[Home] [Headlines] [Latest Articles] [Latest Comments] [Post] [Sign-in] [Mail] [Setup] [Help]
Status: Not Logged In; Sign In
Resistance See other Resistance Articles Title: Operation Sex Deviate 2.0 In the bad-old-days of American intelligence, J. Edgar Hoover maintained a notorious Sex Deviate file filled with salacious bits of information on the sexual proclivities of prominent Americans: actors, columnists, activists, members of Congress, and even presidents. Sometimes this information could be immediately usefulas when Hoovers right hand Cartha DeLoach proudly reported that the Bureau had learned of a truculent senator caught driving drunk with a good looking broad. The senator, DeLoach explained, was promptly made aware that we had the information, and we never had trouble with him on appropriations since. But Hoover could be patient as well: In the 1940s, the FBI investigated and wiretapped columnist and suspected German spy Inga Arvad, who happened to be conducting an affair with a young naval ensign named John Kennedy. When Kennedy won the Democratic presidential nomination 17 years later, the Arvad dossier was immediately moved to Hoovers personal office file. Sometimes the information was used to discredit Hoovers political enemies through targeted leaks; on other occasions, the threat of exposure was enough. The National Security Agency has clearly learned to apply Hoovers tactics in the war on terrorism: In a new Huffington Post story based on documents leaked by Edward Snowden, Glenn Greenwald reports that the NSA discussed how Islamist radicalizers could be discredited by exploiting informationpresumably obtained through electronic surveillanceabout their online sexual activities. Critically, the six radicalizers mentioned in the NSA document do not appear to have been directly involved in terrorism: They are described only as preachers of extremist ideas. Indeed, the document notes that the three English- speaking radicalizers, one of whom is identified as a U.S. person, seem to have had minimal contact with members of violent groups, and one is characterized as explicitly condeming violence against civillians. Nevertheless, the Agency urged that such vulnerabilities as online promiscuity or viewing sexually explicit material online could be used to discredit these radicalizers by exposing them as hypocrites. While its not clear whether the NSAor one of its client agenciesever carried through on this plan, even compiling and disseminating such derogatory information about a U.S. person guilty of no more than vile (but nevertheless First Amendment protected) speech would be, prima facie, illegal. But given the breadth of NSAs collection, records of the online sexual habits of millions of others who might one day be deemed radicalizers of one stripe or another are almost certainly sitting in a database waiting to be mined and deployed. The report underscores one of the primary reasons intellgience surveillance in particular is so susceptible to abuse. In criminal investigations, the paradigmatic government use of information gleaned from wiretaps or other forms of spying is as evidence in a criminal trial, where the governments actions are subject to eventual scrutiny and legal accountability. But in the realm of intelligence, only rarely are the fruits of surveillance used in criminal prosecutioneliminating the primary back end institutional check on government spying. Often, the point is precisely to make use of information from intercepts in ways that can never be directly or publicly traced to government. A target whose reputation or career is torpedoed by embarassing disclosures may never know whether they were the victim of an intelligence operation or simple bad luck. The U.S. legal system is ill-designed to guard against such tactics: Our primary safeguardindeed, in most cases the only safeguardagainst violations of the Fourth Amendment is the exclusionary rule, which prohibits evidence derived from illicit surveillance from being used against a defendant at trial. When, instead, intelligence agencies use surveillance to attack their targets through means other than prosecution, no court or judge is ever likely to review their work. You may not be engaged in any criminal conduct, but does that really mean you have nothing to hide from government? Check your browser history before answering too confidently. Post Comment Private Reply Ignore Thread
|
||
[Home]
[Headlines]
[Latest Articles]
[Latest Comments]
[Post]
[Sign-in]
[Mail]
[Setup]
[Help]
|