Surveillance and Democracy: Chilling Tales from Around the World 1

Total Page:16

File Type:pdf, Size:1020Kb

Surveillance and Democracy: Chilling Tales from Around the World 1 Surveillance and Democracy chilling tales from around the world INCLO INTERNATIONAL NETWORK OF CIVIL LIBERTIES ORGANIZATIONS SURVEILLANCE AND DEMOCRACY: CHILLING TALES FROM AROUND THE WORLD 1 Surveillance and Democracy chilling tales from around the world Cover photo: A security camera is mounted on the side of a building overlooking an intersection in midtown Manhattan, on 31 July 2013 in New York. Photo: Mark Lennihan/AP ABOUT INCLO The International Network of Civil Liberties Organizations (INCLO) is a group of independent, national human rights organisations working to promote fundamental rights and freedoms by supporting and mutually reinforcing the work of the member organisations working in their respective countries, and by collaborating on a bilateral and multilateral basis. Each organisation is multi-issue, multi-constituency, domestic in focus, independent of government, and advocates on behalf of all persons in their respective countries through a mix of litigation, legislative campaigning, public education and grassroots advocacy. The members of INCLO that participated in this report are: the American Civil Liberties Union (ACLU), the Association for Civil Rights in Israel (ACRI), the International Human Rights Group Agora (Agora) in Russia, the Canadian Civil Liberties Association (CCLA), the Centro de Estudios Legales y Sociales (CELS) in Argentina, the Egyptian Initiative for Personal Rights (EIPR), the Human Rights Law Network (HRLN) in India, the Hungarian Civil Liberties Union (HCLU), the Irish Council for Civil Liberties (ICCL), the Kenya Human Rights Commission (KHRC), and the Legal Resources Centre (LRC) in South Africa. table of contents Acknowledgements Introduction PAGE 6 PAGE 7 SURVEILLANCE AND DEMOCRACY: CHILLING TALES FROM AROUND THE WORLD table of contents National cases: surveillance in ten countries PAGE 9 1 2 3 United States Israel Russia We’re watch-listing you Warning conversations: Vigilant state: PAGE 11 an intimidation approach the ‘Surveillance to activism? Database’ and other tools PAGE 19 PAGE 29 4 5 6 Canada Argentina India The Re (X) case and The AMIA case, the judiciary From the halls of Parliament to the invisible subjects and the intelligence services the cubicles of cybercafés: the of digital surveillance PAGE 51 Indian government is watching PAGE 41 PAGE 61 7 8 9 Hungary Ireland Kenya The cameras are on… Smoke and mirrors: Irish The case of Makaburi: and they know surveillance law and the illusion the role of surveillance who they’re seeing of accountability in extrajudicial killings PAGE 71 PAGE 79 PAGE 89 10 South Africa Conclusion and Spying for others: recommendations troubling cases of transnational surveillance PAGE 111 PAGE 99 6 INCLO ACKNOWLEDGeMENTS The report has been a collaborative effort on Ireland the part of ten organisations of INCLO. Stephen O’Hare, senior research and policy The primary chapter authors are: programme manager, ICCL United States Kenya Larry Siems, writer, and Brett Max Andrew Songa, programme manager, Kaufman, staff attorney in the ACLU’s Cen- Transformative Justice, KHRC ter for Democracy South Africa Israel Avani Singh, attorney, Constitutional Avner Pinchuk, senior attorney, ACRI Litigation Unit, and Michael Laws, researcher, Constitutional Litigation Unit, Russia LRC Damir Gainutdinov, attorney, and Pavel Chikov, executive director, Agora The primary editor of the report was Canada Larry Siems. Lucila Santos (programme Brenda McPhail, director, Privacy, coordinator, INCLO), Brett Max Kaufman Technology and Surveillance Project, CCLA (staff attorney in the ACLU’s Center for Democracy), and Steven Watt (senior staff Argentina attorney, ACLU Human Rights Program) Ignacio Bollier, project officer, Democratic also contributed edits. Security and State Violence Programme, Ximena Tordini, director of Communications, Jameel Jaffer (deputy legal director of and Paula Litvachky, director of the Justice the ACLU and director of the Center for and Security Area, CELS Democracy) reviewed and edited the final report. India Saikat Datta, independent journalist, and Mariana Migueles and Carolina Marcucci Eliza Relman, paralegal, ACLU, with the were in charge of the report’s design and support of the HRLN layout. Jazmin Tesone was the report’s photo editor. Hilary Burke copyedited the Hungary report. Fanny Hidvegi, director, Data Protection and Freedom of Information Programme, INCLO also thanks the Open Society and Rita Zagoni, programme officer, Data Foundations, the Ford Foundation and the Protection and Freedom of Information Oak Foundation for their generous support Programme, HCLU of its work in this area. SURVEILLANCE AND DEMOCRACY: CHILLING TALES FROM AROUND THE WORLD 7 introduction This report offers a ground-level view of some of the In Ireland, the office of the independent ombudsman ways surveillance, and digital electronic surveillance charged with overseeing the country’s national police in particular, is impacting on the lives of citizens and suspects it has become the target of national police residents in ten countries in Africa, the Americas, Asia, surveillance. Europe and the Middle East. In Kenya, a radical imam is gunned down on the street, The ten author organisations are members of the and investigations point to state-sanctioned death International Network of Civil Liberties Organizations squads operating on the basis of information gathered (INCLO), and their dispatches are rooted in their through transnational intelligence sharing. experiences as civil and human rights litigators and In South Africa, the head of an internationally renowned advocates in their respective countries. Their stories are environmental organisation is the subject of a request distinct, reflecting local and national political realities, for “specific security assessments” from a foreign but their concerns, like the surveillance technologies government to the South African government, and the themselves, are transnational, interconnected and, South African organisation Legal Resources Centre increasingly, shared. (LRC) learns that it has been subject to unlawful In the United States, a Marine Corps veteran tries surveillance by the United Kingdom’s Government to board a plane and learns he is on a secret no-fly Communications Headquarters (GCHQ). list, apparently based on innocuous private email Separately, these stories describe concrete instances communications. in which governments have used surveillance to violate In Israel, state security agents summon peaceful political civil and human rights. Together, they challenge the activists for ‘warning conversations’ that make clear notion that digital and more traditional surveillance their lives and communications are being monitored. operations are harmless intrusions and that these tools are being used in democratic countries with adequate In Russia, a respected human rights advocate learns restraint and oversight. after repeated detentions that he is listed in the “human This publication is by no means a comprehensive survey rights activists” section of the national surveillance of the digital and traditional surveillance programmes database. operating in these countries. Rather, INCLO member In Canada, a conscientious judge discovers that his organisations have focused on specific cases in their country’s intelligence services have been circumventing countries where abusive government surveillance has the law and the courts to spy on Canadian citizens. come to light, and where member organisations and other civil and human rights groups have sought to In Argentina, the investigation of its worst terrorist attack challenge or curtail these practices. While the nature included illegal surveillance and intelligence activities to and purpose of these operations differ significantly from cover up the truth, leaving the attack unsolved to this day. country to country, these organisations have faced – In India, a journalist on the brink of exposing and still face – a common set of obstacles in seeking to government surveillance of opposition politicians confront the abuses: most significantly, poorly defined becomes the target of surveillance himself. legal frameworks delimiting surveillance powers and safeguarding individual rights; lack of transparency in In Hungary, the residents of a multiethnic regard to laws and practices governing surveillance; neighbourhood in Budapest find themselves living under feeble or insufficient mechanisms for overseeing the gaze of cameras that can recognise their faces. intelligence agencies and their intelligence operations; 8 INCLO and limited avenues for pursuing accountability when limiting domestic surveillance in their own countries. intelligence services misuse surveillance tools. These countries have also collaborated with intelligence services in other countries to form surveillance coalitions These are not new challenges. Surveillance, a known as, ‘Nine Eyes,’ ‘14 Eyes,’ ‘Rampart A (or 33 cornerstone of oppressive states, has always posed a Eyes)’ and ‘41 Eyes,’ creating transnational networks particular test for open, democratic societies; almost to gather, store and share intelligence that not only by definition, clandestine intelligence gathering strains defy national laws but also challenge concepts of democratic structures and stretches fundamental national sovereignty and distort fundamental notions commitments to due process, transparency and citizen of government accountability to the citizenry and the oversight. But there is something new in the scope
Recommended publications
  • “State of Civil Society Report: 2015
    the year in review State of Civil Society report 2015: THE YEAR IN REVIEW ...these stories tell us that only civil introduction society, in its broadest sense, is taking a It has been another year of hard work and high achievement for civil society. The story of the year since the stance against the 2014 State of Civil Society Report was published has partly been one of a continuing series of attacks on civil concentration of society in the many countries where, when civil society asks difficult questions about power, the powerful seek to silence it. But is has also been a story of impressive and sustained civil society response, in a world that has power in the hands of become more turbulent and contested. a tiny, global, super- rich elite, and against As we show below, civil society faces challenges - of lack of space, under-resourcing and limited access to the attempts of many decision-makers. Civil society also needs continually to prove its connection with and relevance to citizens, political leaders and and it needs to demonstrate its ability to stay ahead of trends and innovate. When civil society groups do not corporate interests do these, they fail. But so often, we see civil society leading the response to crisis, taking on difficult issues, contributing to change, and winning arguments for social justice. to undermine human rights and This year in review section of the 2015 CIVICUS State of Civil Society Report is complemented by our report’s the value of people’s special thematic section on the resourcing for civil society, and the 27 guest contributions, from civil society participation.
    [Show full text]
  • POLICING REFORM in AFRICA Moving Towards a Rights-Based Approach in a Climate of Terrorism, Insurgency and Serious Violent Crime
    POLICING REFORM IN AFRICA Moving towards a rights-based approach in a climate of terrorism, insurgency and serious violent crime Edited by Etannibi E.O. Alemika, Mutuma Ruteere & Simon Howell POLICING REFORM IN AFRICA Moving towards a rights-based approach in a climate of terrorism, insurgency and serious violent crime Edited by Etannibi E.O. Alemika, University of Jos, Nigeria Mutuma Ruteere, UN Special Rapporteur, Kenya Simon Howell, APCOF, South Africa Acknowledgements This publication is funded by the Ford Foundation, the United Nations Development Programme, and the Open Societies Foundation. The findings and conclusions do not necessarily reflect their positions or policies. Published by African Policing Civilian Oversight Forum (APCOF) Copyright © APCOF, April 2018 ISBN 978-1-928332-33-6 African Policing Civilian Oversight Forum (APCOF) Building 23b, Suite 16 The Waverley Business Park Wyecroft Road Mowbray, 7925 Cape Town, ZA Tel: +27 21 447 2415 Fax: +27 21 447 1691 Email: [email protected] Web: www.apcof.org.za Cover photo taken in Nyeri, Kenya © George Mulala/PictureNET Africa Contents Foreword iv About the editors v SECTION 1: OVERVIEW Chapter 1: Imperatives of and tensions within rights-based policing 3 Etannibi E. O. Alemika Chapter 2: The constraints of rights-based policing in Africa 14 Etannibi E.O. Alemika Chapter 3: Policing insurgency: Remembering apartheid 44 Elrena van der Spuy SECTION 2: COMMUNITY–POLICE NEXUS Chapter 4: Policing in the borderlands of Zimbabwe 63 Kudakwashe Chirambwi & Ronald Nare Chapter 5: Multiple counter-insurgency groups in north-eastern Nigeria 80 Benson Chinedu Olugbuo & Oluwole Samuel Ojewale SECTION 3: POLICING RESPONSES Chapter 6: Terrorism and rights protection in the Lake Chad basin 103 Amadou Koundy Chapter 7: Counter-terrorism and rights-based policing in East Africa 122 John Kamya Chapter 8: Boko Haram and rights-based policing in Cameroon 147 Polycarp Ngufor Forkum Chapter 9: Police organizational capacity and rights-based policing in Nigeria 163 Solomon E.
    [Show full text]
  • Mwazighe, Charles Lenjo Title Legal Responses to Terrorism: Case Study of the Republic of Kenya Publisher Monterey, Ca
    Author(s) Mwazighe, Charles Lenjo Title Legal responses to terrorism: case study of the Republic of Kenya Publisher Monterey, California. Naval Postgraduate School Issue Date 2012-12 URL http://hdl.handle.net/10945/27876 This document was downloaded on October 10, 2013 at 15:48:27 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS LEGAL RESPONSES TO TERRORISM: CASE STUDY OF THE REPUBLIC OF KENYA by Charles Lenjo Mwazighe December 2012 Thesis Co-Advisors: Thomas C. Bruneau Carolyn C. Halladay Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED December 2012 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS LEGAL RESPONSES TO TERRORISM: CASE STUDY OF THE REPUBLIC OF KENYA 6. AUTHOR(S) Charles Lenjo Mwazighe 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9.
    [Show full text]
  • Prism Vol. 9, No. 2 Prism About Vol
    2 021 PRISMVOL. 9, NO. 2 | 2021 PRISM VOL. 9, NO. 2 NO. 9, VOL. THE JOURNAL OF COMPLEX OPER ATIONS PRISM ABOUT VOL. 9, NO. 2, 2021 PRISM, the quarterly journal of complex operations published at National Defense University (NDU), aims to illuminate and provoke debate on whole-of-government EDITOR IN CHIEF efforts to conduct reconstruction, stabilization, counterinsurgency, and irregular Mr. Michael Miklaucic warfare operations. Since the inaugural issue of PRISM in 2010, our readership has expanded to include more than 10,000 officials, servicemen and women, and practi- tioners from across the diplomatic, defense, and development communities in more COPYEDITOR than 80 countries. Ms. Andrea L. Connell PRISM is published with support from NDU’s Institute for National Strategic Studies (INSS). In 1984, Secretary of Defense Casper Weinberger established INSS EDITORIAL ASSISTANTS within NDU as a focal point for analysis of critical national security policy and Ms. Taylor Buck defense strategy issues. Today INSS conducts research in support of academic and Ms. Amanda Dawkins leadership programs at NDU; provides strategic support to the Secretary of Defense, Chairman of the Joint Chiefs of Staff, combatant commands, and armed services; Ms. Alexandra Fabre de la Grange and engages with the broader national and international security communities. Ms. Julia Humphrey COMMUNICATIONS INTERNET PUBLICATIONS PRISM welcomes unsolicited manuscripts from policymakers, practitioners, and EDITOR scholars, particularly those that present emerging thought, best practices, or train- Ms. Joanna E. Seich ing and education innovations. Publication threshold for articles and critiques varies but is largely determined by topical relevance, continuing education for national and DESIGN international security professionals, scholarly standards of argumentation, quality of Mr.
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • National Police Service Badges of Rank and Insignia
    APPENDIX 31(gg): NATIONAL POLICE SERVICE BADGES OF RANK AND INSIGNIA S/NO RANK INSIGNIA DESCRIPTION Shoulder Badge : Crossed scimitar sword and swagger cane surrounded by a laurel wreath, surmounted by two lion badges. 1. Inspector General Gorget Patches: Red velvet, 4 cm wide and 9.5 cm long pointed at the top with one vertical row of three gold embroidered oak leaves (without acorn), small golden Service button 2 cm. from point of the patch. Cap Peak: Two rows of twisted oak leaf gold lace. Lanyard: National Police Service colours. Aiguillettes: Gold coloured aiguillettes when wearing cereminial dress. The name ‘National Police Service’ is inscribed at the base of the cloth badge. Shoulder Badge : Crossed scimitar sword and swagger cane surrounded by a laurel wreath, surmounted by a military pattern star and a lion badge. Gorget Patches:Black/maroon velvet, 4 cm wide and 9.5 cm long pointed at the top with one vertical row of three silver embroidered oak leaves 2. Deputy Inspector General (without acorn). A small silver/gold Service button 2 cm. from point of the patch. Cap Peak:Two rows of twisted oak leaf silver/golden lace. Lanyard: Respective Service colours. Aiguillettes: Silver/gold coloured aiguillettes when wearing cereminial dress. The name of the respective service is inscribed at the base of the cloth badge. 1 Shoulder Badge: A crossed scimitar sword and a swagger cane surrounded by a laurel wreath surmounted by a lion badge. Gorget Patches: Black/maroon velvet, 4cm wide and 9.5 cm long pointed 3. Senior Assistant Inspector at the top with one vertical row of three silver/golden embroided oak General leaves (without acorn).
    [Show full text]
  • A Failure of Intelligence: the Echelon Interception System & the Fundamental Right to Privacy in Europe
    Pace International Law Review Volume 14 Issue 2 Fall 2002 Article 7 September 2002 Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe Kevin J. Lawner Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Kevin J. Lawner, Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe, 14 Pace Int'l L. Rev. 435 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss2/7 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. POST-SEPT. 11TH INTERNATIONAL SURVEILLANCE ACTIVITY - A FAILURE OF INTELLIGENCE: THE ECHELON INTERCEPTION SYSTEM & THE FUNDAMENTAL RIGHT TO PRIVACY IN EUROPE Kevin J. Lawner* I. Introduction ....................................... 436 II. Communications Intelligence & the United Kingdom - United States Security Agreement ..... 443 A. September 11th - A Failure of Intelligence .... 446 B. The Three Warning Flags ..................... 449 III. The Echelon Interception System .................. 452 A. The Menwith Hill and Bad Aibling Interception Stations .......................... 452 B. Echelon: The Abuse of Power .................. 454 IV. Anti-Terror Measures in the Wake of September 11th ............................................... 456 V. Surveillance Activity and the Fundamental Right to Privacy in Europe .............................. 460 A. The United Nations International Covenant on Civil and Political Rights and the Charter of Fundamental Rights of the European Union... 464 B.
    [Show full text]
  • Trend Analysis the Israeli Unit 8200 an OSINT-Based Study CSS
    CSS CYBER DEFENSE PROJECT Trend Analysis The Israeli Unit 8200 An OSINT-based study Zürich, December 2019 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Trend analysis: The Israeli Unit 8200 – An OSINT-based study Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group, Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, S. (2019). Trend Analysis: The Israeli Unit 8200 – An OSINT-based study. Center for Security Studies (CSS), ETH Zürich. 1 Trend analysis: The Israeli Unit 8200 – An OSINT-based study . Table of Contents 1 Introduction 4 2 Historical Background 5 2.1 Pre-independence intelligence units 5 2.2 Post-independence unit: former capabilities, missions, mandate and techniques 5 2.3 The Yom Kippur War and its consequences 6 3 Operational Background 8 3.1 Unit mandate, activities and capabilities 8 3.2 Attributed and alleged operations 8 3.3 International efforts and cooperation 9 4 Organizational and Cultural Background 10 4.1 Organizational structure 10 Structure and sub-units 10 Infrastructure 11 4.2 Selection and training process 12 Attractiveness and motivation 12 Screening process 12 Selection process 13 Training process 13 Service, reserve and alumni 14 4.3 Internal culture 14 5 Discussion and Analysis 16 5.1 Strengths 16 5.2 Weaknesses 17 6 Conclusion and Recommendations 18 7 Glossary 20 8 Abbreviations 20 9 Bibliography 21 2 Trend analysis: The Israeli Unit 8200 – An OSINT-based study selection tests comprise a psychometric test, rigorous Executive Summary interviews, and an education/skills test.
    [Show full text]
  • The Truth of the Capture of Adolf Eichmann (Pdf)
    6/28/2020 The Truth of the Capture of Adolf Eichmann » Mosaic THE TRUTH OF THE CAPTURE OF ADOLF EICHMANN https://mosaicmagazine.com/essay/history-ideas/2020/06/the-truth-of-the-capture-of-adolf-eichmann/ Sixty years ago, the infamous Nazi official was abducted in Argentina and brought to Israel. What really happened, what did Hollywood make up, and why? June 1, 2020 | Martin Kramer About the author: Martin Kramer teaches Middle Eastern history and served as founding president at Shalem College in Jerusalem, and is the Koret distinguished fellow at the Washington Institute for Near East Policy. Listen to this essay: Adolf Eichmann’s Argentinian ID, under the alias Ricardo Klement, found on him the night of his abduction. Yad Vashem. THE MOSAIC MONTHLY ESSAY • EPISODE 2 June: The Truth of the Capture of Adolf Eichmann 1x 00:00|60:58 Sixty years ago last month, on the evening of May 23, 1960, the Israeli prime minister David Ben-Gurion made a brief but dramatic announcement to a hastily-summoned session of the Knesset in Jerusalem: A short time ago, Israeli security services found one of the greatest of the Nazi war criminals, Adolf Eichmann, who was responsible, together with the Nazi leaders, for what they called “the final solution” of the Jewish question, that is, the extermination of six million of the Jews of Europe. Eichmann is already under arrest in Israel and will shortly be placed on trial in Israel under the terms of the law for the trial of Nazis and their collaborators. In the cabinet meeting immediately preceding this announcement, Ben-Gurion’s ministers had expressed their astonishment and curiosity.
    [Show full text]
  • Summary of U.S. Foreign Intelligence Surveillance Law, Practice, Remedies, and Oversight
    ___________________________ SUMMARY OF U.S. FOREIGN INTELLIGENCE SURVEILLANCE LAW, PRACTICE, REMEDIES, AND OVERSIGHT ASHLEY GORSKI AMERICAN CIVIL LIBERTIES UNION FOUNDATION AUGUST 30, 2018 _________________________________ TABLE OF CONTENTS QUALIFICATIONS AS AN EXPERT ............................................................................................. iii INTRODUCTION ......................................................................................................................... 1 I. U.S. Surveillance Law and Practice ................................................................................... 2 A. Legal Framework ......................................................................................................... 3 1. Presidential Power to Conduct Foreign Intelligence Surveillance ....................... 3 2. The Expansion of U.S. Government Surveillance .................................................. 4 B. The Foreign Intelligence Surveillance Act of 1978 ..................................................... 5 1. Traditional FISA: Individual Orders ..................................................................... 6 2. Bulk Searches Under Traditional FISA ................................................................. 7 C. Section 702 of the Foreign Intelligence Surveillance Act ........................................... 8 D. How The U.S. Government Uses Section 702 in Practice ......................................... 12 1. Data Collection: PRISM and Upstream Surveillance ........................................
    [Show full text]
  • Limitless Surveillance at the Fda: Pro- Tecting the Rights of Federal Whistle- Blowers
    LIMITLESS SURVEILLANCE AT THE FDA: PRO- TECTING THE RIGHTS OF FEDERAL WHISTLE- BLOWERS HEARING BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS SECOND SESSION FEBRUARY 26, 2014 Serial No. 113–88 Printed for the use of the Committee on Oversight and Government Reform ( Available via the World Wide Web: http://www.fdsys.gov http://www.house.gov/reform U.S. GOVERNMENT PRINTING OFFICE 87–176 PDF WASHINGTON : 2014 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Aug 31 2005 11:40 Mar 31, 2014 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 C:\DOCS\87176.TXT APRIL COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM DARRELL E. ISSA, California, Chairman JOHN L. MICA, Florida ELIJAH E. CUMMINGS, Maryland, Ranking MICHAEL R. TURNER, Ohio Minority Member JOHN J. DUNCAN, JR., Tennessee CAROLYN B. MALONEY, New York PATRICK T. MCHENRY, North Carolina ELEANOR HOLMES NORTON, District of JIM JORDAN, Ohio Columbia JASON CHAFFETZ, Utah JOHN F. TIERNEY, Massachusetts TIM WALBERG, Michigan WM. LACY CLAY, Missouri JAMES LANKFORD, Oklahoma STEPHEN F. LYNCH, Massachusetts JUSTIN AMASH, Michigan JIM COOPER, Tennessee PAUL A. GOSAR, Arizona GERALD E. CONNOLLY, Virginia PATRICK MEEHAN, Pennsylvania JACKIE SPEIER, California SCOTT DESJARLAIS, Tennessee MATTHEW A. CARTWRIGHT, Pennsylvania TREY GOWDY, South Carolina TAMMY DUCKWORTH, Illinois BLAKE FARENTHOLD, Texas ROBIN L. KELLY, Illinois DOC HASTINGS, Washington DANNY K. DAVIS, Illinois CYNTHIA M. LUMMIS, Wyoming PETER WELCH, Vermont ROB WOODALL, Georgia TONY CARDENAS, California THOMAS MASSIE, Kentucky STEVEN A.
    [Show full text]