U.S. Government Wins Dozens of Millions From Kim Dotcom

This also ensures that Dotcom won’t have money to defend himself…

Following the 2012 raid on Megaupload and Kim Dotcom, U.S. and New Zealand authorities seized millions of dollars in cash and other property.

Claiming the assets were obtained through copyright and money laundering crimes, last July the U.S. government launched a separate civil action in which it asked the court to forfeit the bank accounts, cars and other seized possessions of the Megaupload defendants.

Megaupload’s defense heavily protested the request but was found to have no standing, as Dotcom and his colleagues can be seen as fugitives.

A few hours ago District Court Judge Liam O’Grady ordered a default judgment in favor of the U.S. Government. This means that the contested assets, which are worth an estimated $67 million, now belong to the United States.

“It all belongs to the U.S. government now. No trial. No due process,” Dotcom informs TF.

More than a dozen Hong Kong and New Zealand bank accounts have now been forfeited including some of the property purchased through them. The accounts all processed money that was obtained through Megaupload’s alleged illegal activities.

Link (TorrentFreak)

Despite Throwing Money At Congress, Comcast Finds Merger Support Hard To Come By

Poor Comcast. Despite throwing millions of dollars at think tanks, consultants, PR reps, editorial writers, various front groups and a myriad of other policy tendrils, genuine, meaningful support for the company’s $45 billion Time Warner Cable acquisition is still apparently hard to come by. You might recall that last year top Comcast lobbyist “Chief Diversity Officer” David Cohen proudly crowed that support for the company’s merger was “pouring in” — though he failed to mention that Comcast was paying people for that support, and that said support largely consisted of regurgitated form letters.

Despite the money spent however, it appears that actual support in Congress for the deal is tepid to non-existent. Comcast’s hometown paper the Philadelphia Inquirer points out that whereas the NBC deal saw major support efforts by members of Congress, politicians appear to want nothing to do with this latest merger attempt

Link (Techdirt)

FBI Pins ‘Terrorist’ Nametag On ‘Retarded Fool’ Without A ‘Pot To Piss In’

The FBI’s preference for easily-investigated terrorism is well-documented. We’re routinely assured that all sorts of domestic surveillance tech and agency opacity is necessary to protect us from a whole host of threats, but for the most part, the terrorists “apprehended” by the FBI seem to be people who’ve had the misfortune of being “befriended” by undercover agents and/or confidential informants.

When over 90% of the funding, idea generation, transportation and motivation comes from those saving us from terrorism, we have reason to be worried. While the FBI performs its predatory handcrafting of “extremists,” the real terrorists — who don’t need someone else to provide weapons, money and motivation — are still going about the business of terrorism.

This isn’t to say that all, or even a majority, of the FBI’s anti-terrorist resources are devoted to digging a hole and filling it back up. But a portion of it is, and that portion is squandered completely. And these numbers, gathered by The Intercept, put the squandered portion at nearly 50% of the total.

Link (Techdirt)

Judicial Committee Gives FBI The First OK It Needs To Hack Any Computer, Anywhere On The Planet

A judicial advisory panel Monday quietly approved a rule change that will broaden the FBI’s hacking authority despite fears raised by Google that the amended language represents a “monumental” constitutional concern.

The Judicial Conference Advisory Committee on Criminal Rules voted 11-1 to modify an arcane federal rule to allow judges more flexibility in how they approve search warrants for electronic data, according to a Justice Department spokesman.

Link (Techdirt)

CIA Worked With DOJ To Re-Purpose Foreign Surveillance Airborne Cell Tower Spoofers For Domestic Use

The CIA’s recent rebranding as Valhalla for US cyberwarriors notwithstanding, the agency’s general focus has been intelligence gathering on foreign governments, corporations and people. That it has often mistaken “torturing people into saying whatever they can to make it stop” for “intelligence gathering” isn’t necessarily germane to the following discussion, but it’s worth noting that the CIA is almost single-handedly responsible for destroying the term “extraordinary rendition” — a formerly innocuous (and complimentary) term previously used to highlight something like, say, Johnny Cash’s amazing cover of Soundgarden’s’ “Rusty Cage.” (That Cash’s two best covers are “Hurt” and “Rusty Cage” is not germane to the discussion of CIA torture programs, but what a coincidence!)

But the emphasis here is foreign. Which is why the following news makes so little sense.

The Central Intelligence Agency played a crucial role in helping the Justice Department develop technology that scans data from thousands of U.S. cellphones at a time, part of a secret high-tech alliance between the spy agency and domestic law enforcement, according to people familiar with the work.

The CIA and the U.S. Marshals Service, an agency of the Justice Department, developed technology to locate specific cellphones in the U.S. through an airborne device that mimics a cellphone tower, these people said.

Link (Techdirt)

How the FBI Created a Terrorist

Osmakac was 25 years old on January 7, 2012, when he filmed what the FBI and the U.S. Department of Justice would later call a “martyrdom video.” He was also broke and struggling with mental illness.

After recording this video in a rundown Days Inn in Tampa, Florida, Osmakac prepared to deliver what he thought was a car bomb to a popular Irish bar. According to the government, Osmakac was a dangerous, lone-wolf terrorist who would have bombed the Tampa bar, then headed to a local casino where he would have taken hostages, before finally detonating his suicide vest once police arrived.

But if Osmakac was a terrorist, he was only one in his troubled mind and in the minds of ambitious federal agents. The government could not provide any evidence that he had connections to international terrorists. He didn’t have his own weapons. He didn’t even have enough money to replace the dead battery in his beat-up, green 1994 Honda Accord.

Osmakac was the target of an elaborately orchestrated FBI sting that involved a paid informant, as well as FBI agents and support staff working on the setup for more than three months. The FBI provided all of the weapons seen in Osmakac’s martyrdom video. The bureau also gave Osmakac the car bomb he allegedly planned to detonate, and even money for a taxi so he could get to where the FBI needed him to go. Osmakac was a deeply disturbed young man, according to several of the psychiatrists and psychologists who examined him before trial. He became a “terrorist” only after the FBI provided the means, opportunity and final prodding necessary to make him one.

Since the 9/11 terrorist attacks, the FBI has arrested dozens of young men like Osmakac in controversial counterterrorism stings. One recent case involved a rudderless 20-year-old in Cincinnati, Ohio, named Christopher Cornell, who conspired with an FBI informant — seeking “favorable treatment” for his own “criminal exposure” — in a harebrained plot to build pipe bombs and attack Capitol Hill. And just last month, on February 25, the FBI arrested and charged two Brooklyn men for plotting, with the aid of a paid informant, to travel to Syria and join the Islamic State. The likelihood that the men would have stepped foot in Syria of their own accord seems low; only after they met the informant, who helped with travel applications and other hurdles, did their planning take shape.

Link (The Intercept)

After Petraeus Plea Deal, Lawyer Demands Release of Stephen Kim

The lawyer for imprisoned leaker Stephen Kim has asked the Department of Justice to immediately release him from jail, accusing the government of a “profound double standard” in its treatment of leakers following a comparatively lenient plea deal for former Gen. David Petraeus.

Petraeus avoided prison time for disclosing a trove of classified information to his lover and lying to the FBI about it. Kim, meanwhile, was sentenced to 13 months in prison for violating the Espionage Act by talking to a Fox News reporter about a single classified report on North Korea. Kim pleaded guilty after a five-year legal battle that depleted his finances and sent him to the brink of suicide. Petraeus, in the wake of his plea arrangement, is expected to continue his lucrative career working for an investment bank and giving speeches.

Kim’s lawyer, Abbe Lowell, noted in a scathing letter to the DOJ that Petraeus, in his plea deal, admitted leaking a range of highly sensitive material “at least as serious and damaging to national security as anything involved in Mr. Kim’s case” to Paula Broadwell, his lover and authorized biographer. Petraeus also acknowledged that when he was director of the CIA he lied to the FBI about leaking to Broadwell, as well as about keeping classified information at his home.

Yet while Kim, a former State Department official, was prosecuted under a draconian law against leaking — even though he merely discussed a single document that a government official later described in court filings as a “nothing burger” — Petraeus was allowed to plead guilty to a misdemeanor offense of mishandling classified information, and he was not charged at all for the felony of lying to the FBI. Under the deal, he is expected to be placed on probation for two years and pay a fine of $40,000.

“The decision to permit General Petraeus to plead guilty to a misdemeanor demonstrates more clearly than ever the profound double standard that applies when prosecuting so-called ‘leakers’ and those accused of disclosing classified information for their own purposes,” Lowell wrote in his two-page letter, which was dated March 6, just three days after the Petraeus plea deal was announced. “As we said at the time of Mr. Kim’s sentencing, lower-level employees like Mr. Kim are prosecuted under the Espionage Act because they are easy targets and lack the resources and political connections to fight back. High-level officials (such as General Petraeus and, earlier, Leon Panetta), leak classified information to forward their own agendas (or to impress their mistresses) with virtual impunity.”

Link (The Intercept)

Albuquerque Police Dept. ‘Complies’ With Records Request By Releasing Password-Protected Videos… But Not The Password

If there’s one thing the Albuquerque Police Department (APD) does well — or at least, frequently –it’s shoot and kill Albuquerque residents. Its officers’ obvious preference for excessive and/or deadly force attracted the notice of the DOJ, which issued a (mostly) scathing review that was tempered somewhat by the DOJ’s appreciation of the inherent risks of the job, as well as all the hard work the city’s officers do when not shooting Albuquerque residents.

On May 3rd of last year, Gail Martin called the APD to help her when her husband, Armand Martin, threatened her and her two children with a gun. This turned into a lengthy standoff which finally ended when APD officers shot Martin as he ran from the house. According to the police, Martin was holding two guns at the time.

The APD released a number of records, including footage captured before and after the shooting, but nothing containing the shooting itself. Local law firm Kennedy Kennedy & Ives, representing Gail Martin for a possible civil rights lawsuit, requested a copy of police recordings containing the actual shooting under New Mexico’s Inspection of Public Records Act (IPRA).

Over a month later, the APD responded. Sort of.

The Kennedy Kennedy & Ives Law Practice in the lawsuit said the department in mid-August released six CDs containing records on the May 3 shooting death of Armand Martin, a 50-year-old Air Force veteran, in response to the firm’s records request. But three of the CDs were password protected.

Now, this could have been a simple oversight, but if so, the problem would be solved already. Instead, it looks as though the APD is looking to keep the law firm from viewing the videos it requested.

The firm has tried to get the password from APD records, evidence and violent crimes personnel to no avail, according to the complaint…

Now the APD’s being sued. The firm is seeking not only access to the password-protected videos, but also damages and legal fees. According to the firm, access to these videos is crucial to determining whether or not Gail Martin has a legitimate civil rights case. Without them, the firm is no better positioned to make this call than the general public, which has only seen the lead-in and aftermath of the shooting.

This isn’t the APD’s only legal battle related to its IPRA non-compliance. Late last year, KRQE of Albuquerque sued it for “serial violations” of the law. That’s in addition to the one it filed over a 2012 incident, in which the PD stalled on its response to a journalist’s public records request before releasing the requested footage at a press conference, basically stripping the reporter of her potential “scoop.”
It’s common knowledge that law enforcement agencies are less than helpful when it comes to releasing documentation of alleged wrongdoing. It’s the one part they can’t completely seal off when circling the wagons. This leads to weeks, months… even years of obfuscation. And this often leads to lawsuits, paid for by the same public it doesn’t want to hold it accountable.

Link (Techdirt)

President Obama Complains To China About Demanding Backdoors To Encryption… As His Administration Demands The Same Thing

Back in January, we pointed out that just after US and EU law enforcement officials started freaking out about mobile encryption and demanding backdoors, that China was also saying that it wanted to require backdoors for itself in encrypted products. Now, President Obama claims he’s upset about this, saying that he’s spoken directly with China’s President Xi Jinping about it:

In an interview with Reuters, Obama said he was concerned about Beijing’s plans for a far-reaching counterterrorism law that would require technology firms to hand over encryption keys, the passcodes that help protect data, and install security “backdoors” in their systems to give Chinese authorities surveillance access.

“This is something that I’ve raised directly with President Xi,” Obama said. “We have made it very clear to them that this is something they are going to have to change if they are to do business with the United States.”

This comes right after the US Trade Rep Michael Froman issued a statement criticizing China for doing the same damn thing that the US DOJ is arguing the US should be doing:

U.S. Trade Representative Michael Froman issued a statement on Thursday criticizing the banking rules, saying they “are not about security – they are about protectionism and favoring Chinese companies”.

“The Administration is aggressively working to have China walk back from these troubling regulations,” Froman said.

Those claims would sound a hell of a lot stronger if they weren’t coming immediately after DOJ officials from Attorney General Eric Holder to FBI Director James Comey had more or less argued for the exact same thing.

Link (Techdirt)

U.S. Govt Files For Default Judgment on Dotcom’s Cash and Cars

In the wake of the now-famous 2012 raid, the U.S. government has done everything in its power to deny Kim Dotcom access to the assets of his former Megaupload empire. Millions were seized, setting the basis for a legal battle that has dragged on for more than three years.

In a July 2014 complaint submitted at a federal court in Virginia, the Department of Justice asked for forfeiture of the bank accounts, cars and other seized possessions, claiming they were obtained through copyright and money laundering crimes.

“Kim Dotcom and Megaupload will vigorously oppose the US Department of Justice’s civil forfeiture action,” Dotcom lawyer Ira Rothken told TF at the time.

But in the final days of last month Dotcom received a blow when a ruling from the United States barred him from fighting the seizure. A Federal Court in Virginia found that Dotcom was not entitled to contest the forfeiture because he is viewed as a “fugitive” facing extradition.

“We think this is not offensive to just Kim Dotcom’s rights, but the rights of all Kiwis,” Rothken said.

Wasting no time, yesterday the United States went in for the kill. In a filing in the District Court for the Eastern District of Virginia, the Department of Justice requested an entry of default against the assets of Kim Dotcom plus co-defendants Mathias Ortmann, Bram van der Kolk, Finn Batato, Julius Bencko, and Sven Echternach.

The targets for forfeiture are six bank accounts held in Hong Kong in the names of Ortmann, der Kolk, Echternach, Bencko and Batato. New Zealand based assets include an ANZ National Bank account in the name of Megastuff Limited, an HSBC account held by der Kolk and a Cleaver Richards Limited Trust Account for Megastuff Limited held at the Bank of New Zealand. Two Mercedes-Benz vehicles (an A170 and an ML500) plus their license plates complete the claim.

The request for default judgment was entered soon after.