Favorite Quotes

"Once you walk into a courtroom, you've already lost. The best way to win is to avoid it at all costs, because the justice system is anything but" Sydney Carton, Attorney. "There is no one in the criminal justice system who believes that system works well. Or if they are, they are for courts that are an embarrassment to the ideals of justice. The law of real people doesn't work" Lawrence Lessig, Harvard Law Professor.



Friday, May 31, 2013

Defense attorney's say mobile cell tower tracking is "junk science"


Article first appeared in the abajournal.com:

At his trial last year on federal kidnapping and conspiracy charges, prosecutors sought to introduce cell tower evidence purporting to show that calls placed from defendant Antonio Evans’ cellphone could have come from his aunt’s house, where the victim was thought to have been held for ransom.

That’s not unusual. Hardly a day goes by when some prosecutor doesn’t go to court armed with cell tower evidence he or she claims places a defendant in the vicinity of a crime the defendant is accused of committing.

What made the Evans case unusual was the fact that the defense even put up a fight to keep the cell tower evidence out of the trial. Evans’ lawyers said the technique has not been shown to be scientific.

Such testimony usually goes unchallenged, presumably because most defense lawyers either accept at face value prosecutors’ assurances that cell tower evidence is scientific or because they don’t know enough about the underlying technology to understand its limitations. And, on the few occasions that it has been challenged, the courts have always let it in.

Until U.S. District Judge Joan H. Lefkow of Chicago came along, that is. Lefkow, who tried the Evans case, took an in-depth look at the cell tower evidence the government was proposing to use and found it wanting. The judge wrote that “multiple factors can affect the signal strength of a tower” and an FBI special agent’s “chosen methodology has received no scrutiny outside the law enforcement community.” As a result, the court concluded that the government had not demonstrated that testimony was reliable, Lefkow wrote in an Aug. 29, 2012, opinion and order.

Critics of cell tower tracking, as the practice is often called, say the decision is long overdue. It marks the first partial defense victory against the use of such evidence on Daubert grounds, the test formulated in the 1993 U.S. Supreme Court case Daubert v. Merrell Dow Pharmaceuticals. The test says that the judge should rule on the admissibility of scientific information submitted to assist the fact finder. It is used by federal and many state courts to determine the admissibility of expert testimony. Critics hope the case represents a turning point in the courts’ general tendency to submit when dubious scientific techniques such as cell tower tracking are proffered.

Michael Cherry, the CEO of Cherry Biometrics, a Falls Church, Va.-based consulting firm that has led the legal assault on cell tower tracking, calls it “junk science” that should never be admitted in any court for any reason. In fact, he can’t believe that such an easily disproved technique, which has been around for a decade or more, is still routinely being used in court.

“No one who understands the relevant science would ever claim that data from a single cell tower can reliably be used to specify the location of a caller at the time a particular call is made,” he says.

The records can tell you whether a person who has denied being in the coverage area of a particular tower at a given time was lying, he says. But they can’t tell you where within that coverage area the caller was; in some areas, the caller could have been anywhere within a 420-square-mile vicinity of a particular tower.

Edward J. Imwinkelried, a law professor at the University of California at Davis who co-authored a treatise on scientific evidence, says cell tower records are not completely worthless. But they’re nowhere near as probative as many police and prosecutors would like to think.

“Some of what these people who are interpreting this data are saying they can do with it is just nonsense,” Imwinkelried says.

Imwinkelried, who last year co-wrote an article in Judicature magazine on the subject with Cherry and a handful of defense lawyers, says that cell tower records, unlike Global Positioning System technology, were never designed to be used for tracking purposes. But not all cellphones are equipped with GPS technology, which can pinpoint a caller’s location down to a radius of about 50 meters, leaving cell tower records the only way of tracking a phone without it.

Imwinkelried says he’s not surprised that cell tower evidence has survived as long as it has without being subjected to serious scientific scrutiny. He likens it to voiceprint identification evidence and comparative bullet lead-analysis evidence, two once-highly touted forensic techniques that were initially embraced by the courts but eventually discredited.

Prosecutors in the Evans case said the significance of the ruling was limited. They still were allowed to put on evidence showing that Evans’ phone repeatedly connected to two cell towers directly east and west of his aunt’s home. They also put on testimony from an admitted co-conspirator who said Evans helped plan and take part in the kidnapping scheme and was with him at his aunt’s house when the calls in question were made.

Evans was one of three men charged in a hare-brained scheme to kidnap the 15-year-old son of a Chicago-area junk dealer whom they inexplicably thought was wealthy and hold him for a $450,000 ransom. The youth, who was snatched off a street on his way to school by two men in April 2010, was held in the basement of a Chicago home for 36 hours before being freed unharmed and given money for bus fare.

The evidence included the proposed testimony of FBI special agent Joseph Raschke, a recognized expert in cellphone analysis, who was expected to testify that by comparing the call detail records for Evans’ phone with the location of the two towers it connected to, he could narrow the location of Evans’ phone to an area the size of a few city blocks, one his aunt’s home falls squarely in the middle of.

After an evidentiary hearing, Judge Lefkow allowed Raschke to testify about how cellular networks operate. She said such testimony would help the jury narrow the possible location of Evans’ phone during the course of the alleged conspiracy. But she refused to allow Raschke to testify that calls made from Evans’ phone could have come from the basement of his aunt’s home because he hadn’t demonstrated to her satisfaction that cell tower tracking is scientific.

The judge said that Raschke’s testimony was based on the erroneous assumption that a cellphone will always connect to the tower with the strongest signal—usually the one closest to the phone when the call is made. Yet there are a variety of factors that determine which tower a phone will connect to, including weather, topography, physical obstructions, tower maintenance and whether the phone is being used indoors or out.

Lefkow also said that Raschke had offered no proof that the tracking technique works, other than his assurances that he and other FBI agents have successfully used it to find people both living and dead, and had done so with a “0 percent” rate of error.

Evans, who ended up being acquitted, claimed that the cellphone registered to him had been purchased in his name by another co-defendant, who has also pleaded guilty and is awaiting sentencing. Evans said he knew the co-defendant through the drug trade. He also pointed out that he, unlike his two co-defendants, had not been captured on surveillance cameras making ransom calls from various pay phones in the Chicago area.

Raschke didn’t return requests for comment. But Mark Eckenwiler, until recently the Justice Department’s primary authority on electronic surveillance, says cell tower records, while no smoking gun, can provide reliable and highly probative evidence of a defendant’s guilt or innocence. And anybody who says otherwise, he says, “is trying to sell you a bill of goods.”

Eckenwiler, now senior counsel with Perkins Coie’s privacy and security practice in Washington, D.C., is the former deputy chief of the Justice Department’s computer crimes section, where he co-authored a brief last fall in opposition to accused drug dealer Antoine Jones’ motion to suppress cell tower records against him on Fourth Amendment grounds.

Jones is the former Washington, D.C., nightclub owner whose drug trafficking conviction and life sentence were overturned in a landmark ruling last year by the U.S. Supreme Court, which held that government installation of a GPS device on Jones’ car without a warrant violated his Fourth Amendment rights. When the government announced plans to retry Jones using the cell tower records instead, he moved to suppress those records on the same grounds.

In the brief he co-authored, Eckenwiler said that cell tower records can provide a “general indication” of where a call was made down to within a few hundred yards under certain conditions, but was “too imprecise” to place a caller inside a constitutionally protected space, such as a home.

In the wake of Lefkow’s ruling, Imwinkelried says he doesn’t expect cell tower evidence to disappear from the courts overnight. But he hopes it will persuade more defense lawyers that such attacks have merit. And he’d like to think it will prompt some prosecutors to take another look at the evidence to make sure they’re not promising more than they can deliver.
http://www.abajournal.com/magazine/article/prosecutors_use_of_mobile_phone_tracking_is_junk_science_critics_say/

Cell tower junk science:
http://educatedevidence.com/Viewpoint_J-F.pdf

Daubert and forensic science: The pitfalls of law enforcement
control of scientific research
http://illinoislawreview.org/wp-content/ilr-content/articles/2011/1/Giannelli.pdf

Edward J. Imwinkelried:
http://www.law.ucdavis.edu/faculty/Imwinkelried/

States are concerned about "inBloom" creating a national spy database on millions of students


A $100 million database inBloom, Inc. set up to store extensive records on millions of public school students has stumbled badly since its launch this spring, with officials in several states backing away from the project amid protests from irate parents.

The school database, funded mostly by the Bill & Melinda Gates Foundation, is intended to track students from kindergarten through high school by storing myriad data points: test scores, learning disabilities, discipline records – even teacher assessments of a child’s character. The idea is that consolidated records make it easier for teachers to use software that mines data to identify academic weaknesses. Games, videos or lesson plans would then be precisely targeted to engage specific children or promote specific skills.

The system is set up to identify millions of children by name, race, economic status and other metrics and is constructed in a way that makes it easy for school districts to share some or all of that information with private companies developing education software.

The nonprofit organization that runs the database, inBloom Inc, introduced the project in March with a presentation at an education technology conference, complete with a list of nine states that it said were committed “partners.

Parents and civil liberties groups concerned about potential privacy breaches quickly began to sound the alarm and rallied opposition in social media.

In response to an outcry in his state, Louisiana Superintendent of Education John White withdrew student data from inBloom in April. He’s planning to hold public hearings on data storage and security this summer but said in an interview that he is no longer sure there’s a need for inBloom.
Kentucky, Georgia and Delaware – all initially listed as partners on the inBloom website – told Reuters that they never made a commitment and have no intention of participating. Georgia specifically asked for its name to be removed.

Officials in two other states on the list, Massachusetts and North Carolina, said they are still evaluating the project and may never upload student data.

“The single biggest issue is, Can we satisfy not only ourselves but everyone that the data is as secure stored there as it would be anywhere?” said Jeff Wulfson, deputy commissioner of the Massachusetts Department of Education. “From our perspective, this is still in the research and development phase.”
http://www.voxxi.com/inbloom-school-database-privacy-breach/
  
inBloom Architecture :
https://www.inbloom.org/sites/default/files/docs-developer-1.0.68-20130118/doc-2b03fc2a-19c2-4ebd-a0a0-b660a34b7384.html

Study shows what you post on social media websites can cost you your job


According to a new report, turning down young job candidates because of what they post on social media has become commonplace. The report, by On Device Research, states that 1 in 10 people between ages 16 and 34 have been turned down for a new job because of photos or comments on Facebook, Twitter, Pinterest, and other social networking sites.

"If getting a job wasn't hard enough in this tough economic climate, young people are getting rejected from employment because of their social media profiles and they are not concerned about it," On Device Research's marketing manager Sarah Quinn said in a statement.

Ten percent of young people said they knew they were rejected from a job because of their social media profiles, yet 66 percent of young people still don't seem to care that these profiles may affect their career prospects. The majority of young people cater their social media presence to friends rather than potential employers, according to On Device Research.

Quinn says that better education on how social media can affect employment is needed to ensure young people aren't making it even harder to excel in their careers.

Several U.S. states have created laws to protect employees from being fired because of what they post on social media. In January, six states officially made it illegal for employers to ask their workers for passwords to their social media accounts.

It's unclear how many employers have demanded access to workers' online accounts, but some cases have surfaced publicly and inspired lively debate over the past year. In one instance last year, a teacher's aide in Michigan was suspended after refusing to provide access to her Facebook account following complaints over a picture she posted.
http://news.cnet.com/8301-1023_3-57586767-93/facebookers-beware-that-silly-update-can-cost-you-a-job/

Law enforcement policy on the use of social media in intelligence and investigative activities


Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities:
 
"Guidance and Recommendations" provides law enforcement and justice agencies with guidance and recommendations on issues to consider when developing a social media policy (or updating other relevant policies), focusing on access, use, storage, and dissemination of information obtained from social media sites for investigative and criminal intelligence purposes.  The document includes recommended elements of the related policy, focusing on potential privacy, civil rights, and civil liberties implications.
https://it.ojp.gov/gist/Files/Developing%20a%20Policy%20on%20the%20Use%20of%20Social%20Media%20in%20Intelligence%20and%20Investigative%20Activities_compliant.pdf

Thursday, May 30, 2013

The new Xbox One gaming console is a 24/7 surveillance device


Article first appeared in the vigilantcitzen.com:

The new Xbox One apparently wants to put an end to those days by turning the beloved game console into a 24/7 surveillance device. The Xbox One will bundle the Kinect – a device that captures motion and sound - with every console and its camera and mic will be always on by default. In fact, Xbox One will actually refuse to work if the Kinect is not connected to it. So the camera and mic will work even when the console is turned off. And the camera will even work in the dark. It will also be able to read your facial expressions and count the people in the room with you (there are also talks of charging Pay-Per-View movies PER PERSON in the room).

Furthermore, all of this data captured by the device could easily be transmitted to God knows where as the console will require an internet connection to even function. This capability is rationalized because Microsoft wants to give users the ability of turning on the console by saying “Xbox On”. So, for this reason, the console needs to be listening to EVERY SINGLE word you’re saying around it in case you say “Xbox On”.

We know that the Xbox One can identify people in the room and will ask them who they are if it doesn’t have their name on file. It is trying to be your only media device in your house. It can monitor heart rate and facial expressions, and has built in voice recognition. The console is always on, leaving the door open to a lot of privacy abuses as it logs everything that is happening in the room.

Before anyone thinks that facial and voice recognition aren’t that good, take a look at the video that Microsoft presented showing just how good it is.

Microsoft also recently changed the terms of service for the kinect. They now reserve the right to gather data from your kinect and pass that information on to their partners and advertisers. If you continue to use the kinect, there is no opting out. The Xbox One will require the kinect, so, if you don’t want your information passed on, your only option is to not purchase one.

The unveiling of these capabilities no one asked for has lifted some eyebrows around the world. 

Tim Vines, director at Civil Liberties Australia, told GamesFIX that Microsoft has a lot to answer for with a product that has the ability to listen and watch everything a person does.

“People should have the ability to turn off the camera or microphone, even if it limits the functionality of the machine,” he said. Vines believes privacy is “all about control”.

“Of course, if Microsoft doesn’t allow that control, then people should vote with their wallets and skip the next Xbox.”

Vines says Microsoft should be upfront about what it does with data collected by Xbox One.

“Microsoft’s new Xbox meets the definition of a surveillance device under some Australian laws, so they need to be upfront and tell customers whether anyone else can intercept their information or remotely access their device,” Vines said. - Games Fix, Privacy breach: Xbox One a ‘twisted nightmare’

According to Berlin’s federal data protection commissioner, Peter Schaar, the Xbox One is nothing more than a monitoring device under the guise of a gaming console.

“The Xbox One continuously records all sorts of personal information about me. My reaction rates, my learning or emotional states. These are then processed on an external server, and possibly even passed on to third parties. The fact that Microsoft could potentially spy on my living room is merely a twisted nightmare.”

Even if the Xbox One provides the option of turning off the camera and mic of the console, History shows that these options could easily be overridden remotely by any organization or creep with some technological capability. All of this ties in perfectly with my article entitled CIA Director: 

Web-Connected Devices in Your Home Make it Easy to Spy on You that quotes a CIA director openly stating that web connected devices are used to spy on citizens.
http://vigilantcitizen.com/latestnews/new-game-console-xbox-one-will-have-always-on-camera-and-mic/
http://www.lossofprivacy.com/index.php/2013/05/xbox-one-can-talk-and-recognize-people/

Study proves police can identify suspects using facial recognition technology


In a study that evaluated some of the latest in automatic facial recognition technology, researchers at Michigan State University were able to quickly identify one of the Boston Marathon bombing suspects from law enforcement video, an experiment that demonstrated the value of such technology.

 
In the Pattern Recognition and Image Processing laboratory, Anil Jain, MSU Distinguished Professor of computer science and engineering, and Josh Klontz, a research scientist, tested three different facial-recognition systems.

By using actual law-enforcement video from the bombing, they found that one of the three systems could provide a “rank one” identification – a match – of suspect Dzokhar Tsarnaev.

“The other suspect, Tamerlan Tsarnaev, the one ultimately killed in the shootout with police, could not be matched at a sufficiently high rank, partly because he was wearing sunglasses,” Jain said. “The younger brother could be identified.

“This study was revealing in that facial recognition technology can successfully handle some cases in which facial images extracted from a video were captured under favorable conditions,” he said.


Under controlled conditions, when the face is angled toward the camera and if the lighting is good, this technology can be up to 99 percent accurate.

Automatic face recognition can quickly attach a name to a face by searching a large database of face images and finding the closest match. This is what law enforcement agencies typically do for mug shot databases.

It is unknown, Jain said, what automatic facial recognition technologies were used by investigators in Boston. Some algorithms are better suited than others for face recognition in uncontrolled video.

While the technology has made great strides in recent years, it doesn’t mean that improvements aren’t needed. Also, more police agencies have to put the technology to use.

“If you use an automatic system, it speeds up the process,” Jain said. “Sometimes police get bad tips so innocent people are questioned. Such situations can be avoided with a robust and accurate face-recognition system.”

Jain and his team are internationally recognized in the field of identification technology. His team has developed methods to match forensic facial sketches with mug shots, as well as technology that allows police to identify criminal suspects by tattoo matching.
http://msutoday.msu.edu/news/2013/facial-recognition-technology-proves-its-mettle/


A case study on unconstrained facial recognition using the Boston marathon bombings suspects:
 http://www.cse.msu.edu/rgroups/biometrics/Publications/Face/KlontzJain_CaseStudyUnconstrainedFacialRecognition_BostonMarathonBombimgSuspects.pdf

Global facial recognition market estimated to grow to $6.5 billion by 2018:
http://www.marketsandmarkets.com/Market-Reports/facial-recognition-market-995.html 

Drones to employ facial recognition, ending anonymity:
http://www.activistpost.com/2013/05/database-your-face-drones-to-employ.html#more

Google's NSA connections should concern everyone


The data mining technology that is integral to the Google AdWords experience is a power tool in creating an individual profile for anyone who surfs the web. The amazing capacity to target specific ads to personal search topics, geographic locations and web history is the harbinger of a total recall on your personality. Google is a wonder creation of the calculate surveillance society.

Research at Google acknowledges:

"When data mining systems are placed at the core of interactive services in a rapidly changing and sometimes adversarial environment, statistical models need to be combined with ideas from control and game theory; for example, when using learning in auction algorithms. 
  
Research at Google is at the forefront of innovation in machine learning and data mining - we have one of the most active groups working on virtually all aspects of data mining." 

OK, so the dominant internet technology company is in business to harvest information on the inner recesses of each unique login. Should a cyber sleuth be concerned? Well, according to the scholarly paper, The Google-NSA Alliance: Developing Cybersecurity Policy at Internet Speed by Stephanie A. DeVos: 

"On February 4, 2010, the Washington Post reported that Google and the National Security Agency had partnered to analyze the cyberattacks, with the objective of better defending Google and its users from future attack. Though neither organization commented on the partnership, sources told the Washington Post that the alliance allows for the sharing of critical information without violating Google’s policies or laws that protect Americans’ privacy of online communications. Under the terms of the alliance, Google will not be sharing proprietary data and the NSA will not be viewing users’ searches or e-mail accounts. The article stated that Google approached the NSA shortly after the attacks, but due to the sensitivity of the alliance, the deal took time to be formulated. Any agreement would be the first instance where Google had entered a "formal information-sharing relationship" with the NSA." 

 "The Justice Department is defending the government's refusal to discuss—or even acknowledge the existence of—any cooperative research and development agreement between Google and the National Security Agency. 

The Washington based advocacy group Electronic Privacy Information Center sued in federal district court here to obtain documents about any such agreement between the Internet search giant and the security agency.

PC World in the article, The Google-NSA Alliance: Questions and Answers lists the following concerns and would have you believe there is nothing ominous behind any alleged relationship.
1) Is the Google-NSA alliance really happening?
2) What would be the point of a Google-NSA partnership?
3) Would the government gain access to my personal information?
4) Why would Google work with the NSA instead of the Department of Homeland Security?
5) Has the NSA worked with Google before?
If the nature of the relationship between Google and the National Security Agency is innocent, where is the transparency? This item from Legal Times, DOJ Asks Court To Keep Secret Any Partnership Between Google, NSA, has a disturbing appearance.

"The Justice Department is defending the government's refusal to discuss—or even acknowledge the existence of—any cooperative research and development agreement between Google and the National Security Agency.

The Washington based advocacy group Electronic Privacy Information Center sued in federal district court here to obtain documents about any such agreement between the Internet search giant and the security agency. 

The NSA responded to the suit with a so-called "Glomar" response in which the agency said it could neither confirm nor deny whether any responsive records exist. U.S. District Judge Richard Leon in Washington sided with the government last July."

http://www.batr.org/negotium/052913.html

Supreme Court rules conversations at the end of a traffic stop are never really voluntary


Kentucky - Conversations with police at the conclusion of a traffic stop are presumed to be involuntary, the Kentucky Supreme Court ruled last week. The justices were in full agreement that the evidence against motorist Stewart M. Turley had to be thrown out because Kentucky State Trooper Jerry Knight had no right to question passengers during the stop, contrary to the state's insistence that the chat was "consensual."

While running a speed trap in Muhlenberg County, Trooper Knight claimed he saw Turley in a Ford F-150 extended cab that had an "improperly illuminated" license plate. Turley was ordered out of the pickup and forced to perform field sobriety tests, which he easily passed. Trooper Knight returned Turley's license and registration, telling him to "have a good night." Turley got back in the pickup. Trooper Knight then began interrogating his two passengers.

 
"I just wanted to see who they were, make sure they are not any wanted person," Knight testified.

The trooper testified that had Turley driven away at this point, he would have "definitely" chased and arrested him. As Justice Daniel J. Venters described the situation, Turley was "a captive of the vehicle he was operating because it was occupied by the detained passengers."

 
During the questioning, Trooper Knight noticed a wooden box inside the cab. He repeatedly demanded to see what was inside. The passenger said he did not know what it contained, and finally agreed to look inside. When he opened the lid, Trooper Knight grabbed the box out of "officer safety" and a small bag of marijuana fell to the floor. Turley was arrested and the truck thoroughly searched, revealing methamphetamine and $3900 in cash. Turley was sentenced to twenty years, which he is currently serving at the Green River Correctional Complex.

At trial, Muhlenberg Circuit Court Judge Brian Wiggins refused to suppress the evidence gathered as a result of the conversation with the passenger, ruling it was a "consensual encounter." The high court went out of its way to blast Judge Wiggins for getting both the law and the facts wrong.

 
"The trial court's incomplete findings are arbitrary, clearly erroneous in their overall effect, and directly contradicted by the evidence viewed in its entirety," Justice Venters wrote for the court.

Trooper Knight's testimony that the appellant was never free to leave left no ground for the trial court's conclusion. Moreover, the high court pointed out that Trooper Knight was interrogating the passengers, so Turley could not have consented to someone else's questioning. The high court was more troubled by the idea that the passengers were questioned even though there was no reason to suspect they had done anything wrong.

"Historically, this has not been a country in which citizens are required to heel to the demand of a policeman to 'show me your papers,' nor will we indulge law enforcement conduct that leads us in that direction," Justice Venters wrote.

 
To drive home the point, the high court rejected the use of a 2011 Court of Appeals ruling, Ward v. Kentucky, to support the practice of running routine warrant checks on passengers. The justices held either the decision is being misinterpreted, or the decision is wrong.

"To the extent that Ward may be construed to hold that a passenger in a routine traffic stop may be detained for the purpose of the obtaining of his identification papers for the running of a warrant
check, it is accordingly overruled," Justice Venters wrote.

http://thenewspaper.com/news/41/4112.asp
   
Turley v. Kentucky ruling: http://thenewspaper.com/rlc/docs/2013/ky-chat.pdf

Fourth Amendment Preservation and Protection Act of 2013


Senator Rand Paul  has introduced the Fourth Amendment Preservation and Protection Act of 2013, which would prohibit the warrantless collection of information about individuals held by third parties. The law would overturn the "third party doctrine," which has been widely criticized by courts and legal scholars. The bill has been referred to the Senate Judiciary Committee.

Bill: http://beta.congress.gov/bill/113th-congress/senate-bill/1037/committees

Fourth Amendment Preservation and Protection Act of 2013:
http://epic.org/privacy/ecpa/Fourth-Amendment-Preservation-and-Protection-Act-of-2013.pdf

Wednesday, May 29, 2013

Police state Amerika is now targeting stores that sell alcohol


Article first appeared in thecrimereport.org:

Baltimore has become the latest U.S. city to target liquor stores in an effort to curb crime in troubled neighborhoods.

A proposed change to zoning laws would force liquor outlets to move to sites especially zoned for liquor sales, to sell their liquor licenses, or to convert their businesses to non-liquor stores. The city council is expected to vote on the measure by this fall, officials say.

With two liquor retailers for every 1,000 people, Baltimore has twice the number of liquor stores than is considered a reasonable standard nationally, says David Jernigan, director of the Center on Alcohol Marketing and Youth at the Johns Hopkins Bloomberg School of Public Health.

The overabundance results partly from population decline, he says.

“In Baltimore, what happened is that people left but the liquor stores didn’t,” adds Jernigan, whose center has been collaborating with city officials.

“And Baltimore’s problem is not atypical across the county wherever there are large, urban populations: The more outlets there are, the more you’ve got homicides, the more you’ve got assaults …

“What Baltimore is saying is, ‘OK, enough is enough.’”

Citing what he describes as one of the most glaring signs of Baltimore’s overload of alcohol outlets, Jernigan says 97 such retailers are situated within a mile of the Johns Hopkins campus in the Homewood neighborhood.

“There is a striking difference between neighborhoods where the per capita income is higher and neighborhoods where it’s on the lower end ... It seems like there’s a liquor store on every corner,” Dr. Oxiris Barbot, the city’s health commissioner, tells The Crime Report.

“Our approach is … revamping the zoning code and going back to the fundamentals of the zoning, which is to promote and protect the health of the community.”

The range of cities that have altered land use laws to curb alcohol sales and the troubling activity associated with them—from rowdy crowds and loitering to crime—include Madison, WI and Oakland, CA.


In 1993, Oakland imposed “public nuisance standards”—gauged by nearby drug sales, noise, and calls for police to intercede against those and related problems—that, if un-addressed, will cause a liquor retailer to lose their sales license.

Since then, according to a 2008 report by Alcohol Policy Consultations in Felton, CA, 15 other California municipalities have adopted Oakland’s model.

Several studies—including ones that have reshaped laws on where liquor stores can open—have cited the link between “alcohol density” and violent crime.

 
Among them, a 1995 study focusing on Los Angeles County, led by researchers at the University of Southern California’s Department of Preventative Medicine, concluded that three additional crimes per liquor store were committed in connection to liquor sales.

In 2001, Texas A&M University studied the trend in impoverished Camden, NJ and conducted follow-up research in 2004, spotlighting overwhelmingly poor, black and/or Latino sections of Austin, TX and San Antonio, TX.

In 2010, researchers from Morehouse School of Medicine and the Johns Hopkins Bloomberg School of Public Health conducted a similar study of Washington, D.C.

Using data from the National Crime Victimization Survey, they concluded that, in 2006, a third of crime victims were under the impression that their victimizer was drunk.  They also concluded that for every additional alcohol outlet, violent crime—including rape, shootings and other assaults—rose 4 percent.

“Compared to other categories of violent crime, alcohol-related violence is most prevalent in homicidal violence,” that study of D.C. concluded.

More recently, a 2013 Indiana University study in the non-metropolitan "college town” of Bloomington, the university’s home, concluded that both simple and aggravated assaults were linked to alcohol density.
http://www.thecrimereport.org/news/inside-criminal-justice/2013-05-alcohol-and-crime 
http://designinghealthycommunities.org/closing-liquor-stores-reduces-crime-and-violence/
http://www.preventioninstitute.org/index.php

Reporters are afraid to speak out against the Obama administration, fear they'll be monitored and surveilled:

The Obama administration’s targeting of journalists and their sources is an assault on the First Amendment, a former National Security Agency official and prominent whistleblower says.

“Reporters have shared with me privately that some of their most trusted sources within government are increasingly afraid to speak with them, even off-the-record, for fear that they will be monitored and surveilled,” Thomas Drake, a former senior executive of the National Security Agency and a whistleblower who was prosecuted by the Obama administration, told The Daily Caller in an exclusive interview.

“That’s self-censorship,” he said.

Drake explained to TheDC that he sees a “soft tyranny” enveloping the United States through the federal government’s targeting of journalists and their sources.

Such a fear of speaking to the press, he said, interferes with the freedom of association —  recognized in the First Amendment as an essential component of free speech.

Reporters are then left with talking points and privileged access to government officials, he explained, all amounting to government propaganda.

Drake was first caught up in the whistleblower investigations of the second Bush administration, but was indicted and prosecuted under the Espionage Act by the Obama administration in 2010.

Drake passed along unclassified information about wasteful spending on the development of the National Security Agency’s post-9/11 secret surveillance program. For that, he was singled out by the Obama administration for indictment and prosecution.

“We were the canaries in the coal mine,” Drake said.

Drake fought the charges leveled against him, which were ultimately dropped in 2011 in exchange for a guilty plea to a misdemeanor, but the damage was done.

“I became a criminal and was labeled an enemy of the state because I was calling out government wrongdoing and illegality,” he said.
 http://dailycaller.com/2013/05/27/former-nsa-official-this-administration-is-exhibiting-narcissistic-tendencies/

Dear graduates: Tyranny is right around the corner

A few weeks ago, President Obama advised graduates at Ohio State University that they need not listen to voices warning about tyranny around the corner, because we have self-government in America. He argued that self-government is in and of itself an adequate safeguard against tyranny, because voters can be counted upon to elect democrats (lowercase "d") not tyrants. His argument defies logic and 20th-century history. It reveals an ignorance of the tyranny of the majority, which believes it can write any law, regulate any behavior, alter any procedure and tax any event so long as it can get away with it.

History has shown that the majority will not permit any higher law or logic or value -- like fidelity to the natural law, a belief in the primacy of the individual or an acceptance of the supremacy of the Constitution -- that prevents it from doing as it wishes.

Under Obama's watch, the majority has, by active vote or refusal to interfere, killed hundreds of innocents -- including three Americans -- by drone, permitted federal agents to write their own search warrants, bombed Libya into tribal lawlessness without a declaration of war so that a mob there killed our ambassador with impunity, attempted to force the Roman Catholic Church to purchase insurance policies that cover artificial birth control, euthanasia and abortion, ordered your doctor to ask you whether you own guns, used the IRS to intimidate outspoken conservatives, seized the telephone records of newspaper reporters without lawful authority and in violation of court rules, and obtained a search warrant against one of my Fox colleagues by misrepresenting his true status to a federal judge.
http://reason.com/archives/2013/05/23/dear-graduates-tyranny-is-right-around-t 

The Age of Authoritarianism: Government of the politicians, by the military, for the corporations

President Obama’s declaration that “America is at a crossroads” in the fight against terror, a fight that is increasingly turning inwards, setting its sights on homegrown extremists, should give every American pause.

We have indeed reached a crossroads. History may show that from this point forward, we will have left behind any semblance of constitutional government and entered into a militaristic state where all citizens are suspects and security trumps freedom. Certainly, this is a time when government officials operate off their own inscrutable, self-serving playbook with little in the way of checks and balances, while American citizens are subjected to all manner of indignities and violations with little hope of defending themselves. We have moved beyond the era of representative government and entered a new age, let’s call it the age of authoritarianism.

Even with its constantly shifting terrain, this topsy-turvy travesty of law and government has become America’s new normal. Don’t believe me? Let me take you on a brief guided tour, but prepare yourself: the landscape is particularly disheartening to anyone who remembers what America used to be.

By and large the term “law enforcement” encompasses all agents within a militarized police state, including the military, the police, and the various agencies such as the Secret Service, FBI, CIA, NSA, etc. Having been given the green light to probe, poke, pinch, taser, search, seize, strip and generally manhandle anyone they see fit in almost any circumstance, all with the general blessing of the courts, America’s law enforcement officials, no longer mere servants of the people entrusted with keeping the peace, are part of an elite ruling class dependent on keeping the masses corralled, under control, and treated like suspects and enemies rather than citizens.
http://lewrockwell.com/whitehead/whitehead84.1.html

Where does it end? Big Brother puts surveillance cameras in children's playgrounds


New York - Authorities in Mount Vernon plan to keep a close eye on twelve city playgrounds with new security cameras.

The Department of Public Works is installing the solar-charged, high-resolution portable cameras.

The city says the cameras will help law enforcement identify trespassers, vandals and others committing illegal activity in the playgrounds. (this is a pretense to install cameras and surveil the public)
 
The mayor says that police will monitor the cameras, especially after hours.

"You hear people say, 'why all these cameras?', said City Councilman Yuhanna Edwards. "If you're not doing anything wrong, don't worry about the cameras." 


In all, there will be a dozen units installed, and to protect the cameras themselves from being vandalized, each one is bullet-proof.

Each solar-powered camera costs about $6,000 and is being funded through money set aside to improve the parks.

"Complaints from residents and police response to people hanging out in the playgrounds even after they were locked helped us make this decision that will improve quality of life for people living near neighborhood playgrounds," Mayor Ernest Davis says.

The motion-detecting cameras were purchased using bond money that was designated for playground renovations.

"Cameras will certainly help us reduce incidences of vandalism and rowdiness," said Darren Morton, Commissioner of the city's Recreation Department. "Every year we have to disband groups who oftentimes damage equipment and damage or destroy equipment."
http://www.myfoxny.com/story/22436207/cameras-mounted-in-mount-vernon-playgrounds
http://abclocal.go.com/wabc/story?section=news/local/northern_suburbs&id=9118842
http://hudsonvalley.news12.com/news/police-install-cameras-at-mount-vernon-playgrounds-1.5353770?firstfree=yes

The FBI's 'No Electronic Recording' policy rigs the game and destroys Its credibility


Considering the FBI's unseemly interest in recording phone calls and inserting itself into all sorts of electronic conversations (all without asking permission first), it's incredibly strange that it refuses to use one of the most basic electronic devices available: a voice recorder. In fact, as Harvey Silvergate's op-ed for the Boston Globe points out, it's forbidden to use any sort of recording device when interviewing suspects. 

FBI agents always interview in pairs. One agent asks the questions, while the other writes up what is called a “form 302 report” based on his notes. The 302 report, which the interviewee does not normally see, becomes the official record of the exchange; any interviewee who contests its accuracy risks prosecution for lying to a federal official, a felony. And here is the key problem that throws the accuracy of all such statements and reports into doubt: FBI agents almost never electronically record their interrogations; to do so would be against written policy.

Without a recording to compare the transcript to, we are expected to trust the FBI's version of the interrogation. If we can't trust it, we are left to draw one of the following conclusions.

1. The transcript is completely false.
2. The transcript is heavily editorialized.
3. The transcript interprets certain statements, but is otherwise accurate.
4. The transcript is completely accurate.

Of all of these choices, number 4 seem least likely. In fact, one wonders why the FBI bothers interviewing anyone when it could simply put two agents in a room and allow them to bang out a confession on behalf of the accused.

If a suspect claims the transcription is erroneous, it's his word against theirs. His words, of course, disappeared into the ether as soon as they were spoken. The FBI's version lives on, printed on paper.

We don't need to ask "why" this is a problem. There are rhetorical questions and then there are stupid questions, the sort helpful teachers and guidance counselors continue to pretend don't exist. A better question is, "Why hasn't this been changed?" Silvergate notes this policy is an updated version of a 1990's policy, crafted in 2006, long long long long after recording devices were ubiquitous. The excuse that this policy was "logistically necessary" because of technological limitations was ridiculous in 1990, much less 16 years later. 

The more honest — and more terrifying — justification for non-recording given in the memo reads as follows: “. . . perfectly lawful and acceptable interviewing techniques do not always come across in recorded fashion to lay persons as proper means of obtaining information from defendants. Initial resistance may be interpreted as involuntariness and misleading a defendant as to the quality of the evidence against him may appear to be unfair deceit.” Translated from bureaucratese: When viewed in the light of day, recorded witness statements could appear to a reasonable jury of laypersons to have been coercively or misleadingly obtained.

Sometimes the "reasonable jury" would be right -- the statement has been "coercively or misleadingly obtained." Other times, it may not be as clear-cut. But in a day and age where recording interviews and interrogations is the expectation, the FBI continues to play by its own (convenient) rules. And if the person being interrogated doesn't like it, he can expect additional charges to brought. This puts the alleged criminal in the unenviable position of having "anything he says" twisted, rewritten and heavily paraphrased before being used against him.

As long as the FBI relies solely on its agents’ uncorroborated reports of such interviews, it is difficult to credit the bureau’s version of what was and was not said. Presumably, much more is going to emerge concerning what Phillipos really told his interrogators, and nobody should arrive at any conclusions until all of the evidence, from both sides, has been made public. The FBI is not entitled to any presumption of credibility in these situations.
http://www.techdirt.com/articles/20130516/18383623114/your-word-against-ours-how-fbis-no-electronic-recording-policy-rigs-game-destroys-its-credibility.shtml

FBI tape recoding policy under review (2010)
http://www.mainjustice.com/2010/04/30/fbi-tape-recording-policy-under-review/

Tuesday, May 28, 2013

DHS's See Something, Say Something spying program now at racetracks


DHS's If You See Something, Say Something spying program now at the Indy 500. The Department of Homeland Security (DHS) is quickly taking over all our major sporting events. What's next? Shopping malls? Hospitals? Grocery stores?

Local first responders attend DHS training:


Alabama - Members of the South Central Mountains Regional Task Force’s Health and Medical Committee completed training offered by the Center for Domestic Preparedness (CDP) in Anniston, Ala.

The CDP is operated by the U.S. Department of Homeland Security’s Federal Emergency Management Agency and is the only federally-chartered Weapons of Mass Destruction (WMD) training facility in the nation.

One hundred and forty-three professionals from hospitals, emergency medical services (EMS) and public health entities attended the training April 15-19. Participants attended one of three classes: “Healthcare Leadership for Mass Casualty Incidents,” “Hospital Emergency Response Training” and “Emergency Medical Operations.”
http://gantdaily.com/2013/05/12/local-responders-attend-homeland-security-training/

DHS and private companies an unholy alliance:

At last month’s Border Security Expo at the Phoenix Convention Center in Arizona, Wyatt Nease held a remote which controlled a small car called the Pointman Tactical Robot (PTR). “Swat teams absolutely love it,” Nease, an unmanned systems specialist with Applied Research Associates, told the Guardian. “You can throw it through windows and doors, it goes up stairs, it’s self-righting. We can mount 12-gauge shotguns on it, so we can weaponize it as well.”

Two themes emerged from a day at the Expo: equipment and technology used by the US military is increasingly becoming available to domestic entities. And software is now easy to use and more powerful. Physical Security Information Management (PSIM) software potentially gives officials huge surveillance powers whether in a desert or a metropolis.

The Expo, which featured some 185 companies, gave both start-ups and established companies the chance to show off their inventions in an effort to pitch projects to federal agencies.

According to Nease, the PTR, which costs between $23,000 and $35,000, was originally only available to the military, but is currently being used by the FBI and LAPD for recon missions where it could be dangerous for humans to enter.

“You can send this robot up to a door, blast it and go right on through,” Nease told theGuardian.

“You can add teargas canisters to it. If someone tries to come up to it you can detonate the teargas canister and haul ass out of there.” Other optional extras include strobe lights and shrieking noises to disorient suspects.

Other inventions shown off at the expo included the a license plate recognition system which would help police, but also ordinary businesses who want to catch people parking in unauthorized spaces; a video camera system that can be worn by law enforcement which can gather video and sound which could later be used in court; and ammunition rounds that flatten on impact in order to “obtain the proper amount of pain to enable target compliance.”

Physical Security Information Management (PSIM) software which gives law enforcement significant surveillance powers in urban or rural areas. PSIM makes it possible for several agencies to share information and make incident responses faster and more effective.

“Threats are always evolving. We’ve moved from a world where threats used to be single gunmen to a world where threats and risks are much more complicated.” John Gill, a former White House Chief Security Officer who now works for VidSys, a PSIM provider told the Guardian.

Two GOP members of the House Homeland Security Committee, took issue with the president's renewal of his call to close the detention center at the U.S. Naval Base on Guantanamo Bay, Cuba. Obama promised to close the facility as a candidate for president, but has been blocked by a congressional ban on relocating the foreign terror suspects held there anywhere in the United States.

"Name me one American city that would like to host these guys," Committee Chairman Michael McCaul said on CNN's State of the Union. Rep. Peter King of New York, appearing on ABC's This Week, said he is "very concerned about sending detainees back to Yemen." More than half of the 166 prisoners still on Guantanamo are from Yemen, and 56 have been cleared for return to their country. Others are deemed too dangerous to be released, but have not been prosecuted because, claims the Obama administration, their trial would compromise security secrets.
http://www.guardian.co.uk/world/2013/mar/13/drones-border-security-arizona-surveillance 
http://www.thenewamerican.com/usnews/foreign-policy/item/15528-neoconservative-republicans-knock-obama-s-shift-in-war-on-terror

DHS is teaching kids to go to FEMA camps in times of crisis:


FEMA , the Red Cross, and the department of homeland security are now using taxpayer money to educate children in public schools about ‘getting ready for disaster’. But why would government agencies hold interest in this? Is it because they want schools to be safer, or because they want citizens to flee to FEMA camps in a time of crisis?

"Educators can get help from the Federal Emergency Management Agency (FEMA), which  introduced guidelines to help schools develop procedures to respond to all types of disasters, including school violence."

"There are certain types of procedures for any emergency," Peggy Stahl, chief of FEMA's Outreach Branch and Preparedness, Training, and Exercises Directorate, told Education World. Those procedures are outlined in "School Emergency Planning Concept," which Stahl presented last week at a Department of Education conference in Worcester, Massachusetts.

Stahl told those attending the conference that there is a new awareness in schools and communities regarding the importance of emergency preparedness. "And it is not only natural disasters that are providing the wake-up call but also the far too numerous tragic incidents of school violence," she said. "The message has been clear that school crisis response support programs are needed, [programs that] include a 'FEMA-type' response with more federal assistance for the school and community when there is an incident of violence."

FEMA Offers School Emergency Planning

The Federal Emergency Management Agency (FEMA) presented guidelines for schools to develop their own school emergency plans.

The multipart guidelines, "School Emergency Planning Concepts," include six primary steps in creating an emergency plan.

1. Institute a planning process-- Recruit support from the community, identify planning issues, recommend strategies for addressing those issues and assign a committee to develop a plan.
2. Identify hazards -- In addition to obtaining or drawing a map of the school and school grounds, identify potential hazards along building evacuation routes.
3. Train and drill -- Develop procedures for classroom and school drills, determine ways of evacuating the building, and practice the drills to determine their effectiveness.
4. Plan for immediate response and care -- Anticipate first-hour priorities, assign roles and responsibilities, coordinate the plan with the school district and local emergency officials, and educate parents on the school response plan and their role in an emergency.
5. Develop a communications plan -- Develop call lists, determine on-site and off-site communication needs, and develop reporting procedures to convey emergency information to parents and the media; submit copies of the plan to school district and local emergency response offices.
6. Develop a post-disaster shelter plan -- Develop a list of post-emergency care and shelter planning assumptions.
http://www.educationworld.com/a_issues/issues084.shtml

FEMA's school emergency plan is a multistep program that focuses on several aspects of emergency response, including planning, practicing evacuation drills, and setting up ways to handle both on-site and off-site communications.

A disaster that very well could be orchestrated by a government agency, one might add. So what are these ‘disaster relief’ camps like? A quick google search for ‘FEMA camps’ would turn up thousands of results. Yet contrary to what one may think, leaving these camps may not be voluntary.

In fact, a leaked document signed by Joyce E. Morrow (administrative assistant to the secretary of the army) suggests that disaster relief camps may actually be military internment camps. The document is titled ‘internment and resettlement operations’ , and it describes these camps in great detail, stating that ‘civil support is the department of defense support to civil authorities for domestic emergencies.

Civil support includes operations that address the consequences of natural or man-made disasters, accidents, terrorist attacks, and incidents in the U.S.’ .

To sum it up, this leaked document confirms plans by the department of defense to operate internment prison camps for citizens during a crisis . But why would they need a crisis to imprison large amounts of people, and why would they imprison large amounts of people in the first place? But the real question is, do these prison camps tie in with FEMA?

And if so, is FEMA preparing children in public schools to accept going to an internment camp if there is a disaster? Perhaps the military internment camps to be used for disasters, and the FEMA camps to be used in times of crisis, are unrelated. But given the recent NDAA , allowing for the legal indefinite detainment of American citizens, and the political weather, it seems this isn’t such a far out possibility. It isn’t a nice issue to think about, but spreading the word about the possibility of an American holocaust would be arguably the most effective way to stop such an event.
http://intellihub.com/2013/05/23/department-of-homeland-security-teaching-kids-to-go-to-fema-camps-in-a-time-of-crisis/

Don't think DHS is creeping into ever facet of American's lives? Here's a picture of an electronic traffic sign in Brookline, MA:

                           Notice the bottom right corner and the Homeland Security sticker.