Category Archives: Big Brother Surveillance Society

Travelers left more than $500,000 at airport checkpoints last year, TSA keeps the change

NBC News | Feb 17, 2013

by Harriet Baskas

TSA-airport-securityFrazzled and forgetful passengers left more than a half million dollars in spare change in the plastic bowls and bins at airport security checkpoints last year.

That’s about $45,000 more than the amount left behind in 2011, according to the Transportation Security Administration (TSA).

What happens to all that money?

TSA makes “every effort to reunite passengers with items left at security checkpoints,” said agency spokesperson Nico Melendez. But all those nickels, dimes, quarters – and a smattering of poker chips and crumpled bills – usually end up getting counted, forwarded to the TSA financial office and then spent on general security operations.

Congress approved that TSA expenditure in 2005, but some lawmakers and passengers rights groups are unhappy TSA gets to keep the change.

In 2009, and again in 2011, Rep. Jeff Miller, R-Fla., the chairman of the House Committee on Veterans’ Affairs, introduced unsuccessful legislation that would require TSA to give the unclaimed cash to the United Service Organizations (USO), a private nonprofit that operates centers for military personnel at more than 40 U.S. airports. The lawmaker plans to reintroduce the bill soon, “as a stand alone measure and as part of the Homeland Security Appropriations bill,” Dan McFaul, a spokesman for Miller’s office, told NBC News.

Money left behind by passengers at airport checkpoints is “a windfall TSA does not deserve to keep,” said Paul Hudson, executive director FlyersRights.org, a non-profit consumer organization. But rather than give the money to the USO, he’d like the funds to go to nonprofit groups that look out for the rights of travelers. “Passengers pay a lot of taxes on airline tickets and there is currently no government funding in the United States for organizations that seek to help passengers,” he said.

“Common sense would dictate that the money is returned to the people who lost it … travelers,” said Brandon Macsata, executive director of the Association for Airline Passenger Rights. But he doubts TSA will ever be required by law to give the change left at airport checkpoints to passenger rights organizations.

If the TSA continues to be able to keep the left-behind money though, Macsata would like the agency to be directed to use it for staff training “to better educate them on how to appropriately handle and treat unique travelers, including travelers with medical conditions, children and travelers with disabilities.”

TSA’s Melendez doesn’t know why passengers leave money in the plastic bins at airports, but says “placing spare change or any other items in a purse or briefcase prior to going through security is the easiest and best way to maintain positive control of your belongings.”

DARPA wants to watch how you type your sentences and how you use your mouse to assemble an “online fingerprint”

armypad

foreignpolicy.com | Feb 15, 2013

By John Reed Friday,

DARPA is getting serious about one of the issues that cyber-security professionals inside and outside government regularly bemoan: the relative inability of weak passwords to protect…anything.

To overcome the fact that passwords can be stolen or hacked — and don’t necessarily protect a computer once the authorized user is logged on — the Pentagon’s research arm has kicked off a $14 million effort to develop sensors that can constantly monitor users’ online behavior to determine whether they are who they say they are.

This kind of vigilance is going to become all the more important as the Pentagon shrinks the number of networks it runs under its cloud-computing initiative and fields mobile devices capable of handling classified information. Ask any cyber security expert and they will tell you that computer networks will inevitably be compromised and that the best defense lies in constantly monitoring for weird behavior.

How exactly do you do that? Well, that’s where DARPA’s Active Authentication program comes in. The Active Authentication program is aimed at verifying your identity based on your online behavior instead of an easily guessed or stolen password.

“The program focuses on the development of new types of behavioral biometrics focused on the user’s cognitive processes,” Richard Guidorizzi, DARPA program manager, explained in an email to Killer Apps. In English, that means Active Authentication will monitor your computer habits — like your typing patterns, the way you use a mouse, and even how you construct sentences — to assemble an “online fingerprint.”

“Examples of this could include, but are not limited to, behavioral biometrics that focus on a user’s unique way of typing on the device or cognitive biometrics that focus on how the user processes language and structures sentences,” he said.

In theory, a user would log onto his computer using a government-issued secure ID card, known as a Common Access Control card. This would tell AA sensors to begin monitoring the user, analyzing typing and sentence structure, and comparing the patterns to previous behavior.

AA isn’t just limited to desktop computers. DARPA will also address mobile devices.

This could come in mighty handy for soldiers and spies who are increasingly reliant on smart phones and tablets to do everything from filing flight plans to collecting and sharing classified information.

Mobile devices will have their own unique safeguards. “For example, the accelerometer in a mobile phone could track how the device rests in a user’s hand or the angle at which he talks into it. Another technique might track the user’s gait, reflecting how he walks as it is transported. In theory, each of these examples could be another layer of user validation,” Guidorizzi writes.

Don’t expect AA tech to be put into place anytime in the near future, though — AA’s work is experimental. “This program is not intended to develop fielded systems but instead to advance the technologies and concepts outlined above,” added Guidorizzi.

Still, some type of online identity software may emerge in the coming years. Just today White House Cyber Security Coordinator Michael Daniel told an audience at the Center for Strategic and International Studies that he wants to see research and development programs that sound a lot like AA shift the balance of cyber power from favoring the attacker, as it does right now, to favoring the defender.

Daniel told Killer Apps he wants to know whether there are “ways that you can bake in better credentialing into the underlying structure of the Internet? Are there ways you can get the software manufacturers make software secure by default, so that you actually have to work at browsing insecurely?”

Military contractor Raytheon’s disturbing Big Brother software trolls social networks to find out where you are and what you are doing

i-am-totally-aware-that-i-dont

It’s a disturbing vision, summoning up George Orwell’s “Big Brother.”

sfgate.com | Feb 12, 2013

by Caleb Garling and Benny Evangelista

Raytheon, a Massachusetts defense contractor, has built tracking software that pulls information from social networks, according to a video obtained by the Guardian newspaper in London.

The gist of the Guardian article:

“The Massachusetts-based company has acknowledged the technology was shared with U.S. government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analyzing ‘trillions of entities’ from cyberspace.”

Using public data from Facebook, Twitter, Gowalla and Foursquare, the software – called RIOT, or Rapid Information Overlay Technology – apparently gathers uploaded information and forms a profile of a person’s every move that was registered with one of the websites.

The video obtained by the newspaper starts with a demonstration by Raytheon’s “principal investigator,” Brian Urch, showing how easy it is to track an employee named Nick – a real person – based on all the places he has checked in using his smartphone.

Raytheon Riot: Defense spying is coming to social networks

Raytheon Riot Software Predicts Behavior Based on Social Media

“When people take pictures and post them on the Internet using their smartphones, the phone will actually embed the latitude and longitude in the header data – so we’re going to take advantage of that,” Urch says. “So now we know where Nick’s gone … and now we’ll predict where he’ll be in the future.”

Urch goes on to analyze – using graphs and calendars – where Nick likes to spend his personal time and make predictions about his behavior.

“If you ever wanted to get a hold of his laptop, you might want to visit the gym at 6 a.m. on Monday,” Urch says with alarming casualness.

It’s a disturbing vision, summoning up George Orwell’s “Big Brother.”

But it’s also a reminder that advertisers are not the only ones with interest in the reams of data that social networks collect about regular people. Consider: Had the CIA built a tool like Facebook, we’d probably all be terrified.

And all the tracking data this tool analyzes is provided voluntarily, by us. The satirical news site the Onion, always on point, once joked that the CIA’s “Facebook Program” had drastically cut its spying costs.

Users who enjoy posting their lives on computers they don’t control – i.e. those of Facebook, Twitter, Google, et al – should not be surprised when that data get out of their control. Some governments, like France, are doing what they can to keep an eye on how social-networking data are used, but at the end of the day, if we don’t want Facebook and Twitter using our data, we shouldn’t give that to them.

A final note: The Raytheon video features technology from 2010 – three years ago. No doubt the tracking software has come a long way since then.

TSA finding new homes for nude scanners in federal buildings

22-administration-security-denver.n
A traveler undergoes a full body scan performed by Transportation Security Administration agents as she and others pass through the security checkpoint at the Denver International Airport on November 22, 2010 in Denver, Colorado.(AFP Photo / John Moore)

RT | Feb 12, 2013

The TSA is retiring 250 of their high-tech “backscatter” screening machines in the coming weeks, easing both healthcare and privacy woes from frequent travelers that don’t trust the devices. Are they really going away for good though?

Backscatter makers Rapiscan and the Transportation Security Administration announced the ending of a partnership just last month, and by June 1 the TSA will have removed the space-age body screeners from around 200 airports across the country. In a recent interview with Federal Times, though, TSA spokesperson David Castelveter says that the roughly $40 million worth of machinery could be moved elsewhere to provide airport-style security outside of departure terminals.

“We are working with other government agencies to find homes for them,” Castelveter tells reporter Andy Medici. “There is an interest clearly by DoD and the State Department to use them — and other agencies as well.”

According to Medici, those machines may soon be coming to federal buildings to be used in routine, day-to-day security screenings for both visitors and employees.

Removed TSA Scanners May End Up in Gov’t Office Buildings

Last February, lawmakers in Washington responded to opponents of the machines by demanding that the TSA only implement devices that produce “generic passenger images,” a maneuver they hoped would bring change substantial enough to alleviate the privacy concerns from travelers made uncomfortable by the X-ray-like machines that have earned them the moniker “pornoscanners.” With a deadline looming and Congress’ challenge left unanswered, though, the TSA confirmed last month that their $5 million contract with Rapiscan would be coming to a close and the company’s Secure 1000SP Advanced Imaging Technology (AIT) systems and Automated Target Recognition (ATR) software would be shelved.

“It became clear to TSA they would be unable to meet our timeline,” Karen Shelton Waters, an assistant administer for acquisitions at the agency, told Bloomberg at the time. “As a result of that, we terminated the contract for the convenience of the government.”

Now just weeks after that announcement, Medici’s report suggests that Americans won’t be saying goodbye to the backscatters anytime soon. Although the TSA has removed at least 76 of the machines from airports already and intends on having the other 174 gone by the June 1 deadline, Castelveter wants them elsewhere.

“Hopefully we will be able to deploy them within other government agencies,” he says.

In the January 17 press release from Rapiscan that announces the end of their backscatter deal with the TSA, the company hints at what could be to come regarding other deals.

“As the Secure 1000SP has been operated by TSA as an effective imaging system, TSA plans to deploy these systems, with Rapiscan’s assistance, to U.S. government agencies that already rely on the Secure 1000 product line or can enhance their security programs with the Secure 1000SP,” the presser reads.

Late last year in November, Rapiscan announced on its website that it had been awarded a $15 million contract from an unnamed, “critical US government agency” in order to provide people and baggage scanning technology. Although that write-up declined to name the entity that will work with Rapiscan or what kind of technology will be implemented, it does little to calm the fears of those who worried that invasive airport pat-downs were just the beginning of a bigger trend — a problematic one where Americans are forced to sacrifice privacy for protection.

Rep. Bennie Thompson (D-Mississippi) made a statement last month condemning the use of the devices and insisted “The American public must be assured that these machines will not be used in any other public federal facility.” Bob Burns of the TSA Blog says the units will be “stored until they can be redeployed to other mission priorities within the government.”

Intel’s creepy face-scanning camera watches you while you watch TV

 

telescreen

One day we’re gonna watch you like it’s 1984

Intel’s new TV box to point creepy spy camera at YOUR FACE

theregister.co.uk | Feb  13, 2013

By Bill Ray

Intel has confirmed it will be selling a set-top box direct to the public later this year, along with a streaming TV service designed to watch you while you’re watching it.

The device will come from Intel Media, a new group populated with staff nicked from Netflix/Apple/Google and so forth. Subscribers will get live and catch-up TV as well as on-demand content – all delivered direct from Intel over their broadband connections. It’s a move which will put Chipzilla firmly into US living room, and no doubt ignite a host of privacy concerns from those who want to watch without being watched.

The announcement, made during an interview at the AllThingsD conference in California, isn’t a great surprise; rumours of an Intel play have been swirling around for the last year and sure enough Erik Huggers (VP at Intel Media) admitted that the company has been working on the device, and associated service, for the last 12 months. He didn’t say what the service will be called, but did say that the US isn’t ready for entirely à la carte options and that Intel will be selling bundles of content – though we’ll have to wait to see what they comprise.

Intel’s television set top box will include a built-in camera that watches you in your living room

Intel Developing Box That Watches You Watch TV

Intel Jumps Into Living Room with Internet TV Device

It’s true: Intel is building an internet TV platform that also watches you

More controversial is the plan to use a camera on the box to look outward, to identify the faces staring at the goggle box… telescreen-stylie. Intel will use that to present personalised options and targeted advertising, in a process which seems immediately creepy but might make sense to anyone who has tuned in to NetFlix to be told “Because you watched Power Rangers Ninja Storm…” We’re used to being watched while we’re web surfing, and those using Google Docs know the composition process contributes to their profile, but being watched on camera might be a step too far for some.

Huggers points out that the camera will have a physical shutter on the front, which can be closed, and that having the box recognise the viewers is simply easier than maintaining separate accounts, but Intel accepts that there’s a public-relations challenge ahead.

Intel will be embracing the H.265 codec, recently developed and just approved by the ITU, which should provide better video over less bandwidth, but will make getting support across devices a challenge.

Huggers made much of his experience at the BBC: “I built this thing called iPlayer in the UK, and we made that service available to more than 650 devices”, citing the broad platform support as essential to the success of iPlayer (which he describes as “catch-up TV done properly”) and promising that Intel’s service will also get broad support.

Whether the Android and iOS clients will feature the watching-you-watching-them tech, patented by Intel last year, we don’t know, but the entry of Intel into the market is significant not only to shake up on-demand TV but also to ensure a future for the chip manufacturer as a provider of on-demand television – a business safe from the ARM-based competitors.

Pentagon contractor Raytheon knows what you are doing, where you are and where you are going

Defence contractor Raytheon has developed a tool that can mine social media to track and predict individuals’ behaviour, according to The Guardian.

Privacy crisis in progress as social media tracking again found to be intrusive

Register | Feb 11, 2013

A global “Big Sinister Defence Company Develops ‘Google For Spies’ That Your Government May Already Have Bought “ story is therefore unfurling as you read this piece.

The key “features” of Raytheon’s tool, developed in co-operation with the US government and delicately titled Rapid Information Overlay Technology (RIOT), are said to be an ability to sift through social media and figure out who your friends are and the places you frequent. With that data in hand, The Guardian feels “monitoring and control” of you, I, and everyone we collectively hold dear is eminently possible. It’s implied, despite Raytheon saying it’s had no buyers, that such software is likely to end up in the hands of a repressive State, or a shadowy agency inside a more open State. Australia’s Sydney Morning Herald has piled in with a story on the same theme.

How Raytheon software tracks you online video

All of which sounds just terrifying, except for the fact similar software can be had from other sources that are far less scary than a “defence contractor.”

IBM, for example, happily sells “social media analytics” software that can “Capture consumer data from social media to understand attitudes, opinions, trends and manage online reputation” and even “Predict customer behavior”. And yes, that’s the same IBM that can whip up a supercomputer or sell you a scale-out NAS capable of storing multiple petabytes of data. Throw in the social stuf and Big Blue, too, could help someone nasty to obtain, retain and analyse petabytes of data about us all.

SAS’ offering in the same software category is capable of “continuously monitoring online and social conversation data to identify important topics” and “continuously captures and retains more than two years of online conversation history”. SAS even offers to host its solution, meaning all that data about you is stored by a third-party company you’ve never heard of (and isn’t even open to the scrutiny afforded to listed companies).

Customer service software outfit Genesys sells “Social engagement” software that “Automates the process of (social) listening to your customers” and “Extends business rules and service level strategies to the growing volume of social media-based customer interactions. Could those business rules become “security rules”?

A quick mention of Big Data, daily and breathlessly advanced as capable of all of the above, and much more to more data, is also surely worth inserting at this point.

And then there are Google, Twitter, Facebook and others whose entire business is built on figuring out who you spend time with and where you spend (or intend to spend) that time, so they can sell that information to advertisers. Or hand it over to the government, when asked, which seems to be happening rather more regularly if the social networks’ own reports on the matter suggest.

We’re not suggesting any of the software or services mentioned above were designed as instruments of State surveillance, but it is surely worth pointing out that Raytheon is far from alone in having developed software capable of tracking numerous data public sources, aggregating them into a file on an individual, and doing so without individuals’ knowledge. That the company has done so in collaboration with the US government should not surprise, either: show The Reg a software company uninterested in adapting their wares for government and/or military applications and we’ll show you a software company begging for a shareholder lawsuit and/or swift and replacement of its top executives.

As for the spatial aspect of the allegations, the fact that photos contain spatial metadata is hardly news, nor is the notion that social media leaves a trail of breadcrumbs novel. One has only to revisit news from 2010 to be reminded of how pleaserobme.com pointed out how social media can alert thieves to the fact you’ve left your home. And let’s not even try to draw a line between a new-wave marketing tool like Geofeedia (today spruiking itself as offering real-time maps showing Tweets around the Grammies and as capable of letting one “monitor events to gather sentiment data”), mashups from clever folks who map check-ins and sinister surveillance-ware.

Far clearer is the fact that you, dear reader, are the product for any free online product. Also crystal clear is that by using such services, data about you will be consumed by a large and diverse audience. The scariest thing of all may be how few of those that use such services care or even realise the reality of the situation.

 

Homeland Security OKs ‘Suspicionless’ seizure of electronic devices for any reason; Fourth-Amendment-Free Zone stretches 100 miles inland from border

517966692_d5e100b039_z
Photo: DeclanTM/Flickr

DHS Watchdog OKs ‘Suspicionless’ Seizure of Electronic Devices Along Border

Wired | Feb 8, 2013

By David Kravets

The Department of Homeland Security’s civil rights watchdog has concluded that travelers along the nation’s borders may have their electronics seized and the contents of those devices examined for any reason whatsoever — all in the name of national security.

The DHS, which secures the nation’s border, in 2009 announced that it would conduct a “Civil Liberties Impact Assessment” of its suspicionless search-and-seizure policy pertaining to electronic devices “within 120 days.” More than three years later, the DHS office of Civil Rights and Civil Liberties published a two-page executive summary of its findings.

“We also conclude that imposing a requirement that officers have reasonable suspicion in order to conduct a border search of an electronic device would be operationally harmful without concomitant civil rights/civil liberties benefits,” the executive summary said.

The memo highlights the friction between today’s reality that electronic devices have become virtual extensions of ourselves housing everything from e-mail to instant-message chats to photos and our papers and effects — juxtaposed against the government’s stated quest for national security.

The President George W. Bush administration first announced the suspicionless, electronics search rules in 2008. The President Barack Obama administration followed up with virtually the same rules a year later. Between 2008 and 2010, 6,500 persons had their electronic devices searched along the U.S. border, according to DHS data.

According to legal precedent, the Fourth Amendment — the right to be free from unreasonable searches and seizures — does not apply along the border. By the way, the government contends the Fourth-Amendment-Free Zone stretches 100 miles inland from the nation’s actual border.

Civil rights groups like the American Civil Liberties Union suggest that “reasonable suspicion” should be the rule, at a minimum, despite that being a lower standard than required by the Fourth Amendment.

“There should be a reasonable, articulate reason why the search of our electronic devices could lead to evidence of a crime,” Catherine Crump, an ACLU staff attorney, said in a telephone interview. “That’s a low threshold.”

The DHS watchdog’s conclusion isn’t surprising, as the DHS is taking that position in litigation in which the ACLU is challenging the suspicionless, electronic-device searches and seizures along the nation’s borders. But that conclusion nevertheless is alarming considering it came from the DHS civil rights watchdog, which maintains its mission is “promoting respect for civil rights and civil liberties.”

“This is a civil liberties watchdog office. If it is doing its job property, it is supposed to objectively evaluate. It has the power to recommend safeguards to safeguard Americans’ rights,” Crump said. “The office has not done that and the public has the right to know why.”

Toward that goal, the ACLU on Friday filed a Freedom of Information Act request demanding to see the full report that the executive summary discusses.

Meantime, a lawsuit the ACLU brought on the issue concerns a New York man whose laptop was seized along the Canadian border in 2010 and returned 11 days later after his attorney complained.

At an Amtrak inspection point, Pascal Abidor showed his U.S. passport to a federal agent. He was ordered to move to the cafe car, where they removed his laptop from his luggage and “ordered Mr. Abidor to enter his password,” according to the lawsuit.

Agents asked him about pictures they found on his laptop, which included Hamas and Hezbollah rallies. He explained that he was earning a doctoral degree at a Canadian university on the topic of the modern history of Shiites in Lebanon.

He was handcuffed and then jailed for three hours while the authorities looked through his computer while numerous agents questioned him, according to the suit, which is pending in New York federal court.

Government decrees all dogs shall now be microchipped

dog_2368173b
The number of patients treated in hospital for dog bites has more than doubled in a decade to more than 6,000 a year Photo: GEOFF PUGH

All puppies will now have to be microchipped to make it easier to trace the owners of dangerous dogs.

Telegraph | Feb 5, 2013

By Peter Dominiczak

Ministers will say that compulsory microchipping will ensure that all dogs can in future be traced back to their owners, who will then be held accountable for the animal’s behaviour.

There have been growing calls for the Government to take action amid concern from animal charities about dangerous dogs being used as weapons and status symbols.

Under the measures to be unveiled by Owen Paterson, the Environment Secretary, dog owners will also now face prosecution if an animal attacks anyone in their home.

Those plans will be welcomed by postmen, who have campaigned for a new law ensuring that dog owners are prosecuted even if their dog attacks someone on private property.

Current rules mean that legal action is only taken if a dog attacks a person on public land.

The number of patients treated in hospital for dog bites has more than doubled in a decade to more than 6,000 a year.

Groups including the RSPCA and the Dogs Trust have called for compulsory microchipping to create a clear link between dogs and their owners.

The electronic chips hold an electronic record of their owner’s name and addresses, as well as a unique identity number.

Implanting can cost as little as £5, however the Telegraph understands that the scheme could be subsidised to avoid pet owners being forced to pay for the chips.

Ministers believe the effect of the new rules will be near-universal coverage of British dogs within little more than a decade.

Recent surveys have suggested there are about 8.3 million dogs in Britain. More than half already have microchips.

Animal charities say there is a growing problem of people abandoning dogs.

Defra last year estimated there are about 125,000 strays in England and Wales.

About 6,000 healthy animals are destroyed each year because they have no permanent home.

Northern Ireland last year became the first part of the UK to introduce a law on microchipping.

Andrew Rosindell, the Conservative MP for Romford, welcomed the announcement and said that the moves will also prevent local authorities from having to spend “huge amounts of money” kennelling lost dogs.

“This is an extremely positive way forward,” he said. “It is the welfare of the animal that we should be putting first.”

Ministers last year announced that owners of dangerous dogs which attack people in public will face stiffer penalties, including up to 18 months in prison.

Obama now ‘Judge, jury and executioner’: Legal experts fear implications of White House drone memo, dangerously expands definition of national defense

Bill.hitler.obama.national.socialism

NBCNews.com | Feb 5, 2013

By Erin McClam, Staff Writer, NBC News

Legal experts expressed grave reservations Tuesday about an Obama administration memo concluding that the United States can order the killing of American citizens believed to be affiliated with al-Qaida — with one saying the White House was acting as “judge, jury and executioner.”

The experts said that the memo, first obtained by NBC News, threatened constitutional rights and dangerously expanded the definition of national self-defense and of what constitutes an imminent attack.

“Anyone should be concerned when the president and his lawyers make up their own interpretation of the law or their own rules,” said Mary Ellen O’Connell, a law professor at the University of Notre Dame and an authority on international law and the use of force.

Memo justifies drone kills even with patchy intelligence

“This is a very, very dangerous thing that the president has done,” she added.

The memo, made public Monday, provides detail about the administration’s controversial expansion of drone strikes against al-Qaida suspects abroad, including those aimed at American citizens.

Among them were Anwar al-Awlaki and Samir Khan, who were killed by an American strike in September 2011 in Yemen. Both men were U.S. citizens who had not been charged with a crime.

Attorney General Eric Holder, in a talk at Northwestern University Law School in March, endorsed the constitutionality of targeted killings of Americans provided that the government determines such an individual poses “an imminent threat of violent attack.”

But the memo obtained by NBC News refers to a broader definition of imminence and specifically says the government is not required to have “clear evidence that a specific attack on U.S. persons and interests will take place in the immediate future.”

RELATED: Read the memo on drone strikes against Americans

Glenn Greenwald, a constitutional lawyer who writes about security and liberty for the British newspaper The Guardian, described the memo as “fundamentally misleading,” with a clinical tone that disguises “the radical and dangerous power it purports to authorize.”

“If you believe the president has the power to order U.S. citizens executed far from any battlefield with no charges or trial, then it’s truly hard to conceive of any asserted power you would find objectionable,” he wrote.

The attorney general told reporters Tuesday that the administration’s primary concern is to keep Americans safe, and to do it in a way consistent with American values. He said the administration was confident it was following federal and international law.

“We will have to look at this and see what it is we want to do with these memos,” he said. “But you have to understand that we are talking about things that are, that go into how we conduct our offensive operations against a clear and present danger.”

White House press secretary Jay Carney said that while the government must take the Constitution into account, U.S. citizenship does not make a leader of an enemy force immune from being targeted.

The drone strikes, and now the Justice Department memo, are expected to figure prominently Thursday when the Senate takes up the nomination of John Brennan, the White House counterterrorism adviser and architect of the drone campaign, to lead the CIA.

Sen. Ron Wyden, an Oregon Democrat, and 10 other senators wrote to President Barack Obama on Monday asking him to release all Justice Department memos on the subject.

The senators said that Congress and the public need a full understanding of how the White House views its authority so they can decide “whether the president’s power to deliberately kill American citizens is subject to appropriate limitations and safeguards.”

Jameel Jaffer, deputy legal director of the American Civil Liberties Union, described the memo as reckless. He wrote that assuming that the target of a strike is an al-Qaida leader, without court oversight, was like assuming a defendant is guilty and then asking whether a trial would be useful.

But John O. McGinnis, a professor of constitutional law at Northwestern University who worked for the White House’s Office of Legal Counsel during the Reagan and H.W. Bush administrations, said he was persuaded by the arguments in the memo, which he described as “very cautious.”

“If this is someone who has taken up affiliation with an organization attacking the United States, I don’t think it matters whether they’re a citizen — they seem to me an enemy combatant whom the president can respond to,” he said. “I think this is not a hard case.”

Sen. Dianne Feinstein of California, a Democrat and chair of the Senate Intelligence Committee, issued a statement Tuesday saying that her committee received the memo last year and wants to see other administration memos further explaining the legal framework for carrying out strikes.

At the same time, she appeared to defend the killing of al-Awlaki. She said that al-Awlaki was external operations leader of al-Qaida in the Arabian Peninsula and directed the failed attempt to blow up an airliner on Christmas Day 2009.

The memo lays out a three-part test for making targeted killings of Americans lawful. The suspect must be deemed an imminent threat, capturing the target must not be feasible, and the strike must be conducted according to “law of war principles.”

Naureen Shah, a lecturer at Columbia Law School and associate director of the Counterterrorism and Human Rights Project at the school’s Human Rights Institute, said that she was deeply troubled by the contents of the memo.

“We should be concerned when the White House is acting as judge, jury and executioner,” she said. “And there’s no one outside of the White House who has real oversight over that process. What’s put forward here is there’s no role for the courts, not even after the fact.”

German Activists Punch Out Big Brother’s Eyes

wired.com | Jan 31, 2013

By Kim Zetter

It’s being called Grand Theft Auto for the surveillance generation, only instead of being played out in the digital world, it’s played out in the real world. And the object of the game isn’t to steal cars or pull off other underworld pranks but to take out Big Brother’s eyes by destroying CCTV surveillance cameras spread across the city.

That’s the new game being played in Berlin and other German cities under the rules of Camover [note: the website keeps changing addresses so link may not work], an activist sport for those who hate surveillance cameras, according to The Guardian.

Teams of players are charged with taking out as many cameras as possible — by ripping them out of mounts, cutting cables or covering the lenses with black paint using Super Soaker squirt guns — and videotaping the vandalism in the process.

Angry Populace Burning British Surveillance Cameras

Points are awarded for the number of cameras destroyed — with bonus points granted for the most inventive methods.

“We thought it would motivate inactive people out there if we made a video-invitation to this reality-game,” the creator of Camover told the Guardian. “Although we call it a game, we are quite serious about it: our aim is to destroy as many cameras as possible and to have an influence on video surveillance in our cities.”

The competition was launched as a protest against the European Police Congress being held in Berlin on February 19. There’s no real prize for the game. The winner gets front place in a protest that will take place three days before the congress begins.

The organizers of Camover explained their motivations on their web site:

“The gaze of the cameras does not fall equally on all users of the street but on those who are stereotypical predefined as potentially deviant, or through appearance and demeanour, are singled out by operators as unrespectable,” they write. “In this way youth, particularly those already socially and economically marginal, may be subject to even greater levels of authoritative intervention and official stigmatisation, and rather than contributing to social justice through the reduction of victimisation, CCTV will merely become a tool of injustice through the amplification of differential and discriminatory policing.”