U.S. Surveillance: Unchecked and Unsupervised
Total Page:16
File Type:pdf, Size:1020Kb
Load more
										Recommended publications
									
								- 
												
												Government Turns the Other Way As Judges Make Findings About Torture and Other Abuse
USA SEE NO EVIL GOVERNMENT TURNS THE OTHER WAY AS JUDGES MAKE FINDINGS ABOUT TORTURE AND OTHER ABUSE Amnesty International Publications First published in February 2011 by Amnesty International Publications International Secretariat Peter Benenson House 1 Easton Street London WC1X 0DW United Kingdom www.amnesty.org Copyright Amnesty International Publications 2011 Index: AMR 51/005/2011 Original Language: English Printed by Amnesty International, International Secretariat, United Kingdom All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior permission of the publishers. Amnesty International is a global movement of 2.2 million people in more than 150 countries and territories, who campaign on human rights. Our vision is for every person to enjoy all the rights enshrined in the Universal Declaration of Human Rights and other international human rights instruments. We research, campaign, advocate and mobilize to end abuses of human rights. Amnesty International is independent of any government, political ideology, economic interest or religion. Our work is largely financed by contributions from our membership and donations CONTENTS Introduction ................................................................................................................. 1 Judges point to human rights violations, executive turns away ........................................... 4 Absence - 
												
												How US and UK Spy Agencies Defeat Internet Privacy and Security James Ball , Julian Borger and Glenn Greenwald Theguardian.Com
Revealed: how US and UK spy agencies defeat internet privacy and security James Ball , Julian Borger and Glenn Greenwald theguardian.com US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. This story has been reported in partnership between the New Through covert partnerships with tech companies, the spy agencies have inserted secret vulnerabilities into encryption software. Photograph: Kacper York Times, the Guardian and Pempel/Reuters ProPublica based on documents obtained by the Guardian. For the Guardian: James Ball, Julian Borger, Glenn Greenwald 1. For the New York Times: Nicole Perlroth, Scott Shane For ProPublica: Jeff Larson Read the New York Times story here The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves. - 
												
												District of Columbia Judicial Nomination Commission Report Of
District of Columbia Judicial Nomination Commission Report of Recommendations and Chief Judge Designations and Presidential Appointments to the District of Columbia Court of Appeals and the Superior Court of the District of Columbia May 8, 1975 to September 30, 2013 INTRODUCTION On October 31, 2011, the District of Columbia Judicial Nomination Commission (“JNC” or “Commission”) published an historic report of JNC recommendations made to the President of the United States, Presidential appointments to the District of Columbia courts, and the JNC’s designations of the Chief Judges for those courts, with the commitment to update the report annually. The report relies on available records, including Congressional and District of Columbia Judicial Nomination Commission records, as well as notices published in the Daily Washington Law Reporter. This is the second annual update of the report. The Commission Chair, Judge Emmet G. Sullivan, gives special recognition and expresses his appreciation to Executive Director Kim M. Whatley and Summer Intern Joseph R.A. Fruth for their tireless and meticulous efforts in researching and compiling the initial report, which spans forty years and encompasses the various branches of both the federal and District of Columbia governments. Judge Sullivan also expresses his appreciation to Addy Schmitt, Esquire, for first suggesting this project more than five years ago and devoting many hours since then to its completion, and to Executive Assistant Eunice Holt-Martin for her assistance and support in this endeavor. The District of Columbia Court of Appeals and the Superior Court of the District of Columbia were established by Congress on July 29, 1970 (Public Law 91-358, 84 Stat. - 
												
												SPRING 2020, Vol. 34, Issue 1 SPRING 2020 1
SPRING 2020, Vol. 34, Issue 1 SPRING 2020 1 MISSION NAWJ’s mission is to promote the judicial role of protecting the rights of individuals under the rule of law through strong, committed, diverse judicial leadership; fairness and equality in the courts; and ON THE COVER 19 Channeling Sugar equal access to justice. Innovative Efforts to Improve Access to Justice through Global Judicial Leadership 21 Learning Lessons from Midyear Meeting in New Orleans addresses Tough Cases BOARD OF DIRECTORS ongoing challenges facing access to justice. Story on page 14 24 Life After the Bench: EXECUTIVE COMMITTEE The Honorable Sharon Mettler PRESIDENT 2 President's Message Hon. Bernadette D'Souza 26 Trial Advocacy Training for Parish of Orleans Civil District Court, Louisiana 2 Interim Executive Director's Women by Women Message PRESIDENT-ELECT 29 District News Hon. Karen Donohue 3 VP of Publications Message King County Superior Court, Seattle, Washington 51 District Directors & Committees 4 Q&A with Judge Ann Breen-Greco VICE PRESIDENT, DISTRICTS Co-Chair Human Trafficking 52 Sponsors Hon. Elizabeth A. White Committee Superior Court of California, Los Angeles County 54 New Members 5 Independent Immigration Courts VICE PRESIDENT, PUBLICATIONS Hon. Heidi Pasichow 7 Resource Board Profile Superior Court of the District of Columbia Cathy Winter-Palmer SECRETARY Hon. Orlinda Naranjo (ret.) 8 Global Judicial Leadership 419th District Court of Texas, Austin Doing the Impossible: NAWJ work with the Pan-American TREASURER Commission of Judges on Social Hon. Elizabeth K. Lee Rights Superior Court of California, San Mateo County IMMEDIATE PAST PRESIDENT 11 Global Judicial Leadership Hon. Tamila E. - 
												
												The U.S. Surveillance State Part 1: Early Answers in Washington DC – Guest Contribution by Jim Farmer
The U.S. Surveillance State Part 1: Early Answers in Washington DC – Guest Contribution by Jim Farmer (This is the first of three Guest Contributions by US-based Jim Farmer [biography, email jfx "AT" immagic "DOT" com]. Jim has contributed occasionally to Fortnightly Mailing over the years.) Several months after National Security Agency (NSA) documents were revealed by Edward Snowden, the impact on higher education remains unclear clear. Some differences between the explanations from the intelligence establishment and observations from the Washington “think tank” writers and scholars are emerging. On Friday, 6 September 2013 Guardian reporter James Ball and cryptology expert Bruce Schneier answered reader questions. Three questions are key to better understanding the extent of the public awareness of the intelligence community’s practices, and its likely impact. Here the responses of the Guardian are compared to those of the intelligence establishment and “think tank” scholars in recent Washington DC presentations. All presentations were scheduled before and held after Glenn Greenwald’s 5 June report about NSA’s collection of phone records. The answers provide some insight into the U.S. government’s position. The questions and answers Question 1. Reader SteppenHerring asked: How hard do you think it will be to get people to take security seriously when people are willing to type so much personal data into Facebook/Google+ etc? The Guardian’s James Ball answers: I think we need more awareness of privacy and security generally, and I think as generations grow up net-native (as today’s teens are), that’s taking care of itself. - 
												
												Confidentiality Complications
Confidentiality Complications: How new rules, technologies and corporate practices affect the reporter’s privilege and further demonstrate the need for a federal shield law The Reporters Committee for Freedom of the Press June 2007 Lucy A. Dalglish, Esq. Gregg P. Leslie, Esq. Elizabeth J. Soja, Esq. 1101 Wilson Blvd., Suite 1100 Arlington, Virginia 22209 (703) 807-2100 Executive Summary The corporate structure of the news media has created new obstacles, both financial and practical, for journalists who must keep promises of confidentiality. Information that once existed only in a reporter’s notebook can now be accessed by companies that have obligations not only to their reporters, but to their shareholders, their other employees, and the public. Additionally, in the wake of an unprecedented settlement in the Wen Ho Lee Privacy Act case, parties can target news media corporations not just for their access to a reporter’s information, but also for their deep pockets. The potential for conflicts of interest is staggering, but the primary concerns of The Reporters Committee for Freedom of the Press are that: • because of the 21st-century newsroom’s reliance on technology, corporations now have access to notes, correspondence and work-product information that before only existed in a reporter’s notebook; • the new federal “e-discovery” court rules allow litigants to discover vastly more information than a printed page – or even a saved e-mail – would provide during litigation; • while reporters generally only have responsibilities to themselves, - 
												
												Data Retention Policy (GDPR Compliant)
Data Retention Policy (GDPR Compliant) Data controller: Habasit (UK) Ltd Habegger House Gannex Park Dewsbury Road Elland HX5 9AF 1 INTRODUCTION 1.1 Habasit (UK) Ltd (“we”, “our”, “us” or “the Company”) must comply with our obligations under data protection laws (including the GDPR and the Data Protection Act 2018) whenever we Process Personal Data relating to our employees, workers, customers and suppliers and any other individuals we interact with. 1.2 This includes the obligation not to Process any Personal Data which permits the identification of Data Subjects for any longer than is necessary and the purpose of this policy is to assist us to comply with that obligation. This policy should be read alongside the Data Retention Matrix which is appended at Schedule 1 to this policy and which provides guideline data retention periods for various different types of Personal Data we hold. 1.3 Compliance with this policy will also assist us to comply with our ‘data minimisation’ and accuracy obligations under data protection laws which require us to ensure that we do not retain Personal Data which is irrelevant, excessive, inaccurate or out of date. 1.4 A failure to comply with data protection laws could result in enforcement action against the Company, which may include substantial fines of up to €20 million or 4% of total worldwide annual turnover (whichever is higher), significant reputational damage and potential legal claims from individuals. It can also have personal consequences for individuals in certain circumstances i.e. criminal fines/imprisonment or director disqualification. 1.5 Compliance with this policy will also assist in reducing the Company’s information storage costs and the burden of responding to requests made by Data Subjects under data protection laws such as access and erasure requests. - 
												
												DEFENCE STRATEGIC COMMUNICATIONS the Official Journal of the NATO Strategic Communications Centre of Excellence
Volume 3 | Autumn 2017 DEFENCE STRATEGIC COMMUNICATIONS The official journal of the NATO Strategic Communications Centre of Excellence Overwriting the City: Graffiti, Communication, and Urban Contestation in Athens Putting the Strategy Back into Strategic Communications Japanese Strategic Communication: Its Significance As a Political oolT ‘You Can Count On Us’: When Malian Diplomacy Stratcommed Uncle Sam Strategic Communications, Boko Haram, and Counter-Insurgency Fake News, Fake Wars, Fake Worlds Living Post-Truth Lives … But What Comes After? ‘We Have Met The Enemy And He Is Us’ Defence Strategic Communications | Volume 3 | Autumn 2017 1 ISSN 2500-9478 Defence Strategic Communications Editor-in-Chief Dr. Neville Bolt Managing Editor Linda Curika Editor Anna Reynolds Editorial Board Professor Mervyn Frost Professor Nicholas O’Shaughnessy Professor Žaneta Ozoliņa Professor J. Michael Waller Professor Natascha Zowislo-Grünewald Dr. Emma Louise Briant Dr. Nerijus Maliukevicius Dr. Agu Uudelepp Matt Armstrong Thomas Elkjer Nissen Defence Strategic Communications is an international peer-reviewed journal. The journal is a project of the NATO Strategic Communications Centre of Excellence (NATO StratCom COE). It is produced for scholars, policy makers and practitioners around the world. It does not represent the opinions or policies of NATO or the NATO StratCom COE. The views presented in the following articles are those of the authors alone. © All rights reserved by the NATO StratCom COE. These articles may not be copied, reproduced, distributed or publicly displayed without reference to the NATO StratCom COE and the academic journal Defence Strategic Communications. NATO Strategic Communications Centre of Excellence Riga, Kalnciema iela 11b, Latvia LV1048 www.stratcomcoe.org Ph.: 0037167335463 [email protected] Living Post-Truth Lives … But What Comes After? 191 LIVING POST-TRUTH LIVES … BUT WHAT COMES AFTER? A review essay by Kevin Marsh Post-Truth: The New War on Truth and How to Fight Back Matthew D’Ancona. - 
												
												Basic Overview of Data Retention Mandates – Privacy and Cost
BASIC OVERVIEW OF DATA RETENTION MANDATES – PRIVACY AND COST September 2012 Introduction The use of telephone and Internet services generates information useful to governments in conducting law enforcement and national security investigations. In an effort to guarantee the availability of communications data for investigations, some governments have imposed or have considered imposing legal obligations requiring communications service providers to retain for specified periods of time certain data about all of their users. Generally, under these “data retention” mandates, data about individuals’ use of communications services must be collected and stored in a manner such that it is linked to a specific user’s name or other identification information. Government officials may then request access to this data, pursuant to the laws of their respective countries, for use in investigations. As a tool for addressing law enforcement challenges, data retention comes with a very high cost and is ultimately disproportionate to the goals it seeks to advance. Less privacy-burdensome alternatives are likely to accomplish governments’ legitimate goals just as, and perhaps more, effectively. I. Data Retention: The Basics Data retention laws vary with respect to the types of companies, data, and services that they cover. Types of companies covered: Most of the data retention laws that have been adopted by governments around the world focus on telephone companies (both fixed line and wireless) and Internet service providers (ISPs), including cable companies cable and mobile providers. Some data retention laws also apply to any entity that offers Internet access, such as Internet cafes and WiFi “hotspots.” Some data retention laws place retention obligations on online service providers (OSPs) – companies that provide, among other things, web-hosting services, email services, platforms for user-generated content, and mobile and web applications. - 
												
												IN the EUROPEAN COURT of HUMAN RIGHTS App No. 24960/15 10 HUMAN RIGHTS
IN THE EUROPEAN COURT OF HUMAN RIGHTS App No. 24960/15 10 HUMAN RIGHTS ORGANIZATIONS AND OTHERS – v – THE UNITED KINGDOM THIRD PARTY INTERVENTION OF THE ELECTRONIC PRIVACY INFORMATION CENTER Introduction 1. The Electronic Privacy Information Center (“EPIC”) welcomes the opportunity to submit these written comments pursuant to leave granted on February 26, 2016, by the President of the First Section under Rule 44 §3 of the Rules of the Court. These submissions do not address the facts or merits of the applicants’ case. 2. EPIC is a public interest, non-profit research and educational organization based in Washington, D.C. 1 EPIC was established in 1994 to focus public attention on emerging privacy and civil liberties issues and to protect privacy, freedom of expression, and democratic values in the information age. EPIC routinely files amicus briefs in U.S. courts, pursues open government cases, defends consumer privacy, coordinates non- profit participation in international policy discussions, and advocates before legislative and judicial organizations about emerging privacy and civil liberties issues. EPIC is a leading privacy and freedom of information organization in the US with special expertise in government surveillance related legal matters. 3. The matter before the Court in 10 Human Rights Organizations and Others v. the United Kingdom impacts the human rights to privacy, data protection and freedom of expression of people around the world, which is reflected also by the variety of the applicants’ affiliations. The matter before the Court is an issue of broad international importance because it involves arrangements to transfer personal data between the United States and European countries. - 
												
												Newsfollowup.Com Transparencyplanet, Promote Open Govt/Biz
NewsFollowUp.com TransparencyPlanet, Promote open govt/biz NewsFollowUp.com Franklingate sex scandal econ charts pictorial index sitemap home Mukasey, Gonazales U.S. Judiciary / DOJ_2 replacement ... Will Mukasey sabotage the Rosen Weissman trial? below back to Judiciary page 1 Conflict of interest, below DOJ, Mukasey, Rosen, Weissman Sibel Edmonds U. S. Supreme Court and Federal Courts Stacking courts International Courts Judge Reggie Walton Watch 'Protect Act' & Judicial discretion Giuliani / Mukasey / Kerik Conflicts of Interest Please Donate to NewsFollowUp.com to help us continue this work. News Research: Topic Index Plame / Wilson / Novak Pentagon mole, AIPAC Spies AIPAC, Giuliani, Mukasey Common Plamegate Timeline AIPAC Mukasey, Rosen, Weissman Flight 77, Pentagon Brewster Jennings & Assc. AIPAC - Cheney Clinton, AIPAC, Iran Marc Rich, L. Libby Flow chart AIPAC Rosen Weisman Iraq War Iran / Syria Operations Group Leakers, Leak Launderers? Trial Iran Iran, Iraq Miller, Judith & subpoena AMDOCS Rosen Weissman Timeline Israeli Art Students, 9/11 Anthrax Iraq War Plans 2001 Giuliani, Mukasey, Palfrey Ledeen - Fascism Miller, WMD deception 9/11 Propaganda Cheney / B-52 / Syria / Iran Niger, Forged Yellowcake Timeline Archive Israeli Intelligence, Iran Israel documents Timeline: 1970 1980 1990 2000 2001 2002 2003 2004 2005 Archive & (2006) under construction Mukasey, Rosen, Weissman and Clinton top PROGRESSIVE REFERENCE CONSERVATIVE* Alex Geana Blackwater / Blackstone group Family Research Council, stop filibuster of connections Summary Fed judges. Antiwar "in Rosen's own secretly-recorded Feinstein The shadow of Israel / AIPAC words – about the Khobar Towers terrorist over Washington. Whitehouse press releases, on Protect Act attack, which he claimed he had received Latest trial date January 14, 2008 McConnell, Mitch, Senator Conservative from U.S. - 
												
												Facts About the Federal Government's Data Retention Scheme
Consumer Fact Sheet Facts about the Federal Government’s data retention scheme The Federal Government’s data retention scheme, enacted in March 2015, will come into effect between 13 October 2015 and 12 April 2017. Our fact sheet covers what consumers need to know. What is metadata? Metadata, simply put, is ‘data about data’. In telecommunications it is information about communications (e.g. the time a phone call was made and its duration), information about the people communicating (e.g. the sender and the receiver) including account and location information, and the device used. The scheme requires that service providers retain metadata but not the content or substance of a communication. However metadata can still reveal a lot of information about an individual and those they interact with. The set of metadata that will be required is set out in the legislation – see http://www.ag.gov.au/NationalSecurity/DataRetention/Documents/Dataset.pdf How will your metadata be used? It will be mandatory for telcos and ISPs to store your metadata for two years (some may have a business need for longer retention of some data). This metadata will be available to specified government agencies (such as law enforcement and national security agencies) upon request. You will be able to access your own data and many service providers do some of this already in your ordinary bill. How will it affect consumers? Costs We don’t know how much a data retention scheme will cost to set up but in March the Government estimated it at $400 million to set up and $4 per year, per customer to run.