Dec 17 2012

Should sex offenders have to wear a “scarlet letter” on the Internet?

In the novel The Scarlet Letter, Hestor Prynne was required to wear a prominent badge on her clothes, for life, to identify her publicly with the crime she had been convicted of: violating the sexual mores decreed as law by the fundamentalist religious and political leaders of the Massachusetts Bay Colony.

Today a Federal court heard arguments on whether Californians convicted of certain sex-related crimes can similarly be prohibited for life from speaking or acting anonymously on the Internet, and required to declare to the local police, within 24 hours, each of their Internet service providers or “Internet identifiers” (email addresses, user names, etc.).

California’s Proposition 35, enacted by popular vote in October 2012 (can the majority vote to revoke the rights of a disfavored minority?), adds the following provisions (among others) to state law:

Every person described in subdivision (c), for the rest of his or her life while residing in California, or while attending school or working in California, shall be required to register with the chief of police of the city in which he or she is residing, or the sheriff of the county if he or she is residing in an unincorporated area or city that has no police department,… within five working days of coming into, or changing his or her residence within, any city, county, or city and county, or campus in which he or she temporarily resides, and shall be required to register thereafter in accordance with the Act.

(c)  The following persons shall be required to register: Any person who, since July 1, 1944, has been or is hereafter convicted [of specified offenses].

(a) Beginning on his or her first birthday following registration or change of address, the person shall be required to register annually, within five working days of his or her birthday, to update his or her registration…

(b)  If any person who is required to register pursuant to the Act adds or changes his or her account with an Internet service provider or adds or changes an Internet identifier, the person shall send written notice of the addition or change to the law enforcement agency or agencies with which he or she is currently registered within 24 hours….. The registration shall consist of all of the following:…

(4)  A list of any and all Internet identifiers established or used by the person.

(5)  A list of any and all Internet service providers used by the person….

For purposes of this chapter, the following terms apply:

(a) “Internet service provider” means a business, organization, or other entity providing a computer and communications facility directly to consumers through which a person may obtain access to the Internet….

(b)  “Internet identifier” means an electronic mail address, user name, screen name, or similar identifier used for the purpose of Internet forum discussions, Internet chat room discussions, instant messaging, social networking, or similar Internet communication.

The day after the election, the Electronic Frontier Foundation (EFF) and the ACLU of Northern California filed a class-action challenging the new law as unconstitutionally vague (nobody can tell with certainty which “identifiers” or “services” have to be disclosed to the police, or might result in criminal prosecution if they aren’t disclosed) and unconstitutionally “overbroad” (no matter how it is interpreted, its plain language would restrict rights protected by the First Amendment).

Judge Thelton Henderson of the U.S. District Court for the Northern District of California immediately approved a temporary restraining order preventing the law from being implemented.

Today in San Francisco, Judge Henderson heard almost three hours of argument by lawyers from EFF, the ACLU, the California Attorney General’s office (the defendant in the lawsuit), and the sponsors of Proposition 35 (Chris Kelly, who funded the “Yes on Prop. 35” campaign, was present in court) on whether the court should issue a “Preliminary Injunction” continuing the prohibition on enforcement of the law until the federal court’s final decision in the case, which could take months or years.

While the meaning of “Internet identifier” is vague, all parties to the case (and the would-be intervenors) agreed in response to Judge Henderson’s questions about a list of examples — user IDs for banking websites. BestBuy.com, Amazon.com, World of Warcraft, etc. — that a user ID used to read the New York Times online would need to be registered with the government, if the user ever posted any comments about news stories.  And the proponents of the law stressed that the purpose of the registration requirement is not to warn the public about registered users of Internet services, but to facilitate police surveillance and investigation of potential future crimes, including “covert” (sting) operations.

As Michael Risher of the ACLU pointed out, “There’s no historical precedent for stripping people of 1st Amendment rights [after the completion of their sentence] on the basis of their having previously been convicted of a crime.”  But this law, if upheld, would set an important precedent of its own.

The registration requirement and the prohibition on using an unregistered user ID or alias don’t depend on any relationship between the Internet and the crime of which someone was convicted. Nor does anything in the proponents’ arguments for this provision of the law depend on the specific nature of the crimes.  If this provision of the law is upheld as applied to people convicted of crimes related to sex, anyone convicted of any crime, ever, could be subjected to a categorical lifetime ban on anonymous online speech.

As Hanni Foukhoury of EFF has pointed out, a similar thing has already happened with DNA testing: First required in California for people convicted of murder and rape, it has since been gradually extend to people convicted of other specified violent crimes, then to people convicted of all felonies, then to anyone arrested for any felony (including possession of any amount of marijuana with “intent to sell”).

Judge Henderson promised a ruling on the motion for a preliminary injunction “as soon as possible”. In the meantime, the temporary injunction against enforcement of the IISP and Internet ID registration rules remains in effect.

Dec 05 2012

The DHS FOIA Office “is not in service”

We’ve been waiting for years for responses to some of our FOIA requests to the TSA and DHS, including a request for records of what happened to our earlier FOIA requests that were subjected to a special program  of political review and reporting to the White House, a request for records that were previously improperly withheld under a claimed FOIA “exemption” which the Supreme Court eventually ruled didn’t exist, and a request for any records of the TSA having sought or obtained OMB approval for its Certification of Identity form.

Unfortunately, the de facto policy of the Department of Homeland Security is not just to ignore any FOIA requester who isn’t already suing it, but to make it impossible even to communicate with it or obtain proof of having made requests.

As we’ve noted before, the DHS uses a contractor who often fails either to deliver their mail or return the return receipts, making it impossible to prove they have received requests. Recipients have told us that the mail is often so browned and burnt by the contractor’s high-intensity x-ray screening that mail that is eventually delivered to DHS, after a delay of a week or so, is often illegible.

Despite huge expansion, changes, reorganizations, and relocations of DHS offices, the DHS FOIA Regulations and what is required by law to be the definitive list of DHS FOIA contacts hasn’t been updated since 2003, despite our repeated protests. Today, many of those addresses lead only to the dead-letter office.

Many DHS and component offices don’t disclose their physical locations. Even if you can find where their offices are, the doors are barred to those without appointments and government-issued photo ID.

And it’s getting worse.  Now the main phone number for the DHS FOIA Requester Service Center (and, if you want to complain about their unresponsiveness, the DHS FOIA “Public Liaison” as well), has been disconnected or taken out of service. Not that it was usually answered by a human being, or that voicemail messages were usually returned, but turning off the phones entirely (or using only some other undisclosed phone numbers at their undisclosed location) is really a new low.

If you go to the Where to Make a FOIA Request page on FOIA.gov, and choose “Department of Homeland Security” and then either “Headquarters and Privacy Office” or “I don’t know which office”, you are directed to call (703) 235-0790.  (Click the image above for a larger version of the Web page.) Call that number, and you get the recorded message, “Sorry. The number you have reached is not in service.”

We knew the DHS FOIA Office was “not in service”, or at least not serving us. But we didn’t realize that they had gotten the phone company to put a recording on their line telling that to anyone who tries to call.

[Update: The TSA and DHS claim that the “FOIA.gov” website is maintained by the Department of Justice and beyond the control of the DHS. But the same wrong number appears on DHS.gov at http://www.dhs.gov/check-status-your-foia-request as the number to call to find out the status of a FOIA request, along with a self-referential hyperlink for FOIA status information that links back to the same page.]

Dec 02 2012

TSA updates its “notice” of Secure Flight records

The TSA published a revised System of Records Notice in the Federal Register on November 19th, updating its disclosures of what information about our “travel histories” it collects, retains, and uses through its Secure Flight program for airline passenger surveillance and control.

The new notice is both better and worse than it might appear at first glance. The new “Secure Flight” SORN describes some disturbing TSA practices that were not explicitly disclosed in the previous “Secure Flight” SORN published in 2008.

In particular, the new SORN discloses that if you are turned down or predetermined to be ineligible for the TSA’s “Pre-Check” or other “Registered Traveler” (a/k/a “Possibly Slightly Less Mistrusted Traveler”) programs, you can be placed on a new watchlist, as a result of which logs of your air travel will be retained by the TSA for 99 years. That’s especially problematic because applicants for the Pre-Check program aren’t told that being turned down could leave them worse off than if they had never applied, and subject to lifetime TSA air travel monitoring and itinerary logging.

Bad as this is, however, it isn’t really a change in what data TSA claims the right to collect, or how long it claims the right to retain and use it. These practices were already covered under “catch-all” clauses of the prior SORN, which are retained in the revised SORN, and that actually purport to authorize a much wider range of even worse practices.

Specifically, the “Secure Flight” SORN already disclosed that “Secure Flight” records might contain:

Records obtained from the TSC [Terrorist Screening Center] of known or suspected terrorists in the TSDB [Terrorist Screening Database] and records regarding individuals identified on classified and unclassified governmental watch lists

There’s no definition or limitation on the sources or purposes of these additional “watch lists”. But it’s clear from the description quoted above that these are watch lists other than those of suspected terrorists: lists of people who are to be watched, and whose air travel itineraries are to be logged for life, for (secret, unrestricted) reasons other than that they are suspected of terrorism. Read More