The Most Transparent Government in History

The Freedom of Information Act (FOIA) claims to allow regular people like you and me to request information from the federal government. Each individual state has also implemented legislation to the same effect. But requests made under these laws often result in responses claiming no such information exists or reams of paper with large black blocks concealing any useful information. New York has gone an extra step. In addition to refuting the existence of requested information or handing over redacted information the state can now tell requesters that it cannot confirm or deny the existence of such information:

Normally, when you submit a FOIA request to a government agency, one of three things happens: You get the records you want, the agency says no such records exist, or the agency says the records are exempt from disclosure.

But there’s another possible outcome: You might be told that the agency can “neither confirm nor deny the existence or nonexistence” of the records. That’s been permissible under federal law since 1976. And now, thanks to a case raising concerns in media circles, it’s permissible under state law in New York—where, for the first time, an appellate court has affirmed the use of such a response under the state Freedom of Information Law (FOIL).

Now New York doesn’t even have to play the usual game where they keep denying your request until you make it so specific that they are no longer able to claim that the information doesn’t exist. Instead it can just tell you that it can neither confirm or deny the existence or nonexistence of the information! In other words, the Freedom of Information Law is entirely useless in New York.

No Good Deed Goes Unpunished

What happens when the municipal government shortens the length of yellow lights to boost the revenue generated by its red light cameras? If you’re a good person you strike back by disabling their red light cameras. Unfortunately, if you’re a good person you also face years in a cage for fighting back against the municipal pirates:

Stephen Ruth, who remains free on bail, was arrested in April shortly after he told a CBS affiliate that he was the culprit and that he dismantled the cameras “in order to save lives.” He said the county shortened the yellow light duration from 5 seconds to 3 seconds in a bid to make more money.

He’s accused of 17 felonies and faces a maximum seven-year prison sentence if convicted on all the charges. He pleaded not guilty Friday in a local court and wants to go to trial for snipping the wires on as many as 16 red light cameras on intersections on Route 25 between Coram and Centereach.

The lesson of this story is that you shouldn’t publicly announce your good deeds to the world. In this case the municipal government actually put people’s lives at risk by shortening the duration of yellow lights just so it could boost its revenue. That’s the kind of corrupt shit that happens when a handful of people are handed absolute power. But that power can be checked somewhat when good people undermine the government’s revenue generation.

Stephen Ruth is the type of everyday hero we need more of.

Another One Of Those Bad Apples

I’m not sure if this is one of those bad apples that makes the majority look bad, another isolated incident I keep hearing so much about, or a case of an officer who simply wanted to go home to his family at night. Regardless of the typical law enforcer apologist excuse you select, it’s important to remember that the rules are different for men with government badges:

A former Kenosha Police officer who planted evidence in a homicide investigation will not see jail time.

Kyle Baars was sentenced Wednesday to one year probation for felony misconduct in public office.

He was given permission to serve that probation in Illinois, and will be required to serve 80 hours of community service. He could serve a year in jail and one year of extended supervision if he violates the terms of his probation.

Baars could have been sentenced to 18 months in prison and given a $10,000 fine.

The former officer had admitted planting a bullet and an identification card in a backpack during an investigation into the 2014 shooting death of a Kenosha man.

On Wednesday, Baars called planting the evidence “a bad decision” but argued that he should be given credit for eventually admitting his actions and testifying at the homicide trial for one of the defendants that he had planted evidence.

One year of probation for planting evidence in the investigation of a legitimate crime? It’s good to be in the king’s employ. The sentence is ridiculous but the way the officer was handled with kid gloves is almost as ridiculous. Neither his fellow officers, the district attorney, or the judge ripped his ass properly. Instead he received a mild chiding by the judge for blaming other people.

This is just another case of the court system treating agents of the State differently than the rest of us. I’m fairly certain any non-state agent who planted evidence in a criminal investigation would receive a bit harsher of a sentence than one year of probation. I also doubt that excuses such as a “distinguished career” would be considered a legitimate legal defense. The sentencing would likely include the judge delivering much harsher words than a mere “Tsk, tsk. You shouldn’t have done that. That was naughty.”

Police are like you and me, only better!

Fear Is The Last Refuge Of A Scoundrel

Stingray is a product name for an IMSI-catcher popular amongst law enforcers. Despite the devices being trivial enough that anybody can build one for $1,500, law enforcers have been desperate to keep the devices a secret. The Federal Bureau of Investigations (FBI), for example, would rather throw out cases than disclose its Stingray usage.

Here in Minnesota law enforcers are also busy keeping tight wraps on Stingray usage:

A Fox 9 Investigation has revealed that tracking warrants for a surveillance device called StingRay have routinely been kept sealed, despite a law requiring them to become public with 90 days.

The StingRay device is used by the Bureau of Criminal Apprehension about 60 times a year, said BCA Superintendent Drew Evans. Hennepin County Sheriff also had a StingRay, but a spokesperson said they discontinued it after using it only four times.

Why the secrecy? If you were expecting a detailed legal defense you’re going to be left wanting. The only defense law enforcers can muster is fear. Whenever a law enforcement department is pressed about the secrecy of Stingray devices they respond with the scariest case they can think of that involved the device

“This technology has been absolutely critical in locating some of Minnesota’s most violent criminals, more quickly than we ever were before,” Evans said.

Photo State of surveillance: StingRay warrants sealed despite changes in Minnesota law
Law enforcement used the technology last month when a disgruntled client allegedly gunned down a clerk at a St. Paul law firm and then went on the run. Police had the suspect’s cell phone and tracked him down.

[…]

“Just this week we were able to locate a level 3 sexual offender that was non-compliant, a suspect in a series of serial rapes, and a homicide suspect, this week alone,” he explained.

This usually satisfies journalists and the general public but shouldn’t. Whenever a law enforcer brings up a scary case where they used a Stingray device the immediate response should be, “So what?”

So what if the devices were used in secrecy to find a suspected murderer or a level three sex offender? Will these devices suddenly cease working if they’re subjected to the same oversight as any other law enforcement technology? Will they power off forever the minute a warrant is unsealed? No.

Law enforcers have no legal justification for keeping these devices secret, which is why they’re resorting to fear tactics. The question everybody should be asking is why they’re so desperate to keep these devices in the shadows. I theorize that there is a known weakness in the technology that would make them potentially inadmissible in court. What other reason could there be to go so far as to throw out individual cases rather than unseal warrants and release technical details about the devices? It’s not like the devices are a novel technology that nobody knows how to make or defend against.

The War Against Privacy

If you read the erroneously named Bill of Rights (which is really a list of privileges, most of which have been revoked) you might be left with the mistaken impression that you have a right to privacy against the State. From the National Security Administration’s (NSA) dragnet surveillance to local police departments using cell phone interceptors, the State has been very busy proving this wrong. Not to be outdone by the law enforcement branches, the courts have been working hard to erode your privacy as well. The most recent instance of this is a proposed procedural change:

The Federal Rules of Criminal Procedure set the ground rules for federal criminal prosecutions. The rules cover everything from correcting clerical errors in a judgment to which holidays a court will be closed on—all the day-to-day procedural details that come with running a judicial system.

The key word here is “procedural.” By law, the rules and proposals are supposed to be procedural and must not change substantive rights.

[…]

But the amendment to Rule 41 isn’t procedural at all. It creates new avenues for government hacking that were never approved by Congress.

The proposal would grant a judge the ability to issue a warrant to remotely access, search, seize, or copy data when “the district where the media or information is located has been concealed through technological means” or when the media are on protected computers that have been “damaged without authorization and are located in five or more districts.” It would grant this authority to any judge in any district where activities related to the crime may have occurred.

In layman’s terms the change will grant judges the ability to authorize law enforcers to hack into any computer using Tor, I2P, a virtual private network (VPN), or any other method of protecting one’s privacy (the wording is quite vague and a good lawyer could probably stretch it to include individuals using a public Wi-Fi access point in a restaurant). The point being made with this rule proposal is clear, the State doesn’t believe you have any right to protect your privacy.

This should come as no surprise to anybody though. The State has long held that your right to privacy stops where its nosiness begins. You’re not allowed to legally possess funds the State isn’t aware of (financial reporting laws exist to enforce this), manufacture and sell firearms the State isn’t aware of, or be a human being the State isn’t aware of (registering newborn children for Social Security and requiring anybody entering or leaving the country to provide notice and receive approval from the State).

Government Oversight

Every time the government initiates another secret program some boot licking apologist excuses it as necessary to fight the enemies of America. After all, our wise benefactors put safety measure in place so these secret programs aren’t abused!

Except those safety measures don’t stop anything:

The secretive U.S. Foreign Intelligence Surveillance Court did not deny a single government request in 2015 for electronic surveillance orders granted for foreign intelligence purposes, continuing a longstanding trend, a Justice Department document showed.

The court received 1,457 requests last year on behalf of the National Security Agency and the Federal Bureau of Investigation for authority to intercept communications, including email and phone calls, according to a Justice Department memo sent to leaders of relevant congressional committees on Friday and seen by Reuters. The court did not reject any of the applications in whole or in part, the memo showed.

1,457 requests and not a single denial? Either the National Security Agency (NSA) and Federal Bureau of Investigations (FBI) are exceedingly cautious in with their requests or the court serves as a rubber stamp, not a check against abuse. Considering the history of both agencies I think it’s pretty safe to say the court is just a rubber stamp.

This is when some boot licker will tell me, “You don’t know that for sure, Chris!” And they’re right, which is the problem with secret programs. Everything takes place behind an iron curtain so the public has no way to verify if the program is being abused. What we do know is the lack of transparency creates an environment for abuse so even if a secret program isn’t currently being abused it will attract people who wish to abuse it.

It’s Good To Be The King’s Men

A court ordered the Federal Bureau of Investigations (FBI) to reveal the exploit it used to reveal the identities of systems that accessed a Tor hidden service that was serving child pornography. The FBI has responded by saying, “Nah, brah!”

In yet another case, the one involving Jay Michaud — his lawyers have now told the court that the DOJ has made it clear that despite the court ruling earlier this year that the FBI must reveal the details of the NIT/hacking tool, it will not do so (first revealed by Brad Heath).

This refusal is nothing new. The FBI has refused to turn over information about Stingray interceptors as well:

The filing goes on to point out how the FBI has similarly been refusing to reveal details of its Stingray mobile phone surveillance tools (something we’ve discussed here quite a bit), leading to convictions being overturned. As Michaud’s lawyers point out, the situation here is basically the same. If the FBI refuses to obey a court order, then the case should be dropped.

While the article does note that the Stringray case was dropped I think it’s important to note the stark difference between the way the king’s men are treated compared to regular individuals. If a court orders somebody like you or me to do something and we refuse we’re held in a cage until we decide to comply. When the FBI refused to obey a court order they go unpunished. For the sake of consistency I believe the judge should order the agents involved in the case and the heads of the FBI to be locked in a cage until they comply with the court order.

The FBI Heroically Saves Us Yet Again From A Criminal It Created

Just one week after heroically saving us from a terrorist it created, the Federal Bureau of Investigations (FBI) has saved us from yet another criminal it created:

US authorities depict Franey as an unstable anti-government militant who deserved a closer look to see how far he might go. One of his neighbors told FBI agents that Franey said he hated the US military for not allowing him “to leave the Army” after he enlisted, and that he railed at the system for “taking away his kids.” As US Attorney Hayes put it, the Justice Department was obligated to “pursue all available leads to ensure the public was protected from any possible harm.”

But while it seems Franey talked often and enthusiastically about plotting a terrorist attack, there’s little indication he ever had any intention of following through with his threats until the FBI’s undercover agent came along. After befriending Franey, the agent took him on an eight-month ride — sometimes literally, including a road trip along the West Coast — while recording their conversations, doling out cash, furnishing him with guns, and then busting him for illegal possession of the weapons.

I once heard that the FBI used to arrest criminals it didn’t create. Does it still do that once in a while? Is that still a thing?

What happened here is the same thing that always happens. The FBI identified somebody, likely of lukewarm intelligence, who it thought was capable of being radicalized into a threat. It then assigned an agent to befriend the individual and slowly radicalize him. After radicalizing him the agent then provided him a means to perpetuate an attack. The operation then closed with the agent arresting the guy for basically being a radicalized individual in possession of a means to commit an attack.

In this case the FBI’s prey was arrested for illegally possessing weapons. Weapons which were given to him by the FBI.

These operations rely on taking a hypothetical scenario and making it a reality. The individuals they target are those the agency deems capable of being radicalized. If left to their own devices the individuals would almost certainly remain harmless. Most of these individuals are socially isolated, aren’t the brightest bulbs in the box, and are seldom go-getters. Since they’re socially isolated they’re usually desperate for friendship, which makes them vulnerable to FBI agents. Their lukewarm intelligence also makes them more susceptible to being influenced. When you combine social isolation with lukewarm intelligence you have a recipe for an individual who can be easily manipulated to do bad things. But even if they’re manipulated into doing something bad they seldom have the motivation or means. So the FBI prods these individuals into performing an attack and provides them a means with which to pull it off. Finally, with all the pieces in place the FBI arrests its creation.

What the FBI is doing is preying on vulnerable individuals, convincing them to do something bad, and then providing the means to do that bad thing. If the FBI didn’t involve itself these people would normally just fade into the annals of history. The FBI isn’t protecting us from anything with these operations. It’s creating a bad situation and then claiming to save everybody from it.

Do As We Say, Not As We Do

A lot of people are talking about the Panama Papers. This treasure trove of shell corporations created by utilizing the services of Mossack Fonseca measures in at over 2.5 terabytes in size and it seems to contain dirt on almost every politician. The prime minister of Iceland just resigned due to public outrage stirred by his name appearing in the papers and others are likely to follow.

But the real scandal isn’t that these politicians are utilizing tax havens to protect their wealth. The real scandal is that these politicians continue to hunt those who utilize tax havens while making use of such wealth preserving institutions themselves.

There is nothing immoral about trying to conceal your wealth from thieves. In fact doing so is meritorious. In the case of tax thieves concealing wealth keeps resources out of the hands of the most violent gangs in the world. The less resources the State has the less effective it is as subjugating its victims. We shouldn’t decry anybody for protecting their wealth from the State.

What we should decry are thieves and these politicians are not only thieves but their dishonest thieves. In public these politicians espouse the merits of taxes and viciously criticize tax evaders. In private they are whisking their wealth away to the exact same places using the exact same tactics as private tax evaders. I believe the only fair thing to do in this case is treat these politicians the exact same way they treat private tax evaders. Make examples of them in the media. Hold a show trial. Then lock them in a cage for the rest of their lives. And do this not because they’re tax evaders but because they’ve gleefully inflicted such harm on tax evaders themselves.

Having Your Surveillance Cake And Eating It Too

At one point it wasn’t uncommon for employers to issue company devices to employees. Things have changed however and now it is common for employers to expect employees to use their personal devices for work. It seems like a win-win since employees don’t have to carry two cell phones or use whatever shitty devices their company issues and employers safe money on having to buy devices. However, it leads to an interesting situation. What happens when the employer wants to surveil an employee’s personal device? That’s the battle currently being waged by Minnesota’s state colleges and their employees:

Two faculty unions are up in arms over a new rule that would allow Minnesota’s state colleges and universities to inspect employee-owned cellphones and mobile devices if they’re used for work.

The unions say the rule, which is set to take effect on Friday, would violate the privacy of thousands of faculty members, many of whom use their own cellphones and computers to do their jobs.

“[It’s] a free pass to go on a fishing expedition,” said Kevin Lindstrom, president of the Minnesota State College Faculty.

But college officials say they have an obligation under state law to protect any “government data” that may be on such devices, and that as public employees, faculty members could be disciplined if they refuse to comply.

If the universities have such a legal obligation then they damn well should be issuing devices. Data is at the mercy of the security measures implemented on whatever devices it is copied to. When businesses allow employees to use personal devices for work any data that ends up on those devices is secured primarily by whatever measure the employee has put into place. While you can require certain security measures such as mandating a lock screen password on the employee’s phone, employees are still generally free to install any application, visit any website, and add any personal accounts to the device. All of those things can compromise proprietary company data.

By issuing centrally managed devices, the universities could restrict what applications are installed, what webpages devices are willing to visit, and what accounts can be added.

There is also the issue of property rights. What right does an employer have to surveil employee devices? If so, how far does that power extend? Does an employer has the right to surveil an employee’s home if they work form home or ever take work home? Does an employer have the right to surveil an employee’s vehicle if they use that vehicle to drive to work or travel for work? When employers purchase and issue devices these questions go away because the issued devices are the employer’s property to do with as they please.

If an employer wants to surveil employee devices then they should issue devices. If an employer is unwilling to issue devices then they should accept the fact they can’t surveil employee devices. If an employer is under a legal obligation to protect data then it needs to issue devices.