P.H., the Assistant Secretary for Preparedness and Response of the United States Public Health Service?

We know where Obama is – practicing reading the words written by others from his treasured TelePrompTer.

-- steve

IT APPEARS THAT THE FBI IS ANGRY AT APPLE AND GOOGLE FOR ENCRYPTING DATA ON YOUR SMARTPHONE

Posted: 16 Oct 2014 11:43 PM PDT

The Director of the FBI, James Comey, is upset that innovations in technology involving cryptology will render data stored on electronic devices beyond the reach of law enforcement – even with a court order. Specifically calling out Apple and Google for encrypting data on their smartphones and not providing law enforcement with immediate and unsupervised access to the encryption keys.

Excerpts from Director Comey’s speech at the Brookings Institute …   

James B. Comey, Director, Federal Bureau of Investigation 
Remarks as delivered -- Brookings Institution -- Washington, D.C.

Excerpted – and [my comments in bracketed blue italics]

I wanted to meet with you to talk in a serious way about the impact of emerging technology on public safety. And within that context, I think it’s important to talk about the work we do in the FBI, and what we need to do the job you have entrusted us to do.

Technology has forever changed the world we live in. We’re online, in one way or another, all day long. Our phones and computers have become reflections of our personalities, our interests, and our identities. They hold much that is important to us. 

[Fourth Amendment to the Constitution of the United States – “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” Searches are not and should not be open-ended fishing expeditions. And, while there are national security issues involved with real-time data, there are few real-time searches that cannot be handled by a post-facto court disclosure within 72-hours.]

And with that comes a desire to protect our privacy and our data—you want to share your lives with the people you choose. I sure do. But the FBI has a sworn duty to keep every American safe from crime and terrorism, and technology has become the tool of choice for some very dangerous people

[The FBI is a law enforcement agency that has a duty to protect the continuity of government and the general order by investigating illegal activities. There must be a reasonable suspicion that illegal activities are occurring and a court mandate to conduct surreptitious electronic surveillance. There is no FBI duty to protect individual Americans from crime or terrorism.] 

Unfortunately, the law hasn’t kept pace with technology, and this disconnect has created a significant public safety problem. We call it “Going Dark,” and what it means is this: Those charged with protecting our people aren’t always able to access the evidence we need to prosecute crime and prevent terrorism even with lawful authority. We have the legal authority to intercept and access communications and information pursuant to court order, but we often lack the technical ability to do so.

[There is a significant difference between preventing terrorism (a national security issue) and prosecuting ordinary crime – which is the duty of the Department of Justice. Extending extra-judicial abilities to combat terrorism to routine law enforcement matters should be considered very carefully, lest we find ourselves in a hyperpartisan politicalized police state.]

We face two overlapping challenges.

The first concerns real-time court-ordered interception of what we call “data in motion,” such as phone calls, e-mail, and live chat sessions.

The second challenge concerns court-ordered access to data stored on our devices, such as e-mail, text messages, photos, and videos—or what we call “data at rest.” And both real-time communication and stored data are increasingly encrypted.

[Is there any procedural difference between information contained in a locked safe or that contained in a locked chip? I think not. And, whereas the accused does not have to give up the combination of a locked safe, why should any party be required to give up a password. Of course, if there is a deal for partial or full transactional immunity, that is another issue.

Constitution’s Fifth Amendment: “No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.”]

Let’s talk about court-ordered interception first, and then we’ll talk about challenges posed by different means of encryption.

In the past, conducting electronic surveillance was more straightforward. We identified a target phone being used by a bad guy, with a single carrier. We obtained a court order for a wiretap, and, under the supervision of a judge, we collected the evidence we needed for prosecution.

Today, there are countless providers, countless networks, and countless means of communicating. We have laptops, smartphones, and tablets. We take them to work and to school, from the soccer field to Starbucks, over many networks, using any number of apps. And so do those conspiring to harm us. They use the same devices, the same networks, and the same apps to make plans, to target victims, and to cover up what they’re doing. And that makes it tough for us to keep up.

If a suspected criminal is in his car, and he switches from cellular coverage to Wi-Fi, we may be out of luck. If he switches from one app to another, or from cellular voice service to a voice or messaging app, we may lose him. We may not have the capability to quickly switch lawful surveillance between devices, methods, and networks. The bad guys know this; they’re taking advantage of it every day.

In the wake of the Snowden disclosures, the prevailing view is that the government is sweeping up all of our communications. That is not true. And unfortunately, the idea that the government has access to all communications at all times has extended—unfairly—to the investigations of law enforcement agencies that obtain individual warrants, approved by judges, to intercept the communications of suspected criminals. 

[If the government is not sweeping up all of our communications, can you please explain the purpose of the NSA’s mega-datacenter in Utah. And, the disclosures that the NSA has directly tapped fiber-optic telephone and data lines for the purposes of intercepting any and all data without specificity and/or court order?]

Some believe that the FBI has these phenomenal capabilities to access any information at any time—that we can get what we want, when we want it, by flipping some sort of switch. It may be true in the movies or on TV. It is simply not the case in real life.

[Perhaps this is a semantic game – whereby the classified NSA scoops up all electronic data and the FBI simply accesses this treasure trove if necessary. Perhaps, they need to appear to allegedly get the data off a person’s private electronic devices as a cover for parallel reconstruction. That is, they know the data from the NSA intercept, and now have to sanitize it for the court without involving the NSA. Impossible or a conspiracy theory – not after what Edward Snowden has revealed.]

It frustrates me, because I want people to understand that law enforcement needs to be able to access communications and information to bring people to justice. We do so pursuant to the rule of law, with clear guidance and strict oversight. But even with lawful authority, we may not be able to access the evidence and the information we need.

[If this were literally true, the only example that Director Comey would need is the one involving the hijacker’s computer and the fact that the FBI was forbidden from accessing it. Something that may have saved approximately 3,000 lives and billions of dollars in damage. Read the story for yourself. Here the pre-9/11 law prohibited access and the FBI was denied access. Whether or not the FBI used national security criteria with the FISA court is unknown.

Following this line of reasoning, perhaps access permission should be given and limited ONLY to national security issues and not for ordinary criminal prosecutions.] 

Current law governing the interception of communications requires telecommunication carriers and broadband providers to build interception capabilities into their networks for court-ordered surveillance. But that law, the Communications Assistance for Law Enforcement Act, or CALEA, was enacted 20 years ago—a lifetime in the Internet age. And it doesn’t cover new means of communication. Thousands of companies provide some form of communication service, and most are not required by statute to provide lawful intercept capabilities to law enforcement.

[This may not be literally true as both wireline and wireless intercepts are covered; as are all public carriers of data. What may not be covered is access to individual electronic devices that are not under the direct control of the communications carriers.]

What this means is that an order from a judge to monitor a suspect’s communication may amount to nothing more than a piece of paper. Some companies fail to comply with the court order. Some can’t comply, because they have not developed interception capabilities. Other providers want to provide assistance, but they have to build interception capabilities, and that takes time and money.

[Boo hoo! Has anyone noticed the federal money pouring into the communications carriers like AT&T and the general exemptions these carriers appear to have been given special immunity from the consequences of wiretapping domestic citizens?]

The issue is whether companies not currently subject to the Communications Assistance for Law Enforcement Act should be required to build lawful intercept capabilities for law enforcement. We aren’t seeking to expand our authority to intercept communications. We are struggling to keep up with changing technology and to maintain our ability to actually collect the communications we are authorized to intercept.

[Are they asking for the ability to download all of the content of a user’s electronic device surreptitiously? Or, does this mean they want to build spying capabilities into smart television sets located in our homes à la George Orwell’s Big Brother monitoring system?]

And if the challenges of real-time interception threaten to leave us in the dark, encryption threatens to lead all of us to a very dark place. 

Encryption is nothing new. But the challenge to law enforcement and national security officials is markedly worse, with recent default encryption settings and encrypted devices and networks—all designed to increase security and privacy.

With Apple’s new operating system, the information stored on many iPhones and other Apple devices will be encrypted by default. Shortly after Apple’s announcement, Google announced plans to follow suit with its Android operating system.

This means the companies themselves won’t be able to unlock phones, laptops, and tablets to reveal photos, documents, e-mail, and recordings stored within. 

Both companies are run by good people, responding to what they perceive is a market demand. But the place they are leading us is one we shouldn’t go to without careful thought and debate as a country. 

At the outset, Apple says something that is reasonable—that it’s not that big a deal. Apple argues, for example, that its users can back-up and store much of their data in “the cloud” and that the FBI can still access that data with lawful authority. But uploading to the cloud doesn’t include all of the stored data on a bad guy’s phone, which has the potential to create a black hole for law enforcement.

And if the bad guys don’t back up their phones routinely, or if they opt out of uploading to the cloud, the data will only be found on the encrypted devices themselves. And it is people most worried about what’s on the phone who will be most likely to avoid the cloud and to make sure that law enforcement cannot access incriminating data.

Correcting Misconceptions

Some argue that we will still have access to metadata, which includes telephone records and location information from telecommunications carriers. That is true. But metadata doesn’t provide the content of any communication. It’s incomplete information, and even this is difficult to access when time is of the essence. I wish we had time in our work, especially when lives are on the line. We usually don’t.

There is a misconception that building a lawful intercept solution into a system requires a so-called “back door,” one that foreign adversaries and hackers may try to exploit. 

But that isn’t true. We aren’t seeking a back-door approach. We want to use the front door, with clarity and transparency, and with clear guidance provided by law. We are completely comfortable with court orders and legal process—front doors that provide the evidence and information we need to investigate crime and prevent terrorist attacks. 

[It appears that federal agencies have violated their “front door” privileges and that clarity and transparency in the Clinton, Bush and Obama Administrations was a joke.] 

Cyber adversaries will exploit any vulnerability they find. But it makes more sense to address any security risks by developing intercept solutions during the design phase, rather than resorting to a patchwork solution when law enforcement comes knocking after the fact. And with sophisticated encryption, there might be no solution, leaving the government at a dead end—all in the name of privacy and network security.

[The FBI did not detect nor deter the JPMorgan Chase data breach and their investigations of foreign state-sponsored hackers may never be fruitful. But, what they never say is that the very people with the keys to the kingdom can comprise your data with impunity. Whether or not these keys are held by private corporations or federal agencies matters little. A compromise is a compromise.]

Another misperception is that we can somehow guess the password or break into the phone with a so-called “brute force” attack. Even a supercomputer would have difficulty with today’s high-level encryption, and some devices have a setting whereby the encryption key is erased if someone makes too many attempts to break the password, meaning no one can access that data.

[Except that Edward Snowden has given us a reason to believe that the encryption algorithms in public use, developed with the knowledge of the CIA and NSA, might already reduce the computing power needed to unencrypt the data,]

Finally, a reasonable person might also ask, “Can’t you just compel the owner of the phone to produce the password?” Likely, no. And even if we could compel them as a legal matter, if we had a child predator in custody, and he could choose to sit quietly through a 30-day contempt sentence for refusing to comply with a court order to produce his password, or he could risk a 30-year sentence for production and distribution of child pornography, which do you think he would choose?

[How the hell did we get from terrorism and national security to child pornography and child predators? This is the type of shifting sand, law enforcement requests are based upon; whereby the public is given an admirable example and then cedes far broader powers to be used for other – possibly political – purposes.]

I’m deeply concerned about this, as both a law enforcement officer and a citizen. I understand some of this thinking in a post-Snowden world, but I believe it is mostly based on a failure to understand why we in law enforcement do what we do and how we do it. 

[Comey speaks about lofty and admirable goals – but says not one word about safeguarding the individual from abuse; or recompense for such abuse in the absence of actual dollar damages. Your reputation and future earnings are incalculable, so no harm, no foul, no compensation.]

I hope you know that I’m a huge believer in the rule of law. But I also believe that no one in this country should be above or beyond the law. There should be no law-free zone in this country. I like and believe very much that we need to follow the letter of the law to examine the contents of someone’s closet or someone’s cell phone. But the notion that the marketplace could create something that would prevent that closet from ever being opened, even with a properly obtained court order, makes no sense to me.

[First, if Comey really believed what he is saying, he would be investigating his boss and the President of the United States. Second, as for the closet, that is not the correct analogy – the correct analogy is a locked safe with a self-destruct mechanism like those used by federal agencies.] 

I think it’s time to ask: Where are we, as a society? Are we no longer a country governed by the rule of law, where no one is above or beyond that law? Are we so mistrustful of government—and of law enforcement—that we are willing to let bad guys walk away...willing to leave victims in search of justice? 

[Yes, some people are so mistrustful of government – especially a President and Administration that lies with impunity, that we have to let some bad guys walk away while protecting individual constitutional rights. And, if you want to be picky – consider that the FBI’s actions at Waco and Ruby Ridge were sketchy and provoked a civilian to blow up the Murrah Federal Building – with a great loss of life as a protest against a particular FBI sharpshooter and the FBI in general. That is not to excuse the miscreants wanton killing of innocent civilians, but to illustrate that there is deep distrust of a government that would use trumped-up charges against civilians for the purposes of little more than a publicity stunt.]

There will come a day—and it comes every day in this business—where it will matter a great deal to innocent people that we in law enforcement can’t access certain types of data or information, even with legal authorization. We have to have these discussions now.

I believe people should be skeptical of government power. I am. This country was founded by people who were worried about government power—who knew that you cannot trust people in power. So they divided government power among three branches, with checks and balances for each. And they wrote a Bill of Rights to ensure that the “papers and effects” of the people are secure from unreasonable searches. 

But the way I see it, the means by which we conduct surveillance through telecommunication carriers and those Internet service providers who have developed lawful intercept solutions is an example of government operating in the way the founders intended—that is, the executive, the legislative, and the judicial branches proposing, enacting, executing, and overseeing legislation, pursuant to the rule of law.

Perhaps it’s time to suggest that the post-Snowden pendulum has swung too far in one direction—in a direction of fear and mistrust. It is time to have open and honest debates about liberty and security. 

Some have suggested there is a conflict between liberty and security. I disagree. At our best, we in law enforcement, national security, and public safety are looking for security that enhances liberty. When a city posts police officers at a dangerous playground, security has promoted liberty—the freedom to let a child play without fear.

[Not everybody appears to be concerned with the rule of law and the Constitution of the United States. One need only cast their eyes on Comey’s boss, Attorney General Eric Holder who is under contempt of Congress for not providing legally subpoenaed documents. In essence, keeping all of the papers in a locked closet – or possibly a hard-drive destined for a future crash.]  

To read Comey’ remarks in context, they can be found at: <Source: FBI>

Excuse me, before using the “terrorism” card to justify access to constitutionally-protected information, let us examine the use of the “organized crime” card that led to the RICO Act …

Whereas the RICO (Racketeering Influenced Corrupt Organizations) Act was designed as a federal law enforcement tool to be used against organized crime, we now find RICO routinely being used by states against corporations and individuals that have nothing to do with organized crime. Mostly to enhance penalties that coerce an accused party to knuckle-under to the prosecutor’s demands, namely accept a plea bargain that will remove a RICO charge from the table.

Law as a Weapon: How RICO Subverts Liberty and the True Purpose of Law

Much of the growth of federal criminal procedures has been tied to the expanded use of RICO—the Racketeer Influenced and Corrupt Organizations Act of 1970. RICO has succeeded in blurring the lines between state and federal law enforcement and in overturning the protections inherent in the due-process guarantees of the U.S. Constitution. <Read more …

Prosecutor Misuse of RICO Laws Should End

There's a festering problem in Florida's criminal justice system: some state prosecutors are misusing our state's racketeering laws to wring guilty pleas out of innocent people and petty criminals afraid of spending decades in prison for crimes they didn't commit.

Abuse is rampant of Florida's version of the federal government's Racketeer Influenced and Corrupt Organizations Act; known more commonly by its acronym, RICO.

The federal version was created 40 years ago to fight the Mafia and the businesses and labor unions it controlled. Today in Jacksonville and elsewhere in Florida, prosecutors are attempting to use RICO laws to crush gangs. While gang-eradication is a worthwhile goal, the methods used to achieve it aren't so admirable.

People who are guilty of no more than knowing a gang member are being charged with racketeering - being part of a criminal organization - in order to get them to testify against friends or loved ones who might genuinely be guilty of criminal activities. These friends and family members face decades in prison if convicted under RICO laws. Rather than take their chances on justice, many come to plea agreements in which they take a few painful years in prison in exchange for their testimony. <Source>

Just as we see military-grade weaponry, clothes, and tactics being used in everyday law enforcement for the serving of warrants, are we to believe that federal access to constitutionally protected information will not be shared, bartered, or provided to local law enforcement agencies?  

Where are the safeguards to protect American citizens from the man with the “keys to the kingdom?”

One, the number of former FBI and law enforcement officials employed in the government and the private sector comprises an “old boys club” where off-the-books favors are routinely exchanged. There is no departmental record and no court sanctions involved. Only by accident could some aggrieved party discover this inappropriate and illegal behavior.

Two, law enforcement agencies tend to cover-up instances of wrongdoing, often substituting a letter of censure in the employee’s confidential file rather than investigating and prosecuting the matter through the courts. One may recall Earl Southers, nominated by President Barack Obama to head the TSA (Transportation Security Administration) whose nomination was withdrawn when it was discovered he used law enforcement computers to access confidential criminal records about his then-estranged wife’s new boyfriend.  But that’s not the problem – it appears that Southers was a former FBI agent and claimed that he had be “censured by his superiors at the FBI.” Instead of firing Southers or prosecuting what was clearly a criminal act, he received a slap on the wrist by the FBI. <Source> Of course, the FBI refused to comment further, citing the security of personnel issues.

Three, law enforcement agencies who employ unconstitutional or illegal means to secure confidential information are now using the very same information to create a method of “parallel reconstruction.” Re-engineering a method on how to obtain the same information using a method that would be acceptable in a court of competent jurisdiction. Or possibly by blackmailing or coercing a third-party to “flip” on the accused by using illegally-obtained information on the third-party, but not using the banned information on the accused.

Four, then there is the issue of data warehousing. Where data is collected in an anonymous manner – without specific warrant -- and stored in a database. When there is probable cause, a warrant is issued – and the law enforcement officials comb the database -- where data that wouldn’t exist except for the collection effort – and access data that can be used to demonstrate intent, a pattern of illegal practice, or reveal further information about the accused’s alleged illegal activities.

Five, then there are the leakers. Some are politicians or bureaucrats seeking to damage the political career of the opposition or kill a project. Some are criminals seeking to manipulate commercial projects or the stock market. Some are financially challenged and seek to sell information to news outlets and others. And, some are simply curiosity seekers who may disclose prohibited information to others to enhance their personal stature.

But, it all comes down to having trust in your government, its agencies, and its personnel. Something that is in short supply as Comey’s boss, Attorney General Eric Holder, might be questioned by Congress about using his office to obstruct justice. 

Yes, we have laws that appear to punish those who access and release restricted information, but they are rarely applied … 

It is amazing to me that the two subjects that politicians and law enforcement officials avoid when describing their urgent need to be able to wiretap any electronic device is the Constitution of the United States and the necessity of a law protecting citizens and providing compensation when reputations are damaged – but there are no real monetary injuries.

A law that provides for a mandatory jail term for any public official, employee, agent, or party employed or compensated by the government if they illegally access any electronically stored data for personal, political, or commercial reasons. And, once charged, the accused cannot plea bargain the charge downward to a lesser charge or plead guilty to another criminal act.

Furthermore, should there be multiple parties or a conspiracy between parties, all parties shall be charged equally.

And, should the government claim “national security,” the matter shall be reviewed by a court-appointed rotating three panel judge and their findings be presented in open court session – that is yea or nay on the national security exemption. If there is a national security claim and the material was used for personal, political, or commercial actions, the claim of national security shall give rise to the presumption of guilt. 

Bottom line …

Director Comey is right. We should have a national conversation. Realizing that “We the People” are being asked to cede our Constitutional rights to a government that is arguably corrupt, inefficient, and self-serving. And, that once those rights are ceded, they are never coming back.

Personally, I like what Comey is saying about the Constitution and the rule of law. And, it appears that he has backed it up with action on at least two occasions by putting his job on the line for truth and justice. But, the question is can we believe Comey’s boss and others in the administration, now and in the future, to exhibit the same type of high ethical standards and loyalty to our Constitution?

But, let us not forget that the FBI couldn't even track the Tsarnaev brothers before they blew up the Boston Marathon -- even though they had received information directly from Russian authorities who uncharacteristically gave us a heads up.

At the time, the FBI's excuse was that "someone" had apparently misspelled “Tsarnaev” on a terrorist list. Given the liklihood that foreign names do not fit neatly into standard American data formats and that terrorists are likely to speak in coded phrases known only to them, the need to access the electronic devices of Americans for the purposes of combatting terrorism seems unlikely. That is, unless you are paranoid -- as is the Obama Administration -- and believe we are likely to face domestic terrorism from disaffected American soldiers with extensive training and combat skills. And, let us not forget that the FBI has been highly politicized to the point where they no longer use the term Islamic terrorist or Muslim Jihadi.

And, it was James Comey who told Congress that he knew the names of most of the Americans fighting overseas with ISIL and that they would be "closely tracked" when they return to the United States. Nothing about pulling their passports and leaving them abroad -- or arresting them upon return for providing material aid and comfort to the enemy or bearing arms against American and its allies. But, then again, let us not forget that Comey is a lawyer and may want to take the Eric Holder route and create a show trial for political purposes.

While I may personally regard those who leak classified documents for political purposes to be evildoers, we do owe a debt of gratitude to Edward Snowden who exposed the government’s lies about spying on American citizens on American soil. We should also be grateful to those whistleblowers who have demonstrated that our government is not above petty prosecutions, cover-ups, and other egregious behaviors.

The true test of whether or not the government is being honest is if Congress is going to seek sanctions against those Administration officials who lied while delivering testimony under oath. Egregious because all they had to do at the time was say that the matter was classified and could only be discussed in a classified closed door session. The fact that they led both Congress AND the American people should be of grave concern to those who see our civil liberties being eroded by corrupt, self-serving politicians and the bureaucracy that actually runs the government.

I suggest that you may wish to donate to the Electronic Frontier Foundation (www.eff.org) that is attempting to reconcile digital right in an analog world and is attempting to protect your Constitutional rights from being violated simply for the convenience of government.

-- steve 

No comments:

Post a Comment

Featured Post

RT @anti_commie32: Keep up the great work!!! https://t.co/FIAnl1hxwG

RT @anti_commie32: Keep up the great work!!! https://t.co/FIAnl1hxwG — Joseph Moran (@JMM7156) May 2, 2023 from Twitter https://twitter....