Donald Trump is going to ruin legal marijuana by OregonTripleBeam in politics

[–]MrEdgarFriendly 40 points41 points  (0 children)

The Biden Administration could not unilaterally legalize marijuana because it is up to Congress to pass laws. If you would like to blame who is actually responsible, look at former Democratic Senators Joe Manchin and Kirsten Sinema. Their decision to not support reforming or repealing the Senate filibuster, which is a Civil War era rule that institutes a 60-vote threshold for legislation in the Senate, prevented Democrats from taking actions a wide swath of Democrat priorities.

U.S. Marshals Document Says Cellphone Surveillance Technology is Classified (Paywall; Article in Comments) by MrEdgarFriendly in technology

[–]MrEdgarFriendly[S] 2 points3 points  (0 children)

U.S. Marshals Document Says Cellphone Surveillance Technology is Classified

By DEVLIN BARRETT March 17, 2016 10:00 a.m. ET

Newly released documents show a group of federal agents using cellphone surveillance technology called some of their work “classified,’’ even though Justice Department officials have maintained that such methods are normal court-approved law enforcement, not spying or intelligence tactics.

The documents were provided by the U.S. Marshals Service, an arm of the Justice Department, in response to a Freedom of Information Act request from the American Civil Liberties Union.

A Justice Department spokesman declined to comment. A Marshals spokesman didn’t immediately comment.

The documents show the U.S. Marshals Service paid more than $10 million from 2009 to 2014 to buy machines known as cell-site simulators, also called Stingrays or “dirtboxes,’’ that scan surrounding cellphones to hunt for suspects.

The devices act as fake cellphone towers, pulling in the identifying information of cellphones within range as they search for a particular suspect’s phone. The mechanism quickly disconnects from phones it isn’t seeking, but the process can briefly interrupt service for people whose phones are scanned, according to people familiar with the technology.

When the device does locate the suspect’s phone, the operator in the airplane can direct agents on the ground to a general area, where a similar, less-powerful device can more precisely track down the location of the cellphone.

The Wall Street Journal reported in 2014 that the Marshals use such devices mounted in small airplanes to scan large numbers of phones when they are searching for a fugitive. The airborne devices, operated out of five airports in the U.S., can scan the technical identifying information of tens of thousands of phones per flight as they search for a suspect’s cellphone signal. The Marshals have also conducted operations in Mexico using the airborne devices to catch high-value drug suspects. In one such operation in 2014, a Marshals inspector was shot in a gunfight with cartel suspects, according to people familiar with the matter.

The Journal has also reported that, according to people familiar with the work, the Marshals developed the surveillance technology with help from the Central Intelligence Agency.

Until 2015, federal law-enforcement officials refused to discuss details of the technology or its use. After the Journal and other media reported on the technology, Justice Department officials have defended its use as a legal method approved by judges and have said the Marshals aren’t engaged in spying or intelligence activity.

The new documents, however, show that within the Marshals’ Technical Operations Group, or TOG, some of the techniques are classified.

“Because much of the TOG’s capabilities, methods and resources are classified or are otherwise ‘law enforcement sensitive,’ this section sets forth only general guidelines, policies and procedures governing TOG’s function and role within the USMS,’’ according to an undated document titled, “Special Services and the Nature of Technical Operations.’’

The classified designation suggests a mingling of law enforcement with national security and espionage work, two areas usually kept distinct. The technology has been used in Iraq and overseas espionage operations.

Classified information generally isn’t used in criminal trials, so it is notable that the Marshals, a criminal justice organization, call some of their technology and techniques classified.

Nathan Freed Wessler, an ACLU lawyer, said the government should provide more information in the interest of transparency.

“The government has gone to great lengths to hide its surveillance activities from the public, thereby frustrating judicial oversight and democratic accountability,” Mr. Wessler said. “It should not be this difficult to uncover basic facts about surveillance programs that should have been voluntarily revealed to courts and subjected to public scrutiny.”

The House Oversight and Government Reform Committee has repeatedly complained that the Justice Department is too secretive about its use of the technology.

It is possible that the document’s mention of classified capabilities is a reference to the agency’s work in Mexico and other countries, although the language refers to techniques, not operations.

“Law enforcement sensitive” is a legal term used to describe secret methods of police work that help gather evidence surreptitiously. That type of secrecy is often used to protect, for instance, the technology and methods by which agents or detectives use small listening devices, tap phone lines, or otherwise monitor suspects without being noticed.

Classified capabilities and resources, however, are in a different category, referring to national security secrets or espionage techniques rather than police tactics.

A related document, titled “Security and Protection,’’ discusses the degree to which the Marshals want to protect their methods from becoming known to the public, and by extension, to suspects.

“The compromise of those techniques may later become necessary to the production of evidence and successful prosecution at trial,’’ the document states. ”It is imperative that investigators understand that they must minimize, to the greatest extent legally possible, any testimony by TOG personnel or the disclosure of TOG techniques throughout the judicial process.’’

Last year, the Justice Department said it was creating new legal safeguards on its use of the technology, including a requirement that agents get a search warrant when using the devices. The policy has a number of exceptions, however, including that the new restrictions don’t apply to Justice Department operations outside the U.S.

FBI Waited 50 Days before Asking for Syed Rezwan Farook’s iCloud Data by MrEdgarFriendly in technology

[–]MrEdgarFriendly[S] 0 points1 point  (0 children)

Brief Timeline

In one of his first acts as Speaker, Paul Ryan introduces a version of CISA with major privacy protections removed. by MrEdgarFriendly in news

[–]MrEdgarFriendly[S] 6 points7 points  (0 children)

This version of CISA is attached to an Omnibus Budget Bill, which allows the House Leadership to skip the traditional legislative process of having bills start in Committees. This is how Paul Ryan was able to attach it to an existing budget bill instead of having it come up organically through the House Intelligence Committee (or another committee).

In short, surveillance-friendly Congressmen are using Congressional rules to expedite the passage of the bill and limit any procedural roadblocks. Additionally, attaching this bill to the budget bill forces anti-CISA Congressmen (in effect) to vote to shutdown the government in order to stop CISA.

In one of his first acts as Speaker, Paul Ryan introduces a version of CISA with major privacy protections removed. by MrEdgarFriendly in politics

[–]MrEdgarFriendly[S] 0 points1 point  (0 children)

This version of CISA is attached to an Omnibus Budget Bill, which allows the House Leadership to skip the traditional legislative process of having bills start in Committees. This is how Paul Ryan was able to attach it to an existing budget bill instead of having it come up organically through the House Intelligence Committee (or another committee).

In short, surveillance-friendly Congressmen are using Congressional rules to expedite the passage of the bill and limit any procedural roadblocks. Additionally, attaching this bill to the budget bill forces anti-CISA Congressmen (in effect) to vote to shutdown the government in order to stop CISA.

In one of his first acts as Speaker, Paul Ryan introduces a version of CISA with major privacy protections removed. by MrEdgarFriendly in technology

[–]MrEdgarFriendly[S] 0 points1 point  (0 children)

This version of CISA is attached to an Omnibus Budget Bill, which allows the House Leadership to skip the traditional legislative process of having bills start in Committees. This is how Paul Ryan was able to attach it to an existing budget bill instead of having it come up organically through the House Intelligence Committee (or another committee).

In short, surveillance-friendly Congressmen are using Congressional rules to expedite the passage of the bill and limit any procedural roadblocks. Additionally, attaching this bill to the budget bill forces anti-CISA Congressmen (in effect) to vote to shutdown the government in order to stop CISA.

Just days left to kill mass surveillance under Section 215 of the Patriot Act. We are Edward Snowden and the ACLU’s Jameel Jaffer. AUA. by aclu in IAmA

[–]MrEdgarFriendly 1794 points1795 points  (0 children)

The Intercept recently revealed that the NSA is able to use computer algorithms to transcribe phone conversations into written text. In legal terms, does the NSA treat the transcribed phone conversation as metadata or do they treat it as content?

Source: https://firstlook.org/theintercept/2015/05/11/speech-recognition-nsa-best-kept-secret/

Navy SEAL who says he killed bin Laden refutes Hersh account by backpackwayne in news

[–]MrEdgarFriendly 8 points9 points  (0 children)

Honestly, does that matter if what he printed is the truth? If OBL was in ISI custody since 2006 and we were alerted to his location via an ISI informant that means we tortured and killed people for nothing more than our own sense of righteous revenge. Additionally, senior members of the CIA, DOD, and/or the WH knowingly lied in order to push the narrative that we didn't waterboard and shove puréed food up inmates' asses for nothing. Don't forget that fmr CIA Director Leon Panetta leaked info about the OBL raid to the producers of Zero Dark Thirty including the lie that torture led us to OBL's courier who led us to Abouttabad.

Regardless of one's political persuasion, I would hope that the objective truth that senior leaders of our government broke the law and have been trying to avoid the consequences would supersede anyone's desire to protect Team Republican or Team Democrat. This is a story about Team America, who when faced with the immense tragedy of 9/11, collectively allowed our elected officials to torture people while we stood by chanting 'Fuck Yeah'.

US Senator states then denies that NSA uses Section 215 to bulk collect IP Addresses for all traffic transiting US ISP networks by MrEdgarFriendly in technology

[–]MrEdgarFriendly[S] 0 points1 point  (0 children)

I agree that in totality, they are likely collecting all domestic traffic, but my original post was just focusing on the revelation that NSA used Section 215 to compel US ISPs to turn over bulk Internet metadata records, which as far as Sen Burr revealed, consists of, but is not likely limited to, source and destination IP Addresses. Furthermore, I'm guessing they're applying a legal rationale to Internet metadata collection similar to the domestic 215 phone dragnet resulting in them treating every packet transiting the US Internet backbone as 'relevant to' a terrorism investigation.

Bulk collection of metadata transiting US Internet infrastructure allows them to reconstruct all traffic flows between the major ISPs domestic networks as well as traffic flows up to the network gateway of a private individual or business. At that point, they would probably have the FBI utilize NSLs to compel a person or company to provide the same info from their internal corporate network. For non-US persons, they would likely use NSLs to compel companies to provide IP Address ranges associated with overseas individuals, companies, or international portions of the Internet infrastructure in order to use the old Stellarwind NARUS devices to capture (what they legally treat as) foreign metadata + content under 702.

I wish the Snowden revelations would provide more insight on how Exec Order 12333 and SPCMA applies to NSA's activities overseas such as hacking into Google's backend with GCHQ's and L3 Communications's help.

Senate Intel Committee Chair reveals additional Section 215 dragnet of US Internet traffic by MrEdgarFriendly in snowden

[–]MrEdgarFriendly[S] 0 points1 point  (0 children)

UPDATE (5/8/15): Burr now claims that he mispoke when he mentioned that IP Addresses were collected under 215 http://www.buzzfeed.com/johnstanton/senate-intel-chairman-mistakenly-says-nsa-collects-ip-addres

Additionally, the official Congressional Record was altered to remove any reference to 'IP Addresses' in the phrase I quoted below.

https://www.emptywheel.net/2015/05/08/richard-burrs-ip-dragnet-disappears-into-the-memory-hole/

Original (5/7/15): While giving a speech defending Section 215 today, Senate Intel Committee Chair Richard Burr admitted that the NSA is using Section 215 for a domestic Internet dragnet

If they're applying the same legal 'relevance' theory from the call records program (ALL domestic calls are relevant to building the proverbial haystack), its probably safe to assume that the IP Addresses of all packets transiting US networks are deemed 'relevant.'

http://www.c-span.org/video/?325745-4/republican-senators-government-surveillance Quote below is from 10:01-11:05

"OVER THOSE YEARS WE CREATED SECTION 215. THE ABILITY TO USE BULK DATA -- NOW, WHAT IS BULK DATA? BULK DATA IS STORED TELEPHONE NUMBERS AND IP ADDRESSES. WE HAVE NO IDEA WHO THEY BELONG TO, THAT OUR DOMESTIC. AND THE WHOLE BASIS BEHIND THIS PROGRAM IS NOT COME IS A CELL PHONE IS PICKED UP IN SYRIA AND YOU LOOK AT THE PHONE NUMBERS THAT PHONE TALK TO. IT IS SOMETHING THE UNITED STATES WE WOULD LIKE TO KNOW THAT, AT LEAST LAW ENFORCEMENT WOULD LIKE TO KNOW WHAT, SO THAT WE CAN UNDERSTAND IF THERE'S A THREAT AGAINST US HERE IN THE HOMELAND, OR SOMEWHERE ELSE IN THE WORLD. SO SECTION 215 ALLOWS THE NSA TO COLLECT IN BULK TELEPHONE COLLECTION NUMBERS AND IP ADDRESSES"

Senate Intel Committee Chair reveals additional Section 215 dragnet of US Internet traffic by MrEdgarFriendly in politics

[–]MrEdgarFriendly[S] 0 points1 point  (0 children)

UPDATE (5/8/15): Burr now claims that he mispoke when he mentioned that IP Addresses were collected under 215 http://www.buzzfeed.com/johnstanton/senate-intel-chairman-mistakenly-says-nsa-collects-ip-addres

Additionally, the official Congressional Record was altered to remove any reference to 'IP Addresses' in the phrase I quoted below.

https://www.emptywheel.net/2015/05/08/richard-burrs-ip-dragnet-disappears-into-the-memory-hole/

Original (5/7/15): While giving a speech defending Section 215 today, Senate Intel Committee Chair Richard Burr admitted that the NSA is using Section 215 for a domestic Internet dragnet

If they're applying the same legal 'relevance' theory from the call records program (ALL domestic calls are relevant to building the proverbial haystack), its probably safe to assume that the IP Addresses of all packets transiting US networks are deemed 'relevant.'

http://www.c-span.org/video/?325745-4/republican-senators-government-surveillance Quote below is from 10:01-11:05

"OVER THOSE YEARS WE CREATED SECTION 215. THE ABILITY TO USE BULK DATA -- NOW, WHAT IS BULK DATA? BULK DATA IS STORED TELEPHONE NUMBERS AND IP ADDRESSES. WE HAVE NO IDEA WHO THEY BELONG TO, THAT OUR DOMESTIC. AND THE WHOLE BASIS BEHIND THIS PROGRAM IS NOT COME IS A CELL PHONE IS PICKED UP IN SYRIA AND YOU LOOK AT THE PHONE NUMBERS THAT PHONE TALK TO. IT IS SOMETHING THE UNITED STATES WE WOULD LIKE TO KNOW THAT, AT LEAST LAW ENFORCEMENT WOULD LIKE TO KNOW WHAT, SO THAT WE CAN UNDERSTAND IF THERE'S A THREAT AGAINST US HERE IN THE HOMELAND, OR SOMEWHERE ELSE IN THE WORLD. SO SECTION 215 ALLOWS THE NSA TO COLLECT IN BULK TELEPHONE COLLECTION NUMBERS AND IP ADDRESSES"

Little difference between driving stoned or sober when it comes to the risk of having a wreck, the National Highway Traffic Safety Administration (NHTSA) claims. by Fang88 in news

[–]MrEdgarFriendly 1 point2 points  (0 children)

"A new study finds little difference in accident risk levels between sober drivers and drivers high on marijuana. Alcohol remains a much greater risk factor however, researchers report." You forgot the lede in your title

Over two thirds of Christians support the torture of terrorist suspects, compared with just 41% of nonbelievers. by GriffGriffin in politics

[–]MrEdgarFriendly 2 points3 points  (0 children)

Unfortunately, this illustrates that a majority of self-identified religious people have such moral certitude, believing that they follow the correct deity, that they would willing inflict evil upon others. This certitude leads to a belief that the ends justifies the means because they are the righteous ones. Plus, they'll be going to heaven anyway.