Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
3Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Unleashed and Unaccountable: The FBI’s Unchecked Abuse of Authority

Unleashed and Unaccountable: The FBI’s Unchecked Abuse of Authority

Ratings: (0)|Views: 2,415 |Likes:
Published by ag1838
ACLU Report on alleged FBI abuses.
ACLU Report on alleged FBI abuses.

More info:

Published by: ag1838 on Sep 17, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/15/2014

pdf

text

original

 
September 2013
UNLEASHED AND UNACCOUNTABLE
The FBI’s Unchecked Abuse of Authority
 
Table of ContentsExecutive Summary ……………………………………………………………………… iIntroduction ……………………………………………………………………………… 1I. Tension Between Domestic Intelligence and Constitutional Rights…………………… 2II. Unleashed: The New Post-9/11 Powers ……………………………………………….. 4A. Surveillance Powers, Given and Taken ……………………………………….. 41. USA Patriot Act ………………………………………………………… 42. Exigent Letters and a Secret OLC Opinion …………………………73. Warrantless Wiretapping and the FISA Amendments Act …………… 8B. Expanding FBI Investigative Authorities …………….……………………… 91. Ashcroft Attorney General’s Guidelines ……………………………92. Evidence of FBI Spying on Political Activists ……………………….. 103. 2010 Inspector General Report Confirms Spying and Lying ………… 114. Mukasey Attorney General’s Guidelines ……………………………… 12C. FBI Profiling Based on Race, Ethnicity, Religion, and National Origin ……… 131. The FBI Domestic Operations and Investigations Guide ……………… 142. Racial and Ethnic Mapping …………………………………………… 153. Innocent Victims of Aggressive Investigation and Surveillance ……… 18D. Unrestrained Data Collection and Data Mining ……………………………… 191. eGuardian and “Suspicious” Activity Reports ………………………… 192. Mining Big Data: FTTTF, IDW, and NSAC ………………………… 203. Real Threats Still Slipping Through the Cracks ……………………… 234. Mining Bigger Data: the NCTC Guidelines …………………………… 275. Exploitation of New Technologies …………………………………… 28
 
6. Secret Spying and Secret Law ………………………………………… 28III. Unaccountable: Evidence of Abuse, Need for Reform ……………………………… 29A. Shirking Justice Department Oversight ……………………………………… 29B. Suppressing Whistleblowers ………………………………………………… 30C. Circumventing External Controls ……………………………………………… 321. Targeting Journalists …………………………………………………… 322. Thwarting Congressional Oversight …………………………………… 333. Thwarting Public Oversight with Excessive Secrecy ………………… 34IV. Targeting First Amendment Activity ………………………………………………… 36A. Biased Training ……………………………………………………………… 36B. Targeting AMEMSA Communities …………………………………………… 39C. Targeting Activists …………………………………………………………… 41V. Greater Oversight Needed: The FBI Abroad ………………………………………… 43A. Proxy Detentions ……………………………………………………………… 43B. FBI Overseas Interrogation Policy …………………………………………… 45C. Use of No-fly List to Pressure Americans Abroad to Become Informants …46VI. Conclusion and Recommendations …………………………………………………… 48

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->