The Reporters Committee for Freedom of the Press and The Associated Press filed a lawsuit against the FBI and DOJ under the Freedom of Information Act seeking records related to the FBI's practice of impersonating journalists and news organizations. Specifically, the plaintiffs sought documents about an instance in 2007 where the FBI posed as an AP reporter in order to deliver surveillance software to a criminal suspect. While the FBI acknowledged this incident, it has since refused to provide information requested by the plaintiffs through FOIA regarding the full scope and guidelines around its practice of impersonating the media. The lawsuit aims to compel the defendants to release the requested records in accordance with FOIA.
National Post reporter Adrian Humphreys uncovered the complex story of Matt DeHart, an American hacker with Anonymous who sought asylum in Canada after claiming torture by US authorities. Humphreys spent eight months investigating leads from intelligence agencies, Anonymous, and interviews with DeHart to piece together events. His resulting series for the National Post was the longest they had ever published. Though DeHart pled guilty to child pornography charges, Humphreys believes there are legitimate questions around how the case was handled by investigators. In retelling such a complicated story involving spies, hackers and government agencies, Humphreys took extensive precautions to communicate privately and verify information.
Nsa responds snowden media contacts with usgAnonDownload
The document is an email exchange between John Young and Cindy B from the NSA regarding Mr. Young's FOIA request. Cindy informs Mr. Young that his request is too broad and burdensome in its current form. She asks him to narrow the scope by specifying a particular media outlet, journalist, timeframe, and topic of correspondence to make the search more reasonable. Alternatively, she suggests piggybacking on a similar pending request that is being processed for other media outlets between June 2013-August 2014 regarding NSA surveillance programs. Cindy places the request on hold until Mr. Young can further clarify or narrow the scope within 30 days.
Targeted Surveillance: Big Brother Takes to the SkyTeresa Long
The document discusses concerns around the increasing use of drones for surveillance purposes by law enforcement and government agencies. It argues that drones threaten privacy and constitutional rights like the 4th amendment protection against unreasonable searches. Drones are proliferating rapidly, with thousands already in use by the military and many more expected over the next few decades. As drone use expands, laws have not kept pace and require updates to prevent potential privacy violations and govern how data collected by drones can be used. The document raises questions over who is accountable for drone data and whether it is ethical to allow machines to decide when to use lethal force.
The memorandum provides the following key points:
1) The Carter Page FISA warrant and renewals relied heavily on the Steele dossier, which was funded by the DNC and Clinton campaign. The source's political connections were not disclosed to the FISA court.
2) The FISA application cited a Yahoo News article that was based on leaks from Steele himself, incorrectly assessing that Steele did not directly provide the information.
3) Steele had numerous undisclosed contacts with the media in violation of FBI rules and demonstrated unreliability, yet continued to be cited in warrant applications.
4) Bruce Ohr maintained contact with Steele after he was terminated as a source, and Ohr's wife worked for Fusion
Juan J Malfavon pursuing criminal justice outlinejuansclass
This document outlines Juan Malfavon's pursuit of knowledge in the criminal justice system, specifically policing. It discusses the investigation process, detention of criminals, and formal arrest procedures as key practices in policing. It also examines challenges like developing multicultural training programs and establishing nationwide law enforcement standards. The document advocates for information sharing between agencies and argues that legal changes like the Patriot Act are necessary responses to increasing terrorism.
The document summarizes key findings from a Senate Intelligence Committee report on the CIA's use of torture. It finds that the CIA's enhanced interrogation techniques did not provide useful intelligence and that the CIA misled Congress and the White House about the program. The report also notes that the four main detainees interrogated were from Middle Eastern countries allied with the US and that the torture damaged US relations and standing internationally.
Em uma carta aberta divulgada hoje, mais de 40 grupos de liberdade de imprensa e liberdades civis condenaram as acusações de crime cibernético contra o jornalista vencedor do Prêmio Pulitzer Glenn Greenwald. As entidades internacionais exigem que as autoridades brasileiras retirem as acusações imediatamente.
This document provides an overview of libel law in the United States. It discusses the key elements of a libel claim, including that the statement must be false, defamatory, published to a third party, and identify the plaintiff. It also outlines the different standards of proof for public officials/figures versus private individuals. The document concludes by describing several defenses that can be raised in a libel suit, such as truth, fair report, and neutral reportage privileges.
National Post reporter Adrian Humphreys uncovered the complex story of Matt DeHart, an American hacker with Anonymous who sought asylum in Canada after claiming torture by US authorities. Humphreys spent eight months investigating leads from intelligence agencies, Anonymous, and interviews with DeHart to piece together events. His resulting series for the National Post was the longest they had ever published. Though DeHart pled guilty to child pornography charges, Humphreys believes there are legitimate questions around how the case was handled by investigators. In retelling such a complicated story involving spies, hackers and government agencies, Humphreys took extensive precautions to communicate privately and verify information.
Nsa responds snowden media contacts with usgAnonDownload
The document is an email exchange between John Young and Cindy B from the NSA regarding Mr. Young's FOIA request. Cindy informs Mr. Young that his request is too broad and burdensome in its current form. She asks him to narrow the scope by specifying a particular media outlet, journalist, timeframe, and topic of correspondence to make the search more reasonable. Alternatively, she suggests piggybacking on a similar pending request that is being processed for other media outlets between June 2013-August 2014 regarding NSA surveillance programs. Cindy places the request on hold until Mr. Young can further clarify or narrow the scope within 30 days.
Targeted Surveillance: Big Brother Takes to the SkyTeresa Long
The document discusses concerns around the increasing use of drones for surveillance purposes by law enforcement and government agencies. It argues that drones threaten privacy and constitutional rights like the 4th amendment protection against unreasonable searches. Drones are proliferating rapidly, with thousands already in use by the military and many more expected over the next few decades. As drone use expands, laws have not kept pace and require updates to prevent potential privacy violations and govern how data collected by drones can be used. The document raises questions over who is accountable for drone data and whether it is ethical to allow machines to decide when to use lethal force.
The memorandum provides the following key points:
1) The Carter Page FISA warrant and renewals relied heavily on the Steele dossier, which was funded by the DNC and Clinton campaign. The source's political connections were not disclosed to the FISA court.
2) The FISA application cited a Yahoo News article that was based on leaks from Steele himself, incorrectly assessing that Steele did not directly provide the information.
3) Steele had numerous undisclosed contacts with the media in violation of FBI rules and demonstrated unreliability, yet continued to be cited in warrant applications.
4) Bruce Ohr maintained contact with Steele after he was terminated as a source, and Ohr's wife worked for Fusion
Juan J Malfavon pursuing criminal justice outlinejuansclass
This document outlines Juan Malfavon's pursuit of knowledge in the criminal justice system, specifically policing. It discusses the investigation process, detention of criminals, and formal arrest procedures as key practices in policing. It also examines challenges like developing multicultural training programs and establishing nationwide law enforcement standards. The document advocates for information sharing between agencies and argues that legal changes like the Patriot Act are necessary responses to increasing terrorism.
The document summarizes key findings from a Senate Intelligence Committee report on the CIA's use of torture. It finds that the CIA's enhanced interrogation techniques did not provide useful intelligence and that the CIA misled Congress and the White House about the program. The report also notes that the four main detainees interrogated were from Middle Eastern countries allied with the US and that the torture damaged US relations and standing internationally.
Em uma carta aberta divulgada hoje, mais de 40 grupos de liberdade de imprensa e liberdades civis condenaram as acusações de crime cibernético contra o jornalista vencedor do Prêmio Pulitzer Glenn Greenwald. As entidades internacionais exigem que as autoridades brasileiras retirem as acusações imediatamente.
This document provides an overview of libel law in the United States. It discusses the key elements of a libel claim, including that the statement must be false, defamatory, published to a third party, and identify the plaintiff. It also outlines the different standards of proof for public officials/figures versus private individuals. The document concludes by describing several defenses that can be raised in a libel suit, such as truth, fair report, and neutral reportage privileges.
17 USC § 107 Limitations on Exclusive Rights – FAIR USE
EXPOSING THE USA'S "DOUBLE-STANDARDS" GOVERNMENT and FRAUDULENT JUDICIAL SYSTEM!
HOW Is It WRONG For The NAZI’s and/or WHITE SUPREMACIST LEADER/UNITED STATES OF AMERICA PRESIDENT DONALD TRUMP To SUSPEND The Press Pass Of A JEWISH/ZIONIST Network’s (Cable News Network [CNN]) REPORTER (Abilio James Acosta) In Efforts Of OBSTRUCTING “NEWS REPORTING” and It NOT Be WRONG To SUSPEND The Accounts Of The UTICA INTERNATIONAL EMBASSY’S Interim Prime Minister For REPORTING THE NEWS/TRUTH?
Nsa responds 2 snowden media run-bys with usgAnonDownload
This email exchange between John Young and Cindy B from the NSA FOIA office discusses clarifying the scope of a FOIA request about communications between NSA officials and journalists regarding Edward Snowden's leaks. Cindy B states the original request was too broad and asks Young to narrow it by specifying a media outlet, journalist, topic, and reasonable timeframe. Young provides additional details about specific journalists, publications, and dates. Cindy B agrees to check if the clarified scope is still too burdensome and will get back to Young.
This document summarizes the increasing militarization of local police forces in the United States. It notes that police are receiving military equipment like armored vehicles, assault rifles, and drones through federal programs. Their training also focuses more on military tactics like "no-knock" raids. This has contributed to over 5,000 Americans being killed by police since 9/11, more than the number of US casualties in the Iraq war. The document argues this turns police into a "standing army" that threatens civil liberties, as seen in incidents of police violence against non-violent citizens.
The document discusses several topics related to the future of homeland security including:
1) Janet Napolitano encouraging citizens to report suspicious activities through a new Spanish language public service campaign.
2) Alec Baldwin blaming post-9/11 security measures for an incident where he was kicked off a flight for being disruptive.
3) Two politicians calling for passenger advocates at airports after complaints from elderly women about intrusive security screenings.
Local media coverage is playing a large role in the 2004 presidential election between President Bush and Senator Kerry, as the battleground states that could determine the winner may be decided by just a few counties or states. Local newspapers and TV stations in these swing areas are providing extensive coverage of the candidates' visits and messages that is more in-depth than national media. Both campaigns recognize the importance of securing favorable coverage from local media outlets in order to sway voters.
The lawyer summarizes his interview defending former Egyptian President Hosni Mubarak and his family on trial. He explains that Mubarak is in poor health and simply asks "what is the next step?" while his family struggles financially. The lawyer asserts that the sons' frozen foreign assets were legitimately obtained and that the prosecutor has exaggerated evidence against the defendants. He criticizes Egypt's media for spreading misinformation about the trial and says witness testimony has been inconsistent, with some pressured by the prosecutor. The lengthy trial involving over 1,600 witnesses is still ongoing amid various controversies.
U.S. vs. Terry L. Loewen Criminal Complaint ReportDylan Hock
- Terry Loewen is charged with 3 counts related to attempting to use a weapon of mass destruction and provide material support to al Qaeda in the Arabian Peninsula.
- Loewen engaged in online conversations with an FBI employee where he expressed a desire to engage in violent jihad on behalf of al Qaeda and a belief that "radical fundamentalists" are closer to Allah than moderates.
- Loewen discussed his research on topics like jihad, martyrdom operations, and Sharia law. He mentioned supporting imprisoned "brothers" and wanting to help active jihadists. Loewen also discussed possibly conducting a terrorist attack at the airport where he works.
This document analyzes gun-related crime data using big data tools like Apache Hive and Pig. It summarizes the deadliest US mass shootings from 2016 to 2015. It then outlines the tools, data specifications, and workflow used to analyze gun sales rates, gun ownership rates, and crime rates over 2014-2015. Visualizations created in Excel, Tableau and 3D maps show trends in gun crimes in different areas for those years. In conclusion, it finds higher gun crime in central LA, guns comprising 28% of total crimes in 2015, and areas with higher income reporting less gun crimes in New York. Suggestions include using financial stability to predict gun crime likelihood.
The document discusses the causes and impacts of wrongful convictions. It examines eyewitness misidentification, false confessions due to interrogation pressures, and prosecutorial misconduct as leading causes. It presents the case of Kirk Bloodsworth, the first death row exoneree based on DNA evidence, who served 9 years in prison for a crime he did not commit. On average, exonerees spend 14 years in prison and are 26 years old at the time of their wrongful conviction. There have been 330 post-conviction DNA exonerations in the US.
This is the affidavit of FBI agent, Kevin Helson, to the effect that there was probable cause to charge Mari(i)a Butina with failing to register as an agent acting on behalf of a foreign power within the United States.
Court dockets are typically public records that allow the public and press to be aware of cases and follow their progress through the legal system. However, some courts are keeping cases secret by omitting them from public dockets. These "secret dockets" threaten transparency and First Amendment rights. Recent examples involve terrorism cases, but secrecy is also used in other types of cases like divorces. Secret proceedings bypass public scrutiny and oversight of the judicial system.
Here are my thoughts on the USA Patriot Act:
- I believe national security is important, but government surveillance powers must be balanced with civil liberties protections. Some provisions of the Patriot Act gave security agencies broad authority with little oversight.
- If certain provisions were affecting my personal privacy or constitutional rights, I would want to see if legal challenges could limit the scope of those authorities or add more transparency and accountability.
- In the future, I think Congress should have an open debate on any extensions and consider input from experts on both sides. Narrowly tailored reforms may be needed to uphold security while also protecting civil liberties. A wholesale renewal or expansion without review may go too far.
Overall it's a complex issue
The document summarizes active shooter incidents that occurred in the United States in 2016 and 2017 according to FBI data. It finds that there were 50 incidents over those two years resulting in 943 casualties including 221 deaths. Many incidents occurred in areas of commerce like businesses and malls. Law enforcement exchanged gunfire with shooters in 14 incidents, resulting in 13 officer deaths and 20 injuries. Citizens confronted shooters in 10 incidents and successfully ended 8 shootings. The shooters were all male and ranged in age from 14 to 66.
This document provides testimony from Brian Levin, Director of the Center for the Study of Hate and Extremism, before the House Committee on Homeland Security regarding countering violent extremism in prisons. Levin discusses the current terrorist threats from violent Salafist jihadists and far-right extremists. He notes that while Salafist jihadists have carried out more severe attacks, far-right extremists have killed more people in the US since 9/11. Levin also addresses the risks of extremism in prisons, noting that far-right extremist groups currently pose a greater threat within prisons than Salafist jihadists. He concludes by discussing considerations for countering violent extremism programs in prisons
The document discusses the history and techniques of investigative journalism. It provides definitions for different types of investigative reporting such as original investigative reporting and reporting on investigations. It also discusses challenges that can arise in investigative reporting like relying too heavily on investigatory sources or becoming activists rather than independent observers. A key part of the document is a case study about the New York Times' coverage of Wen Ho Lee and the accusation that he stole nuclear secrets for China. It reflects on aspects of the coverage that could have been improved by considering alternative explanations and perspectives earlier.
Federal documents detailing the attacks at the U.S. Capitol show a mix of FBI techniques, from license plate readers to facial recognition, that helped identify rioters. Digital rights activists say the invasive technology can infringe on our privacy.
Analysis of sources and effect of fake news on society Arpit Khurana
This report reviews the relevant literature to provide a definition of fake news, its potential impact and recent responses to this phenomenon. Finally, the report provides a summary of the research and important findings concerning fake news in the conclusion.
Nsa responds snowden media contacts with usgAnonDownload
The document is an email exchange between John Young and Cindy B from the NSA regarding Mr. Young's FOIA request. Cindy informs Mr. Young that his request is too broad and burdensome in its current form. She asks him to narrow the scope by specifying a particular media outlet, journalist, timeframe, and topic of correspondence to make the search more reasonable. Alternatively, she suggests piggybacking on a similar pending request that is being processed for other media outlets between June 2013-August 2014 regarding NSA surveillance programs. Cindy places the request on hold until Mr. Young can further clarify or narrow the scope within 30 days.
17 USC § 107 Limitations on Exclusive Rights – FAIR USE
EXPOSING THE USA'S "DOUBLE-STANDARDS" GOVERNMENT and FRAUDULENT JUDICIAL SYSTEM!
HOW Is It WRONG For The NAZI’s and/or WHITE SUPREMACIST LEADER/UNITED STATES OF AMERICA PRESIDENT DONALD TRUMP To SUSPEND The Press Pass Of A JEWISH/ZIONIST Network’s (Cable News Network [CNN]) REPORTER (Abilio James Acosta) In Efforts Of OBSTRUCTING “NEWS REPORTING” and It NOT Be WRONG To SUSPEND The Accounts Of The UTICA INTERNATIONAL EMBASSY’S Interim Prime Minister For REPORTING THE NEWS/TRUTH?
Nsa responds 2 snowden media run-bys with usgAnonDownload
This email exchange between John Young and Cindy B from the NSA FOIA office discusses clarifying the scope of a FOIA request about communications between NSA officials and journalists regarding Edward Snowden's leaks. Cindy B states the original request was too broad and asks Young to narrow it by specifying a media outlet, journalist, topic, and reasonable timeframe. Young provides additional details about specific journalists, publications, and dates. Cindy B agrees to check if the clarified scope is still too burdensome and will get back to Young.
This document summarizes the increasing militarization of local police forces in the United States. It notes that police are receiving military equipment like armored vehicles, assault rifles, and drones through federal programs. Their training also focuses more on military tactics like "no-knock" raids. This has contributed to over 5,000 Americans being killed by police since 9/11, more than the number of US casualties in the Iraq war. The document argues this turns police into a "standing army" that threatens civil liberties, as seen in incidents of police violence against non-violent citizens.
The document discusses several topics related to the future of homeland security including:
1) Janet Napolitano encouraging citizens to report suspicious activities through a new Spanish language public service campaign.
2) Alec Baldwin blaming post-9/11 security measures for an incident where he was kicked off a flight for being disruptive.
3) Two politicians calling for passenger advocates at airports after complaints from elderly women about intrusive security screenings.
Local media coverage is playing a large role in the 2004 presidential election between President Bush and Senator Kerry, as the battleground states that could determine the winner may be decided by just a few counties or states. Local newspapers and TV stations in these swing areas are providing extensive coverage of the candidates' visits and messages that is more in-depth than national media. Both campaigns recognize the importance of securing favorable coverage from local media outlets in order to sway voters.
The lawyer summarizes his interview defending former Egyptian President Hosni Mubarak and his family on trial. He explains that Mubarak is in poor health and simply asks "what is the next step?" while his family struggles financially. The lawyer asserts that the sons' frozen foreign assets were legitimately obtained and that the prosecutor has exaggerated evidence against the defendants. He criticizes Egypt's media for spreading misinformation about the trial and says witness testimony has been inconsistent, with some pressured by the prosecutor. The lengthy trial involving over 1,600 witnesses is still ongoing amid various controversies.
U.S. vs. Terry L. Loewen Criminal Complaint ReportDylan Hock
- Terry Loewen is charged with 3 counts related to attempting to use a weapon of mass destruction and provide material support to al Qaeda in the Arabian Peninsula.
- Loewen engaged in online conversations with an FBI employee where he expressed a desire to engage in violent jihad on behalf of al Qaeda and a belief that "radical fundamentalists" are closer to Allah than moderates.
- Loewen discussed his research on topics like jihad, martyrdom operations, and Sharia law. He mentioned supporting imprisoned "brothers" and wanting to help active jihadists. Loewen also discussed possibly conducting a terrorist attack at the airport where he works.
This document analyzes gun-related crime data using big data tools like Apache Hive and Pig. It summarizes the deadliest US mass shootings from 2016 to 2015. It then outlines the tools, data specifications, and workflow used to analyze gun sales rates, gun ownership rates, and crime rates over 2014-2015. Visualizations created in Excel, Tableau and 3D maps show trends in gun crimes in different areas for those years. In conclusion, it finds higher gun crime in central LA, guns comprising 28% of total crimes in 2015, and areas with higher income reporting less gun crimes in New York. Suggestions include using financial stability to predict gun crime likelihood.
The document discusses the causes and impacts of wrongful convictions. It examines eyewitness misidentification, false confessions due to interrogation pressures, and prosecutorial misconduct as leading causes. It presents the case of Kirk Bloodsworth, the first death row exoneree based on DNA evidence, who served 9 years in prison for a crime he did not commit. On average, exonerees spend 14 years in prison and are 26 years old at the time of their wrongful conviction. There have been 330 post-conviction DNA exonerations in the US.
This is the affidavit of FBI agent, Kevin Helson, to the effect that there was probable cause to charge Mari(i)a Butina with failing to register as an agent acting on behalf of a foreign power within the United States.
Court dockets are typically public records that allow the public and press to be aware of cases and follow their progress through the legal system. However, some courts are keeping cases secret by omitting them from public dockets. These "secret dockets" threaten transparency and First Amendment rights. Recent examples involve terrorism cases, but secrecy is also used in other types of cases like divorces. Secret proceedings bypass public scrutiny and oversight of the judicial system.
Here are my thoughts on the USA Patriot Act:
- I believe national security is important, but government surveillance powers must be balanced with civil liberties protections. Some provisions of the Patriot Act gave security agencies broad authority with little oversight.
- If certain provisions were affecting my personal privacy or constitutional rights, I would want to see if legal challenges could limit the scope of those authorities or add more transparency and accountability.
- In the future, I think Congress should have an open debate on any extensions and consider input from experts on both sides. Narrowly tailored reforms may be needed to uphold security while also protecting civil liberties. A wholesale renewal or expansion without review may go too far.
Overall it's a complex issue
The document summarizes active shooter incidents that occurred in the United States in 2016 and 2017 according to FBI data. It finds that there were 50 incidents over those two years resulting in 943 casualties including 221 deaths. Many incidents occurred in areas of commerce like businesses and malls. Law enforcement exchanged gunfire with shooters in 14 incidents, resulting in 13 officer deaths and 20 injuries. Citizens confronted shooters in 10 incidents and successfully ended 8 shootings. The shooters were all male and ranged in age from 14 to 66.
This document provides testimony from Brian Levin, Director of the Center for the Study of Hate and Extremism, before the House Committee on Homeland Security regarding countering violent extremism in prisons. Levin discusses the current terrorist threats from violent Salafist jihadists and far-right extremists. He notes that while Salafist jihadists have carried out more severe attacks, far-right extremists have killed more people in the US since 9/11. Levin also addresses the risks of extremism in prisons, noting that far-right extremist groups currently pose a greater threat within prisons than Salafist jihadists. He concludes by discussing considerations for countering violent extremism programs in prisons
The document discusses the history and techniques of investigative journalism. It provides definitions for different types of investigative reporting such as original investigative reporting and reporting on investigations. It also discusses challenges that can arise in investigative reporting like relying too heavily on investigatory sources or becoming activists rather than independent observers. A key part of the document is a case study about the New York Times' coverage of Wen Ho Lee and the accusation that he stole nuclear secrets for China. It reflects on aspects of the coverage that could have been improved by considering alternative explanations and perspectives earlier.
Federal documents detailing the attacks at the U.S. Capitol show a mix of FBI techniques, from license plate readers to facial recognition, that helped identify rioters. Digital rights activists say the invasive technology can infringe on our privacy.
Analysis of sources and effect of fake news on society Arpit Khurana
This report reviews the relevant literature to provide a definition of fake news, its potential impact and recent responses to this phenomenon. Finally, the report provides a summary of the research and important findings concerning fake news in the conclusion.
Nsa responds snowden media contacts with usgAnonDownload
The document is an email exchange between John Young and Cindy B from the NSA regarding Mr. Young's FOIA request. Cindy informs Mr. Young that his request is too broad and burdensome in its current form. She asks him to narrow the scope by specifying a particular media outlet, journalist, timeframe, and topic of correspondence to make the search more reasonable. Alternatively, she suggests piggybacking on a similar pending request that is being processed for other media outlets between June 2013-August 2014 regarding NSA surveillance programs. Cindy places the request on hold until Mr. Young can further clarify or narrow the scope within 30 days.
Nsa responds snowden media run-bys with usgAnonDownload
The document is an email exchange between John Young and Cindy B from the NSA regarding Mr. Young's FOIA request. Cindy informs Mr. Young that his request is too broad and burdensome in its current form. She asks him to narrow the scope by specifying a particular media outlet, journalist, timeframe, and topic of correspondence. Alternatively, she suggests piggybacking on an existing similar FOIA request that is already being processed. Mr. Young's response clarifies the intent and scope of his request.
1Town Hall BriefRacial ProfilingIntroduc.docxlorainedeserre
The document discusses racial profiling by law enforcement and proposes a policy to address it. It identifies racial profiling as a harm that undermines justice and trust in communities. The plan mandates passing the End Racial Profiling Act to ban profiling and implementing training to address bias. Implementing this policy would eliminate profiling, making law enforcement more efficient and restoring trust between police and minority groups.
1Town Hall BriefRacial ProfilingIntroduc.docxjesusamckone
1
Town Hall Brief
Racial Profiling
Introduction: Racial profiling reflects bias actions reinforced by law enforcement based on race, religion, and nationality/ethnicity which has led to violence and unjust accusations amongst minority groups. This has become a controversial issue in our nation, as stated in an article published by The Huffington Post website, in 2011, which displays a chart showing that the NYPD uses force against Blacks and Latinos 6.7% more than whites. It is evident that the police work force exemplifies inefficiency through racial profiling which calls for change and improvement in the training process. By thoroughly conducting proper training for law enforcement, with an emphasis on racial profiling, police officers and authority will reform effectively.
Inherency: The inherency is attitudinal and structural. In order to supply change there must be awareness to promote the issue and new laws to improve the justice system. As reported by the Tolerance website accessed on March 26, 2015, “Community members must be empowered with awareness and steps they can take to address profiling or other abuses of police authority when they occur” which emphasizes that citizens should grasp knowledge of racial profiling in order to prevent being targeted. According to an article published by the We Are One America website accessed on March 26, 2015, “Congress should introduce and pass the "End Racial Profiling Act" which would ban racial profiling at the federal, state and local level” this explains that minority groups will continue to be abused without change of policy.
Harms
Claim 1: Law enforcement authorities result in extreme force when practicing racial profiling.
Ground 1A: The Washington Post website, on December 15, 2014, reported “In Garner’s case, for example, police targeted him for the petty crime of selling loose cigarettes — the types of crimes black people are targeted for at higher rates — and then attempted to arrest him with a chokehold, banned by the department [of New York City]. Whatever else we have learned from the recent tragedies of police violence, it is clear that we need comprehensive federal, state and local policies that outlaw racial profiling and rein in police excessive force.”
Ground 1B: The Huffington Post website, on December 9, 2014, stated “If we have learned anything from the recent tragic deaths of Garner and Brown, as well as the experiences of numerous other African American victims of police violence going back decades -- from Rodney King to Abner Louima to Amadou Diallo and Tamir Rice -- it is that excessive force and racial profiling are two destructive modes of police misconduct that require concerted, vigilant action to reduce and eliminate.”
Warrant: It is clear that patterns of excessive force have been displayed through exercising racial profiling. These unlawful functions ultimately flaw the justice system by targeting citizens based on race and using actions that are ba.
This document is a thesis submitted to American Public University examining the justification for the NSA's domestic bulk data collection and surveillance program. It provides background on the NSA's origins and mission, as well as the laws governing domestic surveillance. It discusses the controversy around the NSA's activities following the Snowden leaks, debating whether the national security benefits outweigh civil liberty costs. The thesis conducts a qualitative analysis of sources on both sides and aims to determine if the current legal framework requires reform while still protecting national security within the Constitution.
Final presentation rev 1 - USA Patriot Actgbsmith5
The USA PATRIOT Act was passed 45 days after 9/11 to enhance domestic security and increase surveillance powers. It impacted laws around intelligence gathering, immigration, and more. While proponents argued it granted needed powers to fight terrorism, critics said it infringed on civil liberties. There have been ongoing legal challenges around its scope and application. As time has passed, there are calls to reevaluate the act and ensure powers are not abused.
This class action lawsuit alleges that the NSA program that collects phone records of millions of Americans violates constitutional rights to privacy, free speech, and due process. The suit names President Obama, Attorney General Holder, Verizon, and others as defendants. It claims the secret NSA program ordered by a FISA court to obtain daily call records from Verizon of its customers is illegal and seeks declaratory and injunctive relief to stop it.
This document discusses the debate around national security surveillance by intelligence agencies. It presents arguments on both sides of the issue.
The pro argument is that intelligence agencies like the CIA and NSA play a vital role in national security and have helped prevent terrorist attacks since 9/11 through surveillance techniques. However, the con argument is that this surveillance infringes on Americans' right to privacy and civil liberties. Many feel their privacy is violated, and there is public mistrust of intelligence agencies due to past mistakes and covert actions. Additionally, some of this surveillance may violate the Foreign Intelligence Surveillance Act.
Laws Governing Access to Search & Arrest Warrants and Wiretap TranscriptsUmesh Heendeniya
1) The document discusses the case of Annie Le, a 24-year-old Yale graduate student who disappeared from campus in 2009. Her disappearance and the subsequent investigation and arrest of Raymond Clark sparked intense media interest.
2) Courts have differed on whether the public has a right to access search warrant materials. Some courts have found a First Amendment right of access while others have found only a common law right of access. There is also debate around when in an investigation warrant materials must be released.
3) Like search warrants, arrest warrants often have supporting affidavits that can provide useful information but courts have been less active in determining public access to these documents. Some states have rules governing whether and when arrest warrant affidavits can
The document discusses issues with the U.S. press system and how it failed in its coverage of the Iraq War. Specifically, news organizations often depend on government and business interests which can shape their reporting to favor official viewpoints. As a result, independent voices challenging government claims may not receive adequate coverage. This indexing of voices in the news to levels of conflict in government limits diverse perspectives, as seen in the largely uncritical reporting of claims for going to war in Iraq. The document suggests citizens can work to develop better information sources, participate in citizen journalism, and support media reform organizations.
Obama administration defends massive phone record collectiontrupassion
The Obama administration on Thursday defended its collection of the telephone records of millions of Americans as part of U.S. counter terrorism efforts, re-igniting a fierce debate over privacy even as it called the program critical to warding off an attack.
The admission came after Britain's Guardian newspaper published on Wednesday a secret court order authorizing the collection of phone records generated by millions of Verizon Communications(VZ.N) customers.
Privacy advocates blasted the order as unconstitutional government surveillance and called for a review of the program amid renewed concerns about intelligence-gathering efforts launched after the September 11, 2001, attacks on the United States.
The History and Spread of American Fake News and What Organizations Can Learn...Shandi Greve Penrod
This document provides an overview of the prevalence of fake news. It discusses how fake news has existed throughout history but has increased with new communication technologies like the internet and social media. The open internet allows anyone to publish information, and social media algorithms can spread misinformation quickly within social bubbles. The document highlights how fake news spread on social media greatly during the 2016 US election, influenced by both foreign actors like Russian troll farms and domestic profiteers creating fake news for advertising revenue. The prevalence of fake news online and its ability to spread widely has serious consequences for public discourse and organizations.
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2Anatol Alizar
The document analyzes cryptographic attacks on the GEA-1 and GEA-2 algorithms used to encrypt GPRS data. It finds that GEA-1 has a weakness allowing recovery of the initial state in 240 time using only 65 bits of known keystream. This weakness is very unlikely to occur by chance, indicating an intentional design to limit security to 40 bits for export regulations. For GEA-2, the document presents an attack requiring 245.1 time and 1600 bytes of known keystream to recover the state.
This document provides lecture notes on analytic geometry. It begins with an introduction discussing the goals of building an algebraic geometry framework for analytic situations by replacing topological abelian groups with condensed abelian groups. Condensed sets are defined as sheaves on the pro-étale site of the point, and behave like generalized topological spaces. The notes establish that quasiseparated condensed sets correspond to ind-compact Hausdorff spaces. This provides the needed abelian category structure to build an analytic geometry in parallel to algebraic geometry over schemes.
This document summarizes the solution of a cryptosystem involving unrelated cipher alphabets. There are 25 different cipher alphabets available. The plain text is encrypted by substituting each plaintext letter with the corresponding letter from the cipher alphabets, which may be used in the same or different sequences and orders. Once the 25 cipher alphabets are reconstructed by analyzing encrypted texts, subsequent messages can be easily solved even if the alphabets are used in a different order.
Британская разведка не может нанять шпионовAnatol Alizar
The UK intelligence and security agencies assess the threat from international terrorism in the UK as severe, meaning an attack is highly likely. This threat is predominantly driven by Daesh, which seeks to maintain its narrative of success despite military losses, and retains some territory. Daesh continues to prioritize and incite external attacks against the West through extremist propaganda. Since March 2017 there have been three successful terror attacks and several disrupted plots in the UK, reflecting a shift in the nature and scale of extremist attack planning. While Al-Qaeda also remains a threat, Daesh's extremist narrative has emerged as the main driver of radicalization and terrorism in the UK.
Libratus is an AI developed by researchers at Carnegie Mellon University that achieved superhuman performance at no-limit Texas hold'em poker by defeating top human professionals in a 120,000-hand poker competition. It uses a three-part approach: 1) It computes an abstraction of the full game to develop a "blueprint" strategy for early rounds; 2) When later rounds are reached, it constructs finer-grained abstractions in real-time and solves them while ensuring strategies fit the overall blueprint; 3) It enhances the blueprint by adding missing branches and strategies based on opponents' actual moves. This game-theoretic approach uses application-independent techniques and marks the first time an AI has defeated humans at this
Waymo sued Uber, Otto, and Otto Trucking alleging trade secret misappropriation, patent infringement, and unfair competition. Waymo claims its former employee Anthony Levandowski downloaded over 14,000 confidential files from Waymo before leaving to set up a self-driving truck company that was later acquired by Uber. Waymo also claims one of its LiDAR component vendors was inadvertently sent machine drawings of an Uber LiDAR circuit board that bore a striking resemblance to Waymo's design, reflecting misuse of Waymo's trade secrets. Waymo is seeking damages and compensation for Defendants' unlawful conduct.
Решение окружного суда Северной КалифорнииAnatol Alizar
This order grants in part and denies in part Facebook's motion to dismiss claims brought by BladeRoom Group Limited and Bripco. The plaintiffs allege that Facebook and Emerson Electric enticed them to reveal confidential data center designs and construction methods with promises of partnership, but then misappropriated those designs for their own use. The order finds that most, but not all, of the plaintiffs' claims withstand a Rule 12(b)(6) review, so it grants the motion to dismiss in part and denies it in part.
Facebook обвиняют в плагиате проекта дата-центра в ШвецииAnatol Alizar
The document appears to be a legal case filing that was submitted to a federal court on March 23, 2015. It includes the case number, titles, and 23 numbered pages of text as part of the filing. However, without more context around the specific claims, parties, or issues in the case, it is difficult to provide a higher-level summary of the essential purpose or content of the legal filing.
Spanner is Google's globally distributed database that provides externally consistent distributed transactions across data centers worldwide. It uses a novel TrueTime API to assign globally meaningful timestamps to transactions despite distribution, enabling features like consistent backups and schema updates at global scale. The database replicates data across multiple zones using the Paxos consensus protocol and provides a SQL-like query interface along with a schematized semi-relational data model.
This complaint alleges that Google infringes four patents related to protecting computer systems from malicious software. The plaintiffs are co-inventors and owners of the patents. They allege Google infringes the patents through its Chrome web browser, Chrome for Android mobile browser, Chromebook computers, and Nexus mobile devices. The complaint brings four counts of patent infringement and seeks damages and injunctive relief.
Судья приказал Google выдать почту пользователя с зарубежных серверовAnatol Alizar
This memorandum addresses the government's motions to compel Google to comply with two search warrants issued under the Stored Communications Act. Google has partially complied by producing data stored in the US, but has refused to produce other data, relying on a recent Second Circuit decision. The court must determine whether Google must disclose electronic data stored outside the US pursuant to these search warrants targeting US persons under investigation for crimes occurring solely in the US.
This document is a second amended complaint filed by ZeniMax Media Inc. and id Software LLC (collectively "ZeniMax") against Oculus VR, LLC, Palmer Luckey, Facebook, Inc., Brendan Iribe, and John Carmack (collectively "Defendants") in the United States District Court for the Northern District of Texas. ZeniMax alleges that Defendants misappropriated ZeniMax's intellectual property related to virtual reality technology that was disclosed to Oculus under a non-disclosure agreement. ZeniMax provided technical expertise, software code and hardware improvements that transformed Oculus' prototype headset. ZeniMax seeks damages for Defendants' alleged infringement and unjust enrichment from using Zeni
The document appears to be a court filing related to a civil case. It consists of 90 pages of legal documentation including references to case numbers, parties involved, dates and page numbers. However, without more context around the specific nature and details of the case, it is difficult to provide a high-level summary of the essential information and issues in only 1-3 sentences from this legal document.
13 млн документов ЦРУ рассекречено и опубликовано в онлайнеAnatol Alizar
This document is a declaration by Antoinette B. Shiner, the Information Review Officer for the Litigation Information Review Office at the Central Intelligence Agency (CIA). It provides additional details regarding the CIA's searches and withholdings in response to a Freedom of Information Act (FOIA) request from MuckRock, LLC regarding objections to agency data gathering practices. Specifically, it describes the CIA's supplemental searches using the same terms as before and additional hard copy searches that did not uncover any new records. It also explains that upon re-review, one document is now being released in full and another is being released in part, but that information in the other two documents remains exempt from release under FOIA Exemption 3 to
В Instagram можно найти фотографии авиабилетов и присвоить себе бонусные милиAnatol Alizar
Global booking systems store travel data from airlines and passengers. They include price and availability rules as well as personal reservation information. Three dominant global distribution systems (GDS) are Amadeus, Sabre, and Galileo. Security protections for these systems are minimal, with coarse access controls, weak authentication methods, and a lack of basic security controls like rate limiting and logging. This exposes private traveler information and leaves the systems vulnerable to fraud and privacy abuse.
Ещё шесть радиосигналов неизвестной природы получены из-за пределов нашей гал...Anatol Alizar
This document reports on radio and X-ray observations of FRB 121102, the only known repeating fast radio burst source. Six additional radio bursts from FRB 121102 were detected - five with the Green Bank Telescope at 2 GHz and one with the Arecibo Observatory at 1.4 GHz, bringing the total detected bursts from this source to 17. X-ray observations from Swift and Chandra show at least one possible counterpart, but the probability of chance superposition is high. Radio imaging with the VLA places an upper limit on any continuum emission at the location. The repeating nature of FRB 121102 indicates that at least some FRBs originate from a repeating phenomenon and not a cataclysmic event.
Рядовые сотрудники Uber использовали «режим Бога» для слежки за бывшимиAnatol Alizar
This document is a declaration from Samuel Ward Spangenberg, the plaintiff in a lawsuit against Uber Technologies. It details Spangenberg's employment with Uber as a Forensic Investigator, where he reported numerous issues regarding Uber's lack of data security and privacy safeguards. These issues included unsecured payroll data, ability of employees to access customer data without authorization, and lack of security for driver and financial information. Spangenberg objected to these practices and others during his employment with Uber.
Немецкий суд объяснил, почему блокировщики рекламы не нарушают законAnatol Alizar
The Hamburg District Court dismissed a claim brought by Spiegel Online GmbH against Eyeo GmbH, the developer of the Adblock Plus browser extension. Spiegel Online alleged that Adblock Plus violated competition law by blocking most of the ads on Spiegel Online's websites, while allowing ads on some sites that paid a fee. The court found that since Spiegel Online did not implement technical measures to only provide its content and ads together as a unified offering, Eyeo was not violating its rights by blocking some ads. Eyeo argued its fee structure and whitelisting process were justified based on administrative costs. The court ruled in favor of Eyeo and dismissed the claim.
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...AHRP Law Firm
Law Number 13 of 2003 on Manpower has been partially revoked and amended several times, with the latest amendment made through Law Number 6 of 2023. Attention is drawn to a specific part of the Manpower Law concerning severance pay. This aspect is undoubtedly one of the most crucial parts regulated by the Manpower Law. It is essential for both employers and employees to abide by the law, fulfill their obligations, and retain their rights regarding this matter.
A Critical Study of ICC Prosecutor's Move on GAZA WarNilendra Kumar
ICC Prosecutor Karim Khan's proposal to its judges seeking permission to prosecute Israeli leaders and Hamas commanders for crimes against the law of war has serious ramifications and calls deep scrutiny.
Capital Punishment by Saif Javed (LLM)ppt.pptxOmGod1
This PowerPoint presentation, titled "Capital Punishment in India: Constitutionality and Rarest of Rare Principle," is a comprehensive exploration of the death penalty within the Indian criminal justice system. Authored by Saif Javed, an LL.M student specializing in Criminal Law and Criminology at Kazi Nazrul University, the presentation delves into the constitutional aspects and ethical debates surrounding capital punishment. It examines key legal provisions, significant case laws, and the specific categories of offenders excluded from the death penalty. The presentation also discusses recent recommendations by the Law Commission of India regarding the gradual abolishment of capital punishment, except for terrorism-related offenses. This detailed analysis aims to foster informed discussions on the future of the death penalty in India.
The presentation deals with the concept of Right to Default Bail laid down under Section 167 of the Code of Criminal Procedure 1973 and Section 187 of Bharatiya Nagarik Suraksha Sanhita 2023.
1. 1
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
THE REPORTERS COMMITTEE FOR
FREEDOM OF THE PRESS,
1156 15th Street NW, Suite 1250
Washington DC, 20005
and
THE ASSOCIATED PRESS,
450 West 33rd Street
New York, NY 10001
Plaintiffs,
v.
FEDERAL BUREAU OF INVESTIGATION,
935 Pennsylvania Avenue, NW
Washington, D.C. 20535
and
UNITED STATES DEPARTMENT
OF JUSTICE
950 Pennsylvania Avenue, NW
Washington, D.C. 20530
Defendants.
Civil Action No. _____________________
COMPLAINT
The Reporters Committee for Freedom of the Press (“Reporters Committee” or “RCFP”)
and The Associated Press (“AP”) (collectively, “Plaintiffs”), by and through their undersigned
counsel, hereby allege as follows:
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 1 of 18
2. 2
1. This is an action under the Freedom of Information Act (“FOIA”), 5 U.S.C. §
552, for declaratory, injunctive, and other appropriate relief brought by the AP, one of the oldest
and most trusted news organizations in the world, and the Reporters Committee, a nonprofit
association dedicated to safeguarding the First Amendment’s guarantee of a free and unfettered
press. 11:00
2. By this action, Plaintiffs seek to compel the Department of Justice (“DOJ”) and
the Federal Bureau of Investigation (“FBI”) (collectively, “Defendants”) to comply with their
obligations under FOIA to release requested records concerning the FBI’s practice of
impersonating members of the news media, including the AP, in order to deliver surveillance
software to targets of criminal investigations. Plaintiffs are statutorily entitled to disclosure of
these records, which they seek so that they may inform the public about the nature and extent of
the FBI’s impersonation of journalists and news organizations. Defendants have improperly
withheld the records requested by Plaintiffs in violation of the law and in opposition to the
public’s strong interest in obtaining information regarding a law enforcement practice that
undermines both the credibility and independence of the news media.
PARTIES
3. The Reporters Committee is an unincorporated nonprofit association located at
1156 15th St. NW, Suite 1250, Washington, DC 20005.
4. The Associated Press is a not-for-profit news cooperative. Its members and
subscribers include the nation’s newspapers, magazines, broadcasters, cable news services and
Internet content providers. Its world headquarters are located at 450 West 33rd Street, New
York, NY 10001.
5. Defendant United States Department of Justice (“DOJ”) is an agency of the
federal government within the meaning of 5 U.S.C. § 551, 5 U.S.C. § 552(f) and 5 U.S.C. § 702
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 2 of 18
3. 3
that has possession, custody, and/or control of the records that Plaintiffs seek. The DOJ’s
headquarters are located at 950 Pennsylvania Avenue NW, Washington, D.C. 20530.
6. Defendant Federal Bureau of Investigation (“FBI”) an agency of the federal
government within the meaning of 5 U.S.C. § 551, 5 U.S.C. § 552(f) and 5 U.S.C. § 702, and a
component of Defendant DOJ, that has possession, custody, and/or control of the records that
Plaintiffs seek. Its headquarters are located at 935 Pennsylvania Avenue, NW, Washington,
D.C. 20535.
JURISDICTION AND VENUE
7. This Court has subject matter jurisdiction over this action and personal
jurisdiction over Defendants pursuant to 5 U.S.C. § 552(a)(4)(B) and 28 U.S.C. § 1331.
8. Venue lies in this district under 5 U.S.C. § 552(a)(4)(B).
FACTS
Background
9. In October of 2014 it came to light, through documents released by the FBI in
response to a FOIA request made by the Electronic Frontier Foundation (“EFF”), that in 2007
the FBI had masqueraded as a member of the news media—specifically, as the AP—in order to
deliver surveillance software to a criminal suspect’s computer. See Endpoint Surveillance Tools
(CIPAV), https://www.eff.org/document/fbicipav-08pdf (last accessed Aug. 25, 2015).
10. The documents obtained by EFF showed that, as part of an investigation into a
series of bomb threats at Timberline High School in Lacey, Washington in June of 2007, the FBI
had obtained a warrant to deliver a specific type of surveillance software known as a “Computer
and Internet Protocol Address Verifier” (“CIPAV”) to a social media account associated with the
threats. Once delivered, the CIPAV would send “the activating computer’s IP address and/or
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 3 of 18
4. 4
MAC address, other environment variables, and certain registry-type information to a computer
controlled by the FBI,” thus enabling the FBI to identify the computer’s location and its user. Id.
at p. 33.
11. On or about October 28, 2014, the FBI confirmed that, in order to successfully
deliver a CIPAV to the bomb threat suspect’s computer, FBI agents had sent an electronic
communication with a link to a fake news article headlined, “Bomb threat at high school
downplayed by local police department,” and “Technology savvy student holds Timberline High
School hostage”; the FBI attributed its fabricated story to “The Associated Press.” See id. at p.
62; see also Gene Johnson, FBI says it faked AP story to catch bomb suspect, The Associated
Press (Oct. 28, 2014), http://perma.cc/ZH7W-XBFS. When the FBI’s bomb threat suspect
clicked on the link, he unknowingly downloaded the CIPAV.
12. In addition to confirming that FBI agents had fabricated and distributed a phony
AP story in order to dupe a suspect into downloading surveillance software, on or about October
28, 2014, FBI officials reportedly told members of the media that the agency was examining
existing policies concerning agency impersonation of journalists and news organizations. Ellen
Nakashima & Paul Farhi, FBI lured suspect with fake Web page, but may have leveraged media
credibility, The Wash. Post (Oct. 28, 2014), https://perma.cc/A5NX-UXE2.
13. Shortly thereafter, on or about October 30, 2014, AP’s General Counsel Karen
Kaiser hand delivered to the DOJ a letter addressed to Attorney General Eric Holder, expressing
concern over the FBI’s actions, and asking for additional information regarding how often, and
under what circumstances, the FBI poses as a member of the press. See Gene Johnson, AP asks
for accounting of fake FBI news stories, The Associated Press (Oct. 30, 2014),
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 4 of 18
5. 5
http://perma.cc/FPY7-U8F3; Letter from Karen Kaiser to Attorney General Holder (Oct. 30,
2014), https://perma.cc/W46W-2DLW.
14. Ms. Kaiser’s letter protested “in the strongest possible terms the FBI’s fabrication
and publication of a fake Associated Press news story in connection with its June 2007
investigation,” stating: “The FBI both misappropriated the trusted name of The Associated Press
and created a situation where our credibility could have been undermined on a large scale . . . . It
is improper and inconsistent with a free press for government personnel to masquerade as The
Associated Press or any other news organization. The FBI may have intended this false story as
a trap for only one person. However, the individual could easily have reposted this story to
social networks, distributing to thousands of people, under our name, what was essentially a
piece of government disinformation.” Id.
15. On or about November 6, 2014, the Reporters Committee, writing on behalf of
itself and 25 other media organizations, also sent a letter to Attorney General Holder and FBI
Director James Comey voicing concerns about the FBI’s actions, including its apparent failure to
follow internal guidelines regarding impersonation of members of the news media, and
requesting additional information about the FBI’s policies and practices. See Letter from the
Reporters Committee to Attorney General Holder and FBI Director Comey (Nov. 6, 2014),
http://perma.cc/NEB5-F6LK (“The utilization of news media as a cover for delivery of electronic
surveillance software is unacceptable. This practice endangers the media’s credibility and
creates the appearance that it is not independent of the government . . . .”).
16. On the same day, The New York Times published a letter to the editor from Mr.
Comey that defended the FBI’s impersonation of an AP reporter. Mr. Comey confirmed in his
letter that the FBI had done more than merely create a fake news story attributed to the AP, but
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 5 of 18
6. 6
that an undercover FBI officer had also “portrayed himself as an employee of The Associated
Press, and asked if the suspect would be willing to review a draft article about the threats and
attacks, to be sure that the anonymous suspect was portrayed fairly.” See James Comey, Letter
to the Editor, To Catch a Crook: The F.B.I.’s Use of Deception, N.Y. Times (Nov. 6, 2014),
http://perma.cc/GZ4C-N6B5.
17. Mr. Comey stated that undercover operations involving deception had “long been
a critical tool in fighting crime,” and that the FBI’s use of such techniques “is subject to close
oversight, both internally and by the courts that review our work.” Id. Mr. Comey stated his
belief that the FBI’s impersonation of an AP reporter “was proper and appropriate under Justice
Department and FBI guidelines at the time. Today, the use of such an unusual technique would
probably require higher-level approvals than in 2007, but it would still be lawful and, in a rare
case, appropriate.” Id.
18. Kathleen Carroll, executive editor of the AP, responded in a statement on
November 7, 2014: “This latest revelation of how the FBI misappropriated the trusted name of
The Associated Press doubles our concern and outrage, expressed earlier to Attorney General
Eric Holder, about how the agency's unacceptable tactics undermine AP and the vital distinction
between the government and the press.” Statement of Kathleen Carroll, AP ‘Outraged’ by FBI
Impersonation, The Associated Press (Nov. 7, 2014), http://perma.cc/UX2U-H6CH.
19. In a letter of November 10, 2014 to Attorney General Eric Holder and FBI
Director James Comey, AP President and Chief Executive Officer Gary Pruitt demanded
assurances from the Justice Department that the FBI would never again impersonate a member
of the news media. “In stealing our identity, the FBI tarnishes [the AP’s] reputation, belittles the
value of the free press rights enshrined in our Constitution and endangers AP journalists and
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 6 of 18
7. 7
other newsgatherers around the world. This deception corrodes the most fundamental tenet of a
free press — our independence from government control and corollary responsibility to hold
government accountable.” See Letter from Gary Pruitt to Attorney General Holder and FBI
Director Comey (Nov. 10, 2014), https://perma.cc/WXH3-8JFW.
20. Notwithstanding the FBI’s admission in October of 2014 that it had posed as the
AP in order to electronically deliver a CIPAV to a criminal suspect, as well as the subsequent
demands from the AP, Reporters Committee, and others that the FBI make a public accounting
of its practices, the FBI has since withheld information from the press and the public about its
practice of impersonating members of the news media in order to deliver surveillance software to
targets of investigations. Specifically, as alleged below, the FBI has withheld—and continues to
withhold—records concerning that practice that were requested by Plaintiffs more than nine
months ago.
Plaintiffs’ FOIA Requests
The AP Request
21. On November 6, 2014, AP reporter Raphael Satter, on behalf of the AP, sent a
FOIA request via email to both the FBI’s central FOIA office and the FBI’s Seattle Division
seeking:
(1) “Any documents referring to the decision to create the fake AP news article in the
Timberline High School case. In particular, I seek correspondence between the FBI’s
Seattle office and FBI headquarters about the case. I also seek a copy of the internal
review carried out by the FBI and a copy of the Web link sent by the FBI to suspect
in 2007”;
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 7 of 18
8. 8
(2) “An accounting of the number of times, between Jan. 1, 2000 and Nov. 6, 2014, that
the Federal Bureau of Investigation has impersonated media organizations or
generated media-style material (including but not limited to emails, webpages or
links) to deliver malicious software to suspects or anyone else caught up in an
investigation”; and
(3) “Any documents—including training material, reviews and policy briefings—dealing
with the creation and deployment of bogus news stories or media-style material in an
investigative context.”
A true and correct copy of that request (the “AP Request”) is attached hereto as Exhibit A, and
incorporated by reference herein.
22. The AP Request included a request for a fee benefit as a representative of the
news media under 5 U.S.C. § 552(a)(4)(A), as well as a request for a fee waiver.
23. The AP Request also included a request for expedited processing. The AP
Request states, inter alia, that the requested records are related to “a currently unfolding news
story, specifically, the FBI’s use of media organizations as cover to hack into suspects’
computers and the appropriation of media groups’ branding to help camouflage covert action.
Some have argued those actions place reporters at risk of harm and chip away at the credibility
of legitimate newsgathering organizations.”
24. Mr. Satter certified that the statements in the AP Request concerning the need for
expedited processing were true and correct to the best of his knowledge and belief.
25. The AP Request complied with all applicable DOJ regulations regarding the
submission of FOIA requests.
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 8 of 18
9. 9
The RCFP Requests
26. On October 31, 2014, Adam A. Marshall and Hannah Bloch-Wehba, on behalf of
the Reporters Committee, submitted two separate FOIA requests to the FBI’s central FOIA
office via facsimile and email (collectively, the “RCFP Requests”).
27. RCFP’s first FOIA request sought “all records concerning the FBI’s utilization of
links to what are or appear to be news media articles or news media websites to install data
extraction software, remote access search and surveillance tools, or the ‘Computer and Internet
Protocol Address Verifier’ (CIPAV).” A true and correct copy of that request (“RCFP FOIA
Request 1”) is attached hereto as Exhibit B, and incorporated by reference herein.
28. RCFP’s second FOIA request sought “all records concerning the FBI’s guidelines
and policies concerning undercover operations or activities in which a person may act as a
member of the news media, including, but not limited to, the guidelines and policies relating to
the criminal and national security undercover operations review committees and the Sensitive
Operations Review Committee; guidelines and policies concerning the use of investigative
methods targeting or affecting the news media, including, but not limited to, sensitive Title III
applications; and all guidelines and policies concerning sensitive investigative matters involving
the activities of the news media or relating to the status, involvement, or impact of an
investigation upon the news media.” A true and correct copy of that request (“RCFP FOIA
Request 2”) is attached hereto as Exhibit C, and incorporated by reference herein.
29. The RCFP Requests included a request for a fee benefit as a representative of the
news media under 5 U.S.C. § 552(a)(4)(A), as well as a request for a fee waiver. The RCFP
Requests state, inter alia, that information responsive to the requests was being sought for
“dissemination to the general public through multiple avenues,” including RCFP’s website,
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 9 of 18
10. 10
email newsletters, and its quarterly magazine. In addition, in support of the Reporters
Committee’s request for a fee waiver, the RCFP Requests point to “widespread public debate
and interest in the FBI’s creation of a fake news story to plant software on a suspect’s
computer.”
30. The RCFP Requests also included a request for expediting processing, noting,
inter alia, that pending proposed changes to Rule 41 of the Federal Rules of Criminal Procedure
concerning the issuance of warrants in connection with federal law enforcement investigations
had created an urgent need on the part of the press and the public for the information sought by
the RCFP Requests.
31. Mr. Marshall and Ms. Bloch-Wehba certified that the statements in the RCFP
Requests concerning the need for expedited processing were true and correct to the best of their
knowledge and belief.
32. The RCFP Requests complied with all applicable DOJ regulations regarding
submitting FOIA requests.
Defendant’s Treatment of Plaintiffs’ FOIA Requests
The AP Request
33. In a letter from David M. Hardy dated December 1, 2014, the FBI acknowledged
receipt of the AP Request. The acknowledgment stated that a search was being conducted for
responsive records, and that the AP’s request for a fee waiver was being considered.
34. In a letter from Mr. Hardy dated December 8, 2014, the FBI stated that it had
granted expedited processing for the AP Request pursuant to 28 C.F.R. § 16.5(d)(1)(iv).
35. In a letter from Mr. Hardy dated December 10, 2014, the FBI stated that, even
though the request had yet to be fulfilled, the AP Request was unilaterally “being closed
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 10 of 18
11. 11
administratively,” because the “material responsive to your request will be processed in FOIA
1313504-0 as they share the same information.”
36. The combining of Mr. Satter’s request with Request No. 1313504-0 occurred
despite the fact that Mr. Satter had not filed Request No. 1313504-0 and was given no
information about the identity of the requester underlying FOIA Request No. 1313504-0.
37. In a letter from Mr. Hardy dated December 17, 2014, the FBI stated that it had
granted a fee waiver for the AP Request pursuant to 5 U.S.C. § 552(a)(4)(a)(iii) and 28 C.F.R. §
16.11(k).
38. Having received no further information or communication from the FBI
concerning the AP Request, on February 9, 2015, Mr. Satter wrote to David Sobonya, the FBI’s
Public Information Officer, via email to request information concerning the status of the AP
Request. Specifically, Mr. Satter’s email sought clarification as to what was meant by the
statement in Mr. Hardy’s letter dated December 10, 2014 that the AP Request was being “closed
administratively,” as well as a time estimate for the completion of the request. Mr. Satter also
sought information about the identity of the individual or entity that filed Request No. 1313504-
0.
39. Mr. Sobonya responded to Mr. Satter on or about February 9, 2015, stating that
that the estimated completion time for large requests is 649 days.
40. Mr. Soobonya also stated that he could not identify the party underlying FOIA
Request No. 1313504-0.
41. Having received no further information or communication from the FBI
concerning the AP Request, on June 3, 2015, the AP submitted an administrative appeal to the
Office of Information Policy (“OIP”) at DOJ (the “AP Appeal”).
42. By letter dated July 7, 2015, OIP acknowledged receipt of the AP Appeal.
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 11 of 18
12. 12
43. By letter dated August 21, 2015, OIP refused to consider the administrative
appeal of the AP request, stating that “[a]s no adverse determination has yet been made by the
FBI on Request No. 1313504, there is no further action for this Office to consider on appeal.”
44. As of the filing of this Complaint, no further information or communication from
Defendants concerning the AP Appeal or the AP Request has been received by AP.
45. As of the filing of this Complaint, it has been 294 days since the AP Request was
submitted, and 85 days since the AP Appeal was submitted.
The RCFP Requests
46. On November 3, 2014, Mr. Sobonya, the FBI’s Public Information Officer,
confirmed the FBI’s receipt of the RCFP Requests via email.
47. On December 22, 2014, Mr. Sobonya wrote to the Reporters Committee
requesting copies of the RCFP Requests. That same day, Ms. Bloch-Wehba, on behalf of the
Reporters Committee, sent Mr. Sobonya copies of the RCFP Requests via email.
48. In a letter from Mr. Hardy dated January 8, 2015, the FBI denied the Reporters
Committee’s request for expedited processing as to RCFP Request 2, seeking “all records
concerning the FBI’s guidelines and policies concerning undercover operations or activities in
which a person may act as a member of the news media . . . .”
49. In a letter from Mr. Hardy dated May 18, 2015, the FBI stated that it had
“conducted a search of the Central Records System” in connection with RCFP Request 1,
seeking “all records concerning the FBI’s utilization of links to what are or appear to be news
media articles or news media websites to install data extraction software, remote access search
and surveillance tools, or the ‘Computer and Internet Protocol Address Verifier’ (CIPAV),” and
that the FBI was “unable to identify main file records responsive to the FOIA.”
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 12 of 18
13. 13
50. Having received no further information or communication from the FBI
concerning either of the RCFP Requests, on June 2, 2015, RCFP submitted, via U.S. Mail,
administrative appeals for both RCFP Requests to OIP (collectively, the “RCFP Appeals”).
51. With respect to RCFP Request 1, the Reporters Committee’s asserted in its appeal
that the FBI had failed to conduct an adequate search for responsive records. Pointing to, among
other things, the fact that the FBI had already released records responsive to that request in
response to an earlier FOIA request made by EFF, the Reporters Committee stated that there
could be no question that the FBI had responsive records.
52. With respect RCFP Request 2, the Reporters Committee’s asserted in its appeal
that the FBI had failed to make a determination with respect to the request within the statutory
time limits proscribed by FOIA.
53. OIP acknowledged receipt of the RCFP Appeals by letters dated July 9, 2015.
Said letters state that the RCFP Appeals were received by OIP on June 11, 2015.
54. In response to the administrative appeal of RFCP Request 1, OIP upheld the
sufficiency of the FBI’s search by letter dated August 5, 2015. The letter states, inter alia, that
OIP determined that the FBI “conducted an adequate, reasonable search for [responsive]
records.” The letter also states that while the FBI’s initial determination with respect to RCFP
Request 1 stated that the CRS was searched, that was a “typographical error. The FBI conducted
a search of its Operational Technology Division for responsive records.”
55. By letter dated August 4, 2015, OIP refused to consider the administrative appeal
of RCFP Request 2, stating that “[a]s no adverse determination has yet been made by the FBI,
there is no action for this Office to consider on appeal.”
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 13 of 18
14. 14
56. As of the filing of this Complaint, no further information or communication from
Defendants concerning the RCFP Appeals or the RCFP Requests has been received by the
Reporters Committee.
57. As of the filing of this Complaint, it has been 300 days since the RCFP Requests
were submitted, and 86 days since the RCFP Appeals were submitted.
CAUSES OF ACTION
Count I
Violation of FOIA for Failure to Comply with Statutory Deadlines
58. Plaintiffs repeat, reallege, and incorporate the allegations set forth in the
foregoing as though fully set forth herein.
59. Defendants are agencies subject to FOIA. 5 U.S.C. § 556(f); 5 U.S.C. § 551.
60. The AP Request and the RCFP Requests properly seek records within the
possession, custody, and/or control of Defendants under FOIA.
61. Defendants have failed to process the AP Request as soon as practicable. 5
U.S.C. § 552(a)(6)(E)(iii).
62. Defendants failed to make a determination with respect to the AP Request within
the 20 working-day deadline mandated by FOIA. 5 U.S.C. § 556(a)(6)(A).
63. Defendants failed to make a determination with respect to the RCFP Requests
within the 20 working-day deadline mandated by FOIA. 5 U.S.C. § 556(a)(6)(A).
64. Plaintiffs have or are deemed to have exhausted applicable administrative
remedies. 5 U.S.C. § 552(a)(6)(C)(i).
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 14 of 18
15. 15
Count II
Violation of FOIA for Wrongful Withholding of Agency Records
65. Plaintiffs repeat, reallege, and incorporate the allegations set forth in the
foregoing as though fully set forth herein.
66. Defendants are agencies subject to FOIA. 5 U.S.C. § 556(f); 5 U.S.C. § 551.
67. The AP Request and the RCFP Requests properly seek records within the
possession, custody, and/or control of Defendants under FOIA.
68. Defendants failed to make responsive records available to Plaintiffs, in violation
of FOIA. 5 U.S.C. § 552(a)(3)(A).
69. Plaintiffs have or are deemed to have exhausted applicable administrative
remedies. 5 U.S.C. § 552(a)(6)(C)(i).
Count III
Violation of FOIA for Failure to Conduct a Reasonable Search
70. Plaintiffs repeat, reallege, and incorporate the allegations set forth in the
foregoing as though fully set forth herein.
71. Defendants are agencies subject to FOIA. 5 U.S.C. § 556(f); 5 U.S.C. § 551.
72. The AP Request and the RCFP Requests properly seek records within the
possession, custody, and/or control of Defendants under FOIA
73. Defendants have failed to conduct a search reasonably calculated to identify all
records responsive to the AP Request and the RCFP Requests in violation of its obligations
under FOIA. 5 U.S.C. § 552(a)(3).
74. Plaintiffs have or are deemed to have exhausted applicable administrative
remedies. 5 U.S.C. § 552(a)(6)(C)(i).
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 15 of 18
16. 16
Count IV
Violation of FOIA for Failure to Grant News Media Fee Status and Fee Waivers
75. Plaintiffs repeat, reallege, and incorporate the allegations set forth in the
foregoing as though fully set forth herein.
76. Defendants are agencies subject to FOIA. 5 U.S.C. § 556(f); 5 U.S.C. § 551.
77. The RCFP Requests set forth facts supporting a determination that the Reporters
Committee is entitled to news media fee status.
78. The RCFP Requests set forth facts supporting a determination that the Reporters
Committee is entitled to a fee waiver.
79. Defendants failed to make a determination with respect to Plaintiff Reporters
Committee’s news media fee status in violation of FOIA. 5 U.S.C. § 552(a)(4).
80. Defendants failed to make a determination with respect to Plaintiff Reporter
Committee’s requests for a fee waiver, in violation of FOIA. 5 U.S.C. § 552(a)(4).
81. Plaintiff Reporters Committee has or is deemed to have exhausted applicable
administrative remedies. 5 U.S.C. § 552(a)(6)(C)(i).
REQUEST FOR RELIEF
WHEREFORE, Plaintiff respectfully requests this Court:
(1) order Defendants to conduct a search reasonably calculated to identify all records
responsive to the AP Request and the RCFP Requests, and to immediately disclose, in
their entirety, all records responsive to those requests that are not specifically exempt
from disclosure under FOIA;
(2) issue a declaration that Plaintiffs are entitled to disclosure of the requested records;
(3) issue a declaration that Plaintiffs are entitled to news media fee status;
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 16 of 18
17. 17
(4) issue a declaration that the Reporters Committee is entitled to a fee waiver in connection
with the RCFP Requests;
(5) issue a declaration that Defendants and/or their personnel have acted arbitrarily and/or
capriciously with respect to withholding records responsive to the AP Request and/or the
RCFP Requests pursuant to 5 U.S.C. § 552(a)(4)(F)(i);
(6) award Plaintiffs reasonable attorney fees and costs reasonably incurred in this action
pursuant to 5 U.S.C. § 552(a)(4)(E); and
(7) grant such other relief as the Court may deem just and proper.
Dated: August 27, 2015
Respectfully submitted,
/s/ Katie Townsend
Katie Townsend
DC Bar No. 1026115
THE REPORTERS COMMITTEE FOR
FREEDOM OF THE PRESS
1156 15th St. NW, Suite 1250
Washington, DC 20005
Phone: 202.795.9300
Facsimile: 202.795.9310
Email: ktownsend@rcfp.org
Counsel for Plaintiffs
Of Counsel for The Associated Press:
Karen Kaiser
Brian Barrett
THE ASSOCIATED PRESS
450 West 33rd Street
New York, NY 10001
Telephone: 212.621.7547
Facsimile: 212.506.6131
E-mail: kkaiser@ap.org
E-mail: bbarrett@ap.org
Of Counsel for The Reporters Committee
for Freedom of the Press:
Adam A. Marshall
Hannah Bloch-Wehba
THE REPORTERS COMMITTEE FOR
FREEDOM OF THE PRESS
1156 15th St. NW, Suite 1250
Washington, DC 20005
Phone: 202.795.9300
Case 1:15-cv-01392 Document 1 Filed 08/27/15 Page 17 of 18