The Fourth Amendment's National Security Exception: Its History and Limits L
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Attorney General Holder Requests That President Assert Executive
<.@ffite of tqe 1\ttcrnel_! ~enernl lias ~ington. ID. QT. 205.30 June 19,2012 The President The White House Washington, D.C. 20500 Dear Mr. President, I am writing to request that you assert executive privilege with respect to confidential Department of Justice ("Department") documents that are responsive to the subpoena issued by the Committee on Oversight and Government Reform of the United States House of Representatives ("Committee") on October 25, 2011. The subpoena relates to the Committee's investigation into Operation Fast and Furious, a law enforcement operation conducted by the Bureau of Alcohol, Tobacco, Firearms, and Explosives ("ATF") and the United States Attorney's Office for the District of Arizona to stem the illegal flow of firearms from the United States to drug cartels in Mexico ("Fast and Furious"). The Committee has scheduled a meeting for June 20, 2012, to vote on a resolution holding me in contempt of Congress for failing to comply with the subpoena. I. The Committee's subpoena broadly sweeps in various groups of documents relating to both the conduct of Operation Fast and Furious and the Department's response to congressional inquiries about that operation. In recognition of the seriousness ofthe Committee's concerns about both the inappropriate tactics used in Fast and Furious and the inaccuracies concerning the use of those tactics in the letter that the Department sent to Senator Grassley on February 4, 2011 ("February 4 Letter"), the Department has taken a number of significant steps in response to the Committee's oversight. First, the Department has instituted various reforms to ensure that it does not repeat these law enforcement and oversight mistakes. -
A Tale of Prosecutorial Indiscretion: Ramsey Clark and the Selective Non-Prosecution of Stokley Carmichael
South Carolina Law Review Volume 62 Issue 1 Article 2 Fall 2010 A Tale of Prosecutorial Indiscretion: Ramsey Clark and the Selective Non-Prosecution of Stokley Carmichael Lonnie T. Brown Jr. University of Georgia School of Law Follow this and additional works at: https://scholarcommons.sc.edu/sclr Part of the Law Commons Recommended Citation Lonnie T. Brown, Jr., A Tale of Prosecutorial Indiscretion: Ramsey Clark and the Selective Non-Prosecution of Stokley Carmichael, 62 S. C. L. Rev. 1 (2010). This Article is brought to you by the Law Reviews and Journals at Scholar Commons. It has been accepted for inclusion in South Carolina Law Review by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Brown: A Tale of Prosecutorial Indiscretion: Ramsey Clark and the Select A TALE OF PROSECUTORIAL INDISCRETION: RAMSEY CLARK AND THE SELECTIVE NON-PROSECUTION OF STOKELY CARMICHAEL LONNIE T. BROWN, JR.* I. INTRODUCTION ............................................................................................... 1 II. THE PROTAGONISTS .................................................................................... 8 A. Ramsey Clark and His Civil Rights Pedigree ...................................... 8 B. Stokely Carmichael: "Hell no, we won't go!.................................. 11 III. RAMSEY CLARK'S REFUSAL TO PROSECUTE STOKELY CARMICHAEL ......... 18 A. Impetus Behind Callsfor Prosecution............................................... 18 B. Conspiracy to Incite a Riot.............................................................. -
Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote
Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote Mobile Threats Are Increasing Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses, and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published earlier this year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones.1 One example is this year’s Valentine’s Day attack, in which attackers distributed a mobile picture- sharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent.2 The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up. Smartphones and personal digital assistants (PDAs) give users mobile access to email, the internet, GPS navigation, and many other applications. However, smartphone security has not kept pace with traditional computer security. Technical security measures, such as firewalls, antivirus, and encryption, are uncommon on mobile phones, and mobile phone operating systems are not updated as frequently as those on personal computers.3 Mobile social networking applications sometimes lack the detailed privacy controls of their PC counterparts. Unfortunately, many smartphone users do not recognize these security shortcomings. Many users fail to enable the security software that comes with their phones, and they believe that surfing the internet on their phones is as safe as or safer than surfing on their computers.4 Meanwhile, mobile phones are becoming more and more valuable as targets for attack. -
DOJ BACKGROUND/RECORDS A. Key Officials
DOJ BACKGROUND/RECORDS A. Key Officials --Attorney General-- Robert F. Kennedy, 1961-6 Nicholas Katzenbach ? Ramsey Clarke, 196_-__ Griffin Bell (worked with HSCA) --Deputy Attorney General--Nicholas deB. Katzenbach (under Kennedy) --Associate Attorney General --Office of Legislative Affairs --Assistant Attorney General Michael Uhlman, worked with the HSCA --Office of Public Affairs --Office of Policy Development --Office of Information and Privacy --Office of Legal Counsel --Norbert A. Schlei (Assistant AG under Kennedy) --Frank M. Wozencraft (1968) --Assistant Attorney General for Criminal Division --Herbert J. Miller, Jr. (under Kennedy) --Fred M. Vinson, Jr. (@ 1965-68) --Composed of the following sections:General Crimes; Fraud; Organized Crime & Racketeering (the Chief of the Organized Crime Section in 1963 was William G. Hundley); Administrative Regulations (covers immigration); Appeals and Research. --Jeff Fogel was on the JFK Assassination Task Force in 1980 --Internal Security Division --J. Walter Yeagley (under Kennedy and Johnson) --Assistant Attorney General for the Civil Division --John W. Douglas (1965) --Barefoot Sanders (1967) --Edwin Weisl, Jr. (1968) --Assistant Attorney General for the Civil Rights Division --Burke Marshall ? (under Kennedy) --John Doar (1967) --Robert Owens (1968) --Assistant Attorney General for the Tax Division --Louis Oberdorfer (under Kennedy) --Robert L. Keuch, Special Counsel to the Attorney General (G. Bell), worked with the HSCA B. Assassination Records Located to Date --Microfilmed DOJ Records from the JFK Library (Need To Review) --Office of Information and Privacy Files re: FOIA Appeals of Harold Weisberg (Civi Action No. 75-0226) and James Lesar, including the documents that were the subject of the appeal. Approximately 3,600 records were identified and 85% transferred to NARA. -
Image Steganography Applications for Secure Communication
IMAGE STEGANOGRAPHY APPLICATIONS FOR SECURE COMMUNICATION by Tayana Morkel Submitted in partial fulfillment of the requirements for the degree Master of Science (Computer Science) in the Faculty of Engineering, Built Environment and Information Technology University of Pretoria, Pretoria May 2012 © University of Pretoria Image Steganography Applications for Secure Communication by Tayana Morkel E-mail: [email protected] Abstract To securely communicate information between parties or locations is not an easy task considering the possible attacks or unintentional changes that can occur during communication. Encryption is often used to protect secret information from unauthorised access. Encryption, however, is not inconspicuous and the observable exchange of encrypted information between two parties can provide a potential attacker with information on the sender and receiver(s). The presence of encrypted information can also entice a potential attacker to launch an attack on the secure communication. This dissertation investigates and discusses the use of image steganography, a technology for hiding information in other information, to facilitate secure communication. Secure communication is divided into three categories: self-communication, one-to-one communication and one-to-many communication, depending on the number of receivers. In this dissertation, applications that make use of image steganography are implemented for each of the secure communication categories. For self-communication, image steganography is used to hide one-time passwords (OTPs) in images that are stored on a mobile device. For one-to-one communication, a decryptor program that forms part of an encryption protocol is embedded in an image using image steganography and for one-to-many communication, a secret message is divided into pieces and different pieces are embedded in different images. -
Espionage Against the United States by American Citizens 1947-2001
Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. -
Rethinking the Identity and Role of United States Attorneys
Rethinking the Identity and Role of United States Attorneys Sara Sun Beale* The reputation and credibility of the Department of Justice were badly tarnished during the Bush administration. This article focuses on concerns regarding the role of partisan politics.1 Critics charge that during the Bush administration improper partisan political considerations pervasively influenced a wide range of decisions including the selection of immigration judges, summer interns and line attorneys; the assignment of career attorneys to particular details; the evaluation of the performance of United States Attorneys; and the decision whether and when to file charges in cases with political ramifications. The Inspector General’s lengthy and highly critical reports have substantiated some of these charges.2 The first two Inspector General (IG) Reports found that the Department improperly used political criteria in hiring and assigning some immigration judges, interns, and career prosecutors.3 The third report * Charles L.B. Lowndes Professor, Duke Law School, Durham, N.C. I would like to acknowledge the outstanding research assistance provided by Michael Devlin, Meghan Ferguson, Amy Taylor, and Molly Brownfield, and the helpful comments of Norman Abrams, Albert Alschuler, Rachel Barkow, Anthony Barkow, Candace Carroll, Colm Connolly, Ronald Goldstock, Bruce Green, Lisa Kern Griffin, James Jacobs, Susan Klein, Daniel Richman, and Adam Safwat. Of course any errors are my own. 1 Other serious concerns about the Department have been raised, particularly in connection with its role in the war on terror. For example, the Department has been the subject of intense criticism for legal analysis that led to the authorization of brutal interrogation techniques for detainees. -
Orantes-Hernandez V. Meese, 685 F
Orantes-Hernandez v. Gonzales United States District Court for the Central District of California August 21, 2006, Decided ; August 21, 2006, Filed; August 22, 2006, Docketed Case No. CV 82-01107 MMM (VBKx) Reporter: 2006 U.S. Dist. LEXIS 95387 Orantes-Hernandez, et al. v. Gonzales, et al. CIVIL MINUTES - GENERAL Prior History: Orantes-Hernandez v. Thornburgh, 919 F.2d 549, 1990 U.S. App. LEXIS 20202 (9th Cir. Cal., 1990) Proceedings: Order Granting Plaintiffs' Request For Limited Discovery On Expedited Removal And Setting A Counsel: [*1] For Crosby Wilfredo Orantes-Hernandez, Telephonic Status Conference For August 31, 2006 Organizacion de Profesionales Y Tecnicos Salvadorenos, Casa El Salvador-Farabundo Marti, Salvadorean American Plaintiffs filed this action in 1982, challenging practices and Professional Association, Concillo Manzo, Central American procedures allegedly employed by the Immigration and Refugee Program, Marta Ester Paniaguavides, Jose Sanchez Naturalization Service ("INS") to detain, process and remove Flores, Dora Alicia Ayala de Castillo, Adelso Salome Flores, Salvadoran nationals who had entered the United States. Uvaldo Aguilar, Dora Elia Estrada, Juan Francisco Perez- Plaintiffs sued on their own behalf and on behalf of a certified Cruz, Ana Estela Guevarra-Flores, Maria Elena Molina, class of "all citizens and nationals of El Salvador eligible to Candido Carcamo Marroquin, Deia Elizabeth Garcia- apply for political asylum … who have been or will be taken Quintanilla, Marta Osorio, Gloria De Flores, Jose Eduardo into custody … by agents of the [INS]; or … subsequent to Rubio, Jose Francisco Marroquin-Salvador, Refugiado Uno- June 2, 1980, requested or will in the future request, political Cuatro, Plaintiffs: Karen C Tumlin, LEAD ATTORNEY, asylum in the United States whose claims have not yet been National Immigration Law Center, Los Angeles, CA US; presented [*3] or adjudicated." Orantes-Hernandez v. -
Image Steganography: Protection of Digital Properties Against Eavesdropping
Image Steganography: Protection of Digital Properties against Eavesdropping Ajay Kumar Shrestha Ramita Maharjan Rejina Basnet Computer and Electronics Engineering Computer and Electronics Engineering Computer and Electronics Engineering Kantipur Engineering College, TU Kantipur Engineering College, TU Kantipur Engineering College, TU Lalitpur, Nepal Lalitpur, Nepal Lalitpur, Nepal [email protected] [email protected] [email protected] Abstract—Steganography is the art of hiding the fact that Data encryption is basically a strategy to make the data communication is taking place, by hiding information in other unreadable, invisible or incomprehensible during transmission information. Different types of carrier file formats can be used, by scrambling the content of data. Steganography is the art but digital images are the most popular ones because of their and science of hiding information by embedding messages frequency on the internet. For hiding secret information in within seemingly harmless messages. It also refers to the images, there exists a large variety of steganography techniques. “Invisible” communication. The power of Steganography is in Some are more complex than others and all of them have hiding the secret message by obscurity, hiding its existence in respective strong and weak points. Many applications may a non-secret file. Steganography works by replacing bits of require absolute invisibility of the secret information. This paper useless or unused data in regular computer files. This hidden intends to give an overview of image steganography, it’s uses and information can be plaintext or ciphertext and even images. techniques, basically, to store the confidential information within images such as details of working strategy, secret missions, According to Bhattacharyya et al., “Steganography’s niche in criminal and confidential information in various organizations security is to supplement cryptography, not replace it. -
An Introduction to Computer Security: the NIST Handbook U.S
HATl INST. OF STAND & TECH R.I.C. NIST PUBLICATIONS AlllOB SEDS3fl NIST Special Publication 800-12 An Introduction to Computer Security: The NIST Handbook U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards Barbara Guttman and Edward A. Roback and Technology COMPUTER SECURITY Contingency Assurance User 1) Issues Planniii^ I&A Personnel Trairang f Access Risk Audit Planning ) Crypto \ Controls O Managen»nt U ^ J Support/-"^ Program Kiysfcal ~^Tiireats Policy & v_ Management Security Operations i QC 100 Nisr .U57 NO. 800-12 1995 The National Institute of Standards and Technology was established in 1988 by Congress to "assist industry in the development of technology . needed to improve product quality, to modernize manufacturing processes, to ensure product reliability . and to facilitate rapid commercialization ... of products based on new scientific discoveries." NIST, originally founded as the National Bureau of Standards in 1901, works to strengthen U.S. industry's competitiveness; advance science and engineering; and improve public health, safety, and the environment. One of the agency's basic functions is to develop, maintain, and retain custody of the national standards of measurement, and provide the means and methods for comparing standards used in science, engineering, manufacturing, commerce, industry, and education with the standards adopted or recognized by the Federal Government. As an agency of the U.S. Commerce Department's Technology Administration, NIST conducts basic and applied research in the physical sciences and engineering, and develops measurement techniques, test methods, standards, and related services. The Institute does generic and precompetitive work on new and advanced technologies. NIST's research facilities are located at Gaithersburg, MD 20899, and at Boulder, CO 80303. -
Separate Spheres
THE YALE LAW JOURNAL CARY FRANKLIN Separate Spheres ABSTRACT. This essay is about the mixed legacy, or incomplete achievement, of the landmark legal changes of the Second Reconstruction. This mixed legacy is one of the central themes of The Civil Rights Revolution, the third volume of Bruce Ackerman's We the People series. The book provides a sweeping account of constitutional change in the 196os and early 1970s, focusing on both the remarkable legislative accomplishments of that period and the limitations and disappointments that accompanied them. Ackerman argues that these limitations were baked in: The landmark statutes of the Second Reconstruction failed to attend to, or combat, forms of discrimination and disadvantage that travel across different social contexts, and thus cannot provide a platform for addressing such problems today. This essay offers a different perspective on the legislative achievements of the Second Reconstruction. "Interspherical impacts" -the cumulative effects of discrimination and disadvantage across multiple spheres of civil society- are a pressing social problem, and one the law today often fails to rectify, or even to recognize. But these limitations were not an inherent part of the constitutional change that occurred during the civil rights era. Indeed, this essay argues that concern about interspherical impacts motivated many of the key statutes and legal decisions of the period, and that these statutes and decisions provide a foundation for developing twenty-first century legal understandings that are responsive to forms of discrimination and disadvantage that migrate across different spheres. AUTHOR. Assistant Professor, University of Texas School of Law. I am grateful to Joey Fishkin, Sandy Levinson, and Reva Siegel for helpful comments and conversation about this essay. -
Signals Intelligence in the Public Domain
Perspective C O R P O R A T I O N Expert insights on a timely policy issue SIGINT for Anyone The Growing Availability of Signals Intelligence in the Public Domain Cortney Weinbaum, Steven Berner, and Bruce McClintock IGINT, or signals intelligence, is intelligence gathered government-only paradigm. We identified ways these capabilities from communications, electronics, or foreign instrumen- and trends may impact the U.S. government in terms of emerging Station1 and has traditionally been considered an inher- threats, policy implications, technology repercussions, human capi- ently governmental function. Historically, only govern- tal considerations, and financial effects. Finally, we identified areas ment had the financial means and the legal authority to conduct for future study for U.S. and allied government leaders to respond SIGINT activities, and, in our experience, many members of to these changes. the U.S. government still hold this opinion today. We tested this During our market scan, we found examples of SIGINT viewpoint by conducting a market scan to seek examples of how capabilities outside of government that are available to anyone. The new technologies, innovations, and behaviors are challenging the capabilities we found have applications in maritime domain aware- existing government-only paradigm. We examined the breadth of ness; radio frequency (RF) spectrum mapping; eavesdropping, jam- technologies available now and reported to be released in the near ming, and hijacking of satellite communications; and cyber surveil- future to understand the capabilities each provides, which audience lance. Most of these capabilities are commercially available, many or market each serves, and what implications each may have for are free, and some are illegal.