Favorite Quotes

"Once you walk into a courtroom, you've already lost. The best way to win is to avoid it at all costs, because the justice system is anything but" Sydney Carton, Attorney. "There is no one in the criminal justice system who believes that system works well. Or if they are, they are for courts that are an embarrassment to the ideals of justice. The law of real people doesn't work" Lawrence Lessig, Harvard Law Professor.



Saturday, August 31, 2013

Big Brother's reach extends far beyond Facebook's facial recognition announcement

 

Facebook is considering incorporating most of its 1 billion-plus members' profile photos into its growing facial recognition database, expanding the scope of the social network's controversial technology.

The possible move, which Facebook revealed in an update to its data use policy on Thursday, is intended to improve the performance of its "Tag Suggest" feature. The feature uses facial recognition technology to speed up the process of labeling or "tagging" friends and acquaintances who appear in photos posted on the network.

Facebook, Google and other companies have insisted that they have never participated in any program giving the government direct access to their computer servers and that they only provide information in response to specific requests, after careful review and as required by law.

Try not to laugh at the following statements..

Facebook Chief Privacy Officer Erin Egan said that adding members' public profile photos would give users better control over their personal information, by making it easier to identify posted photos in which they appear.

"Our goal is to facilitate tagging so that people know when there are photos of them on our service," Egan said.

 She stressed that Facebook users uncomfortable with facial recognition technology will still be able to "opt out" of the Tag Suggest feature altogether, in which case the person's public profile photo would not be included in the facial recognition database.

"Can I say that we will never use facial recognition technology for any other purposes? Absolutely not," Egan said. But, she noted, "if we decided to use it in different ways we will continue to provide people transparency about that and we will continue to provide control."

A German privacy regulator is astonished that Facebook has added facial recognition to a proposed new privacy policy it published on Thursday. 

"It is astonishing to find the facial recognition again in the new proposed privacy policy that Facebook published yesterday. We therefore have directly tried to contact officials from Facebook to find out if there is really a change in their data protection policy or if it is just a mistake of translation," Hamburg Commissioner for Data Protection and Freedom of Information Johannes Caspar said in an email on Friday.
http://www.nbcnews.com/technology/facebook-may-add-your-profile-photo-facial-recognition-database-8C11030921
https://www.networkworld.com/news/2013/083013-facebook39s-new-face-recognition-policy-273373.html
Microsoft and Google to sue over US surveillance requests:

Microsoft and Google are to sue the US government to win the right to reveal more information about official requests for user data. The companies announced the lawsuit on Friday, escalating a legal battle over the Foreign Intelligence Surveillance Act (Fisa), the mechanism used by the National Security Agency (NSA) and other US government agencies to gather data about foreign internet users.

Microsoft's general counsel, Brad Smith, made the announcement in a corporate blog post which complained of the government's "continued unwillingness" to let it publish information about Fisa requests.

Each company filed a suit in June arguing that they should be allowed to state the details under the first amendment, which guarantees freedom of speech, and in the process defend corporate reputations battered by Edward Snowden's revelations. Critics accused the companies of collaborating in the snooping.

"On six occasions in recent weeks we agreed with the department of justice to extend the government's deadline to reply to these lawsuits. We hoped that these discussions would lead to an agreement acceptable to all," Smith wrote.

The negotiations failed, he wrote, so Google and Microsoft were going to court. He did not specify when, or to which court.

"With the failure of our recent negotiations, we will move forward with litigation in the hope that the courts will uphold our right to speak more freely. And with a growing discussion on Capitol Hill, we hope Congress will continue to press for the right of technology companies to disclose relevant information in an appropriate way."

The companies denied the NSA had "direct access" to their systems but said they were legally unable to disclose how many times they have been asked to provide information on users.

Fisa requests are granted by a special court that sits in secret and can grant the NSA permission to collect data stored by any company about a named person. In 2012, the court granted 1,856 requests and turned none down.

"We believe we have a clear right under the US constitution to share more information with the public," said Smith's post. "The purpose of our litigation is to uphold this right so that we can disclose additional data."

He welcomed a government announcement earlier this week that it would begin publishing the total number of national security requests for customer data for the past 12 months.

"But the public deserves and the constitution guarantees more than this first step. For example, we believe it is vital to publish information that clearly shows the number of national security demands for user content, such as the text of an email."
http://www.theguardian.com/law/2013/aug/31/microsoft-google-sue-us-fisa

The  United States spying budget is an unbelievable $52.6 billion dollars:

U.S. spy agencies have built an intelligence-gathering colossus since the attacks of Sept. 11, 2001, but remain unable to provide critical information to the president on a range of national security threats, according to the government’s top-secret budget.

The $52.6 billion “Black Budget” for fiscal 2013, obtained by The Washington Post from former ­intelligence contractor Edward Snowden, maps a bureaucratic and operational landscape that has never been subject to public scrutiny. Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses the money or how it performs against the goals set by the president and Congress.

The summary provides a detailed look at how the U.S. intelligence community has been reconfigured by the massive infusion of resources that followed the 2001 attacks. The United States has spent more than $500 billion on intelligence during that period, an outlay that U.S. officials say has succeeded in its main objective: preventing another catastrophic terrorist attack in the United States.

The result is an espionage empire with resources and a reach beyond those of any adversary, sustained even now by spending that rivals or exceeds the levels at the height of the Cold War.

The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the U.S. intelligence community, which has 107,035 employees.

The summary describes cutting-edge technologies, agent recruiting and ongoing operations. The Post is withholding some information after consultation with U.S. officials who expressed concerns about the risk to intelligence sources and methods. Sensitive details are so pervasive in the documents that The Post is publishing only summary tables and charts online.

“The United States has made a considerable investment in the Intelligence Community since the terror attacks of 9/11, a time which includes wars in Iraq and Afghanistan, the Arab Spring, the proliferation of weapons of mass destruction technology, and asymmetric threats in such areas as cyber-warfare,” Director of National Intelligence James R. Clapper Jr. wrote in response to inquiries from The Post. 
 
“Our budgets are classified as they could provide insight for foreign intelligence services to discern our top national priorities, capabilities and sources and methods that allow us to obtain information to counter threats,” he said.

Among the notable revelations in the budget summary:

Spending by the CIA has surged past that of every other spy agency, with $14.7 billion in requested funding for 2013. The figure vastly exceeds outside estimates and is nearly 50 percent above that of the National Security Agency, which conducts eavesdropping operations and has long been considered the behemoth of the community.

●The CIA and the NSA have begun aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as “offensive cyber operations.”

●Long before Snowden’s leaks, the U.S. intelligence community worried about “anomalous behavior” by employees and contractors with access to classified material. The NSA planned to ward off a “potential insider compromise of sensitive information” by re-investigating at least 4,000 people this year who hold high-level security clearances.

In words, deeds and dollars, intelligence agencies remain fixed on terrorism as the gravest threat to national security, which is listed first among five “mission ob­jectives.” Counterterrorism programs employ one in four members of the intelligence workforce and account for one-third of the intelligence program’s spending.

The surge in resources for the CIA funded secret prisons, a controversial interrogation program, the deployment of lethal drones and a huge expansion of its counterterrorism center. The agency was transformed from a spy service struggling to emerge from the Cold War into a paramilitary force.

The CIA has devoted billions of dollars to recruiting and training a new generation of case officers, with the workforce growing from about 17,000 a decade ago to 21,575 this year.

The agency’s budget allocates $2.3 billion for human intelligence operations and $2.5 billion to cover the cost of supporting the security, logistics and other needs of those missions around the world. A relatively small amount of that total, $68.6 million, was earmarked for creating and maintaining “cover,” the false identities employed by operatives overseas.
http://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html?hpid=z2

War on terrorism’s price tag is $17.82 billion for 2011-2012:

The government on Thursday informed the Senate that the country’s economy suffered an estimated loss of $17.82 billion due to the war on terror during 2011-12.
  
The finance division provided details of the estimates to the upper house of the parliament on a query posed by Senator Abdul Haseeb Khan. The finance ministry further stated that these estimated losses, which occurred due to the war on terror during 2011-12, are being finalized by the authorities concerned.

The house was informed that approximately $30.4 billion in aid have been received by Pakistan from the US in connection with the war on terror during the last decade.

The finance ministry also informed the house that $647 million in foreign aid had been received from different countries for flood relief activities, and rehabilitation of flood affectees since 2010.
Minister of State for Privatisation Khurram Dastagir Khan said that the government also acquired $857 million in foreign loans for flood relief activities from 2010 to 2013.

He said the amount received under aid and loan heads was disbursed among provinces. The finance ministry also informed the house that the Pakistan government had obtained foreign loans during fiscal year 2008-09 to 2012-13 worth $14.55 billion and the amount paid back by the government during the period in question was $10.62 billion.
http://tribune.com.pk/story/597248/senate-told-war-on-terrorisms-price-tag-17-82b/

U.S. government spending on big data to grow exponentially:


Biometrics Research Group, Inc. has observed that national security and military applications are driving a large proportion of “Big Data” research spending.

Big Data is a term used to describe large and complex data sets that can provide insightful conclusions when analyzed and visualized in a meaningful way. Conventional database tools do not have capabilities to manage large volumes of unstructured data.  The U.S. Government is therefore investing in programs to develop new tools and technologies to manage highly complex data.  The basic components of Big Data include hardware, software, services and storage.

Biometrics Research Group estimates that federal agencies spent approximately $5 billion on Big Data resources in the 2012 fiscal year. We estimate that annual spending will grow to $6 billion in 2014 and then to $8 billion by 2017 at a compound annual growth rate of 10 percent.  Our industry analysis projects that most of this spending will be directed through the military apparatus of the U.S. government in the near to midterm.  Currently, federal agencies are pursuing over 150 Big Data projects involving procurements, grants or related activities.

Big Data research is being mainly driven by the military establishment, with over 30 projects led by the U.S. Department of Defense.  Specifically, the Defense Advanced Research Projects Agency (DARPA) is leading nine major projects focused on algorithmic improvement, espionage and surveillance.  Some DARPA Big Data projects are also attempting to make improvements to natural speech recognition and video and image retrieval systems.

DARPA’s Anomaly Detection at Multiple Scales (ADAMS) program addresses the problem of anomaly detection and characterization in massive data sets. In this context, anomalies in data are intended to cue collection of additional, actionable information in a wide variety of real-world contexts. The initial ADAMS application domain is insider threat detection, in which anomalous actions by an individual are detected against a background of routine network activity.

The Cyber-Insider Threat (CINDER) program seeks to develop novel approaches to detect activities consistent with cyber espionage in military computer networks. As a means to expose hidden operations, CINDER will apply various models of adversary missions to “normal” activity on internal networks. CINDER also aims to increase the accuracy, rate and speed with which cyber threats are detected.

The Insight program addresses key shortfalls in current intelligence, surveillance and reconnaissance systems. Automation and integrated human-machine reasoning enable operators to analyze greater numbers of potential threats ahead of time-sensitive situations. The Insight program aims to develop a resource management system to automatically identify threat networks and irregular warfare operations through the analysis of information from imaging and non-imaging sensors and other sources.

DARPA’s Machine Reading program seeks to realize artificial intelligence applications by developing learning systems that process natural text and insert the resulting semantic representation into a knowledge base rather than relying on expensive and time-consuming current processes for knowledge representation that require expert and associated-knowledge engineers to hand craft information.

The Mind’s Eye program seeks to develop a capability for “visual intelligence” in machines. Whereas traditional study of machine vision has made progress in recognizing a wide range of objects and their properties—the nouns in the description of a scene—Mind’s Eye seeks to add the perceptual and cognitive underpinnings needed for recognizing and reasoning about the verbs in those scenes. Together, these technologies could enable a more complete visual narrative.

The Mission-oriented Resilient Clouds program aims to address security challenges inherent in cloud computing by developing technologies to detect, diagnose and respond to attacks, effectively building a “community health system” for the cloud. The program also aims to develop technologies to enable cloud applications and infrastructure to continue functioning while under attack. The loss of individual hosts and tasks within the cloud ensemble would be allowable as long as overall mission effectiveness was preserved.

The Programming Computation on Encrypted Data (PROCEED) research effort seeks to  overcome a major challenge for information security in cloud-computing environments by developing practical methods and associated modern programming languages for computation on data that remains encrypted the entire time it is in use. Giving users the ability to manipulate encrypted data without first decrypting it would make interception by an adversary more  difficult.

The Video and Image Retrieval and Analysis Tool (VIRAT) program aims to develop a system to provide military imagery analysts with the capability to exploit the vast amount of overhead video content being collected. If successful, VIRAT will enable analysts to establish alerts for activities and events of interest as they occur. VIRAT also seeks to develop tools that would enable analysts to rapidly retrieve, with high precision and recall, video content from extremely large video libraries.

The XDATA program seeks to develop computational techniques and software tools for analyzing large volumes of semi-structured and unstructured data. Central challenges to be addressed include scalable algorithms for processing imperfect data in distributed data stores and  effective human-computer interaction tools that are rapidly customizable to facilitate visual reasoning for diverse missions. The program envisions open source software toolkits for flexible software development that enable processing of large volumes of data for use in targeted defense applications.

In addition, the National Security Agency (NSA) has unveiled “Vigilant Net”, which is effectively a competition to foster and test cyber defense situational awareness at scale.  The project will explore the feasibility of conducting an online contest for developing data visualizations in the defense of massive computer networks, beginning with the identification of best practices in the design and execution of such an event. The U.S. intelligence community has identified a set of coordination, outreach and program activities to collaborate with a wide variety of partners throughout the U.S. Government, academia and industry, combining cybersecurity and Big Data and making its perspective accessible to the unclassified science community.

Previous editorial commentary on BiometricUpdate.com has also indicated that “big” government is already exploiting Big Data in the areas of surveillance for criminal and anti-terror investigations.

BiometricUpdate.com reporting has also found that U.S. Government is also increasingly developing “predictive pattern-matching” techniques to determine suspicious patterns of behavior by actively collecting and collating metadata from the Internet, cellular phone networks and other publicly-accessible sources.

While the aforementioned programs are just a sample of some of the new, experimental Big Data research and development that has been undertaken, a recent survey of 150 IT executives in the U.S. Government, sponsored by EMC, found that 70 percent of respondents believe that within five years, Big Data will be critical to all government operations.
http://www.biometricupdate.com/201308/u-s-government-spending-on-big-data-to-grow-exponentially

The NSA is paying communications companies to let them spy on communications networks

The National Security Agency is paying hundreds of millions of dollars a year to U.S. companies for clandestine access to their communications networks, filtering vast traffic flows for foreign targets in a process that also sweeps in large volumes of American telephone calls, e-mails and instant messages.

The bulk of the spending, detailed in a multi-volume intelligence budget obtained by The Washington Post, goes to participants in a Corporate Partner Access Project for major U.S. telecommunications providers. The documents open an important window into surveillance operations on U.S. territory that have been the subject of debate since they were revealed by The Post and Britain’s Guardian newspaper in June.

New details of the corporate-partner project, which falls under the NSA’s Special Source Operations, confirm that the agency taps into “high volume circuit and packet-switched networks,” according to the spending blueprint for fiscal 2013. The program was expected to cost $278 million in the current fiscal year, down nearly one-third from its peak of $394 million in 2011.

Voluntary cooperation from the “backbone” providers of global communications dates to the 1970s under the cover name BLARNEY, according to documents provided by former NSA contractor Edward Snowden. These relationships long predate the PRISM program disclosed in June, under which American technology companies hand over customer data after receiving orders from the Foreign Intelligence Surveillance Court.

The budget documents do not list individual companies, although they do break down spending among several NSA programs, listed by their code names.

In briefing slides, the NSA described BLARNEY and three other corporate projects — OAKSTAR, FAIRVIEW and STORMBREW — under the heading of “passive” or “upstream” collection. They capture data as they move across fiber-optic cables and the gateways that direct global communications traffic.

The documents offer a rare view of a secret surveillance economy in which government officials set financial terms for programs capable of peering into the lives of almost anyone who uses a phone, computer or other device connected to the Internet.

Although the companies are required to comply with lawful surveillance orders, privacy advocates say the multimillion-dollar payments could create a profit motive to offer more than the required assistance.

It turns surveillance into a revenue stream, and that’s not the way it’s supposed to work,” said Marc Rotenberg, executive director of the Electronic Privacy Information Center, a Washington-based research and advocacy group. “The fact that the government is paying money to telephone companies to turn over information that they are compelled to turn over is very troubling.”

Former telecommunications executive Paul Kouroupas, a security officer who worked at Global Crossing for 12 years, said that some companies welcome the revenue and enter into contracts in which the government makes higher payments than otherwise available to firms receiving re­imbursement for complying with surveillance orders.

These contractual payments, he said, could cover the cost of buying and installing new equipment, along with a reasonable profit. These voluntary agreements simplify the government’s access to surveillance, he said.

“It certainly lubricates the surveillance infrastructure,” Kouroupas said. He declined to say whether Global Crossing, which operated a fiber-optic network spanning several continents and was bought by Level 3 Communications in 2011, had such a contract.
http://www.washingtonpost.com/world/national-security/nsa-paying-us-companies-for-access-to-communications-networks/2013/08/29/5641a4b6-10c2-11e3-bdf6-e4fc677d94a1_story.html

CNN caught staging news segments on Syria with actors:

The primary “witness” that the mainstream media is using as a source in Syria has been caught staging fake news segments.  Recent video evidence proves that “Syria Danny”, the supposed activist who has been begging for military intervention on CNN, is really just a paid actor and a liar.

While Assad is definitely a tyrant like any head of state, a US invasion of the country is a worst case scenario for the people living there.

By pointing out that the mainstream media is orchestrating their entire coverage of this incident, we are not denying that there is a tremendous amount of death and violence in Syria right now.

However, we are showing that the mainstream media version of events is scripted and staged propaganda.

The following video shows him contradicting himself while off air, and even asking crew members to “get the gunfire sounds ready” for his video conference with Anderson Cooper on CNN.

 http://intellihub.com/2013/08/29/cnn-correspondent-syria-exposed-actor-caught-multiple-lies/


                                                   image source blacklistednews.com

Proof that TV news is scripted:

Friday, August 30, 2013

Is civil asset forfeiture being used to balance police and government budgets?

 
Article first appeared in natural news.com:

If you've never heard of "civil forfeiture laws," you're about to get an eye-opening education. What's more, you're going to be disappointed that far too many local police departments - maybe even your own - are using these laws to rip off innocent citizens and help fund their own operations.

Every year, federal and state law enforcement agents seize millions of dollars from civilians during traffic stops, simply by asserting that they believe the money is connected to some illegal activity and without ever pursuing criminal charges. Under federal law and the laws of most states, they are entitled to keep most (and sometimes all) of the money and property they seize.

 "The protections our Constitution usually affords are out the window," Louis Rulli, a clinical law professor at the University of Pennsylvania and a leading forfeiture expert, says.

Property doesn't have the same rights as a person. There is no right to an attorney and, in the majority of states, there is no "innocent until proven guilty." You can tell that just by the title of the court cases: United States v. One Pearl Necklace and United States v. Approximately 64,695 Pounds of Shark Fins.

Police have their victims at a distinct disadvantage in a number of ways. First, they have the guns and badges. Second, civil asset forfeiture doesn't have to meet the standard of "probable cause" (it barely reached the level of "reasonable suspicion"). And third, they know that, oftentimes, hiring a lawyer and taking the department to court would far exceed the cost of the confiscated money and valuables.

"Washington, D.C., charges up to twenty-five hundred dollars simply for the right to challenge a police seizure in court, which can take months or even years to resolve," Silverman writes - and this is in a city overwhelmingly dominated by "fair-minded" liberals.

In fact, Silverman explains, the D.C. system has impoverished hundreds of poor citizens caught in this civil forfeiture nightmare. Cops there will confiscate anything and everything - including the automobiles these people use to get back and forth to low-paying, menial labor jobs (another sad but true fact about "progressive" D.C.). It is so bad there, in fact, that the city's Public Defender Service has filed suit on behalf of 375 car-owners, calling the city P.D.'s policy "devastating for hundreds of families who depend on their cars for many of the urgent and important tasks of daily life."


Astonishingly, many police departments defend this abomination.

"We all know the way things are right now - budgets are tight," Steve Westbrook, the executive director of the Sheriffs' Association of Texas, told Silverman.

"It's definitely a valuable asset to law enforcement, for purchasing equipment and getting things you normally wouldn't be able to get to fight crime," he said.

Other officers said, if the practice of civil forfeiture becomes too heavily regulated to use, their departments would collapse economically - and, of course, that would endanger public safety (can you say fearmongering).


Per Silverman:

But a system that proved successful at wringing profits from drug cartels and white-collar fraudsters has also given rise to corruption and violations of civil liberties. Over the past year, I spoke with more than a hundred police officers, defense attorneys, prosecutors, judges, and forfeiture plaintiffs from across the country. Many expressed concern that state laws designed to go after high-flying crime lords are routinely targeting the workaday homes, cars, cash savings, and other belongings of innocent people who are never charged with a crime.

This pathetic use of the law amounts to little more than legalized theft. If a private citizen were to do something like this, he or she would go to jail.

Civil forfeiture in the case of a convicted criminal is one thing; stealing from innocent people to fund your police department is quite another.

And quite despicable.
http://www.naturalnews.com/041828_cops_innocent_civilians_civil_forfeiture.html

Civil asset forfeiture dealt a blow in MA. will other states take notice?
http://massprivatei.blogspot.com/2013/03/civil-asset-forfeiture-dealt-blow-in-ma.html 

Civil asset forfeiture fund proceeds are up $1.6 billion and growing as police & prosecutors profit:
http://massprivatei.blogspot.com/2013/01/georgias-civil-forfeiture-laws-are.html

Civil asset forfeiture tramples citizens rights while filling state's coffers:
http://massprivatei.blogspot.com/2012/11/civil-asset-forfeiture-tramples.html

Federal Court recognizes constitutional rights of Americans on the "No-Fly List"


A federal court took a critically important step towards placing a check on the government's secretive No-Fly List. In a 38-page ruling in Latif v. Holder, the ACLU's challenge to the No-Fly List, U.S. District Court Judge Anna Brown recognized that the Constitution applies when the government bans Americans from the skies. She also asked for more information about the current process for getting off the list, to inform her decision on whether that procedure violates the Fifth Amendment guarantee of due process.

The ACLU represents 13 Americans, including four military veterans, who are blacklisted from flying. At oral argument in June on motions for partial summary judgment, we asked the court to find that the government violated our clients' Fifth Amendment right to due process by barring them from flying over U.S. airspace – and smearing them as suspected terrorists – without giving them any after-the-fact explanation or a hearing at which to clear their names.

The court's opinion recognizes – for the first time – that inclusion on the No-Fly List is a draconian sanction that severely impacts peoples' constitutionally-protected liberties. It rejected the government's argument that No-Fly list placement was merely a restriction on the most "convenient" means of international travel.

Such an argument ignores the numerous reasons an individual may have for wanting or needing to travel overseas quickly such as for the birth of a child, the death of a loved one, a business opportunity, or a religious obligation.
According to the court, placement on the No-Fly List is like the revocation of a passport because both actions severely burden the right to international travel and give rise to a constitutional right to procedural due process:

Here it is undisputed that inclusion on the No-Fly List completely bans listed persons from boarding commercial flights to or from the United States or over United States air space.  Thus, Plaintiffs have shown their placement on the No-Fly List has in the past and will in the future severely restrict Plaintiffs' ability to travel internationally. Moreover, the realistic implications of being on the No-Fly List are potentially far-reaching. For example, TSC [the Terrorist Screening Center] shares watchlist information with 22 foreign governments and United States Customs and Boarder [sic] Protection makes recommendations to ship captains as to whether a passenger poses a risk to transportation security, which can result in further interference with an individual's ability to travel as evidenced by some Plaintiffs' experiences as they attempted to travel abroad by boat and land and were either turned away or completed their journey only after an extraordinary amount of time, expense, and difficulty. Accordingly, the Court concludes on this record that Plaintiffs have a constitutionally-protected liberty interest in traveling internationally by air, which is affected by being placed on the list.
The court also found that the government's inclusion of our clients on the No-Fly List smeared them as suspected terrorists and altered their ability to lawfully board planes, resulting in injury to another constitutionally-protected right: freedom from reputational harm.

The importance of these rulings is clear. Because inclusion on the No-Fly List harms our clients' liberty interests in travel and reputation, due process requires the government to provide them an explanation and a hearing to correct the mistakes that led to their inclusion. But under the government's "Glomar" policy, it refuses to provide any information confirming or denying that our clients are on the list, let alone an after-the-fact explanation and hearing.

The court has asked the ACLU and the government for more information about the No-Fly List redress procedure to help it decide the ultimate question of whether that system violates the Fifth Amendment right to due process. We are confident the court will recognize that the government's "Glomar" policy of refusing even to confirm or deny our clients' No-Fly List status (much less actually providing the reasons for their inclusion in the list) is fundamentally unfair and unconstitutional.
https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes

Who can remove your name from the "No-Fly List" or a gov't. watch list? Answer: no one:
http://massprivatei.blogspot.com/2012/05/if-youre-on-no-fly-list-or-another-govt.html

Our Constitution doesn't disappear if a citizen is placed on the  "No-Fly List":
http://massprivatei.blogspot.com/2013/03/our-constitution-doesnt-dissapear-if.html

U.S. citizen/political activist put on the "No-Fly List"
http://massprivatei.blogspot.com/2012/10/us-citizenpolitical-activist-on-do-not.html 

International travel by air is a Constitutional right:

In a preliminary ruling in a lawsuit brought by the ACLU three years ago on behalf of a group of people who have been prevented by the U.S. government from traveling by air, a Federal judge in Oregon has found (1) that international air travel is a Constitutional right, and (2) that a categorical ban by the government on the exercise of that right can only be issued in accordance with due process.

Those shouldn’t be surprising findings. But given that the U.S. government has never sought to follow normal legal procedures by asking a court to issue a no-fly injunction against an individual, and that none of the goverment’s extrajudicial administrative no-fly orders has ever been reviewed on its merits by any court, the latest ruling by District Judge Judge Anna Brown in the case of Latif et al. v. Holder is an important step toward bringing DHS controls on travel within the rule of law.

The ruling is the latest in a series of decisions which have finally begun to uphold the right of travelers to due process and juducial review of the restrictins on their movements. The decison in the Oregon no-fly case echoes similar findings in the past year by the 4th Circuit Court of Appeals in the case of Gulet Mohamed and by the 9th Circuit and the District Court for the Northern District of California in the case of Rahinah Ibrahim.

The government will neither confirm nor deny whether anyone is or has ever been on the government’s no-fly list.  But each of the plaintiffs in the Oregon lawsuit has been prevented from boarding international flights to and/or from the USA, or has been on a flight that was denied permission to land in the USA becuase they were on board.

The government first tried to claim that the court had no jursidiction to hear such a case at all. After that argument was rejected by the 9th Circuit on appeal, the government tried to get the complaint dismissed on the grounds that the plaintiffs’ rights hadn’t been violated, even if the government had forbidden airlines to transport them, they could have traveled by other means.

Judge Brown was quick to reject this argument, and to distinguish the difficulties faced by those seeking to travel internationally (many of the plaintiffs have families and/ort jobs overseas) from the  restrictions on domestic air travel that were at issue in Gilmore v. Gonzales

Read more: http://www.papersplease.org/wp/2013/08/30/international-travel-by-air-is-a-constitutional-right/

Thursday, August 29, 2013

Federal & local governments are profiting by selling our personal data to marketers


A CBS4 Investigation has uncovered that government agencies at all levels are selling personal information to marketing companies.

Eric Meer is a small business owner who works out of his home in Denver’s Stapleton neighborhood. Meer says he was deluged by direct mail after registering his small business with the Colorado Secretary of State. He says many of the ads he received were deceptive asking him to pay fees that he wasn’t required to pay.

Meer had a hunch the Secretary of State was selling his business information to marketing companies. CBS4 confirmed his hunch was right. Last year, the Secretary of State brought in $59,000 for business registration data.
 
“It feels like a betrayal,” Meer said. “Because our government is supposed to protect us, not to sell our information and profit from us.”

Spokesperson Andrew Cole confirms the Secretary of State sells business information for monetary amounts ranging from $200 to $12,000, depending on frequency and amount of information requested. But, Cole says the fees only cover the costs of running the databases.

“We are not looking to make money,” said Cole. “We charge to cover our costs.”

According to Cole, there is no way to opt out of these lists and anyone can buy them, even scammers. There is no screening process.

“It’s a public database,” Cole said. He said it’s “meant to be public” and part of running a transparent government.

The Secretary of State also sold voter registration information — including names, addresses and political party affiliation of voters — for $58,000, last year.

Do you ever notice a surge of confusing mail after refinancing, a foreclosure, or buying a house? The Denver Clerk and Recorder made $32,000 last year selling home sale data.

It happens in college, too. The University of Colorado Boulder buys names from the SAT for 33 cents each and names from the ACT for 34 cents each for recruiting purposes. CU sells student information to private meal plans and storage companies for $15,000 a year.

Even death is for sale. The Social Security Administration sells a “Master Death Index” for 7,500 each. The result, an onslaught of letters to surviving family members asking to purchase a home.
http://denver.cbslocal.com/2013/08/26/sales-of-public-data-to-marketers-can-mean-big-for-governments/ 

Demanding transparency from data brokers:

Many tech firms are calling on the government to allow them to reveal how and how often the government seeks information about individuals. We ought to demand the same sort of transparency from the commercial data brokers that know much more about us than we do about them. One of the largest, Acxiom, reportedly has information on about 700 million active consumers worldwide, with some 1,500 data points per person. Such data brokers learn about us from the cookies that hitch rides as users travel online and from the social media sites where we post everything from home addresses to pictures to magazine subscriptions and store purchases, as well as deeds on file in towns and counties. They load all this data into sophisticated algorithms that spew out alarmingly personal predictions about our health, financial status, interests, sexual orientation, religious beliefs, politics and habits.

These dossiers are the reason that when you log in, you see an ad for suede boots but my son sees the release date for the latest “Call of Duty” game. This may seem benign, but increasingly our data fuel more than just what ads we are served. They may also determine what offers we receive, what rates we pay, even what jobs we get.

The Fair Credit Reporting Act (FCRA) provides some protections. The law requires that entities that collect information for those making employment, credit, insurance and housing decisions do so in a manner that ensures the information is accurate. The Federal Trade Commission targets firms that screen potential tenants, credit recipients, employees and insurance purchasers without complying with the law. But in an online world in which companies large and small innovate constantly and — sometimes unknowingly — push legal boundaries, it is difficult to reach all of those who may engage in activities that fall afoul of the FCRA.
http://www.washingtonpost.com/opinions/demanding-transparency-from-data-brokers/2013/08/15/00609680-0382-11e3-9259-e2aafe5a5f84_story.html

Has big data made anonymity impossible?
http://www.technologyreview.com/news/514351/has-big-data-made-anonymity-impossible/

Infographic: Wrestling online privacy:

http://owni.eu/2012/02/08/infographic-wrestling-online-privacy-google/

Facebooks "Global Government Requests Report" gov'ts demanded info on 38K users, protesters & political activists among them


In releasing its first report on government requests for user information, Facebook is reminding businesses and consumers that use of the Internet today requires self-censorship.

The report released Tuesday shows also that the U.S. government -- which is the single biggest with between 11,000 and 12,000 requests -- is only one of many seeking data from Facebook. Total non-U.S. requests numbered about 15,000 during the first half of this year.

Facebook's Global Government Requests Report is meant to assure users that the company is doing everything it can legally to protect their privacy. Google does the same through its biannual Transparency Report.

The number of users specified in the requests was from 20,000 to 21,000. The majority of the requests were related to criminal cases, such as robberies or kidnappings.

Facebook handed over at least some data in 79% of the requests, showing that Facebook refused to release data when it could.
https://www.facebook.com/about/government_requests 

Department of Homeland Security's Analyst's Media Monitoring Capability Desktop Reference Binder:

In the latest revelation of how the federal government is monitoring social media and online news outlets, the Electronic Privacy Information Center has posted online a 2011 Department of Homeland Security manual that includes hundreds of key words (such as those above) and search terms used to detect possible terrorism, unfolding natural disasters and public health threats. The center, a privacy watchdog group, filed a Freedom of Information Act request and then sued to obtain the release of the documents.

The 39-page "Analyst's Desktop Binder" used by the department's National Operations Center includes no-brainer words like ""attack," "epidemic" and "Al Qaeda" (with various spellings). But the list also includes words that can be interpreted as either menacing or innocent depending on the context, such as "exercise," "drill," "wave," "initiative," "relief" and "organization." 

These terms and others are "broad, vague and ambiguous" and include "vast amounts of First Amendment protected speech that is entirely unrelated to the Department of Homeland Security mission to protect the public against terrorism and disasters," stated the Electronic Privacy Information Center in letter to the House Homeland Security Subcommittee on Counterterrorism and Intelligence.

The agency agrees that the manual's language is vague. For instance, under terrorism watchwords, the manual lists "Hamas" and "Hezbollah" but also the "Palestinian Liberation Organization." The PLO was once considered a terrorist organization by the U.S. government but now that it has a diplomatic mission in Washington and its leader, Mahmoud Abbas, has met with presidents Bush and Obama, the inclusion of this term could be deemed questionable.
http://epic.org/foia/epic-v-dhs-media-monitoring/Analyst-Desktop-Binder-REDACTED.pdf 

NYPD secretly designated entire mosques as terrorism organizations:

The New York Police Department has secretly labeled entire mosques as terrorist organizations, a designation that allows police to use informants to record sermons and spy on imams, often without specific evidence of criminal wrongdoing.

Designating an entire mosque as a terrorism enterprise means that anyone who attends prayer services there is a potential subject of an investigation and fair game for surveillance.

Since the 9/11 attacks, the NYPD has opened at least a dozen "terrorism enterprise investigations" into mosques, according to interviews and confidential police documents. The TEI, as it is known, is a police tool intended to help investigate terrorist cells and the like.

Many TEIs stretch for years, allowing surveillance to continue even though the NYPD has never criminally charged a mosque or Islamic organization with operating as a terrorism enterprise.

The documents show in detail how, in its hunt for terrorists, the NYPD investigated countless innocent New York Muslims and put information about them in secret police files. As a tactic, opening an enterprise investigation on a mosque is so potentially invasive that while the NYPD conducted at least a dozen, the FBI never did one, according to interviews with federal law enforcement officials.
http://www.huffingtonpost.com/2013/08/28/nypd-spying-mosques_n_3827567.html#!
http://news.yahoo.com/nypd-designates-mosques-terrorism-organizations-070801349.html
http://tribune.com.pk/story/596406/mosques-declared-terrorism-organisations-by-nypd-report/

The NYPD built in effect its own CIA—and its Demographics Unit delved deeper into the lives of citizens than did the NSA:

There was nothing like what Larry Sanchez a CIA analyst and David Cohen, a former senior CIA officer were proposing anywhere in American law enforcement. And of course, the behaviors to be monitored were common not only to the 9/11 hijackers but also to a huge population of innocent people. Most café customers, gym members, college kids, and pub customers were not terrorists. Most devout Muslims weren’t either. To catch the few, the NYPD would spy on the many.
http://nymag.com/news/features/nypd-demographics-unit-2013-9/#!

U.S. Border Patrol is spying on all maritime traffic:

The Air and Marine Operations Center at March Air Reserve Base tracks planes flying in and out of the country as well as domestic flights.

Now, officials there have set their sights on the sea.

The center, operated by U.S. Customs and Border Protection, is a mass of computer banks reminiscent of NASA’s Mission Control. An 8-by-45-foot, high-definition television screen is spread across its front wall. The center can track as many as 50,000 aircraft at any moment.

It’s basically a clearing house for radar and intelligence information, working with — and supplying information to — a host of security and law enforcement agencies. Officials say the center has reduced illegal cross-border flights from thousands per year in the mid-1980s to a handful. Initially, the focus was on drug trafficking. The surveillance has expanded over the years to include human trafficking, the smuggling of counterfeit products, and terrorist activities.

The center now is testing software that will allow similar scrutiny of maritime traffic. The system would tap into existing radar and photo surveillance and incorporate newer state-of-the-art equipment to provide a comprehensive view of marine vessels within 100 miles of the U.S. coastlines. The omniscient view allows for greater coordination of agencies that might respond to a potential emergency.

Steve Savala, a detection enforcement officer, said the program won’t officially go into use for another year, in October 2014. The center started working on the system in December.

“They gave it to us early, so we could develop it from the bottom up,” Savala said.

Savala said he and others are in the testing phase. Two weeks ago, they started a 60-day test of a Carlsbad-based radar built by Terma, a company based in Virginia. Most shoreline radar systems have a range of three to four miles, Savala said. This unit can detect objects up to 20 miles offshore.

If the radar provides the kind of data Savala is looking for, the center will work out an agreement to use the device in the future.

He also expects to gather data and photos from smaller radar and automatic cameras already being used by various agencies along the coasts. Some plane-based radar also will be used on the southern and eastern coasts.

The center is using a computer program designed by SRI International, in Menlo Park. But putting a system together requires more than software, center spokeswoman Tina Pendell said.

The center’s director, Tony Crowder, said the agency currently receives some maritime information from a multi-agency task force looking at traffic in the Caribbean. He said he believes the new system eventually will be as comprehensive as the air tracking.
http://www.pe.com/local-news/riverside-county/riverside/riverside-headlines-index/20130823-

Prosecutors cannot use a defendant's request for a lawyer as evidence of guilt


New York - A three-judge panel of the 2nd Circuit concluded Monday, however, that the evidence violated Okatan's rights under the Fifth Amendment.

"In order for the privilege to be given full effect, individuals must not be forced to choose between making potentially incriminating statements and being penalized for refusing to make them," Judge Gerald Lynch wrote for the Manhattan-based court.

The panel also took of note of a Supreme Court ruling (Salinas v. Texas) earlier this year, in which it drew a distinction between a defendant's asserting his Fifth Amendment rights to protect himself against self-incrimination, and his merely remaining silent.

That decision had left unanswered whether the prosecution may use a defendant's assertion of his Fifth Amendment rights as part its case, the appellate panel found.

While Okatan did not use the words "Fifth Amendment" or "privilege against self-incrimination," the panel concluded that "a request for a lawyer in response to law enforcement questioning suffices to put an officer on notice that the individual means to invoke the privilege."

Precedent holds this true even when an individual is not in custody, given the "unique role the lawyer plays in the adversary system of criminal justice in this country."

The Supreme Court has said a prosecutor may not comment on a defendant's failure to testify at trial, as such comment would be "a penalty imposed by courts for exercising a constitutional privilege," Lynch wrote

"The same logic governs our decision today," he added. "Use of a defendant's invocation of the privilege imposes the same cost no matter the context in which that invocation is made. ... The Fifth Amendment guaranteed Okatan a right to react to the question without incriminating himself, and he successfully invoked that right. As the First Circuit has observed, allowing a jury to infer guilt from a pre-arrest invocation of the privilege 'ignores the teaching that the protection of the Fifth Amendment is not limited to those in custody or charged with a crime.'"
http://www.courthousenews.com/2013/08/27/okatan.pdf

Wednesday, August 28, 2013

Did Disney World's biometrics program identify a suspected murderer in its park?



Florida - The man suspected of shooting and killing a Manchester man at a downtown nightclub this month was arrested while on a Disney vacation in Florida, police said.

Mike Cruz, 23, whose last known address was in East Hartford, was seen poolside in Orlando, Fla. Friday and later taken into custody by U.S. federal marshals and members of a fugitive task force. The task force works with the Hartford police Major Crimes Division.

He is being held in Florida with bail set at $2 million on a charge of fugitive from justice and is awaiting extradition to Connecticut, Lt. Brian Foley said in a press release. When Cruz arrives, he will be arrested on a warrant charging him with murder, first-degree reckless endangerment and criminal possession of a pistol/revolver, police said.

On Aug. 4, a disturbance began inside Up Or On The Rocks, 50 Union Place. The fight continued outside after the club closed.

Brian Simpe of Manchester was shot and killed during the altercation, police said.
http://www.orlandosentinel.com/news/crime/hc-hartford-murder-arrest-0827-20130827,0,547235.story

Admittedly this story doesn't come out and say Disney World used its biometrics program to identify a patron and notify authorities, that would open them up to a huge lawsuit. 

The following examples show how closely Disney World works with Big Brother, I'll let the reader decide.

Walt Disney World is using a biometric RFID gate system:

Walt Disney World is in the midst of introducing a new gate system at the park which uses cards with RFID chips and fingerprint biometrics.

According to a report in the Examiner, the theme park was previously using this RFID technology, but it was only available to those staying at the park.

In the 1990s, the park introduced fingerprint geometry scanners to verify ticket holders, though they have since been upgraded with fingerprint scanners.

In a 2006 Associated Press report from The Boston Globe, at the time the fingerprint scanners were first introduced, a spokesperson for the theme park said that scanned information is stored separately and that after 30 days, or a fully-utilized ticket, unique data is purged from the system.

A spokesperson at Walt Disney World has confirmed to BiometricUpdate.com that the new system is being put in place, and will replace the existing turnstile system and the paper passes previously used by passholders.

Under the new system, passholders can exchange their paper ticket for a new plastic card with an RFID chip inside.

The chip is intended to make entering the park or boarding rides a simpler process, and this new card will also contain passholders’ biometric data, pre-registered in the system.  When reaching a gate, passholders tap their card and then place their finger on the scanner to verify identity.

The spokesperson from Walt Disney World was also adamant to say that fingerprints are not stored in the database, rather a unique numerical sequence derived from passholders’ original fingerprint scan is stored and used for verification.

This morning, Jason Hodge, VP at Securlinx, posted his thoughts on the purpose of the system and believes it has to do with pass-sharing and the bottom line.

“It’s my impression that Disney does this mostly for the purposes of making sure that discounted longer-term passes aren’t shared among different individuals. It’s not hard, however, envisioning that this might point the way toward future security applications.”

A recent Biometric Research Note suggests that fingerprint technology is the most established and widespread form of biometrics, and will dominate the residential and commercial security product marketplace. The Biometric Research Group projects that fingerprint technology will represent US$3 billion of revenue within the residential and commercial security product marketplace by 2017.
http://www.biometricupdate.com/201303/walt-disney-world-introduces-biometric-verification-for-passholders

Disney biometrics and the Department of Defense:

The Department of Defense (DOD) has been interested in Disney Amusement Parks for decades. Known as Operation Mickey Mouse, the DOD has been studying Disney’s use of technology and coercion techniques. The DOD has also been working in conjunction with Disney to collect information on Beta testing operations that the popular theme park uses on their customers. Best of all, who would ever suspect Disney of being a front for the US government?

Through the Freedom of Information Act, the Disney Corporation hands over to the DOD all data on their customers. The DOD has an overabundance of information on the general public going back decades thanks to their relationship with Disney. After the DOD analyses and profiles their data from Disney, it is ready to be used to the US government for whatever purposes they deem fit.

Within the Disney walls and on their cruise ships, a separate digital monetary system is used.

Customers trade their paper money for a digital card or voucher to purchases goods and services. On the cruise ship alone, the value of the digital Mickey money is determined prior to boarding. The card can be used at the ship, as well as at designated ports of call where the ship docks. As a programming technique, this digital money as replacing paper dollars conditions customers to think this idea is superior to carrying cash. This is reminiscent of the push of debit cards by banks in the 90’s.

The small cities Disney has created through their compound, although seemingly harmless, can harness quite a bit of private information on unsuspecting customers. All movements of patrons are tracked and traced through a myriad of cameras strategically placed throughout the theme parks.

Facial recognition technology is a part of Disney’s new cruise liners. Moving Art lines the walls of the ship to entertain the passengers. This pictures move in response to the passenger’s facial movements, ensuring that the same sequence will not play twice. Although this may entertain, the passenger’s facial movements are being recorded by the computers within the pictures at all times.

Disney’s private island, Castaway Cay, uses an array of photographs taken of the passengers, with or without their permission or prior knowledge. When a passenger wants to purchase one of these photographs, they use an encoded voucher (digital Mickey money). The facial recognition software works much like Facebook’s new photo tag application. Then the passenger can choose to have an album created through the use of this technology. Photos, regardless of whether or not they are sold to passengers, are entered into a data base for future use. Because the photographs are legally property of Disney, they can be used at the corporation’s discretion.
http://www.occupycorporatism.com/disney-biometrics-and-the-department-of-defense/  

Disney theme parks became the first to use biometrics at their ticket entrances.

According to Janel Pisorchik, Director of Business Operations at Accesso (a Florida based electronic ticketing and eCommerce solutions company):

Disney was the first theme park to introduce Biometrics to the entrance process. The initial type of technology used was hand geometry. This was an effective deterrent to help decrease the number of tickets from being resold. However, from an operational perspective, explaining the enrollment & verification process to the guests entering the parks was a little challenging.


Walt Disney World, bills itself as one of the happiest and most magical places anywhere, also may be one of the most closely watched and secure. The most popular tourist attraction in the United States is beginning to scan visitors' fingerprint information.

For years, Disney has recorded onto tickets the geometry and shape of visitors' fingers to prevent ticket fraud or resale, as an alternative to time-consuming photo identification checks.

All of the geometry readers at Disney's four Orlando theme parks will be replaced with machines that scan fingerprint information, according to industry experts familiar with the technology. The four parks attract tens of millions of visitors each year.

"It's essentially a technology upgrade," said Kim Prunty, spokeswoman for Walt Disney World. The new scanner, like the old finger geometry scanner, "takes an image, identifies a series of points, measures the distance between those points, and turns it into a numerical value."

She added, "To call it a fingerprint is a little bit of a stretch."

"The lack of transparency has always been a problem," said Lillie Coney, associate director of the Electronic Privacy Information Center. She said Disney's use of the technology "fails a proportionality test" by requiring too much personal information for access to roller coasters.

"What they're doing is taking a technology that was used to control access to high-level security venues and they're applying it to controlling access to a theme park," Coney said.

George Crossley, president of the Central Florida ACLU, said, "It's impossible for them to convince me that all they are getting is the fact that that person is the ticket-holder."
http://www.cbc.ca/news/technology/story/2006/09/05/tech-disney.html
http://newsinitiative.org/story/2006/08/14/walt_disney_world_the_governments 
http://boingboing.net/2008/03/15/fingertip-biometrics.html 

What's on the horizon you ask? How about Iris recogniton:


For decades, researchers seeking biometric identifiers other than fingerprints believed that irises were a strong biometric because their one-of-a-kind texture meets the stability and uniqueness requirements for biometrics. Recent research, for example, has questioned that belief, finding that the recognition of the subjects’ irises became increasingly difficult, consistent with an aging effect. Other researchers, however, found no evidence of a widespread aging effect. A computer model used to study large populations estimates that iris recognition of average people will typically be useable for decades after the initial enrollment.

A new report by biometric researchers at the National Institute of Standards and Technology (NIST) uses data from thousands of frequent travelers enrolled in an iris recognition program to determine that no consistent change occurs in the distinguishing texture of their irises for at least a decade. 

These findings inform identity program administrators on how often iris images need to be recaptured to maintain accuracy.

A NIST release reports that for decades, researchers seeking biometric identifiers other than fingerprints believed that irises were a strong biometric because their one-of-a-kind texture meets the stability and uniqueness requirements for biometrics. Recent research, however, has questioned that belief. A study by S. Fenker and K. W. Bowyer of 217 subjects over a 3-year period found that the recognition of the subjects’ irises became increasingly difficult, consistent with an aging effect.

To learn more, NIST biometric researchers used several methods to evaluate iris stability.

Researchers first examined anonymous data from millions of transactions from NEXUS, a joint Canadian and American program used by frequent travelers to move quickly across the Canadian border. As part of NEXUS, members’ irises are enrolled into the system with an iris camera and their irises are scanned and matched to system files when they travel across the border. NIST researchers also examined a larger, but less well-controlled set of anonymous statistics collected over a six-year period.

In both large-population studies, NIST researchers found no evidence of a widespread aging effect, said Biometric Testing Project Leader Patrick Grother. A NIST computer model estimates that iris recognition of average people will typically be useable for decades after the initial enrollment.

In our iris aging study we used a mixed effects regression model, for its ability to capture population-wide aging and individual-specific aging, and to estimate the aging rate over decades,” said Grother. “We hope these methods will be applicable to other biometric aging studies such as face aging because of their ability to represent variation across individuals who appear in a biometric system irregularly.”

NIST researchers then reanalyzed the images from the earlier studies of 217 subjects that evaluated the population-wide aspect. Those studies reported an increase in false rejection rates over time — that is, the original, enrolled images taken in the first year of the study did not match those taken later. While the rejection numbers were high, the results did not necessarily demonstrate that the iris texture itself was changing.

A study by M. Fairhurst and M. Erbilek identified pupil dilation as the primary cause behind the false rejection rates. This prompted the NIST team to consider the issue. NIST researchers showed that dilation in the original pool of subjects increased in the second year of the test and decreased the next, but was not able to determine why. When they accounted for the dilation effect, researchers did not observe a change in the texture or aging effect. Some iris cameras normalize dilation by using shielding or by varying the illumination.

The release notes that NIST established the Iris Exchange (IREX) program in 2008 to give quantitative support to iris recognition standardization, development and deployment. Sponsors for this research include the Criminal Justice Information Systems Division of the Federal Bureau of Investigation, the Office of Biometric Identity Management in the Department of Homeland Security (DHS), and the DHS Science and Technology Directorate.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913900

America's private prison companies have expanded across the globe


International Growth Trends In Prison Privatization report:

As the growth of the U.S. prison population has stalled, American private prison companies have expanded their reach across the globe, operating prisons and detention centers in at least 11 countries, according to a new report by The Sentencing Project, a non-profit advocacy group.

The United States continues to house the highest total number of inmates in private prisons, but other — primarily English-speaking — nations use private prisons for a greater percentage of their inmates.

Nearly one in five Australian inmates are housed in private prisons, according to the report. In Scotland, private prisons account for 17 percent of inmates and in England and Wales, 14 percent, according to The Sentencing Project.

“As in the United States, immigrant detention has been a particular target of privatization in the United Kingdom, which has 73 percent of its immigrant detainees held privately,” the study notes.

“And Australia, which has a wholly private immigrant detention system.”

The study highlights The Geo Group, America’s second largest private prison company, for its international growth. About 14 percent of The Geo Group’s revenue in 2012 came from international services.
http://sentencingproject.org/doc/publications/inc_International%20Growth%20Trends%20in%20Prison%20Privatization.pdf

A group of black people were kicked out of a restaurant because a white cusomer felt threatened


A group of customers at a Wild Wing restaurant in Charleston, SC were forced to wait two hours for their table and then were ultimately denied service on the basis of their race. According to Charleston’s WNEW Channel 5, the group of 25 African-Americans were asked to leave because a white customer felt “threatened.”

Michael Brown and a group composed of family and friends were gathered in July at the North Charleston Wild Wing Café to say farewell to a cousin who was moving away. The party waited for two hours for a table only to be told by a manager that there was “a situation.”

“She said there’s a situation where one of our customers feels threatened by your party, so she asked us not to seat you in our section, which totally alarmed all of us because we’re sitting there peaceably for two hours,” Brown told Channel 5. “Obviously, if we were causing any conflict, we would have been ejected out of the place hours before.”

A member of the party began to film the discussion between Brown and the restaurant manager with a camera phone.

“I asked her I want to be clear with you,” Brown recounted. “I said so you’re telling me I have to leave. She said I have a right to deny you service. I said so you’re asking me to leave because you’re upset because he was recording you, after we’ve waited for two hours, and after you’ve already pretty much discriminated on us, and she answered yes.”

Brown took the issue to Facebook on Friday after several unsuccessful calls to the company’s corporate office.

Facebook excerpt:

I will never go to Wild wings cafe in N. Chs again! We (Party of 25 family and friends) waited 2hrs, patiently and were refused service because another customer (White) felt threatened by us. This type of racial discrimination is unacceptable and we have to put a STOP TO IT. The manager looked me dead in the face and said she was refusing us service because she had a right to and simply she felt like it. DO NOT SUPPORT THIS ESTABLISHMENT… PLEASE SHARE THIS POST… We need your help.
http://www.rawstory.com/rs/2013/08/24/south-carolina-restaurant-ejected-african-american-customers-when-white-person-felt-threatened/?goback=.gde_62979_member_268925712#!

Six examples of police targeting those who record them and how police can switch off your iPhone camera


Many cameras, little privacy:

“The Fourth Amendment protects individuals from ‘unreasonable searches and seizures,’ but no court has yet found law enforcement use of video cameras to surveil activity on public property to be an unreasonable search,” the Constitution Project report said.
http://www.washingtonpost.com/world/national-security/many-cameras-little-privacy/2013/08/12/37462de8-01d1-11e3-9711-3708310f6f4d_story.html

Police Now Can Switch off iPhone Camera and Wi-Fi:

Apple has recently patented a piece of technology that would allow the authorities and police to block data transmission, including video and photos, whenever they like. All they need to do is decide that a public gathering or venue is deemed “sensitive” and needs to be protected from externalities. In this case Apple will enable them to switch off all its gear. The developers insist that the affected locations are normally cinemas, theaters and concert grounds, but Apple admits it could also be used in covert police or government operations that may need complete “blackout” conditions.

In the meantime, privacy outfits point out that it could also be used to prevent such whistle blowers as Edward Snowden from shooting pictures and sharing them online. In response, Apple claimed that the wireless transmission of sensitive data to a remote source is a threat to security, with the sensitive data being anything from classified government data to answers to an exam administered in an academic setting.

Anyway, the fact is that Apple has patented the means to transmit an encoded signal to all wireless gadgets, commanding them to disable recording functions. The developers reveal that the policies would be activated by GPS, and Wi-Fi or mobile base-stations that would ring-fence around a building or a sensitive area in order to prevent mobile cameras from taking pictures or recording video.

http://www.veteranstoday.com/2013/08/19/police-now-can-switch-off-iphone-camera-and-wi-fi/
 
(VIDEO) Wisconsin Capitol police tackle man for photographing progressive protest: 

The arrests in the video above, of Christopher J. Terrell, 25, and his brother Damon Terrell, 22, were especially violent and according to reports may lead to felony charges for Damon.

The felony charge being recommended to prosecutors is the most severe since the Wisconsin labor protests began in February 2011, and since police stepped up arrests during the noon protests one month ago.
 
As noise of rain writes at Daily Kos:

"They've arrested priests, firemen, old ladies, old men, children, and countless citizens who feel that we shouldn't need to get permission to protest our elected government. The whole thing is beyond embarrassing for the state, and for the United States. Every time they take it up a notch, a score or more singers appear the next day. Is it fair to ask why the police have been unusually brutal (compared with a lot of aggressive arresting in the last month!) with two young black men? Is it because Damon "disrespected" an officer by questioning authority? Is it because they were singing? Is it because the cops have absolutely no idea how to handle the situation, and are looking to try to escalate the peaceful singers to violent response, so they can demonize them?"
http://www.rawstory.com/rs/2013/08/26/watch-wisconsin-capitol-police-tackle-man-for-photographing-progressive-protest/
http://occupyamerica.crooksandliars.com/diane-sweet/felony-charge-recommended-wisconsin-pr#sthash.EyRp8yDL.dpbs 
 
Officer is indicted on charges of lying about photographer’s arrest:
http://www.nytimes.com/2013/08/27/nyregion/officer-is-indicted-on-charges-of-lying-about-photographers-arrest.html?_r=2&  
http://www.huffingtonpost.com/2013/08/27/robert-stolarik-police-officer-indicted_n_3822915.html 

In California, a champion for police cameras:
http://www.nytimes.com/2013/08/22/us/in-california-a-champion-for-police-cameras.html?hp&_r=2&

Police threaten to arrest volunteers feeding homeless without permit:
http://www.breitbart.com/InstaBlog/2013/08/26/Police-Threaten-to-Arrest-Volunteers-Feeding-Homeless-Without-Permit