Monthly Archives: June 2017

Fact Check: Why did the NSA breach privacy protections? – The Weekly Standard

Posted: June 1, 2017 at 10:20 pm

National Security Agency analysts under the Obama administration improperly searched Americans' information, but the searches were conducted largely out of error, according to a review of publicly available intelligence documents reported on by Circa last week.

The website reported that Obama's NSA violated privacy protections by searching a subset of intelligence for Americans' information. The story draws in part from a partially declassified April 2017 Foreign Intelligence Surveillance Court opinion, which says that the NSA repeatedly and inappropriately queried, or searched, "U.S. person identifiers" within a swath of data. The data was collected under Section 702 of the Foreign Intelligence Surveillance Act, meaning that it targeted a foreigner, on foreign soil, for a foreign intelligence purpose.

The NSA at the time was not allowed to search a chunk of intelligence, known as "upstream," using U.S. person identifiers (like an American's email address)but it did, and "with much greater frequency than had previously been disclosed" to the FISC. Upstream data is obtained from "providers that control the telecommunications "backbone" over which telephone and Internet communications transit," according to an independent government oversight agency.

Of this, Circa wrote:

The admitted violations undercut one of the primary defenses that the intelligence community and Obama officials have used in recent weeks to justify their snooping into incidental NSA intercepts about Americans.

Circa has reported that there was a three-fold increase in NSA data searches about Americans and a rise in the unmasking of U.S. person's identities in intelligence reports after Obama loosened the privacy rules in 2011.

Officials like former National Security Adviser Susan Rice have argued their activities were legal under the so-called minimization rule changes Obama made, and that the intelligence agencies were strictly monitored to avoid abuses.

The intelligence court and the NSA's own internal watchdog found that not to be true.

This sounds nefarious, especially against the backdrop of a months-long controversy over unmasking and leaks. But as Circa hints some paragraphs later, the incidents, which were self-reported by the NSA to Congress and the FISC, were in part the result of a system design quirk.

"The system automatically includes in a search all authorities an analyst's credentials permit the analyst to access," Adam Klein, a senior fellow at the Center for a New American Security, told THE WEEKLY STANDARD. "That meant that analysts with access to upstream data had to opt out of querying upstream when setting their search criteria. That system design apparently resulted in non-compliant queries."

A January notice to the FISC also said that "human error was the primary factor" in a portion of these improper queries. The NSA in an announcement also claimed that the incidents were "not willful." And as Klein told TWS, "There have been no reported incidents of intentional misuse of Section 702 by the agencies responsible for implementing it."

The NSA inspector general report read:

For the queries into FAA 702 upstream data, SV concluded that analysts had not removed the FAA 702 upstream authority from their search criteria (that automatically defaulted on the basis of their credentials) or had not included the appropriate . . . limiters to prevent FAA 702 upstream data from being queried.

The NSA told the FISC about the incidents as the court conducted its annual review for 702 certifications. The non-compliance triggered a broader NSA review, and ultimately resulted in the agency declaring the end of "about" collectionor the gathering of communications that mention a target. "About" collection often scooped up entirely domestic communications, drawing the ire of civil liberties advocates. The NSA also announced that it would purge much of its upstream data, and the FISC gave the go-ahead for analysts to query upstream using U.S. person identifiers, now that "about" has ended.

The court's late March certification reflected that change. But the court was not pleased with the non-compliance. The FISC in October described it as "a very serious Fourth Amendment issue" and attributed the agency's delayed disclosure to "an institutional 'lack of candor.'"

Still, the incidentincluding the NSA's self-reporting and public announcementsexemplifies the extent of 702 oversight, Klein said.

"The program is subject to extensive oversight, including judicial supervision by the Foreign Intelligence Surveillance Court. The recent end of "about" collection in response to FISC oversight shows that it has real teeth," he said.

If you have questions about this fact check, or would like to submit a request for another fact check, email Jenna Lifhits at jlifhits@weeklystandard.com or The Weekly Standard at factcheck@weeklystandard.com.

Read more:
Fact Check: Why did the NSA breach privacy protections? - The Weekly Standard

Posted in NSA | Comments Off on Fact Check: Why did the NSA breach privacy protections? – The Weekly Standard

NSA conducted blanket surveillance of Salt Lakers during 2002 Games, former official says – Salt Lake Tribune

Posted: at 10:20 pm

"I have reviewed the declaration of Michael V. Hayden dated March 8, 2017," Drake's statement said. "As a result of personal knowledge I gained as a long-time contractor and then senior executive (1989-2008) of the NSA, I know the statements made by Hayden in that declaration are false or, if not literally false, substantially misleading."

Drake's statement was provided to the U.S. Department of Justice this week, as part of discovery, by attorney Rocky Anderson the Salt Lake City mayor at the time of the 2002 Olympics who represents plaintiffs Mary Josephine Valdez, Howard Stephenson, Deeda Seed, Will Bagley and Thomas Nelson Huckin.

In January, Judge Robert Shelby rejected an attempt by the Department of Justice to dismiss the case.

The NSA has the capability to seize and store electronic communications passing through U.S. intercept centers, according to a statement from Drake.

After Sept. 11, 2001, "the NSA's new approach was that the president had the authority to override the Foreign Intelligence Surveillance Act (FISA) and the Bill of Rights, and the NSA worked under the authority of the president," Drake said. "The new mantra to intercepting intelligence was 'just get it' regardless of the law."

Additional information on NSA's intelligence gathering came to light in 2013 when Edward Snowden revealed to Glenn Greenwald of the Guardian, the scope of U.S. and British global surveillance programs.

One of the documents Snowden purloined spoke to the 2002 operation, where the NSA sought detailed records without warrants from telecom communications systems in Utah, including Qwest Communications.

The document, labeled "Top Secret," has several entries, including this one: "In early 2002, NSA personnel met with senior vice president of government systems and other employees from Company E [later identified as Qwest]. Under authority of the President's Surveillance Program (PSP), NSA asked Company E to provide call records in support of security for the Olympics in Salt Lake City... On 19 February 2002, Company E submitted a written proposal that discussed methods it could use to regularly replicate call record information stored in a Company E facility and potentially froward the same information to NSA ... "

In 2011 the NSA completed the $1.2 billion digital storage faci`lity called the Utah Data Center in Bluffdale.

In a 2012 lawsuit in U.S. District Court for the Northern District of California, two former highly-placed NSA employees said the agency was not filtering personal electronic data but was storing everything it collected.

"The capacity of NSA's infrastructure far exceeds the capacity necessary for the storage of discreet, targeted communications," said William Binney. "The capacity of NSA's infrastructure is consistent, as a mathematical matter, with seizing both the routing information and the contents of all communications."

In the same case, J. Kirk Wiebe, who worked as a senior analyst at the NSA from 1975 to 2001, concurred with Binney and Drake.

"I agree with Mr. Drake's assessment that everything changed at the NSA after the attacks of September 11. The prior approach focused on complying with the Foreign Intelligence Act (FISA)," he stated. "The post-September 11 approach was that NSA could circumvent federal statutes and the Constitution as long as there was some visceral connection to looking for terrorists."

By contrast, in the Utah case, current NSA Director of Operations Wayne Murphy, like Hayden, rejected allegations of an NSA "blanket" surveillance program during the 2002 Winter Olympics. He noted, however, that NSA collection of communications did and does continue to exist but is "targeted at one-end foreign communications where a communicant was reasonably believed to be a member or agent of Al-Qaeda or another international terrorist organization."

Anderson called the NSA's surveillance programs "Orwellian."

Read more here:
NSA conducted blanket surveillance of Salt Lakers during 2002 Games, former official says - Salt Lake Tribune

Posted in NSA | Comments Off on NSA conducted blanket surveillance of Salt Lakers during 2002 Games, former official says – Salt Lake Tribune

Putin: What Snowden did to the NSA was ‘wrong’ – The Hill

Posted: at 10:20 pm

Russian President Vladimir Putin condemned Edward Snowden's 2013 release of confidential NSA documents as "wrong" but defended Snowden against accusations of treason in a new interview released Thursday. He said in a show airing this month on Showtime that Snowden "didnt betray the interest of his country."

Putin made the comments to interviewer Oliver Stone as part of "ThePutin Interviews,"which will air on Showtime on June 12.

Stone is best known as the director of "Wall Street,""Natural Born Killers" and "Snowden," in which Joseph Gordon-Levitt plays Snowden.

Snowden currently lives in exile in Russia for leaking NSA documents that detailed international bulk surveillance operations.

In newly released clips from the interview, Putin reveals that he sees Snowden's actions as legal but not moral.

"I think he shouldnt have done it," Putin said of Snowden's actions. "If he didnt like anything at his work he should have simply resigned. But he went further. Thats his right. But since you are asking me whether it's right or wrong, I think its wrong."

Earlier in the interview, Putin said that Snowden had not taken any actions against the United States during or after the leaks.

"Snowden is not a traitor. He didnt betray the interest of his country. Nor did he transfer any information to any other country which would have been pernicious to his own country or to his own people." said Putin.

Putin, an ex-KGB agent, is known for his tight-gripped rule over Russia as well as an unrivaled intelligence operation against the United States.

During the interview, Putin said that Russian intelligence suffers from the problems he implied he saw with the NSA.

"Our intelligence services always conform to the law. Thats the first thing. And secondly, trying to spy on your allies if you really consider them allies and not vassals is just indecent. Because it undermines trust. And it means that in the end it deals damage to your own national security," he said.

See the article here:
Putin: What Snowden did to the NSA was 'wrong' - The Hill

Posted in NSA | Comments Off on Putin: What Snowden did to the NSA was ‘wrong’ – The Hill

ShadowBrokers launch subscription service for stolen NSA tools – FCW.com

Posted: at 10:20 pm

Cybersecurity

How much would you pay for access to stolen hacking tools developed by some of the NSA's most elite computer scientists? The enigmatic entity calling itself TheShadowBrokers thinks that $23,000 is a fair price.

The mysterious group that first appeared in August 2016 claiming to have a trove of tools pilfered from the Equation Group, which has been identified as an NSA hacking operation, have been periodically releasing bits of that stash for free.

In April, TheShadowBrokers dumped tools and exploits that led to the WannaCry ransomware attack as well as other malware that has been used in recent attacks.

The group then issued a long blog post written in pigeon English, complaining that no one had offered to buy the stolen data and make them "go dark," and contemplating the launch of a "wine of month" style subscription service.

In a new blog post, TheShadowBrokers announced that interested subscribers can sign up during the month of June for a fee of 100 ZEC or Zcash cryptocurrency worth about $235 a share -- and then in the first two weeks of July patrons will receive the next dump of hacking tools.

TheShadowBrokers said they have not decided what will be in the next release, but said it will include "Something of value to someone."

"The time for 'I'll show you mine if you show me yours first' is being over," states the post. "Peoples is seeing what happenings when theshadowbrokers is showing theshadowbrokers' first. This is being wrong question. Question to be asking 'Can my organization afford not to be first to get access to theshadowbrokers dumps?'"

In the May 15 blog post, TheShadowBrokers stated that future releases of tools could include, "web browser, router, handset exploits and tools; select items from newer Ops Disks, including newer exploits for Windows 10; compromised network data from more SWIFT providers and Central banks; compromised network data from Russian, Chinese, Iranian, or North Korean nukes and missile programs."

Cybersecurity experts continue to speculate over who is or are TheShadowBrokers and how they acquired the NSA data -- possibly from an insider such as former contractor Hal Martin, who has been charged under the Espionage Act with stealing classified data from the NSA and CIA.

About the Author

Sean Carberry is an FCW staff writer covering defense, cybersecurity and intelligence. Prior to joining FCW, he was Kabul Correspondent for NPR, and also served as an international producer for NPR covering the war in Libya and the Arab Spring. He has reported from more than two-dozen countries including Iraq, Yemen, DRC, and South Sudan. In addition to numerous public radio programs, he has reported for Reuters, PBS NewsHour, The Diplomat, and The Atlantic.

Carberry earned a Master of Public Administration from the Harvard Kennedy School, and has a B.A. in Urban Studies from Lehigh University.

The rest is here:
ShadowBrokers launch subscription service for stolen NSA tools - FCW.com

Posted in NSA | Comments Off on ShadowBrokers launch subscription service for stolen NSA tools – FCW.com

Crowdfunding campaign to buy stolen NSA hacking tools from Shadow Brokers – Network World

Posted: at 10:20 pm

By Ms. Smith, Network World | May 31, 2017 8:54 AM PT

Ms. Smith (not her real name) is a freelance writer and programmer with a special and somewhat personal interest in IT privacy and security issues.

The idea of crowdfunding to raise enough money to buy NSA-linked hacking tools from the Shadow Brokers is picking up steam and making some people steam.

The price tag for getting hold of stolen Equation Group hacking tools is 100 Zcash. When I started the article about the Shadow Brokers revealing details about its June dump of the month subscription service, the cost of 100 Zcash was equal to $22,779. By the time I finished writing, it was equal to $23,251. As I start this article, 100 Zcash is equal to $24,128. By tomorrow, the first day to subscribe to the Shadow Brokers monthly dump service, Zcash will likely cost even more dollars. If you dont have that kind of money, but want to partake in the spoils of the June dump, then maybe crowdfunding is the way to go?

At least that is what Hacker Houses Matthew Hickey and a security researcher gong by x0rz have proposed as the solution. They formed a Shadow Brokers Response Team, which a goal of creating open and transparent crowd-funded analysis of leaked NSA tools and launched a Patreon campaign to raise $25,000.

The campaign, dubbed a harm reduction exercise, states:

This patreon is a chance for those who may not have large budgets (SME, startups and individuals) in the ethical hacking and whitehat community to pool resources and buy a subscription for the new monthly released data.

Their hope is that by purchasing the stolen data and analyzing it, another attack like WannaCry can be prevented. But, oh my, some security experts are vehemently opposed to the idea and likened the crowdfunding effort to enabling cyberterrorists, negotiating with terrorists, or funding evil.

The Shadow Brokers did not reveal what data the group might dump in June, claimed to be undecided about it, but when first announcing the monthly dump subscription service, they said the dump could be:

The Patreon reads:

As a harm reduction exercise it is important that any compromised parties are notified, vulnerabilities in possession of criminals are patched and tools are assessed for capabilities. We will release any and all information obtained from this once we have assessed and notified vendors of any potential 0days.

We believe it is in the greater good to obtain these exploits and mitigate the risk presented by them, the campaign adds.

The campaign launched yesterday and thus far has 24 patrons with a crowdfunded total of $2,225. The goal is to raise $25,000. If that goal is not met, the bitcoin funds will be donated to a to a charitable organization campaigning for human and/or digital rights. Patreon subscribers will be refunded if the platform allows it (or we will not post to prevent a charge). We will split whatever maybe left over from this evenly between EDRI and the EFF. If you had money to spend on an exploit auction like this, giving it to charity should not be too objectionable for you.

Of course, the Shadow Brokers might be playing everyone and not have anything left to dump. Conversely, the group might still have powerful NSA Equation Group-developed exploits. The NSA could just step up and tell all affected parties how it was exploiting their products, as it allegedly did when it told Microsoft, so the patches can be developed and deployed before the exploits are in the public domain. But lets get real; thats highly unlikely to happen.

Nevertheless, the Patreon floats the idea:

If the NSA are willing to inform us about what it is they have lost, the capabilities and vulnerabilities it has exploits for - so that we can make informed decisions to defend our networks then we will withdraw from this option. We need accurate guidance to be able to defend our networks and so far that guidance is not forthcoming from anywhere else.

While some people view pooled funding resources as a way to give the Shadow Brokers the least amount yet still get hold of the dump to get things patched, others are adamant that giving the group any money is morally wrong.

At the time of publishing, 100 ZEC (Zcash) had slightly decreased from $24,128 at the time I started the article to $23,662. If you dont have that to spare for the June data dump monthly subscription, will you join the crowdfunding campaign?

Read more here:
Crowdfunding campaign to buy stolen NSA hacking tools from Shadow Brokers - Network World

Posted in NSA | Comments Off on Crowdfunding campaign to buy stolen NSA hacking tools from Shadow Brokers – Network World

Vietnamese hackers appear to be researching an NSA backdoor tool – CyberScoop

Posted: at 10:20 pm

A hacker group with suspected ties to the Vietnamese government appears to be researching a leaked National Security Agency tool codenamed ODDJOB, based on documents uploaded to the repository VirusTotal andtied to a source already identified as OceanLotus group, otherwise known as APT32.

A classified user manual for ODDJOB was originally published on April 14 by a mysterious group, known for sharing NSA documents, named the Shadow Brokers. A copy of this same document was then uploaded April 17 to VirusTotal along with other malicious email attachments by OceanLotus. Multiple U.S. cybersecurity firms say OceanLotus is aligned with the interests of the Vietnamese government.

The specific version of the manual uploaded by OceanLotus was not weaponized, meaning it didnt carry malware that could be used to convert the harmless PDF to a phishing lure.

ODDJOB is a high-quality, masterfully engineered digital weapon believed to have been once used to help U.S. spies collect intelligence stored on machines running older versions of Microsoft Windows. Details on this backdoor implant are scarce at the moment. The operational computer code behind ODDJOB was not released by the ShadowBrokers.

OceanLotus apparent interest in the ODDJOB manual underscores the efforts now being made by nation-backed hacking groups to better understand, and potentially reuse, leaked NSA capabilities a fear perhaps already realized with the WannaCry ransomware campaign.

When ODDJOB is deployed against a target computer it attempts to obscure network traffic by appearing to be the Microsoft Background Intelligence Transfer Services, or BITS, which is typically used by Windows Update to apply a patch to a computer.

As of Thursday afternoon, the related file uploaded to VirusTotal remained in plain view.

The manual was first made public by the Shadow Brokers in April, but interest in this document by nation-states was previously unreported.

CyberScoop first reported Wednesday that OceanLotus was likely behinda cyber-espionage operation aimed at the Philippines government; a campaign which similarly saw sensitive documents be uploaded to VirusTotal. The reason for why these documents are being uploaded to a public forum remains unclear.

In addition to the ODDJOB manual, the aforementioned file dump includes, among other documents, an apparently leaked transcript of a phone conversation between U.S. President Donald Trump and Philippines President Rodrigo Duterte,briefing notes for a call between Philippine government officials and a U.S. senator, and internal documents tied to the Philippine National Security Council.

OceanLotus has been known to conduct missions against valuable corporations, foreign governments, dissidents and domestic journalists since at least 2014, according to research conducted by FireEye.

Read more:
Vietnamese hackers appear to be researching an NSA backdoor tool - CyberScoop

Posted in NSA | Comments Off on Vietnamese hackers appear to be researching an NSA backdoor tool – CyberScoop

Man jailed for refusing to disclose iPhone passcode underlines Fifth Amendment uncertainties – 9to5Mac

Posted: at 10:20 pm

The law lags badly behind technology in a great many areas. One area where there is still huge uncertainty is whether the Fifth Amendment right against self-incrimination protects someone who refuses to disclose the passcode to their phone.

Weve seen conflicting rulings in the past, and a Miamireport shows that rulings may even vary between courts in the same state

TheMiami Herald reports that a child abuse suspect was jailed for six months for contempt of court after failing to reveal the correct passcode to his iPhone. Christopher Wheeler was arrested on suspicion of hitting and scratching his young daughter, with police believing that photos on the iPhone would help prove their case.

Detectives believe that his phone contains images of repeated injuries to the child, which could prove evidence in the case. A Broward judge earlier authorized a search warrant for Wheelers iPhone, but detectives had been unable to get in.

When a judge ordered him to provide the pass code, it didnt work. Rothschild held him in criminal contempt earlier this month.

Wheeler claimed he had given police the code and didnt know why it didnt work. The judge ruled that he would be released from jail if he reveals the correct code.

In a separate case in the same state, aMiami-Dade judge decided against holding a suspect in contempt of court for similarly refusing to reveal his passcode. Extortion suspectWesley Victor claimed that he didnt remember his passcode, and the judge ruled that there was no way to know given the passage of time.

[Wesley Victor was] accused of extorting a social-media celebrity over stolen sex videos. [He] and his girlfriend had been ordered by a judge to produce a pass code to phones suspected of containing text messages showing their collusion in the extortion plot. Victor claimed he didnt remember the number. He prevailed.

On Tuesday, Miami-Dade Circuit Judge Charles Johnson ruled that there was no way to prove that Victor actually remembered his pass code, more than 10 months after his initial arrest.

Back in 2014, a Virginia District Court ruledthat phone passcodes are protected by the 5th Amendment, though there is no such protection against using a suspects fingerprint to unlock a phone. Another Florida court took the opposite stance, insisting that the 5th Amendment does not apply to passcodes.

The legal position on using Touch ID to unlock a phone seems clearer, where multiple court rulings have decided that a fingerprint is the equivalent of a safe key, and police are free to use a suspects fingerprint to unlock the device. You can read a 2014 analysis of the legal position of both forms of protection here.

Via Engadget. Photo: MacWorld.

Check out 9to5Mac on YouTube for more Apple news!

Go here to read the rest:
Man jailed for refusing to disclose iPhone passcode underlines Fifth Amendment uncertainties - 9to5Mac

Posted in Fifth Amendment | Comments Off on Man jailed for refusing to disclose iPhone passcode underlines Fifth Amendment uncertainties – 9to5Mac

Obama Vandalized the Fourth Amendment – HuffPost

Posted: at 10:20 pm

The Fourth Amendments barriers to unreasonable searches and seizures dont get the attention the First Amendment does, but theyre at least as important as a guarantee of liberty. And during his White House years Barack Obama vandalized the Fourth Amendment. His glittering words blinded the media to his unprecedented assault on the right to be let alonethe most cherished right among civilized people.

The American Revolution was ignited by British invasions of the right to privacy. James Otis protested British Writs of Assistance that empowered every petty official to rummage through colonial businesses and homes on a hope and a prayer that smuggled goods or other incriminating evidence of wrongdoing might be discovered:

Custom-house officers may enter our houses when they please; we are commanded to permit their entry. Their menial servants may enter, may break locks, bars, and everything in their way; and whether they break through malice or revenge, no man, no court can inquire. Bare suspicion without oath is sufficient.

Pitt the Elder, speaking to the British Parliament, captured the heart and soul of what came to be ratified as the Fourth Amendment:

The poorest man may in his cottage bid defiance to all the forces of the Crown. It may be frail, its roof may shake; the wind may blow through it; the storms may enter, the rain may enter,but the King of England cannot enter; all his forces dare not cross the threshold of the ruined tenement.

The Amendment protects reasonable expectations of privacy from government surveillance, and in Olmstead v. United States (1928), Justice Brandeis (dissenting) said that, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment. The government cannot invade a persons privacy without documenting a particularized and urgent criminal justice or foreign intelligence need to a neutral and impartial magistrate. The prohibition does not bend even in cases of homicide or international terrorism where its shield might enable serious wrongful conduct to escape detection. Our Constitution is anchored to the high principle that it is better to risk being the victim of injustice than to risk being complicit in it.

That is, until now. President Obamas dragnet collection of internet and phone metadata on every American citizen obliterated the Fourth Amendments privacy fortress. Without getting a court warrant, Obamas National Security Agencys Stellar Wind program indiscriminately collected internet metadata, i.e., the accounts to which Americans sent and from which they received emails. The metadata detailed the internet protocol (IP) addresses used by people inside the United States when sending emails. Julian Sanchez of the CATO Institute explained the magnitude of the invasion of privacy:

The calls you make can reveal a lot, but now that so much of our lives are mediated by the internet, your IP logs are really a real-time map of your brain: what are you reading about, what are you curious about, what personal ad are you responding to (with a dedicated email linked to that specific ad), what online discussions are you participating in, and how often?...Seeing your IP logs and especially feeding them through sophisticated analytic tools is a way of getting inside your head that's in many ways on par with reading your diary.

President Obama also collected metadata on every phone call made by Americans, under a tortured interpretation of section 215 of the USA Patriot Act. Among other things, the telephony metadata included the time, duration, number called, and routing information of every phone communication in the United States. The database would enable the government to create a personal profile of citizen.

United States District Judge Richard Leon found a high probability that the dragnet collection of telephony metadata violated the Fourth Amendment in Klayman v. Obama.

I cannot imagine a more indiscriminate and arbitrary invasion [of privacy] than this systematic and high-tech collection and retention of personal data on virtually every single citizen for the purpose of querying and analyzing it without prior judicial approval. Surely, such a program infringes on that degree of privacy that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware the abridgment of freedom of the people by gradual and silent encroachments by those in power, would be aghast.

President Obamas own Privacy and Civil Liberties Board similarly found Steller Wind unauthorized by section 215 of the USA Patriot Act. It amplified that it could not find a single instance in which the program made a concrete difference in the outcome of a terrorism investigation[and added]we are aware of no instance in which the program directly contributed to the discovery of a previously unknown terrorist plot or the disruption of a terrorist attack. The United States Court of Appeals for the Second Circuit also concluded that Stellar Wind was illegal in ACLU v. Clapper.

President Obamas presidency was unprecedented in its scorched earth tactics against the Fourth Amendment. And were only now beginning to find out how he weaponized this information against political enemies.

Start your workday the right way with the news that matters most.

See the rest here:
Obama Vandalized the Fourth Amendment - HuffPost

Posted in Fourth Amendment | Comments Off on Obama Vandalized the Fourth Amendment – HuffPost

Opinion analysis: Finding Fourth Amendment unanimity while allowing Fourth Amendment justice – SCOTUSblog (blog)

Posted: at 10:20 pm

In an opinion that seems carefully crafted to achieve unanimity rather than break new ground, the court yesterdayunsurprisingly and unanimously rejected the U.S. Court of Appeals for the 9th Circuits Fourth Amendment provocation rule while leaving the specific facts open for further analysis on remand. Justice Samuel Alito authored a crisp 11-page opinion, without dissent, for an eight-justice court (Justice Neil Gorsuch did not participate) that is rightfully weary of 4-4 tie possibilities. Alitos opinion hewed closely to the excessive force precedent of Graham v. Connor and avoided points that had provoked strong disagreement at oral argument and in the briefs. As a result, the opinion masks more issues than it resolves. All we know, after reading this opinion, is this: When law enforcement uses force that is judged reasonable based on circumstances relevant to that determination, then a different Fourth Amendment violation cannot transform [that] reasonable use of force into an unreasonable seizure.

Sympathetic facts and three distinct Fourth Amendment claims

As detailed in my prior summary, two deputy sheriffs, searching for a felon, entered a shack where they had been told a homeless couple lived, without a search warrant and without knocking or announcing their presence or identity. Angel Mendez and his then-girlfriend were resting inside. When he heard someone entering, Mendez picked up a BB gun to move it in order to stand up. The deputies saw what they reasonably viewed as a weapon pointed in their direction, and immediately opened fire, severely injuring the woman and Mendez (whose lower leg was amputated as a result).

The Mendezes (now married) pursued three distinct Fourth Amendment claims in their federal lawsuit against the deputies and Los Angeles County: the failure to get a search warrant, the failure to knock and announce, and excessive force. No one has disputed that, at the moment of the shooting, the deputies acted reasonably in shooting to protect themselves. But as Alito notes, the district court did not end its excessive force analysis at this point. Instead, the court awarded damages based on why the shooting took place, noting that were it not for the failure to get a warrant and to knock and announce both constitutional violations Mendez would not have been startled or picked up his gun.

In so ruling, the district court applied the 9th Circuits provocation rule, which as described by Alito permits an excessive force claim where an officer intentionally or recklessly provokes a violent confrontation, if the provocation is an independent Fourth Amendment violation. On appeal, the 9th Circuit affirmed this application of its doctrine. The appeals court held that entering the residence without a warrant violated clearly established Fourth Amendment law. But the court ruled that the deputies were entitled to qualified immunity for the knock-and-announce violation, because it was not clearly established in this context: Other officers had in fact knocked and announced at the front door of the main house. Still, because the deputies unconstitutional warrantless entry had recklessly provoked the otherwise reasonable shooting, the court of appeals affirmed the damages award.

As an alternative rationale, the appeals court said that basic notions of proximate cause also supported the damages award, regardless of the provocation rule, because it was reasonably foreseeable that the officers would meet an armed homeowner when they barged into the shack unannounced. But, as the Supreme Court noted in remanding on this alternative theory, by relying on the unannounced nature of the entry, the court of appeals appeared to focus on the same knock-and-announce violation for which it had already ruled that the officers should receive immunity.

The court rejects the provocation rule as an unwarranted and illogical expansion of Graham

When law enforcement officers use force to effect a search or seizure, the Fourth Amendment requires reasonableness. A law-enforcement entry, an arrest, and even a shooting (a seizure) are Fourth Amendment events governed by this timeless yet amorphous constitutional standard. Claims of unreasonable force by law enforcement in such circumstances are characterized as excessive force, and can lead to constitutional tort damage awards for violating the Fourth Amendment, unless qualified immunity intervenes to protect the law-enforcement officers from liability.

As the court pointedly noted yesterday, The framework for analyzing excessive force claims is set out in Graham v. Connor. In Graham, Alito emphasized, the court held that the operative question in excessive force cases is whether the totality of circumstances justifies a particular search or seizure, paying careful attention to the facts and circumstances of each particular case.

No one can argue with this account of settled law because, of course, it is so general that it answers no specific questions. The trick how such general legal principles are applied to the specific facts of each case.

It is in this application that the 9th Circuit erred, said the court as it overturned the provocation rule. [T]he objective reasonableness analysis, the court explained, must be conducted separately for each search or seizure. In the courts view, the fundamental flaw of the provocation rule is that it uses a separate and independent constitutional violation to manufacture an excessive force claim where one would not otherwise exist. When viewed from the deputies perspectives at the time they confronted a weapon pointed at them, the shooting in this case was not unreasonable. By asking a court to look back in time to see if there was a different Fourth Amendment violation that is somehow tied to the eventual use of force, the Supreme Court reasoned, the 9th Circuits novel and unsupported rule conflates distinct Fourth Amendment claims.

A key footnote necessary to avoid a 4-4 tie?

If you followed the courts opinion to this point, you might think that the it would conclude by holding that Mendez cannot recover damages in this case. But that is not what the opinion says at all. Instead, a single footnote appears in the opinion, marked with an * rather than a number. One can speculate that this footnote was first suggested by someone other than the opinions author a justice who threatened otherwise to dissent. Even more likely, four justices may have asked for this footnote as a condition for joining, thereby threatening a 4-4 affirmance of the judgment below and continuation of the provocation rule. That was surely an outcome Alito and other justices wanted to avoid. Thus footnote * is the key to this opinion. Here is what it says:

Graham commands that an officers use of force be assessed for reasonableness under the totality of the circumstances. On respondents view, that means taking into account unreasonable police conduct prior to the use of force that foreseeably created the need to use it. We did not grant certiorari on that question . All we hold today is that once a use of force is deemed reasonable under Graham, it may not be found unreasonable by reference to some separate constitutional violation.

Thus and this seems surprising given the tone of the opinion up to this point the court did not rule that the Mendezes cannot recover on the facts of their case. All the court held was that the theory of the provocation rule that one constitutional violation can somehow render a different, separate and distinct, reasonable seizure unconstitutional is rejected. This holding does not mean or at least it does not appear to mean that persons injured by law enforcements use of force cannot recover for injuries proximately caused by a Fourth Amendment violation committed before the moment of a shooting. Indeed, a key phrase from Graham at the moment on which the petitioners had relied, was pointedly not mentioned anywhere in this opinion.

In light of footnote *, yesterdays opinion seems uneventful. As with all good proximate cause tort hypotheticals, the outcome will depend on the facts. This is nothing new, given that the Framers made the word unreasonable the fulcrum of the Fourth Amendment in 1790.

Conclusion

In a concluding paragraph that I imagine was also worked on by more than one justice, the court appeared to endorse the objective Alito also called it a notion that it is important to hold law enforcement officers liable for the foreseeable consequences of all their constitutional torts. This seems like a healthy recognition in light of contemporary concerns regarding police shootings. Indeed, said the court, both parties and, it appears, the unanimous court accept the principle that plaintiffs can subject to qualified immunity generally recover damages that are proximately caused by any Fourth Amendment violation. This phrasing may satisfy the justices offended by this particular shooting and favoring recovery by persons like the Mendezes severely injured by law enforcement although they had nothing to do with the event, as Justice Sonia Sotomayor said at oral argument. In deference to those justices, the court remanded the case for the lower courts to revisit the proximate cause question. (In a somewhat unusual move, the court pointed to specific pages of the briefing as a useful starting point for the remand.) Meanwhile, the 9th Circuits general provocation rule is dead, as Alito had suggested it should be two years ago in City and County of San Francisco v. Sheehan and, indeed, years earlier as a judge on the U.S Court of Appeals for the 3rd Circuit.

Thus the court preserved the logic of its precedents, while not endorsing the law-enforcement shooting of two innocent people. It would be encouraging if this opinion set a new standard for the newly reconstituted court: finding ways to rule unanimously while reaching fair results.

Click for vote alignment by ideology.

Posted in County of Los Angeles v. Mendez, Analysis, Featured, Merits Cases

Recommended Citation: Rory Little, Opinion analysis: Finding Fourth Amendment unanimity while allowing Fourth Amendment justice, SCOTUSblog (May. 31, 2017, 11:55 PM), http://www.scotusblog.com/2017/05/opinion-analysis-finding-fourth-amendment-unanimity-allowing-fourth-amendment-justice/

Original post:
Opinion analysis: Finding Fourth Amendment unanimity while allowing Fourth Amendment justice - SCOTUSblog (blog)

Posted in Fourth Amendment | Comments Off on Opinion analysis: Finding Fourth Amendment unanimity while allowing Fourth Amendment justice – SCOTUSblog (blog)

Bombshell Doc Reveals Massive Breaches of 4th Amendment By Obama NSA, FBI – MRCTV (blog)

Posted: at 10:19 pm

It must be tough to be a dinosaur pop media editor nowadays. All these Plebians who watch alternative news sites keep clamoring for real information, while youre trying to focus on other things.

Seriously, how can the great unwashed not see that Donald Trumps body language while walking beside a foreign dignitary is much more important than the publication by Wikileaks, Sinclair Broadcast Group, and Circa News that the Foreign Intelligence Surveillance Act (FISA) Court issued a secret ruling on April 26 lambasting the Obama-era National Security Agency for conducting illegal surveillance on Americans?Pop media editors must be flummoxed trying to suss out why folks in this modern era of news gathering keep trying to find out about how the federal government was spying on many of them without even obtaining the usual rubber-stamp warrants that the FISA Court hands out like candy during Trick Or Treat.

In fact, despite the dinosaur media editors stepping around it, this revelation about the FISA Court and the NSA is a major story, and sheds considerable light on just how perfidious the NSA under James Clapper has been --and how, even after the revelations of Edward Snowden about the NSA spying on Americans, the agency continued to do so.

It also serves as an opportunity to remind oneself about the FISA Court itself, and how, despite the leak of this document, the court is, in essence,sanctioned only by a 1978 law, and not by the Fourth Amendment of the US Constitution.

First, the revelation.

As Tim Johnson reports for the Miami Herald, one of the few old guard news sources to give this more than a fleeting mention:

The document, signed by (FISA Court) Judge Rosemary M. Collyer, said the court had learned in a notice filed Oct. 26, 2016, that National Security Agency analysts had been conducting prohibited queries of databases with much greater frequency than had previously been disclosed to the court. It said a judge chastised the NSAs inspector general and Office of Compliance for Operations for an institutional lack of candor for failing to inform the court. It described the matter as a very serious Fourth Amendment issue.

Thats putting it mildly.

Lets underline a few points about this notice." First, it was 99 pages long. Second, it revealed that the NSA was not even bothering to get FISA Warrants when conducting surveillance against Americans.

As nice as it is that the FISA judge sent this notice to the NSA, the only reason we, the people on whom the NSA could be spying, know about it is because it was leaked.

This reveals a great deal about the persistentactions of the NSA under its former leader, James Clapper, a man who, when asked in 2013 Senate testimony whether the NSA was spying on Americans, said, No."

The NSA spying on Americans is contrary to the Fourth Amendment in 2013, andit continued to do so without asking for the so-called FISA Warrants required by the 1978 Foreign Intelligence Surveillance Act. This, all being done by an administration whose Chief Executive claimed it was the most transparent ever.

The FISA revelation is another tiny hint that maybe, just maybe, Mr. Obama was not being truthful.

And lest we forget, this secret message, as damning as it is, comes from a court that is not really a court as the Founders envisioned it.

The FISA Court was created after the Church Hearings in Congress pursued the valid allegations that U.S. government agencies (FBI, CIA, etc) were spying on Americans, especially counter-culture figures like Martin Luther King and anti-war activists during the Vietnam Conflict. Large portions of the American public were justifiably upset about the problem, and, in classic government fashion, the politicians called their show trials, performed their kabuki theatre, and came out of it with the answer: Since the spying was against the law, they decided to write a new law to essentially make it legal while telling people they were fixing the problem.

Thus was born the Foreign Intelligence Surveillance Act, thanks mainly to the ever-trustworthy Sen.Teddy Kennedy of Massachusetts. The Act purported to protect Americans from surveillance by giving the federal government a power it didnt have according to the Constitution:the power to spy on foreigners. And, ifan American was on the other end of the conversation,to spy on that American.

All the U.S. spy agencies had to do was ask for a warrant from the newly created secret court called the FISA Court, and everything would be hunky dory.

The fact that the Fourth Amendment applies to any spying, regardless of whether it is being done to Americans or foreigners, and it requires real warrants, from real judges, public warrants in the common law tradition going back centuries? The fact that each person to be searched and each item sought had to be mentioned in this public warrant? Not part of the deal.

The FISA law essentially rewrote the Fourth Amendment, making it whatever the FISA Court wanted when it came to surveillance.

The fact that a FISA judge sent a classified message to the Executive Branch saying the NSA wasnt complying to the 1978 law is nice to know, but the entire system is unjustified based on the original intent of the people who wrote their rulebook, called the U.S. Constitution.

But it gets worse.

In fact, while the ObamaNSA continued to spy on people -- even justifying the expansion of that spying by seeing names that were merely mentioned in e-mails of people on whom they were spying, and then spying on those people it has been revealed in declassified documents that the James Comey-led FBI illegally shared surveillance data on people with third parties.

All of this is getting little press in the mainstream media, but it does not mean the issues are unimportant or will go away.

It seems the mainstream just wants us to feel good that the Obama administration was so transparent.

Heck, his gang was almost as transparent as your own private communications may have been to them.

Read more here:
Bombshell Doc Reveals Massive Breaches of 4th Amendment By Obama NSA, FBI - MRCTV (blog)

Posted in Fourth Amendment | Comments Off on Bombshell Doc Reveals Massive Breaches of 4th Amendment By Obama NSA, FBI – MRCTV (blog)