www.aclu.orgJOIN THE ACLUTAKE ACTIONDONATEABOUT US
ACLU Blog of Rights - Official Blog of the ACLU National Office Blog of Rights Homepage Support the ACLU

Join Us At:

Sep 24th, 2009 Google Bookmarks Technorati StumbleUpon Digg! Reddit Delicious Facebook
Posted by Sara Mullen, ACLU of Pennsylvania at 4:59pm

Fighting for Free Speech at the G20 in Pittsburgh

After the ACLU of Pennsylvania successfully sued last week to force the city of Pittsburgh to allow several groups to hold demonstrations around the G20 Summit, it seemed that free speech would prevail in the Steel City.

Unfortunately, this has not proven to be the case. Following the court ruling, the Pittsburgh police department has engaged in a pattern of harassment of G20 demonstrators, singling out the Seeds of Peace Collective, one of several groups providing food support to the protestors.

The police have repeatedly tried to intimidate members of the collective, citing them with minor traffic violations, illegally searching their bus, towing their legally parked bus, detaining and charging members walking home with loitering, repeatedly demanding identification, and pressuring private property owners to rescind their permission for the collective to park its bus.

Despite evidence of systematic harassment, a federal judge refused to grant a temporary injunction to stop the harassment in a second lawsuit.

The ACLU-PA is collecting reports of violations of protestors’ rights at the G20 and publishing them on our Web site. Anyone witnessing a violation is encouraged to call the ACLU G20 hotline at (412) 562-5015.

The ACLU-PA and the National Lawyers Guild have dispatched over 150 legal observers to monitor law enforcement’s treatment of the protestors throughout the week.

More information about the ACLU and the G20 is available here.

Check out The New York Times blog post about the G20 protests, which includes a video featuring an interview with ACLU-PA Legal Director Vic Walczak.

Sep 22nd, 2009 Google Bookmarks Technorati StumbleUpon Digg! Reddit Delicious Facebook
Posted by Suzanne Ito, ACLU at 09:01am

2009 Supreme Court Term Preview

This morning in Washington, D.C., we are hosting our annual Supreme Court breakfast, in which attorneys discuss cases that the ACLU will or may be arguing in the upcoming term. This year's breakfast will have three speakers: ACLU Legal Director Steve Shapiro; Jameel Jaffer, Director of the ACLU National Security Project; and Peter Eliasberg, Managing Attorney at the ACLU of Southern California.

Steve kicks off the breakfast with an overview of the upcoming term and the civil liberties issues at stake.

Jameel discusses Department of Defense v. ACLU, our Freedom of Information Act (FOIA) lawsuit over photographs depicting the abuse of prisoners at detention facilities in Afghanistan and Iraq. The question before the court is whether the government can rely on an exemption to the Freedom of Information Act to withhold the photographs on the basis of a general assertion that their release could provoke a violent response. The government has asked the Supreme Court to review an appellate court decision that found in our favor, requiring the Defense Department to release these photographs. We should hear whether the Supreme Court will hear the case by September 29.

Finally, Peter discusses Salazar v. Buono, a case that will address whether the government has adequately remedied the Establishment Clause violation created by the presence of a Latin cross in the Mojave Desert National Preserve by transferring one acre of land surrounding the cross to the Veterans of Foreign Wars while also designating the cross as a national memorial. The lower courts agreed with the ACLU that the government's actions compounded the Establishment Clause problem rather than resolving it. Peter will argue the case before the court on October 7. Learn more about this case by reading Peter's statement.

Tags: U.S. Supreme Court

Sep 18th, 2009 Google Bookmarks Technorati StumbleUpon Digg! Reddit Delicious Facebook
Posted by Ateqah Khaki, National Security Project at 5:49pm

NYT Calls for End to “Ideological Exclusion”

Yesterday, The New York Times opined about “ideological exclusion” — the practice of denying foreign citizens entry into the U.S. based on their political views and associations, rather than any suspicious activity — writing:

"The Bush administration eagerly revived the practice, barring numerous people from entering the country for speaking engagements or conferences or to teach at leading universities — all under a flimsily supported guise of fighting terrorism.

[…]Months ago, a group of free speech advocates, including the Association of American Publishers, the American Library Association and the American Civil Liberties Union called on the Obama administration to end ideological exclusions and to review dubious visa denials. We hope Secretary of State Hillary Rodham Clinton takes heed.
Although “ideological exclusion” originated during the Cold War, when critics of U.S. policy were often excluded as supposed Communists, the misguided practice was revived in the wake of the 9/11 attacks.

The ACLU is challenging the exclusion of foreign scholars Tariq Ramadan and Adam Habib on behalf of academic, religious and professional organizations that have invited these scholars to speak in the U.S. The lawsuits charge that the Departments of State and Homeland Security are violating Americans' First Amendment right to hear Professors Ramadan and Habib's speech.

The editorial highlights our cases, stating:

Adam Habib, a well-known intellectual, professor and human rights activist from South Africa, was interrogated for seven hours and told that his visa had been revoked when he tried to enter the United States in 2006 for professional meetings. He was later told that his exclusion was based on terrorism-related grounds. He is challenging the action in court, but the government has yet to explain its precise legal or factual reasoning.

In 2004, the Bush administration revoked the visa of Tariq Ramadan, a Swiss national and Muslim scholar, who was to become a tenured professor at the University of Notre Dame. It again denied him a visa in 2006. Two months ago, a three-judge panel of the United States Court of Appeals for the Second Circuit in Manhattan unanimously reversed a lower-court ruling allowing the government’s move.
The editors at the Times got it right: ideological exclusion is inconsistent with American values. The sad revival of this long-discredited practice should end, and ideological exclusion should be returned to the dustbin of history.

Sep 18th, 2009 Google Bookmarks Technorati StumbleUpon Digg! Reddit Delicious Facebook
Posted by Suzanne Ito, ACLU at 3:28pm

Justice for True Patriots

Yesterday, Sen. Russell Feingold (D-Wis.) introduced the Justice Act, which would provide much-needed fixes to the three provisions of the Patriot Act that expire at the end of this year. This is good news, because on Tuesday the Department of Justice said in a letter to Senate Judiciary Committee Chairman Sen. Patrick Leahy (D-Vt.) (PDF) that it was open to reforming parts of the Patriot Act. We're going to hold you to that, DOJ!

Earlier this year, the ACLU's Washington Legislative Office released a report, called Reclaiming Patriotism (PDF), that details the parts of the Patriot Act that need fixing most. Since the 38-page report isn't exactly light fare, we'll sum up the must-know parts for the upcoming Patriot Act debate:

First, the three provisions that will expire at the end of the year:

  1. Section 206, a.k.a. the "roving wiretap" provision: Section 206 allows the FBI to get an order from the Foreign Intelligence Surveillance Court (FISC) to wiretap a target without having to provide the target's name or even their phone number. The provision only requires that the target is described "with particularity," and that the FBI tell FISC why it had to tap the phone after it was tapped. It basically lacks any kind of specificity that, you know, a real warrant would need.

  2. Section 6001, a.k.a. the "lone wolf" provision of the Intelligence Reform and Terrorism Prevention Act (IRTPA): Section 6001 authorizes the government to get secret surveillance orders against individuals who are not associated with any international terrorist group or foreign nation. As the report points out, an international terrorist acting independently of any organization or country is pretty pie-in-the-sky unlikely.

  3. Section 215, a.k.a. the "library provision": The term "any tangible thing" should raise your hackles. Like the previous two provisions, Section 215 also lowers the bar on the standard of proof needed to get a court order to surveill. Before the Patriot Act was passed, probable cause showing that the target of surveillance was the agent of a foreign power was required. After Patriot, Section 215 allows the FBI to only claim that the items or information sought is relevant to an investigation. That means the person being surveilled doesn't necessarily have to be the target of the investigation or even be suspected of involvement in terrorism.

The ACLU is also concerned about provisions of the Patriot Act that are not expiring, but which would be amended under Sen. Feingold's bill. For example, the National Security Letter statute, which permits the FBI to secretly demand sensitive and private customer records from Internet service providers, banks, and credit companies, without any suspicion or prior judicial approval. To make matters even worse, the statute allows the FBI to put gag orders on NSL recipients, prohibiting them from discussing the record demand. The ACLU have filed three lawsuits on behalf of NSL recipients, and most recently, a federal appeals court upheld a lower court ruling that the NSL statute's gag provisions violated the First Amendment.

The Justice Act would also fix the worst parts of the FISA Amendments Act (FAA). You remember the FAA, right? That was the law Congress passed last year that immunized telecoms from lawsuits for wiretapping innocent Americans, in collusion with the National Security Agency. In passing the FAA, Congress — with the help of then-Sen. Obama — basically signed away our Fourth Amendment rights by allowing the government to conduct dragnet surveillance of Americans’ international communications.

We hope Congress and the president will take this opportunity to not only right that wrong, but also fix the overbroad sections of the Patriot Act by passing the Justice Act and signing it into law, restoring Americans’ privacy rights.

You can watch the debate unfold next week: On Tuesday, the ACLU's Mike German will testify about the Patriot Act before the House Judiciary Subcommittee on the Constitution, Civil Rights, and Civil Liberties. And the Senate Judiciary Committee will hold a hearing on the Patriot Act next Wednesday.

(Oh, and in case you were wondering, the "Justice Act" is indeed a crazy acronym, just like the "Patriot Act." It stands for: "Judicious Use of Surveillance Tools in Counterterrorism Efforts." Does Congress have a machine that makes up these things?)

Tags: National Security Letters, Patriot Act

Sep 15th, 2009 Google Bookmarks Technorati StumbleUpon Digg! Reddit Delicious Facebook
Posted by Michael German, Policy Counsel on National Security, Immigration and Privacy at 2:26pm

The Erosion of Posse Comitatus

(Originally posted on Daily Kos.)

Remember Esequiel Hernandez, Jr.? "Junior," as he was known, was an American teenager shot and killed in 1997 by U.S. Marines as he tended a flock of goats near his home one evening in Redford, Texas. The Marines, fully armed and dressed in camouflage ghillie suits, were operating on U.S. soil as part of a covert counter-drug mission supporting the Border Patrol. They were not supposed to come into contact with civilians; rather they were just to observe and report what they saw to the Border Patrol. But Junior had a .22 caliber rifle with him, and it appears he fired at least one shot from it that evening. What he was shooting at isn't clear. The Marines looked more like tumbleweeds than men, and none of them were hit. But as war-fighters, Marines are trained to engage a threat until it is destroyed, without asking a lot of questions. While this mission orientation is essential in combat, it is a poor fit with the shades-of-gray world of domestic policing. In any event, they followed their military "rules of engagement," advanced their position and returned fire, killing Junior with a bullet to the chest.

The reason I bring this incident up is that it demonstrates the risks of using military forces in domestic law enforcement missions. From their colonial experience, the framers of the Constitution recognized the threat a standing army posed to democracy, and they sought to establish a government that guaranteed civilian control over the military. This ideal was finally codified after the Civil War through the Posse Comitatus Act, which prohibited the Army from engaging in law enforcement activities.

The Posse Comitatus Act should have prevented what happened to Junior. But Congress has weakened Posse Comitatus over the years to involve the military in drug enforcement, border control and all sorts of other "domestic support" operations. Today, the number of domestic missions the military is accepting and the number of troops it is deploying inside the U.S. is drastically increasing, making future tragedies like Junior's only more likely.

The first meeting of a new "Advisory Panel on Department of Defense Capabilities for Support of Civil Authorities After Certain Incidents" is taking place this afternoon. Congress recently charged this panel with evaluating "the authorities and capabilities of the Department of Defense (DOD) to conduct operations in support of U.S. civil authorities in the event of a chemical, biological, radiological, nuclear, or high yield explosive (CBRNE) incident." This effort appears to be part of the latest assault on Posse Comitatus.

The ACLU submitted comments to remind the Panel that this increasing domestic use of military troops cuts against longstanding traditions of civilian dominance and to ask them to consider options other than increasing reliance on military forces.

Last year the Army's 3rd Infantry Division's 1st Brigade Combat Team, fresh from a tour in Iraq, became the first combat troops assigned to the U.S. Northern Command. These 4,700 soldiers would be tasked with responding to a CBRNE event in the U.S., and were not expected to be directly involved in law enforcement operations. But they train and deploy with the National Guard, who are not governed by Posse Comitatus unless called to federal service (so someone in camouflage might still end up pointing a gun at you if they are ever sent on a mission). Moreover, there are indications that the size of this CBRNE response force is going to increase. The Progressive's Matthew Rothschild reported last month that U.S. Northern Command recently distributed a legislative proposal asking Congress to authorize "the Secretary of Defense to order any unit or member of the Army Reserve, Air Force Reserve, Navy Reserve, and the Marine Corps Reserve, to active duty for a major disaster or emergency." This would put "more than 379,000 military personnel in thousands of communities across the United States" at the secretary's command.

Now a CBRNE event could certainly overwhelm the capabilities of local law enforcement and first responders. But if there is a need for a dedicated force to respond to such an event that force should be civilian. After 9/11, we created the Department of Homeland Security (DHS), the largest civilian agency in the federal government, and gave it the mission (PDF) "to prevent and deter terrorist threats and to protect against and respond to threats and hazards to the nation" (emphasis added). If the DOD has a role here, it is to train and equip the civilian agencies responsible for disaster response. There is simply no reason why we have to accept that the military is the only entity capable of responding to CBRNE events. Yesterday, DHS announced it was giving state and local fusion centers access to classified military intelligence in DOD databases, an unusual move given the New York Times reported in July that "Janet Napolitano, the homeland security secretary, said Wednesday that fusion centers were not intended to have a military presence, and that she was not aware of ones that did.

There is no doubt that the military is very good at many things. But recent history shows that restraint in their new-found domestic role is not one of them.

  • In 2001 the National Security Agency began domestic wiretapping and data collection programs we still don't know the true extent of (though we do know the NSA continued to "overcollect" even after Congress legalized the program).

  • In 2003, the Department of Defense began a program to track potential terrorist threats to Department personnel or property. These TALON reports, an acronym for Threat and Local Observation Notices, were designed to permit civilians and military personnel to report on suspicious activity near defense installations. Not surprisingly, the DOD soon strayed from this limited mission and TALON became a repository for information about peaceful anti-war protesters, and even Quakers. Reports were added to the database even when the "threat" was an anti-war protest that occurred far from any military installation and some "threats" the military deemed non-credible were never removed.

  • A detective with the Los Angeles County Sheriff's Office allegedly established a spying ring that included a Marine intelligence specialist stationed at Camp Pendleton, California and a civilian intelligence analyst working at U.S. Northern Command. Together they stole hundreds of highly classified intelligence files from the Strategic Technical Operations Center at Camp Pendleton and secret surveillance reports from the U.S. Northern Command. Some of the stolen files reportedly "pertained to surveillance of Muslim communities in Southern California," including mosques in L.A. and San Diego, and revealed "a federal surveillance program targeting Muslim groups" in the United States. It remains unclear why the military had such records.

  • In the most recently exposed example, just last month a civilian DOD employee working for Fort Lewis Force Protection violated military regulations by infiltrating anti-war protest groups in Olympia, Washington. He used a fake name and posed as a sympathizer for more than a year, all the while reporting the groups' activities to the local law enforcement agencies he worked with.

These examples of excess and overreach amply demonstrate the risks to giving new domestic missions to the military. The military needs to focus on and train for its primary mission of fighting and winning wars. We don't need more tragedies like Junior's, and we can avoid them by assigning civilian missions to civilians.

Sep 9th, 2009 Google Bookmarks Technorati StumbleUpon Digg! Reddit Delicious Facebook
Posted by Suzanne Ito, ACLU at 4:09pm

"The Fat Lady Has Sung for the Fourth Amendment"

Sacramento's KXTV reported on our lawsuit to enforce our Freedom of Information Act (FOIA) request for records about Customs and Border Protection’s (CBP) policy of searching travelers’ laptops without suspicion of wrongdoing. We want to see the criteria used for selecting passengers for suspicionless searches, the number of people who have been subject to the searches, the number of devices and documents retained and the reasons for their retention. Pretty basic stuff, we think.

KXTV's article states:

"I don't carry my laptop overseas anymore," said Sacramento attorney Mark Reichel. "The fat lady has sung for the fourth amendment."

Reichel said one client who carries sensitive business information on his laptop on international trips sends the hard drive home separately by express mail.
You could also encrypt your hard drive, as the ACLU’s Technology and Liberty Project public education director, Jay Stanley, suggested last month. But whether you're using software or express mail to get around the CBP's invasive policy, those solutions don't address the fact that the government is violating your Fourth Amendment right against unreasonable searches and seizures.

KXTV’s news segment features ACLU National Security Project attorney Larry Schwartztol explaining why laptop searches at the border are different from traditional searches of luggage. As Larry explains, your luggage probably doesn’t contain personal documents and files, pictures of your family and friends, all of your email correspondence or sensitive business information.

Has your laptop been searched at the border? We want to hear your story. Contact us at "nspintake [at] aclu.org."

Aug 28th, 2009 Google Bookmarks Technorati StumbleUpon Digg! Reddit Delicious Facebook
Posted by Sandra Park, Women's Rights Project at 5:22pm

How the Patents on the Breast Cancer Genes Harm Physicians and Patients

By Sandra S. Park, Staff Attorney, ACLU Women's Rights Project

Yesterday, the American Medical Association (PDF) and several other major medical and patient organizations (PDF) filed briefs in support of our lawsuit challenging the patents on two human genes associated with breast and ovarian cancer (the BRCA1 and BRCA2 genes).

Why would the AMA get involved in a patent case? Because "[t]he use of patents . . . to limit the availability of medical procedures places significant limitation on the dissemination of medical knowledge, and is therefore unethical."

The patents we have challenged claim the actual BRCA1 and BRCA2 genetic sequences and directly violate this ethical principle. While all of us have these two genes in our bodies, the patents give the patent holder the exclusive right to determine who can examine these genes. As a result, Myriad Genetics, one of the defendants in the case, is the sole provider of BRCA1/2 full sequencing testing in the United States. A woman who wants to know whether she has a mutation on these genes that places her at greater risk for cancer, and a physician who wants to order that test for her, have only one option, leading to less access to medical treatment and knowledge.

It does not matter what technique is used to analyze the genes, or whose blood sample is tested (yours, mine, or the six women who are plaintiffs in the case) – the patents grant control over the genes. If you want to confirm your test results through another lab, or if you can't afford the price Myriad sets, there is nowhere else you can go.

For people concerned about hereditary risk for breast and ovarian cancer, access to information about the BRCA1/2 genes is too important to put in a single company's hands. As Susan Love, M.D., author of the classic Dr. Susan Love's Breast Book, describes in the declaration she filed in support of the lawsuit (PDF), genetic test results can dramatically influence a breast cancer patient's decisions about prevention and treatment. She said: "It is my professional opinion that genes are so fundamental to science, medicine and clinical care that patents should not be granted so as to exclude doctors and geneticists from examining them. Allowing a company to control the BRCA1/2 genes is harmful to the quality of care we can provide our patients."

We have asked the court to rule on whether the BRCA1/2 gene patents violate patent law, which prohibits the patenting of products and laws of nature, and the Constitution. For more information about the lawsuit, Association for Molecular Pathology et al. v. United States Patent and Trademark Office et al., and to read more from the scientific and medical experts who have come out in support of the case, see www.aclu.org/brca

Aug 28th, 2009 Google Bookmarks Technorati StumbleUpon Digg! Reddit Delicious Facebook
Posted by Jay Stanley, Technology & Liberty Program at 4:47pm

The Homeland Security Lap Dance

(Originally posted on Daily Kos.)

Yesterday, a day after we filed a lawsuit over the matter, DHS issued a new policy on laptop searches at the border. We were not impressed. The new policy imposes some limits on the claimed authority of the U.S. Customs and Border Protection (CBP) agency but leaves intact its unconstitutional policy allowing agents to conduct suspicionless searches of travelers' laptops.

Customs offices in the U.S. and other countries have long had the power to inspect goods being brought into the nation. But it is a radical new step for the government to claim that it can inspect the information being brought across our borders — not only radical, but laughable too.

In a DHS press release, Secretary Janet Napolitano said:

Keeping Americans safe in an increasingly digital world depends on our ability to lawfully screen materials entering the United States.
Clearly, by "materials," CBP now means electronic data as well as physical materials. But does Customs now claim the right to examine all digital "materials" that cross our nation's borders via the Internet? If not, then is it DHS' position that America is massively unsafe until we institute such a system? Also, is America unsafe as long as we permit encrypted digital materials to cross the border, either on someone's person or via the Internet?

If CBP does not claim the radical power to monitor the importation of data into the United States over the Internet, then checking laptops of international travelers is like trying to monitor the trickle of water in a gutter while the Mississippi river flows nearby, unattended.

And so the policy fails not only a constitutional test, but also a basic balancing test: while the damage to privacy is deep and wide-ranging, its security benefit is laughable.

Clearly this policy really has nothing to do with "securing the borders" of the United States in the sense of CBP's right to search and seize for contraband goods. Rather, it is about giving border agents sweeping new powers to peer into the lives and invade the privacy of individuals crossing the border. Today you can easily buy a computer hard drive with a capacity of two terabytes of data; that is equivalent to 10 percent of all the books held in the Library of Congress (usually estimated at 20 terabytes). And taking up that enormous storage volume, people often hold the bulk of their information lives on their laptops — their correspondence, writings, personal photographs and videos, financial and medical records, business dealings (including sometimes trade secrets), reading matter and much else.

In Thomas Jefferson's day, all that would have been stored in his study at Monticello and no government official would have ever had the right to pore over (not to mention, the ability to conduct keyword searches through) that material without a warrant. We need privacy today as much as our founders did in theirs, and shouldn't allow it to slip away because of the shifting technological platforms through which we conduct our business and our lives.

So this is really about giving agents the ability to deeply invade individuals' privacy at a whim, not the ability to "secure the borders" from contraband goods. Clearly when we cross the border we identify ourselves to an extent by presenting our passport. But we have never before, and cannot now permit the government to engage in limitless exploration of our lives under the rationale of security. The battle over laptop searches is part of a larger battle over just how much probing security officials at the border and elsewhere can do; other fronts in that fight include controversies over airline watchlists and the Automated Targeting System.

In the DHS directive itself, the agency writes that searches of computers "and any other electronic or digital devices" are

essential to enforcing the law at the U.S. border. Searches of electronic devices help detect evidence relating to terrorism and other national security matters, human and bulk cash smuggling, contraband, and child pornography. They can also reveal information about financial and commercial crimes, such as those relating to copyright, trademark and export control violations. Finally, searches at the border are often integral to a determination of admissibility under the immigration laws.
Clearly searches of laptops on the border between New Jersey and Pennsylvania, or in libraries, or of citizens walking down the sidewalk, might also from time to time "help detect evidence" related to various crimes. But that has never been enough of a reason in our legal system to allow the authorities to conduct such searches without suspicion of wrongdoing. There is no unique need to conduct such searches at the border, as there is to prevent physical contraband from entering the country.

In any case, anyone carrying personal information on a laptop is well advised to encrypt that data, not only because of our government's aggressive claims for unconstitutional search authority at the border, but also because laptops get lost and stolen. Personally, I use the open-source, easy-to-use TrueCrypt, which not only renders your data inaccessible to anyone up to and including the National Security Agency (as long as they can't get your passphrase), but also includes a feature for plausible deniability in case someone forces you to type in your passphrase (you type in an alternate passphrase and a separate container showing different, unsensitive files opens up instead of your sensitive folder, and no one can prove that the sensitive folder even exists).

Legislation introduced last year by Wisconsin Sen. Russell D. Feingold, called the Travelers' Privacy Protection Act would have imposed the proper constitutional criteria on CBP laptop searches by requiring probable cause. Let's hope Congress isn't fooled by DHS' new policy and proceeds with passing this important legislation.

Aug 26th, 2009 Google Bookmarks Technorati StumbleUpon Digg! Reddit Delicious Facebook
Posted by Suzanne Ito, ACLU at 1:15pm

Surrendering Your Fourth Amendment Rights at the Border

(Originally posted on Daily Kos.)

Today the ACLU filed a lawsuit against U.S. Customs and Border Protection (CBP) demanding records about the CBP's policy of searching travelers' laptops without suspicion of wrongdoing. The lawsuit was filed to enforce a Freedom of Information Act request we filed in June, when we requested the criteria used for selecting passengers for suspicionless searches, the number of people who have been subject to the searches, the number of devices and documents retained and the reasons for their retention.

In the policy, the CBP asserts the right to read the information on travelers' laptops "absent individualized suspicion." So that means searching all files saved on laptops, including personal financial information, family photographs and lists of Web sites travelers have visited, without having any reason to believe a traveler has broken the law.

And after they're done searching your laptop, they also reserve the right to search "documents, books, pamphlets and other printed material, as well as computers, disks, hard drives and other electronic or digital storage devices." (So you might want to reconsider sending that risque email to your spouse from your Blackberry, 'cause the CBP might see that as well).

Oh, and while you're at it, don't carry, send or receive any sensitive or private documents that you might need for work. As we pointed out last year, the Association of Corporate Travel Executives (ACTE) opposes the CBP policy because it threatens companies' ability to do business with the rest of the world, especially those companies that are trying to keep trade secrets, you know, secret. Testifying before the Senate Subcommittee on the Constitution last year, Susan Gurley of the ACTE said: "[T]he unjustified retention and/or copying of proprietary and sensitive business information pursuant to the warrantless seizure of laptops and other electronic devices imposes both a personal and economic hardship on business travelers and their corporations."

Talk about kicking the economy while it's down.

Oh, and this policy includes everyone crossing the border, whether they're U.S. citizens or not. Think of it as equal opportunity virtual frisking.

We'll of course keep you posted as this lawsuit progresses. But in the meantime, if your laptop or electronic device has been searched at the border, let us know about it by emailing "legalintake [at] aclu.org."

Aug 21st, 2009 Google Bookmarks Technorati StumbleUpon Digg! Reddit Delicious Facebook
Posted by Elizabeth Esser-Stuart, LGBT Project at 4:41pm

School Censorship, Justice and LGBT Rights

When I was in the 10th grade at the Alabama School of Fine Arts, a public high school in Birmingham, the administration banned a t-shirt with the words, “Gay? Fine by Me.” I was shocked that this was happening at my school, an institution with a seemingly liberal and open arts culture. I knew this threatened the use of free speech and dialogue in art, culture and the classroom, and that something had to be done.

I researched free speech rights, students’ rights, and non-discrimination laws. Despite an overwhelming body of similar cases and the First Amendment supporting me, the administration didn’t budge. After months of meetings, I called the ACLU and explained my problem. After the ACLU wrote the administration of my school, they immediately reversed the policy, suddenly realizing they lacked legal authority to censor students.

The significance in the story above is a deep understanding of justice from small censorship cases to more destructive discriminatory laws, such as adoption bans and the Defense of Marriage Act (DOMA). This summer, as an intern at the American Civil Liberties Union LGBT and AIDS Project, I’ve reviewed cases that challenge same-sex adoption bans and proofread court briefs. These tasks show the broad spectrum of experiences where rights have been taken away or never existed. My conversations with lawyers and activists were the best part of the experience, because they introduced me to how the law could protect and save people from discrimination and ensure liberties.

Massachusetts legalized same sex marriage my freshman year of high school and since then state laws have begun to slowly change After five years, 15 states and the District of Columbia recognize same sex relationships in a variety of ways; leaving 35 states with no recognition. Further, 29 states restrict marriage to a man and woman, and many have laws that threaten to not honor same-sex relationships in any way.

My experience at the ACLU highlighted how important justice was. After completing this opportunity, I will continue to explore concepts of justice, crime and punishment to inform my personal legal philosophy. As an undergraduate, I’ve studied international law, legal philosophy and economics, and hope to attend law school in the future to work for a more equal society.

As I spent my summer interning at the LGBT and AIDS Project, I am reminded of why I felt so angered in high school. Whether I am proofreading a brief, researching legal precedent or studying cases, I am assisting the work of a cause much larger than myself. I am increasingly aware of the discriminatory laws — Proposition 8, DOMA — and the marginalizing of transgender individuals and people with HIV. During the above experience in high school, my peers and I were personally discriminated against and marginalized. Now that I am more informed, I am working for a cause larger than myself and giving back to the same community that helped me in the past.

Just in time for the new school year, the ACLU has released a new letter to principals and educators about LGBT-related censorship. If you find yourself in a similar situation to Elizabeth, download and print the letter and give it to your school. If they still want to censor you, contact us!

 

Quicksearch


© ACLU, 125 Broad Street, 18th Floor New York, NY 10004
This is the Web site of the American Civil Liberties Union and the ACLU Foundation.
Learn more about the distinction between these two components of the ACLU.

User Agreement | Privacy Statement | FAQs | Site Map