Spying on the Margins: the History, Law, and Practice of U.S

Total Page:16

File Type:pdf, Size:1020Kb

Spying on the Margins: the History, Law, and Practice of U.S Spying on the Margins: The History, Law, and Practice of U.S. Surveillance Against Muslim, Black, and Immigrant Communities and Contemporary Strategies of Resistance A Project South Report. Lead Author, Amith Gupta, Esq. Edited by Azadeh Shahshahani and Manzoor Cheema Acknowledgments Project South would like to thank the following people for their advice and assistance in making this report possible: Leena Al-Arian, Dr. Sami Al-Arian, Nicole Fauster, Mike German, Nadia Guzman, Bisan Hameed, Javeria Jamil, Hamid Khan, Zainab Khan, Lara Kiswani, Sabrine Mohamed, Celine Qussiny, Sue Udry, Elica Vafaie, Jeffrey Wang, Stephanie Guilloud, and Emery Wright. Cover Page: Nahla Al-Arian, wife of Palestinian-American Muslim Professor Sami Al-Arian, shuffles through hundreds of CDs containing audio from the surveillance of all of her family’s phone calls over a decade. (Halvorsen, Line. USA vs. Al-Arian. Exposed Film, 2007, vimeo.com/128413718.) © Project South, February 2021 TABLE OF CONTENTS INTRODUCTION 2 Ethno-Religious Profiling as Probable Cause 37 Equal Protection Claims Under the Fourteenth and Fifth CHAPTER 1: THE HISTORY OF THE U.S. SURVEILLANCE Amendments 38 STATE: ORIGINS TO THE 1990S 4 Intentional Discrimination 38 Discriminatory Application of Facially Neutral Laws 39 Defining Islamophobia 4 Islamophobia as Racism 4 The State Secrets Hurdle 39 The Trans-Atlantic Slave Trade & Muslims 4 Orientalism: Islam as Foreign and Dangerous 5 CHAPTER 4: SURVEILLANCE BY STATE 40 Modern Islamophobia 5 GEORGIA 42 The Evolution of Surveillance 6 Expansive Surveillance Guidelines at the Georgia Bureau The Colonial and Racist Origins of Surveillance in the Americas 6 of Investigation & GISAC Fusion Center 42 The Repression of The Labor Movement & The Surveillance State 6 Directive 7-6: Overarching Intelligence Gathering Guidelines 42 U.S. Imperialism in the Philippines & The Surveillance State 6 Directive 8-6-5: Social Media Guidelines 43 The Repression of Dissent & Diversity: Early Twentieth Century Directive 8-8-23: Facial Recognition Software Guidelines 43 Surveillance 8 Annual Privacy Presentations 43 The COINTELPRO Era 9 Privacy Audits 43 Reforms and their Limits 12 Conclusions about GBI & GISAC 44 The Antiterrorism and Effective Death Penalty Act and Other Federal-to-Local Spying and Prosecution 44 Changes 14 JTTF & Pentagon Monitoring Protest Activity 44 Preemptive Prosecutions of Shifa Sadequee & Syed Harris CHAPTER 2: THE “WAR ON TERRORISM” AND THE Ahmed 44 CONTEMPORARY U.S.SURVEILLANCE STATE 15 Recent Incidents 45 46 Fearing Muslims: Preventative Policing & The “Radicalization” NORTH CAROLINA Thesis: 16 Expansive Surveillance Guidelines at the State Bureau of 46 Invading Muslim Spaces: The Use of Informants, Ethno- Investigation & NCISAAC 47 Religious Mapping, and Entrapment 17 Federal-to-Local Spying and Prosecution The JTTF-led Targeting and Prosecution of the Raleigh 7 47 Brutalizing Muslims: Torture, Disappearances, Renditions, Recent Incidents 48 and Secret Detentions 18 Authorizing Torture and Secret Detentions 18 FLORIDA 48 U.S. Torture of Detained People at GTMO and CIA Black Sites 19 Fusion Centers: SEFFC and the Florida Fusion Center 48 Expanding Extraordinary Renditions 19 Federal-to-Local Spying and Prosecution 48 U.S. Torture in Iraq and Afghanistan Invasions 20 Fusion Centers and JTTF Target Muslim Teens 48 President Obama’s Weak Reforms 21 The Collapse of the FISA Wall: The Prosecution of Sami Al-Arian 49 Torture and Surveilling Muslims 21 Targeting Black Muslim Poverty: The Liberty City 7 50 51 Criminalizing Muslim Society: Prosecutions for “Material LOUISIANA 51 Support” 21 Expansive Surveillance Guidelines at LA-SAFE 51 Programmatic Mass Surveillance 23 Federal-to-Local Spying and the Climate of Fear Authorizing Mass Surveillance: Statutes and Directives 23 SOUTH CAROLINA 51 Mass Surveillance in Practice 24 Expansive Surveillance Guidelines at SCIIC and in Local Leaks and Statutory Authorizations 26 Police Departments 51 The Call Detail Records Program 27 The Charleston Police Department 51 The Terrorist Surveillance Program and FISA Section 702 27 Federal and Local Surveillance Collaboration 28 CHAPTER 5: COMMUNITIES RESIST SURVEILLANCE 52 Some Reforms 29 Obstacles and Limits to Traditional Strategies 53 Watching Muslims 29 Litigation 53 The Trump Era 30 Statutory Changes 55 “Black Identity Extremism” and the Repression of Black Reclaiming Muslim Community Spaces in Atlanta, GA and Resistance 30 Kenner, LA 55 Banning Muslims 30 Shutting Down CVE Programs in Los Angeles, CA 56 Surveilling Anti-Deportation Efforts 31 Ending JTTF Agreements in San Francisco, CA 57 FISA Limits 31 Halting the Expansion of Fusion Centers in Georgia 58 CHAPTER 3: CHAPTER 3: THE LEGAL CONTOURS OF U.S. CONCLUSION & RECOMMENDATIONS 61 FEDERAL LAW ON SURVEILLANCE AND RELATED LITIGATION 32 APPENDIX 62 - 79 First Amendment Challenges to Surveillance 32 The Laird Barrier 32 Overcoming Laird 33 The First Amendment and Material Support Prosecutions 34 Fourth Amendment Challenges to Surveillance 34 A Reasonable Expectation of Privacy 34 The Third Party Doctrine 36 The Foreign Intelligence Surveillance Exception 36 The Border Search Exception 37 INTRODUCTION n the aftermath of September 11th, 2001, Project South worked with our regional movement partner Highlander Research & Education Center to hold an emergency meeting for movement leaders from across the U.S. South. "This report offers a historical As a Southern-based movement organization rooted in the Black Radical Traditions of the U.S. South, we anticipated that the events of September 11th and the State response Iwould create a paradigm shift for the social, economic, and political conditions in our country. As a result of that meeting, Project South initiated a set of popular education workshops and legal perspective to support in 2002 and published a workbook called Roots of Terror to provide historical context for the “War on Terror” and USA PATRIOT Act after 9/11. Since that time, Project South has developed analysis and programs to contend with the rise in Islamophobia as a critical frontline in the work for racial justice and movement building. In 2009, Project South’s organizing efforts supported the family of Shifa Sadequee, a member of movement organizing that aims to our community. Sadequee, a young Muslim man in Atlanta, was targeted, surveilled, kidnapped in Bangladesh, charged, and convicted in a U.S. federal court on four counts of terrorism. The case (explored in more depth in Chapter Four) exposed The first chapter traces the origins of Islamophobia as a the lengths to which preemptive prosecution and social control form of anti-Black racism connected to the trans-Atlantic slave mechanisms had evolved, and the organization continued trade. The report connects the rise of the surveillance state to to monitor and organize around state social control. A 2011 dismantle surveillance policies crush social movements and extreme forms of surveillance and People’s Movement Assembly connected the impacts of the repression that emerged in the 1960s, like COINTELPRO, and U.S. War on Drugs, War on Immigrants, and War on Terror continued into the 1990s, leading up to the 9/11 attacks. Chapter on Black, Brown, and Muslim communities. Project South Two describes the shift towards more significant surveillance and launched a more cohesive set of legal and advocacy programs “counter-terrorism” programs justified by President George W. led by attorney Azadeh Shahshahani in 2015. Bush’s War on Terror. The efforts included mass round-ups of Muslims, preventative policing, and entrapment, all of which have and practices as part of a wider In 2018, Project South developed a more concentrated shaped the surveillance state for African American and immigrant effort to document state surveillance practices targeting communities throughout the twenty-first century. Muslim, Black, and immigrant communities. A number of developments informed the project: the continued expansion Chapter Three investigates the legal precedents of federal law and normalization of mass surveillance in U.S. society; the as it relates to surveillance and potential challenges communities elevation of Islamophobia to the highest level of U.S. Executive can consider. The fourth chapter dives into specific surveillance power; and the targeting of people for surveillance, primarily call for the abolition of prisons, and social control regulations in Georgia, North Carolina, consisting of individuals from Muslim, immigrant, and/or Florida, Louisiana, and South Carolina, detailing specific case African American backgrounds. Project South’s Protect and study examples in each. The fifth chapter explores resistance Defend Initiative received repeated reports from members of strategies to contend with the surveillance state. From litigation to local Muslim communities in the U.S. South about unwelcome community organizing and education efforts, the report provides visits from law enforcement and suspicion that various possible avenues and several successful examples of challenging law enforcement agents were engaged in discriminatory anti-Muslim ordinances and Joint Terrorism Task Force initiatives. police, and law enforcement surveillance. Beginning in 2019, Project South’s Protect and Project South’s organizing to stop SB15—a Georgia Senate Bill Defend Initiative began an extensive effort to build our legal that would have expanded data mining, surveillance, and policing and historical knowledge of surveillance policies; obtain
Recommended publications
  • Cyber Violence Against Women and Girls
    CYBER VIOLENCE AGAINST WOMEN AND GIRLS A WORLD-WIDE WAKE-UP CALL 2015 Photo credits:Shutterstock A REPORT BY THE UN BROADBAND COMMISSION FOR DIGITAL DEVELOPMENT WORKING GROUP ON BROADBAND AND GENDER CYBER VIOLENCE AGAINST WOMEN AND GIRLS: A WORLD-WIDE WAKE-UP CALL Acknowledgements This Report has been written collaboratively, drawing on insights and rich contributions from a range of Commissioners and Expert Members of the Working Group on Broadband and Gender. It has been researched and compiled by lead author Nidhi Tandon, assisted by Shannon Pritchard, with editorial inputs by teams from UN Women, UNDP and ITU. Design concepts were developed by Céline Desthomas of ITU. We wish to thank the following people for their contributions and kind review and comments (listed in alphabetical order of institution, followed by alphabetical order of surname): Dafne Sabanes Plou, Jac sm Kee and Chat Garcia Ramilo (APC); Dr Nancy Hafkin; Minerva Novero- Belec (UNDP); Corat Suniye Gulser (UNESCO); Jennifer Breslin and team (UN Women); Samia Melhem and team (World Bank). About the Commission The Broadband Commission for Digital Development was launched by the International Telecommunication Union (ITU) and the United Nations Educational, Scientific and Cultural Organization (UNESCO) in response to UN Secretary-General Ban Ki-moon’s call to step up efforts to meet the Millennium Development Goals. Established in May 2010, the Commission unites top industry executives with government leaders, thought leaders and policy pioneers and international agencies and organizations concerned with development. The Broadband Commission embraces a range of different perspectives in a multi-stakeholder approach to promoting the roll-out of broadband, as well as providing a fresh approach to UN and business engagement.
    [Show full text]
  • Serious and Organised Crime Strategy
    Serious and Organised Crime Strategy Cm 8715 Serious and Organised Crime Strategy Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty October 2013 Cm 8715 £21.25 © Crown copyright 2013 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www. nationalarchives.gov.uk/doc/open-government-licence/ or e-mail: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us [email protected] You can download this publication from our website at https://www.gov.uk/government/ publications ISBN: 9780101871525 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID 2593608 10/13 33233 19585 Printed on paper containing 75% recycled fibre content minimum. Contents Home Secretary Foreword 5 Executive Summary 7 Introduction 13 Our Strategic Response 25 PURSUE: Prosecuting and disrupting serious and 27 organised crime PREVENT: Preventing people from engaging 45 in serious and organised crime PROTECT: Increasing protection against 53 serious and organised crime PREPARE: Reducing the impact of serious and 65 organised crime Annex A: Accountability, governance and funding 71 Annex B: Departmental roles and responsibilities for 73 tackling serious and organised crime 4 Serious and Organised Crime Strategy Home Secretary Foreword 5 Home Secretary Foreword The Relentless Disruption of Organised Criminals Serious and organised crime is a threat to our national security and costs the UK more than £24 billion a year.
    [Show full text]
  • Allen W. Dulles and the CIA
    THE GILDED AGE Allen W. Dulles and the CIA Allen W. Dulles spent his tenure as the Director of Central Intelligence (DCI) entrenched in secret power struggles that would ensure his ultimate power over the foreign and domestic aff airs for the United States. Th roughout his childhood, Dulles learned to use political power in order to get ahead, and to use secrecy to make unilateral deci- sions. Aft er analyzing examples of his treatment of various foreign aff airs disasters, as well as his manipulation of American media and politicians, Dulles is exposed as a man whose legacy lives in the CIA, as a legendary fi gure who is in fact much more of a craft ed legend than a man of truth. By Sada O. Stewart ‘16 Princeton University of the CIA’s own making, the product of the publicity and the political propaganda Allen Dulles manufactured in the 1950s.”4 How, though, did Dulles craft a fl awless, genius im- age for the CIA? What methods did Dulles use to manipulate the press, the public, and even the other branches of govern- ment to bring forth an agency with “a great reputation and a terrible record?”5 Dulles made the CIA seem like an elite agency full of top agents resulting in high risk, high reward missions—how is this reconciled with the reality of the CIA under Dulles’ reign? INTELLIGENCE IN YOUTH To begin, it is vital to identify the signifi cance of developing and running an intelligence agency in an open democratic system.6 Sun Tzu, author of Th e Art of War, insists the best A Bas-relief of Allen Dulles at the Original Headquarters of (only) way to fi ght a war is to know the enemy.
    [Show full text]
  • ARTIFICIAL INTELLIGENCE on the BATTLEFIELD an Initial Survey of Potential Implications for Deterrence, Stability, and Strategic Surprise Zachary S
    ARTIFICIAL INTELLIGENCE ON THE BATTLEFIELD An Initial Survey of Potential Implications for Deterrence, Stability, and Strategic Surprise Zachary S. Davis Center for Global Security Research Lawrence Livermore National Laboratory March 2019 ARTIFICIAL INTELLIGENCE ON THE BATTLEFIELD | I ARTIFICIAL INTELLIGENCE ON THE BATTLEFIELD An Initial Survey of Potential Implications for Deterrence, Stability, and Strategic Surprise Zachary S. Davis ARTIFICIAL INTELLIGENCE ON THE BATTLEFIELD | III Table of Contents About the Author. VI Introduction . 1 A Realistic Appraisal of AI, Big Data, and Machine Learning . 2 Characterizing the Military Potential of AI . 4 Illustrative AI Applications at the Operational Level of War . 5 Illustrative AI Applications at the Strategic Level of War . 6 The Negative Side of Disruptive Technologies . 8 AI’s Potential Effects on Deterrence and Stability . .14 AI is Only One Piece of a Larger Puzzle. 17 Notes . .18 ARTIFICIAL INTELLIGENCE ON THE BATTLEFIELD | V About the Author Zachary Davis is a senior fellow at the Center for Global Security Research at Lawrence Livermore National Laboratory and a research professor at the Naval Postgraduate School in Monterey, California, where he teaches courses on counterproliferation. He has broad experience in intelligence and national-security policy and has held senior positions in the executive and legislative branches of the U.S. government. His regional focus is South Asia. Davis began his career with the Congressional Research Service at the Library of Congress and has served the State Department, Congressional committees, and the National Security Council. Davis was the group leader for proliferation networks in LLNL’s Z Program and, in 2007, senior advisor at the National Counterproliferation Center, in the office of the Director of National Intelligence.
    [Show full text]
  • Understanding Schrems II and Its Impact on the EU-US Privacy Shield
    EU Data Transfer Requirements and U.S. Intelligence Laws: Understanding Schrems II and Its Impact on the EU-U.S. Privacy Shield March 17, 2021 Congressional Research Service https://crsreports.congress.gov R46724 SUMMARY R46724 EU Data Transfer Requirements and U.S. March 17, 2021 Intelligence Laws: Understanding Schrems II Chris D. Linebaugh and Its Impact on the EU-U.S. Privacy Shield Legislative Attorney On July 16, 2020, in a decision referred to as Schrems II, the Court of Justice of the European Edward C. Liu Union (CJEU) invalidated the EU-U.S. Privacy Shield (Privacy Shield). Privacy Shield is a Legislative Attorney framework developed by the European Union (EU) and the United States to facilitate cross- border transfers of personal data for commercial purposes. Privacy Shield requires companies and organizations that participate in the program to abide by various data protection requirements and, in return, assures the participants that the transfer is compliant with EU law. The CJEU, however, found Privacy Shield inadequate in part because it does not restrain U.S. intelligence authorities’ data collection activities. According to the CJEU, U.S. law allows intelligence agencies to collect and use the personal data transferred under the Privacy Shield framework in a manner that is inconsistent with rights guaranteed under EU law. The CJEU focused on Section 702 of the Foreign Intelligence Surveillance Act, Executive Order 12333, and Presidential Policy Directive 28, which govern how the U.S. government may conduct surveillance of non-U.S. persons located outside of the United States. The CJEU’s Schrems II ruling has significant implications for personal data transfers between the EU and the United States.
    [Show full text]
  • DIRECTING the Disorder the CFR Is the Deep State Powerhouse Undoing and Remaking Our World
    DEEP STATE DIRECTING THE Disorder The CFR is the Deep State powerhouse undoing and remaking our world. 2 by William F. Jasper The nationalist vs. globalist conflict is not merely an he whole world has gone insane ideological struggle between shadowy, unidentifiable and the lunatics are in charge of T the asylum. At least it looks that forces; it is a struggle with organized globalists who have way to any rational person surveying the very real, identifiable, powerful organizations and networks escalating revolutions that have engulfed the planet in the year 2020. The revolu- operating incessantly to undermine and subvert our tions to which we refer are the COVID- constitutional Republic and our Christian-style civilization. 19 revolution and the Black Lives Matter revolution, which, combined, are wreak- ing unprecedented havoc and destruction — political, social, economic, moral, and spiritual — worldwide. As we will show, these two seemingly unrelated upheavals are very closely tied together, and are but the latest and most profound manifesta- tions of a global revolutionary transfor- mation that has been under way for many years. Both of these revolutions are being stoked and orchestrated by elitist forces that intend to unmake the United States of America and extinguish liberty as we know it everywhere. In his famous “Lectures on the French Revolution,” delivered at Cambridge University between 1895 and 1899, the distinguished British historian and states- man John Emerich Dalberg, more com- monly known as Lord Acton, noted: “The appalling thing in the French Revolution is not the tumult, but the design. Through all the fire and smoke we perceive the evidence of calculating organization.
    [Show full text]
  • Australian Criminal Intelligence Management (ACIM) Strategy 2017
    Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 AUSTRALIAN CRIMINAL INTELLIGENCE MANAGEMENT STRATEGY 2017–20 INTELLIGENCE PARTNERSHIPS FOR A SAFER AUSTRALIA Attorney-General’s Department Australia New Zealand Policing Advisory Agency Australian Criminal Intelligence Commission Australian Federal Police ACT Policing Australian Securities and Investments Commission Australian Security Intelligence Organisation Australian Taxation Office Australian Transaction Reports and Analysis Centre Department of Immigration and Border Protection/Australian Border Force New South Wales Police Force New Zealand Police Northern Territory Police Queensland Police Service South Australia Police Tasmania Police Victoria Police Western Australia Police 1 Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 CONTENTS FOREWORD 1 AUSTRALIAN CRIMINAL INTELLIGENCE LANDSCAPE 2 AUSTRALIAN CRIMINAL INTELLIGENCE MODEL 3 DEFINITION OF INTELLIGENCE 4 OVERSIGHT AND IMPLEMENTATION 5 WHAT WILL SUCCESS LOOK LIKE? 6 HOW WILL WE ACHIEVE SUCCESS? 7 CRITICAL SUCCESS FACTORS 10 HOW WILL WE MEASURE SUCCESS? 10 EVALUATION MODEL 11 MATURITY MODEL 12 CONCLUSION 14 REFERENCES 14 2 Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 FOREWORD The United Nations Office on Drugs and Crime (UNODC) describes criminal intelligence as “... the lifeblood of the fight against transnational organized crime. It is the foundation for
    [Show full text]
  • Client Alert
    September 28, 2006 Resurgens Plaza 945 East Paces Ferry Road Suite 2700 CLIENT ALERT Atlanta, Georgia 30326-1380 404.923.9000 The Department of State (“DOS”) recently published its 150 North Michigan Avenue 35th Floor instructions regarding the Diversity Lottery for 2008 (“DV-2008”). The Chicago, Illinois 60601-7553 U.S. Citizenship and Immigration Services (“USCIS”) recently announced 312.499.1400 that: (a) it is expanding the premium processing service to include three Lincoln Plaza 500 N. Akard Street additional employment-based immigrant visa categories; (b) its district Suite 2700 offices will no longer issue Interim Employment Authorization Documents Dallas, Texas 75201-3306 214.397.4300 (Form I-688B) as of October 1, 2006; and (c) any passport issued on or after Wells Fargo Plaza October 26, 2006, by a Visa Waiver Program (“VWP”) country must be an 1000 Louisiana Suite 5400 e-passport for VWP travelers to be eligible to enter the United States under Houston, Texas 77002-5013 the VWP. The U.S. Department of Labor (“USDOL”) recently 713.750.3100 implemented an online system to provide the general public with 1875 Century Park East Suite 500 information on cases pending at its Backlog Reduction Centers. Two states Los Angeles, California 90067-2506 have passed legislation addressing immigration enforcement issues. In this 310.556.8861 Special Alert, we shall address these and other recent developments in the Wachovia Financial Center 200 South Biscayne Boulevard immigration area. Suite 2100 Miami, Florida 33131 305.982.1520 1. Diversity Visa Lottery 2008 Two Gateway Center 12th Floor The DOS recently published its instructions for the 2008 Newark, New Jersey 07102-5003 973.642.1900 Diversity Lottery (“DV-2008”).
    [Show full text]
  • REPORTER "Eluding Electronic Servicing
    MAY, 1963 35 CENTS REPORTER "eluding Electronic Servicing Special Equipment Speeds Servicing A...,-`" _.. .., . _ . --:._ Molecular Electronics Explained Resistors With More Than One Job } www.americanradiohistory.com BIG -SYSTEM MUSCLE... _ . u . , . ... : .: : . .- . : . a .,...: .. e : : . ... a . + _.. a ! a . e s s . ! . 1 . ! . e i . 1 . s e e . / . a ' / 11 . / . / s f ! . e . ! ! e s . > . te...... cc..... / a e a a . 1 w . a f i . : / ! . / / . .. - / / . ! ! ! / . .. ....... ................... 18Í . e . .. t a a e + e1V . 7J / Ma/ i Qç } ; , ! a- ir '+4 . +. & ! ,. e ! ' "' ac. 4 .:.a a . SMALL -SYSTEM PRICE! NEW JERROLD TV DISTRIBUTION SYSTEM ENGINEERED FOR THE NEW COLOR -TV ERA Designed for TV shops, dealers' showrooms, The JERROLD "Challenger" Amplifier, small apartments and motels Model ACL-200, delivers 20db minimum gain Feeds up to 32 TV and FM sets over the low band, 19db No controls or adjustments over the high band. New "Quick -Disconnect" plug-in outlets Flat response-unique in a low-price amplifier, but necessary for good color TV. Easy to install, Here's the distribution system to sell to TV and no controls to adjust. Famous JERROLD qual- FM dealers for their color -TV showrooms .. ity is built in to stay. perfect too for the small apartment building or Model ACL-200, $38.97 net motel that's been needing an antenna system See your JERROLD distributor or write but couldn't afford one before. It's also ideal for Jerrold Electronics, Distributor Sales Division, your own service shop. Philadelphia 32, Pa. icz:=;`1 JER RO LO New crown -washer screw Exclusive "Gamma" ELECTRONICS New 4- and 8 -way nigh - terminals for stripped or chassis fittings for quick isolation networks.
    [Show full text]
  • The Law of Asylum Procedure at the Border: Statutes and Agency Implementation
    The Law of Asylum Procedure at the Border: Statutes and Agency Implementation April 9, 2021 Congressional Research Service https://crsreports.congress.gov R46755 SUMMARY R46755 The Law of Asylum Procedure at the Border: April 9, 2021 Statutes and Agency Implementation Ben Harrington The Immigration and Nationality Act (INA) generally provides for the removal of non-U.S. Legislative Attorney citizens or nationals (“aliens,” under the INA) encountered at the border without valid entry documents, unless they qualify for asylum or other humanitarian protections. Two significant questions of legal procedure arise regarding these aliens (referred to here as “undocumented migrants” to distinguish them from aliens encountered in the interior of the United States). First, how should the United States determine which undocumented migrants qualify for humanitarian protections? By trial or some more rapid assessment? Second, how should undocumented migrants be treated while their claims are evaluated? Should the government detain them, release them under supervision, or—as the Trump Administration opted to do—require many of them to wait in Mexico? These questions have become more prominent as the flow of undocumented migrants seeking humanitarian protections (“asylum seekers”) has increased over the past decade. Most undocumented migrants encountered at the border are subject to expedited removal. The statutory framework for expedited removal outlines the following answers to these procedural questions: 1. Screening. Protection claims by undocumented migrants at the border should be screened for a level of potential merit called “credible fear,” and rejected if they lack such potential merit, before being referred to trial-type immigration court proceedings before the Executive Office for Immigration Review within the Department of Justice.
    [Show full text]
  • Through a PRISM, Darkly(PDF)
    NANOG 59 – October 7, 2013 Through a PRISM, Darkly Mark Rumold Staff Attorney, EFF NANOG 59 – October 7, 2013 Electronic Frontier Foundation NANOG 59 – October 7, 2013 NANOG 59 – October 7, 2013 NANOG 59 – October 7, 2013 What we’ll cover today: • Background; what we know; what the problems are; and what we’re doing • Codenames. From Stellar Wind to the President’s Surveillance Program, PRISM to Boundless Informant • Spying Law. A healthy dose of acronyms and numbers. ECPA, FISA and FAA; 215 and 702. NANOG 59 – October 7, 2013 the background NANOG 59 – October 7, 2013 changes technologytimelaws …yet much has stayed the same NANOG 59 – October 7, 2013 The (Way) Background • Established in 1952 • Twin mission: – “Information Assurance” – “Signals Intelligence” • Secrecy: – “No Such Agency” & “Never Say Anything” NANOG 59 – October 7, 2013 The (Mid) Background • 1960s and 70s • Cold War and Vietnam • COINTELPRO and Watergate NANOG 59 – October 7, 2013 The Church Committee “[The NSA’s] capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything. Telephone conversations, telegrams, it doesn't matter. There would be no place to hide.” Senator Frank Church, 1975 NANOG 59 – October 7, 2013 Reform • Permanent Congressional oversight committees (SSCI and HPSCI) • Foreign Intelligence Surveillance Act (FISA) – Established requirements for conducting domestic electronic surveillance of US persons – Still given free reign for international communications conducted outside U.S. NANOG 59 – October 7, 2013 Changing Technology • 1980s - 2000s: build-out of domestic surveillance infrastructure • NSA shifted surveillance focus from satellites to fiber optic cables • BUT: FISA gives greater protection for communications on the wire + surveillance conducted inside the U.S.
    [Show full text]
  • HOUSE of REPRESENTATIVES-Thursday, December 17, 1998
    27770 CONGRESSIONAL RECORD-HOUSE December 17, 1998 HOUSE OF REPRESENTATIVES-Thursday, December 17, 1998 Pursuant to section 3 of House Con­ Pursuant to clause 1, rule I, the Jour­ Mr. Thomas J. Murrin, Pennsylvania; current Resolution 353, One Hundred nal stands approved. Mr. Kenneth Saxe, Pennsylvania; Fifth Congress, the House met at 10 Mr. Frank Riggs, California; and a.m. and was called to order by the Mr. Frank Roberts, California. Speaker, Hon. NEWT GINGRICH. PLEDGE OF ALLEGIANCE The SPEAKER. Will the gentleman from South Carolina (Mr. SPENCE) COMMUNICATION FROM THE NOTIFICATION OF REASSEMBLING come forward and lead the House in the CHAIRMAN OF THE COMMITTEE OF CONGRESS Pledge of Allegiance. ON TRANSPORTATION AND IN­ The SPEAKER. The Chair lays before Mr. SPENCE led the Pledge of Alle­ FRASTRUCTURE the House the text of the formal notifi­ giance as follows: The Speaker laid before the House cation sent to Members on Monday, I pledge allegiance to the Flag of the the following communication from the December 14, 1998, of the reassembling United States of America, and to the Repub­ chairman of the Committee on Trans­ of the House, which the Clerk will read. lic for which it stands, one nation under God, portation and Infrastructure; which The Clerk read as follows: indivisible, with liberty and justice for all. was read and referred to the Com­ OFFICE OF THE SPEAKER, mittee on Appropriations. Washington, DC, December 14, 1998. APPOINTMENT AS MEMBERS OF WASHINGTON, DC, Pursuant to section 3 of House Concurrent THE ADVISORY COMMISSION ON October 13, 1998. Resolution 353 and after consultation with ELECTRONIC COMMERCE Hon.
    [Show full text]