Judge tried to bribe FBI agent with beer to get family’s text messages | Ars Technica

Indictment alleges judge offered “a couple of cases of beer” as payment.

Source: Judge tried to bribe FBI agent with beer to get family’s text messages | Ars Technica

Feds accuse X-Art/Malibu Media’s attorney Jason Aaron Kotzker of a $7,000,000 payday loan fraud | Fight Copyright Trolls

From at least 2011 to at least 2013, Defendants operated as data brokers, collecting and selling sensitive consumer information from consumer payday loan applications to non-lenders.

In particular, Defendants sold this information to at least one non-lender, Ideal Financial Solutions, Inc. and its subsidiaries (collectively, “Ideal Financial”), knowing or having reason to know that Ideal Financial used the information to make unauthorized debits from the consumers’ bank accounts.

Source: Feds accuse X-Art/Malibu Media’s attorney Jason Aaron Kotzker of a $7,000,000 payday loan fraud | Fight Copyright Trolls

FBI probed SciFi author Ray Bradbury for plot to glum-down America • The Register

Ten-year investigation into whether commies used SciFi to put nation into bad mood

Source: FBI probed SciFi author Ray Bradbury for plot to glum-down America • The Register

Chris Christie So Obsessed With Increasing Surveillance He Pretends He Was A Fed On 9/11 Even Though He Wasn’t | Techdirt

But there was one very odd moment at the very beginning, before the exchange above. Christie noted that he was appointed to his former job as a US Attorney on September 10th of 2001:

MEGYN KELLY: Do you really believe you can assign blame to Senator Paul just for opposing he bulk collection of people’s phone records in the event of a terrorist attack?

CHRISTIE: Yes, I do. And I’ll tell you why: because I’m the only person on this stage who’s actually filed applications under the Patriot Act, who has gone before the federal — the Foreign Intelligence Service court, who has prosecuted and investigated and jailed terrorists in this country after September 11th.

I was appointed U.S. attorney by President Bush on September 10th, 2001, and the world changed enormously the next day, and that happened in my state.

This is not theoretical to me. I went to the funerals. We lost friends of ours in the Trade Center that day. My own wife was two blocks from the Trade Center that day, at her office, having gone through it that morning.

I found that interesting, because I didn’t know that. And perhaps the reason I didn’t know that is that it’s complete bullshit. As Marcy Wheeler points out on Emptywheel, Christie was actuallynominated months later, on December 7th, 2001

The President intends to nominate Christopher J. Christie to be United States Attorney for the District of New Jersey. Christie has been a partner with Dughi, Hewitt and Palatucci of Cranford, New Jersey since 1987. He is a graduate of the University of Delaware and Seton Hall University School of Law.

Christie took office in January 2002.

Source: Chris Christie So Obsessed With Increasing Surveillance He Pretends He Was A Fed On 9/11 Even Though He Wasn’t | Techdirt

Dennis Hastert And Federal Prosecutorial Power

This week, federal prosecutors indicted former Speaker of the House Dennis Hastert.

Hastert is charged with two federal crimes: structuring financial transactions to evade IRS reporting requirements in violation of 31 U.S.C. section 5324(a)(3) and lying to the FBI in violation of the notorious 18 U.S.C. section 1001. Both charges reflect the breadth of federal prosecutorial power.

The indictment has mostly inspired chatter about what it doesn’t say. Hastert is charged with structuring withdrawals of less than $10,000 (so that they would not be reported to the IRS) so that he could pay off an unidentified person for Hastert’s unidentified past misconduct. What past misconduct, or threatened accusation of misconduct, could lead Hastert to pay $3.5 million? The indictment doesn’t say, but it has been drafted to imply that the allegation of past misconduct relates to Hastert’s job as a teacher and coach in Yorkville, Illinois. Hastert isn’t charged with doing anything to the accuser, and the accuser isn’t charged with extortion.

As Radley Balko has pointed out, structuring (or “smurfing”) charges are extremely flexible. They demonstrate the reality of how Americans targeted by the Department of Justice can be charged. We imagine law enforcement operating like we see on TV: someone commits a crime, everyone knows what the crime is, law enforcement reacts by charging them with that crime. But that’s not how federal prosecution always works. Particularly with high-profile targets, federal prosecution is often an exercise in searching for a theory to prosecute someone that the feds would like to prosecute. There is an element of creativity: what federal statute can we find to prosecute this person?

We’ll learn more about the reasons for Hastert’s payments in the course of the case (or through Department of Justice leaks calculated to harm him). I suspect we’ll find that the investigation happened like this: the feds heard that Hastert was paying someone off based on an accusation of old misconduct, determined that the misconduct was too old (or out of their jurisdiction) to prosecute, and started subpoenaing records and interviewing witnesses until they found some element of what he was doing that was a federal crime. In other words, they targeted the man, and then looked for the crime.

The problem with this scenario is that federal criminal law is extremely broad. Practically speaking, it gives federal prosecutors vast discretion to determine who among us faces criminal charges. If you think that you’re safe because you’ve never committed a crime, you may learn to your surprise that you’re wrong.

The rational response to this situation is clear: don’t trust the feds, don’t talk to the feds. But Dennis Hastert, like many accomplished people, believed he could talk his way out of the situation. When the FBI came to interview him, he didn’t refuse to answer and call his lawyer. According to the indictment, he confirmed in response to an FBI agent’s question that he was withdrawing cash in order to store it because he didn’t feel the banking system was safe. For that, he’s been charged with lying to federal agents.

Link (Popehat)

U.N. Report Asserts Encryption as a Human Right in the Digital Age

Encryption is not the refuge of scoundrels, as Obama administration law-enforcement officials loudly proclaim – it is an essential tool needed to protect the right of freedom of opinion and expression in the digital age, a new United Nations report concludes.

Encryption that makes a communication unintelligible to anyone but the intended recipient creates “a zone of privacy to protect opinion and belief,” says the report from David Kaye, who as Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression is essentially the U.N.’s free speech watchdog.

The significance of encryption extends well beyond political speech, Kaye writes. “The ability to search the web, develop ideas and communicate securely may be the only way in which many can explore basic aspects of identity, such as one’s gender, religion, ethnicity, national origin or sexuality.”

Encryption, like anonymity, is essential to artists, journalists, whistleblowers, and many other classes of people, the report says.

And far from banning or weakening encryption, governments should embrace and strengthen it, Kaye writes. He specifically urges the U.S. Congress to “prohibit the Government from requiring companies to weaken product security or insert back-door access measures.”

Obama administration officials have been advocating for encryption with some sort of built-in measure that law enforcement could circumvent, either an intentional weakness that creates a “back door,” or some sort of split “master key”.

Newly-installed Attorney General Loretta Lynch on Wednesday became the latest to engage in fear-mongering, saying she had “grave concerns” about encryption’s use by “people whose sworn duty is to harm Americans here and abroad.”

National Security Agency director Mike Rogers took a slightly more nuanced view on Wednesday, ZDNet reported. “You’re not going to hear me say that encryption is a bad thing. I don’t think it is a bad thing. Encryption is not bad. Encryption is a fundamental part of the future; I think it would be ridiculous to pretend otherwise,” Rogers told a cyberwarfare conference in Estonia.

But he expressed his desire for a legal framework that would give law enforcement access, asking: “Can we create some mechanism where within this legal framework there’s a means to access information that directly relates to the security of our respective nations, even as at the same time we are mindful we have got to protect the rights of our individual citizens?”

Kaye’s answer is: No. He concludes from his research that “compromised encryption cannot be kept secret from those with the skill to find and exploit the weak points, whether State or non-State, legitimate or criminal.” Thus: “In the contemporary technological environment, intentionally compromising encryption, even for arguably legitimate purposes, weakens everyone’s security online.”

And Kaye points out that law enforcement officials “have not demonstrated that criminal or terrorist use of encryption serves as an insuperable barrier to law enforcement objectives.”

Indeed, FBI Director James Comey gave a much-quoted speech last fall about how increasingly common cell-phone encryption could lead law enforcement to a “very dark place” where it “misses out” on crucial evidence to nail criminals. But the examples he then gave failed the laugh test.

The United Nation’s Office of the High Commissioner for Human Rights appoints expert “special rapporteurs” to be their eyes and ears when it comes to key human rights issues. Kaye, a law professor at the University of California, Irvine, began his three-year term as the rapporteur for freedom of opinion and expression in August 2014.

His report also warns that state prohibitions of anonymity online – such as required real-name registration for online activity, SIM card registration, or banning of anonymity tools such as Tor — interfere with the right to freedom of expression.

Encryption advocates hailed the report. “This landmark report shows how fundamental — and necessary — encryption is for exercising freedom of expression,” said Access Senior Policy Counsel Peter Micek. “It’s a sober rebuke of baseless fear-mongering from those who say encryption only helps criminals and terrorists.”

Link (The Intercept)

Seized Megaupload Domains Link to Scam Ads and Malware

Well over three years have passed since Megaupload was shutdown, but there is still little progress in the criminal proceedings against the operation.

The United States hopes that New Zealand will extradite Kim Dotcom and his colleagues, but the hearings have been delayed several times already.

Meanwhile, several domain names including the popular Megaupload.com and Megavideo.com remain under the control of the U.S. Government. At least, that should be the case. In reality, however, they’re now being exploited by ‘cyber criminals.’

Instead of a banner announcing that the domains names have been seized as part of a criminal investigation they now direct people to a Zero-Click adverting feed. This feed often links to malware installers and other malicious ads.

One of the many malicious “ads” the Megaupload and Megavideo domain names are serving links to a fake BBC article, suggesting people can get an iPhone 6 for only £1.

And here is another example of a malicious ad prompting visitors to update their browser.

The question that immediately comes to mind is this: How can it be that the Department of Justice is allowing the domains to be used for such nefarious purposes?

Looking at the Whois records everything seems to be in order. The domain name still lists Megaupload Limited as registrant, which is as it was before. Nothing out of the ordinary.

The nameserver PLEASEDROPTHISHOST15525.CIRFU.BIZ, on the other hand, triggers several alarm bells.

CIRFU refers to the FBI’s Cyber Initiative and Resource Fusion Unit, a specialized tech team tasked with handling online crime and scams. The unit used the CIRFU.NET domain name as nameserver for various seized domains, including the Mega ones.

Interestingly, the CIRFU.NET domain now lists “Syndk8 Media Limited” as registrant, which doesn’t appear to have any connections with the FBI. Similarly, CIRFU.BIZ is not an official CIRFU domain either and points to a server in the Netherlands hosted by LeaseWeb.

It appears that the domain which the Department of Justice (DoJ) used as nameserver is no longer in control of the Government. Perhaps it expired, or was taken over via other means.

Link (TorrentFreak)

FBI Says It Has No Idea Why Law Enforcement Agencies Are Following The Terms Of Its Stingray Non-Disclosure Agreements

The FBI doesn’t want to talk about its Stingray devices. It definitely doesn’t want local law enforcement agencies talking about them. It forces any agency seeking to acquire one to sign a very restrictive non-disclosure agreement that stipulates — among other things — that as little information as possible on IMSI catchers makes its way into the public domain, which includes opposing counsel, prosecutors’ offices and judges. The NDAs also instruct agencies to drop prosecutions if disclosure appears unavoidable. We know this because two NDAs have actually been obtained through Freedom of Information requests.

Now that Stingray usage and its attendant secrecy have been questioned by high-ranking DC legislators, the FBI is apparently feeling it should be a bit more proactive on the Stingray info front, presumably in hopes of heading off a more intrusive official inquiry. So, it has offered some “clarification” on its Stingray policies — including the NDAs it makes local agencies sign.

The “clarification” seems to contradict a great deal of what the FBI’s own NDAs require.

In a handful of criminal cases around the country, local police officers have testified in recent months that non-disclosure agreements with the FBI forbid them from acknowledging the use of secret cellphone-tracking devices. In some, prosecutors have settled cases rather than risk revealing, during court proceedings, sensitive details about the use of the devices.

The FBI, however, says such agreements do not prevent police from disclosing that they used such equipment, often called a StingRay. And only as a “last resort” would the FBI require state and local law enforcement agencies to drop criminal cases rather than sharing details of the devices’ use and “compromising the future use of the technique.”

To date, the bureau hasn’t invoked that provision, FBI spokesman Christopher Allen said in a statement to The Washington Post.

Let’s compare the official statement with statements found in the agreement signed with a New York sheriff’s department. The FBI says it’s OK for law enforcement agencies to disclose Stingray usage in this “clarification.” Here’sthe NDA:

The Erie County Sheriff’s Office shall not, in any civil or criminal proceeding, use or provide any information concerning the Harris Corporation wireless collection equipment/technology… beyond the evidentiary results obtained through the use of the equipment/technology including, but not limited to, during pre-trial matters, in search warrants and related affidavits, in discovery, in response to court ordered disclosure, in other affidavits, in grand jury hearings, in the State’s case-in-chief, rebuttal, or on appeal, or in testimony in any phase of civil or criminal trial, without the prior written approval of the FBI.

Link (Techdirt)

FBI Spied On Activists Because Protecting Corporate Interests Is Roughly Equivalent To Ensuring National Security

That whole thing about the FBI not surveilling people based solely on First Amendment activity? The thing that’s been in all the (FISA) papers (and agency policies)? Yeah, the FBI hasn’t heard of it either.

The FBI breached its own internal rules when it spied on campaigners against the Keystone XL pipeline, failing to get approval before it cultivated informants and opened files on individuals protesting against the construction of the pipeline in Texas, documents reveal.

Internal agency documents show for the first time how FBI agents have been closely monitoring anti-Keystone activists, in violation of guidelines designed to prevent the agency from becoming unduly involved in sensitive political issues.

“Unduly involved” is right. First of all, a majority of what was monitored was First Amendment activity, something no federal intelligence or investigative agency is supposed to be doing. Certainly, there can be law enforcement monitoring of protests as they occur, but there’s no provision in the law that allows the FBI to monitor people solely because of their activism.

Unless, of course, these activists are declared “extremists.” Then all bets (and Constitutional protections) are off.

“Many of these extremists believe the debates over pollution, protection of wildlife, safety, and property rights have been overshadowed by the promise of jobs and cheaper oil prices,” the FBI document states.

“Extremists” are often mentioned in the same breath as “domestic terrorists,” so with a little bit of rebranding, the FBI is now able to surveill people solely for their First Amendment-protected activities. That’s handy and not totally unexpected, given the agency’s long history of eyeballing activists who run contrary to its view on How Things Should Be. At one point, it was uppity blacks and encroaching homosexuals. Now, it’s people who don’t want an oil pipeline running through their neighborhoods.

Link (Techdirt)

What are the Lyrics to Louie Louie? The FBI figured it out, finally….

Would you believe that the FBI conducted a two year investigation into whether someone should go to jail for “Louie Louie.”? Yeah, the song. A threat to national security and order!

Can you imagine what kind of blueballed hall monitor dipshit fuckhead decided that there should be an FBI investigation at all much less one that lasted for two years?

I can.

They’re the kind of people who now find themselves as administrators at colleges and law schools. They’re the kind of people who have decided that “that kind of thing” bothers them — even if the “thing” has changed (but not really by a lot). Although this letter was most certainly not written by Catharine MacKinnon, you can find her spirit in between the lines. (Will over-privileged bored white women always be the bane of liberty?) See also Catharine A. MacKinnon, Pornography, Civil Rights, and Speech, 20 Harv. C.R.-C.L. L. Rev. 1, 3 & n.2 (1985).

A threat to national security
A threat to national security
It should come as little surprise that the ball started rolling with the Indianapolis and Tampa FBI offices. Yep. The more things change, the more they stay the same. Two bastions of stupidity in 1964, and 50 years later, not much has changed. See, e.g., American Booksellers v. Hudnut, 771 F.2d 323 (7th Cir. 1985). In all fairness, Detroit really picked up the ball and ran with it too. So, lets hear it for a tradition of wasting time and money.
The punch line? Do you know the lyrics to “Louie Louie?”

No, without using Wikipedia.

How many times have you drunkenly swayed back and forth screaming absolute nonsense, knowing full well that the only words you know to it are “Louie Lou-waaay,” “yeah, yeah, yeah, yeah, yeah” and “we gotta go?” Hell, I’ve even performed the song on stage, no fucking idea what the lyrics are. (Spolier alert, it isn’t “we gotta go”)

Well I feel better now.

Link (The Legal Satyricon)