Showing posts with label privacy. Show all posts
Showing posts with label privacy. Show all posts

2009-01-22

Someone else is spying on YOU. And it isn’t the NSA. Fusion Centers.

JaciCee
Daily Kos
January 22, 2009

Ever hear of a Fusion Center?

They are run by the Department of Homeland Security and are locally based across the country.

A fusion center is an effective and efficient mechanism to exchange information and intelligence, maximize resources, streamline operations, and improve the ability to fight crime and terrorism by merging data from a variety of sources.

At first blush this sounds good. After 9/11 discussions were had about how to streamline communication between local and federal law enforcement agencies.

From the Department of Homeland Security website:

Many states and larger cities have created state and local fusion centers to share information and intelligence within their jurisdictions as well as with the federal government. The Department, through the Office of Intelligence and Analysis, provides personnel with operational and intelligence skills to the fusion centers. This support is tailored to the unique needs of the locality and serves to:

help the classified and unclassified information flow,
provide expertise,
coordinate with local law enforcement and other agencies, and
provide local awareness and access.

But, it is being alleged that something has gone wrong along the way. Fusion centers have now come under the scrutinizing eye of the ACLU, and for good reasons.

Who is spying in your neighborhood?

These centers have been placed in our neighborhoods. Our local fusion center is located on Bataan Boulevard in Santa Fe, New Mexico. You can find the fusion center nearest you by clicking on this interactive map. The ACLU has also set up a site that tracks camera surveillance. Video surveillance is nothing new, but:

Video surveillance is not a new phenomenon, but the amount of attention that the federal government has been paying is. In the past five years, the Department of Homeland Security has awarded $300 million in grants to state and local governments, all in the name of public video surveillance.

From the same article:

Meanwhile, a timely University of California study has found that San Francisco’s $700,000 ‘Crime Camera’ program has had no impact on violent crime since its 2005 installation. The study also states that robberies dropped significantly within each camera’s radius, but notes that this finding is inconclusive.

These two paragraphs beg some further discussion. Is the surveillance arm of the Department of Homeland Security working in conjunction with the fusion center in this California neighborhood? If surveillance cameras aren’t reducing crime significantly, what other purposes are they serving?

From California again:

The Electronic Frontier Foundation and the ACLU of California have filed a federal lawsuit against the FBI and local authorities over the seizure and search of two organizations’ computers, they jointly announced Wednesday.

On August 27, 2008, the University of California Police, the Alameda County Sheriff’s Department and the FBI took part in a raid of the Berkeley offices of two politically active groups, Long Haul Infoshop and East Bay Prisoner Support Group (EBPS), seizing every computer in the building, even those behind locked doors, which were opened by force. The raid was conducted despite no allegations of wrongdoing on the part of either organization or any of their members, and the complaint questions the legality of the warrant obtained by authorities.

Why search and seize at the Long Haul Infoshop or the East Bay Prisoner Support Group? Was the FBI working in conjunction with the local fusion center? More questions.

The neighborhood spying isn’t limited to California.

From the Washington Post:

Organizational meetings, public forums, prison vigils, rallies outside the State House in Annapolis and e-mail group lists were infiltrated by police posing as peace activists and death penalty opponents, the records show. The surveillance continued even though the logs contained no reports of illegal activity and consistently indicated that the activists were not planning violent protests.

The records show that undercover agents collectively spent 288 hours on surveillance activities over 14 months from March 2005 until May 2006.

The fusion center in New Mexico is known as a "cut and paste" shop. Analysts peruse media, in all forms (print and electronic), clipping information that they feel is "important" or "questionable." It is also alleged that they peruse the internet. It wouldn’t surprise me if they were reading this diary, now.

Their peering eyes are looking into the private sector:

A new institution is emerging in American life: Fusion Centers. These state, local and regional institutions were originally created to improve the sharing of anti-terrorism intelligence among different state, local and federal law enforcement agencies. Though they developed independently and remain quite different from one another, for many the scope of their mission has quickly expanded - with the support and encouragement of the federal government - to cover "all crimes and all hazards." The types of information they seek for analysis has also broadened over time to include not just criminal intelligence, but public and private sector data, and participation in these centers has grown to include not just law enforcement, but other government entities, the military and even select members of the private sector.

Legislation has been drafted, and will be presented to the New Mexico State Legislature, addressing concerns over the fusion center in Santa Fe.

A draft of the ACLU legislation, sponsored by Rep. Antonio "Mo" Maestas, D-Albuquerque, would prohibit a law enforcement agency from collecting, maintaining and sharing "with any other law enforcement agency, information about the political, religious or social associations, views or activities of a person unless" they are suspected of committing a crime.

That is the kicker…they aren’t watching American citizens who are suspected of committing crimes. They are watching whoever they want to.

A quick summary:

But in a democracy, the collection and sharing of intelligence information - especially information about American citizens and other residents - need to be carried out with the utmost care. That is because more and more, the amount of information available on each one of us is enough to assemble a very detailed portrait of our lives. And because security agencies are moving toward using such portraits to profile how "suspicious" we look.

American citizens aren’t being spied on just by the NSA. They are being spied on by the fusion center office around the corner.

Pinal County, AZ, shelves speed-camera program

Pinal County supervisors Wednesday bid goodbye to photo enforcement.

Their vote to terminate their contract with Redflex, the company that operates the cameras, came at the recommendation of the county's top law-enforcement official, new Pinal County Sheriff Paul Babeu.

"I'm against photo speed enforcement completely," Babeu said, walking the three-member panel through a detailed PowerPoint presentation. "Here in Pinal, it's failed miserably."

Babeu said speed cameras created dangerous road conditions and offered little financial benefit for the county. He plans to boost traffic enforcement through additional manpower.

Although Pinal County's contract with Redflex wasn't set to expire until Feb. 20, two mobile speed cameras have not been in operation on Pinal roads since Babeu took office Jan. 1.

The speed vans had been roadside in some of Pinal's most populous areas, including Apache Junction, Gold Canyon and unincorporated areas near Queen Creek, since mid-2007.

The county's program is separate from the one operated by the Arizona Department of Public Safety on freeways statewide.

The supervisors two weeks ago had tabled a vote on the Redflex contract because they wanted Babeu to prepare a report on camera enforcement in Pinal, including the financial impact on the county.

He reported Wednesday that the two cameras were activated 11,416 times from September 2007 through last month. Of those activations, 7,290 resulted in citations, but only 3,711 were paid.

Babeu said most of the total $134,199.43 in fines and fees from the paid citations covered administrative and operational costs, leaving the county with a net profit of $12,391.58 that Babeu dismissed as paltry.

Moreover, Babeu said, total motor-vehicle accidents increased by 16 percent in the same time period, and fatal collisions in the Queen Creek area doubled from three to six.

The sheriff said he couldn't be certain that speed cameras were to blame for the crashes, but he believes they were a factor.

Collisions were said to be the reason Redflex was implemented on county roads. Former Sheriff Chris Vasquez initiated the contract to minimize an increasing number of crashes on Hunt Highway, the main thoroughfare connecting north-central Pinal County with Maricopa County.

Babeu thinks that putting more deputies on patrol offers the best way to improve safety, instead of relying on cameras that "can't catch drunk drivers" or stop motorists involved in illegal or dangerous activities.

The sheriff has increased his traffic-enforcement unit from two to four deputies, and a fifth will join the team soon. Babeu said the changes were made at no county cost as part of a departmentwide reorganization.

Babeu estimated that the volume of citations issued annually by the Sheriff's Office would increase sharply as a result of having more deputies on the streets. He said the five-member team alone could generate 10,400 to 20,800 citations a year.

Supervisor Bryan Martyn, whose district was the primary operating area for the speed vans, said he received a number of letters from residents who favored speed-camera enforcement, but he "doesn't presume to tell the sheriff how to do his job."

"He believes he has a better solution to this public-safety concern," Martyn said. "What he's proposing is prudent and seems to make sense. If it goes as sold, you may be praying for photo radar again."

Babeu may answer those prayers in a different way. He wants to bring red-light cameras to the county.

Ex-NSA analyst: Agency spied on news organizations

A former National Security Agency analyst told MSNBC’s Keith Olbermann Wednesday night that the Bush Administration targeted and eavesdropped on the conversations of American journalists.

Share:
· Facebook
· LinkedIn
· Email
· Print
· Link

Russell Tice, one of the sources who revealed the secret NSA warrantless wiretapping program to The New York Times in 2005, gave harrowing details about the NSA’s wiretapping program in an interview less than 24 hours after President George Bush left office.

He told Olbermann that the NSA collected all communications from various U.S. groups, many of which had nothing to do with terrorism:

Tice: Now, what I was finding out, though, is that the collection on those organizations was 24/7, and you know, 365 days a year, and it made no sense. And that's -- I started to investigate that. That's about the time when they came after me, to fire me. But an organization that was collected on were U.S. news organizations and reporters and journalists.

Olbermann: To what purpose? I mean, is there a file somewhere full of every e-mail sent by all the reporters at the "New York Times?" Is there a recording somewhere of every conversation I had with my little nephew in upstate New York? Is it like that?

Tice: If it was involved in this specific avenue of collection, it would be everything. Yes. It would be everything.

When Bush defended the secret wiretapping program after it became public a little more than three years ago, he said that only international communications were monitored as a way to collect terrorism intelligence. But Tice said that was not true.

“The National Security Agency had access to all Americans' communications, faxes, phone calls, and their computer communications. And that doesn't -- it didn't matter whether you were in Kansas, you know, in the middle of the country, and you never made a communication -- foreign communications at all. They monitored all communications,” he said.

Additionally Tice told Olbermann that "the agency would tailor some of their briefings to try to be deceptive” to congressional committees so that no one would know exactly what the NSA was collecting.

Olbermann asked Tice if President Barack Obama could, and would, stop the NSA from continuing to spy on Americans. Tice responded that he had tried to reach out to the Obama Administration and was still hoping he could work with the White House on intelligence issues.

The American Civil Liberties Union is challenging the NSA wiretapping program, as legalized by the FISA Amendments Act of 2008, in federal court in Manhattan. The Reporters Committee filed a friend-of-the-court brief in the case, Amnesty International v. McConnell, arguing that the law violates the First Amendment rights of journalist to conduct interviews with their sources.

Samantha Fredrickson, 3:48 pm · Comments: 0

Intelligence Agencies' Databases Set to Be Linked

WASHINGTON -- U.S. spy agencies' sensitive data should soon be linked by Google-like search systems, nearly five years after the intelligence community was rebuked by the 9/11 Commission for failing to "connect the dots" and detect the attack.

Director of National Intelligence Mike McConnell has launched a sweeping technology program to knit together the thousands of databases across all 16 spy agencies. After years of bureaucratic snafus, intelligence analysts will be able to search through secret intelligence files the same way they can search public data on the Internet.

Mr. McConnell's new technology program is also addressing a more basic problem: Spies often have trouble emailing colleagues in other U.S. intelligence agencies, because email addresses aren't readily accessible, and messages sometimes get eaten by security filters. Mr. McConnell aims to solve that by uniting the agencies' email systems into a single system with a full directory that links names, expertise and addresses.

Linking up the 16 agencies is the challenge at the heart of the job of director of national intelligence, created after 9/11. Dennis Blair, nominated by President Barack Obama to succeed Mr. McConnell, faces a confirmation hearing Thursday where senators are likely to ask how he will make agencies with different histories and missions work together.

The new information program also is designed to include Facebook-like social-networking programs and classified news feeds. It includes enhanced security measures to ensure that only appropriately cleared people can access the network. The price tag is expected to be in the billions of dollars, but much of that money will be reallocated from existing technology programs.

The impact for analysts, Mr. McConnell says, "will be staggering." Not only will analysts have vastly more data to examine, potentially inaccurate intelligence will stand out more clearly, he said.

Today, an analyst's query might scan only 5% of the total intelligence data in the U.S. government, said a senior intelligence official. Even when analysts find documents, they sometimes can't read them without protracted negotiations to gain access. Under the new system, an analyst would likely search about 95% of the data, the official said.

Several similar efforts have been aborted in the past decade, because cultural divides couldn't be bridged between rival agencies. Some of those efforts predated 9/11, and many intelligence agencies have botched their own technology programs since 2001.

Mr. McConnell's team says this effort, called the Information Integration Program, has experienced officials working on it full-time and is designed to deliver tangible products every few months. "There really is a very different spirit about doing all these things than there was, I think, in the past," said Prescott Winter, a senior National Security Agency official who is directing the program for Mr. McConnell.

The program is likely to get a review from Mr. Blair. The new administration is expected to make sure it is adequately funded, effective and protects privacy.

The initiative grew out of discussions more than a year ago between the Pentagon's intelligence chief and Mr. McConnell's top deputy, who were concerned that military and civilian intelligence data couldn't be easily tapped. They asked the chief information officers at the six largest intelligence agencies to develop a solution.

Over the summer, the officers began to sketch out the technology and policy problems to be solved, including protecting sources and connecting systems at different levels of classification. They also assembled case studies, which showed that the typical analyst is using technology that is about a decade old, a senior intelligence official said.

In September, all 16 agencies agreed to the goal of creating one searchable data and email system, and Mr. McConnell borrowed Mr. Winter from the NSA to get the program under way.

The first stage of the initiative is to merge the email systems of the six largest intelligence agencies, including the Federal Bureau of Investigation, the Central Intelligence Agency and the NSA. Mr. Winter said that is on track to be largely completed by the end of the month. Then, they will expand to the other 10 agencies. By 2010, the intelligence agencies and the Pentagon would have a single email system.

With the Google-like system, intelligence officials would like to connect the bulk of the databases by the end of the year, though no firm date has been set. The system would search all intelligence data, and quickly determine which data an analyst is permitted to see. Someone focused on one corner of the world may be allowed to see everything available on the countries in the region, but not other regions.

Currently, an analyst might run a search but not be able to open a document without negotiating for access. "You don't want to sort of have to play Twenty Questions to figure out where it is hidden," Mr. Winter said.

Write to Siobhan Gorman at siobhan.gorman@wsj.com

2009-01-19

New Guidelines Define NCTC Access to Non-Terror Databases

The National Counterterrorism Center (NCTC), a component of the Office of the Director of National Intelligence, may obtain access to federal databases containing non-terrorism-related information in order to acquire information needed for authorized counterterrorism purposes, pursuant to a recent memorandum of agreement (pdf) between the Director of National Intelligence and the Attorney General.

“NCTC will access information in such datasets identified as containing non-terrorism information… only to determine if the dataset [also] contains terrorism information,” the memorandum states.

“NCTC is not otherwise permitted under these guidelines to query, use, or exploit such datasets (e.g., analysts may not ‘browse’ through records in the dataset that do not match a query with terrorism datapoints, or conduct ‘pattern-based’ queries or analyses without terrorism datapoints),” the memo directs.

The seven-page Memorandum of Agreement has not been approved for public release, but a copy was obtained by Secrecy News. It took effect on November 4, 2008.

“Most of the terrorists arrested in the U.S. have supported themselves with common criminal activities” and therefore NCTC would have a legitimate need for access to related law enforcement information, a senior intelligence official from another agency told Secrecy News.

The new memo “regularizes the process by which NCTC can access information not originally collected for intelligence purposes,” the official said. It also “inserts the ODNI Civil Liberties Protection Officer into the process with an affirmative role for the first time — I think.”

The memorandum makes the ODNI Civil Liberties Protection Officer responsible for ensuring that NCTC complies with privacy guidelines when accessing non-terrorism-related databases.

2009-01-06

Judge: 'Sufficient Facts' Exist That U.S. Spied on Islamic Charity Lawyers

Spy SAN FRANCISCO — A federal judge ruled Monday that "sufficient facts" exist to keep alive a lawsuit brought by two U.S.-based lawyers for a Islamic charity who say they were eavesdropped on without warrants.

The suit involves two American lawyers accidentally given a Top Secret document showing they were eavesdropped on by the government when working for a now-defunct Islamic charity in 2004. Their suit looked all but dead in July when they were initially blocked from using that document to prove they were spied on.

The case tests whether a sitting U.S. president may bypass Congress — in this case whether President Bush abused his power by authorizing his secret spying program in the aftermath of the Sept. 11, 2001, terror attacks.

"I don't want President Obama to have that power any more than I do President Bush," said Jon Eisenberg, the attorney for the two lawyers who are suing the administration.

U.S. District Judge Vaughn Walker said the lawyers' amended lawsuit, even absent the classified document, showed there was enough evidence for the case to continue. The amended lawsuit pieces together snippets of public statements from government investigations into Al-Haramain, the Islamic charity the lawyers were working for and, among other things, a speech about their case by an FBI official.

"The plaintiffs have alleged sufficient facts to withstand the government's motion to dismiss," Walker ruled in a 25-page opinion (.pdf). Walker said the nation's spy laws now demand that he view the classified document and others to decide whether the lawyers were spied on illegally and whether Bush's spy program was unlawful.

The case concerns lawyers Wendell Belew and Asim Ghafoor, whose case appears now the most likely to lead to a ruling on the legality of Bush's warrantless-wiretapping program. That program started after the Sept. 11 terror attacks and involved various initiatives that peered into Americans' phone and internet usage without court approval — a surveillance program ratified by Congress last year in legislation immunizing participating telecommunication companies.

Walker is also considering a lawsuit brought by the Electronic Frontier Foundation challenging whether Congress unconstitutionally granted immunity to telecommunications companies from those lawsuits accusing them of assisting the Bush administration to secretly spy on Americans without warrants.

Walker's decision Monday came six months after he ruled that he could look at the Top Secret document in private to see if the surveillance was illegal, but only if the lawyers could first find independent evidence they were allegedly spied on in violation of how the Foreign Intelligence Surveillance Act was written at the time.

On Monday, Walker ruled: "To be more specific, the court will review the sealed document ex parte and in camera. The court will then issue an order regarding whether plaintiffs may proceed — that is, whether the sealed document establishes that plaintiffs were subject to electronic surveillance not authorized by FISA."

During oral arguments before Walker last month, Justice Department special counsel Anthony Coppolino said the lawyers for the Saudi-based Al-Haramain charity — designated a terror group by the United States — did not have enough evidence to make a case. "This is speculation, this is conjecture, this is not evidence," he said.

The government has never declared whether it had proper court authorization to eavesdrop on the lawyers' U.S.-based telephone conversations with Saudi charity officials.

See Also:

2008-12-21

The Bill Nobody Noticed: National DNA Databank

Patty Donovan
Natural News
December 20, 2008

(NaturalNews) In April of 2008, President Bush signed into law S.1858 which allows the federal government to screen the DNA of all newborn babies in the U.S. This was to be implemented within 6 months meaning that this collection is now being carried out. Congressman Ron Paul states that this bill is the first step towards the establishment of a national DNA database.

S.1858, known as The Newborn Screening Saves Lives Act of 2007, is justified as a “national contingency plan” in that it represents preparation for any sort of public health emergency. The bill states that the federal government should “continue to carry out, coordinate, and expand research in newborn screening” and “maintain a central clearinghouse of current information on newborn screening… ensuring that the clearinghouse is available on the Internet and is updated at least quarterly”. Sections of the bill also make it clear that DNA may be used in genetic experiments and tests. Read the full bill: http://www.govtrack.us/congress/bill.xp…

efoodsTwila Brase, president of the Citizens’ Council on Health Care warns that this new law represents the beginning of nationwide genetic testing. Brase states that S.1858 and H.R. 3825, the House version of the bill, will:
• Establish a national list of genetic conditions for which newborns and children are to be tested.
• Establish protocols for the linking and sharing of genetic test results nationwide.
• Build surveillance systems for tracking the health status and health outcomes of individuals diagnosed at birth with a genetic defect or trait.
• Use the newborn screening program as an opportunity for government agencies to identify, list, and study “secondary conditions” of individuals and their families.
• Subject citizens to genetic research without their knowledge or consent.
Read her entire analysis of the implications of this bill here: http://www.cchconline.org/pdf/S_1858_NB…

Brase states that under this bill, “The DNA taken at birth from every citizen is essentially owned by the government, and every citizen becomes a potential subject of government-sponsored genetic research.” All 50 states are now routinely providing results of genetic screenings to the Department of Homeland Security and this bill will establish the legality of that practice plus include DNA.

Ron Paul has also vigorously argued against this bill making the following comments before the US House of Representatives:

“I cannot support legislation…that exceeds the Constitutional limitations on federal power or in any way threatens the liberty of the American people. I must oppose it.”

“S. 1858 gives the federal bureaucracy the authority to develop a model newborn screening program. Madame Speaker, the federal government lacks both the constitutional authority and the competence to develop a newborn screening program adequate for a nation as large and diverse as the United States. …”

“Those of us in the medical profession should be particularly concerned about policies allowing government officials and state-favored interests to access our medical records without our consent … My review of S. 1858 indicates the drafters of the legislation made no effort to ensure these newborn screening programs do not violate the privacy rights of parents and children, in fact, by directing federal bureaucrats to create a contingency plan for newborn screening in the event of a ‘public health’ disaster, this bill may lead to further erosions of medical privacy. As recent history so eloquently illustrates, politicians are more than willing to take, and people are more than willing to cede, liberty during times of ‘emergency.”

S. 1858 PDF

2008-12-09

Resolution Condemning Domestic Deployment of the US Military

from LP staff

The following resolution was passed by the Libertarian National Committee on Dec. 7, 2008 at its quarterly board meeting:

RESOLUTION CONDEMNING DOMESTIC DEPLOYMENT OF THE U.S. MILITARY

WHEREAS, the domestic deployment of 20,000 uniformed military personnel planned by the United States government undermines the Posse Comitatus Act of 1878, which forbids the use of the military for domestic policing; and,

WHEREAS, such a deployment is an alarming example of the increasing militarization of our society; and,

WHEREAS, the increasing use of active duty military personnel, has led, and will lead, to the abuse of American civil liberties, such as violations of the Fourth Amendment; and,

WHEREAS, a state’s National Guard ­ not active duty members of Army combat units ­ is the appropriate authority to handle local emergencies and disasters should they arise; and,

WHEREAS, the use of the 3rd Infantry Division 1st Brigade Combat Team during a time of war puts further tension on an already strained U.S. military.

THEREFORE, be it resolved, the Libertarian National Committee and its undersigned members hereby condemn the plans of the federal government to deploy 20,000 active duty members of the U.S. military to serve, for whatever reason, domestically in the United States. Furthermore, the Libertarian National Committee calls for the immediate abandonment of these plans, and instead suggests that should an emergency response team comprised of members other than local emergency responders (fire, police, HAZMAT) be developed and trained, it consist of members of the National Guard ­ not active duty personnel of the United States military.

The Libertarian National Committee calls for the citizens of the United States to oppose this militarization of our society, and its encroachment on American civil liberties, to their local, state and federal representatives.

Editor’s note: This resolution was supported by the Libertarian National Committee and passed by unanimous vote of the entire committee.

A Trend to Prison-Like Schools?

DALLAS: 'SOLUTION' TO SCHOOL CRIME: MAKE SCHOOLS LIKE PRISONS

BY KEN BOETTCHER

Politicians across the country are slashing public education
funds to protect the profits of the tax-paying capitalist
class. At the same time--despite its proven failure as a
"crime-fighting" measure--they are also funding the biggest
buildup of prisons in the nation's history because capitalism
has no other "solution" to the crime bred by the growing
poverty and misery the system produces.

"Forward-thinking" municipal servants and school district
officials in Dallas, however, seem to have hit on another
approach--cut down on schools AND prisons by building schools
as though they ARE prisons.

The school year opened in Dallas last month with a new "magnet"
school that THE NEW YORK TIMES recently described in terms that
would please many a prison warden. Appropriately located next
to the Dallas County Probation Department, the "sprawling new
building...has 37 surveillance cameras, six metal detectors,
five full-time police officers and a security-conscious
configuration based on the principles of crime prevention
through environmental design," the TIMES observed.

There are "no nooks or crannies around which to hide," the
TIMES noted. "Perimeter lights illuminate all public spaces and
an eight-foot iron-pole fence seals off the school from an
adjacent residential area," the TIMES added. Halls are broad
and well-lit to enable security cameras an unobstructed view
and prevent bumping as a source of fights.

Further, "The room that houses the mainframes for the school's
computer system is a security command post, where officers scan
37 cameras monitoring the building and grounds." Thanks to
windows everywhere, the grounds are visible from anywhere
inside.

Townview, the $41-million school in question, is already being
hailed as a model for schools across the nation. But can
patrols and surveillance really halt growing violence in the
schools, or is this experiment destined to become just another
failure of repression as an answer to crime?

Time will tell, but certain factors are already known.
Repression hasn't halted growing violence outside the schools,
and the schools ARE a microcosm of the world around them.
Figures from the National School Safety Center show that during
the 1993-1994 school year 46 students were killed on school
grounds during the school day. Moreover, 3 million felonies and
misdemeanors are committed at schools annually, and the
severity of crimes has increased.

It must be remembered that most violent crimes are crimes of
passion, and all the forms of punishment capitalism has been
able to come up with have not been able to overcome the
alienation, despair, frustration and social anarchy that breeds
violent crime. Haven't the Dallas "city fathers" even heard of
plastic guns and bullets, or the martial arts? In the final
analysis, Townview is a telling commentary on the sickness of
the capitalist system--a system whose solution to growing crime
in the schools is to treat students like prisoners.

BACK to the Prison-Industrial Complex Index

Spying on pacifists, environmentalists and nuns

Maryland, police, spying
Kim Hairston / Baltimore Sun
Max Obuszewski talks about being one of the targets of spying by the Maryland State Police. Obuszewski is one of 53 activists wrongly added to a database of suspected terrorists.
An undercover Maryland State Police trooper infiltrated nonviolent groups and labeled dozens of people as terrorists.
By Bob Drogin
December 7, 2008
Reporting from Takoma Park, Md. -- To friends in the protest movement, Lucy was an eager 20-something who attended their events and sent encouraging e-mails to support their causes.

Only one thing seemed strange.

"At one demonstration, I remember her showing up with a laptop computer and typing away," said Mike Stark, who helped lead the anti-death-penalty march in Baltimore that day. "We all thought that was odd."

Not really. The woman was an undercover Maryland State Police trooper who between 2005 and 2007 infiltrated more than two dozen rallies and meetings of nonviolent groups.

Maryland officials now concede that, based on information gathered by "Lucy" and others, state police wrongly listed at least 53 Americans as terrorists in a criminal intelligence database -- and shared some information about them with half a dozen state and federal agencies, including the National Security Agency.

Among those labeled as terrorists: two Catholic nuns, a former Democratic congressional candidate, a lifelong pacifist and a registered lobbyist. One suspect's file warned that she was "involved in puppet making and allows anarchists to utilize her property for meetings."

"There wasn't a scintilla of illegal activity" going on, said David Rocah, an attorney for the American Civil Liberties Union, which filed a lawsuit and in July obtained the first surveillance files. State police have released other heavily redacted documents.

Investigators, the files show, targeted groups that advocated against abortion, global warming, nuclear arms, military recruiting in high schools and biodefense research, among other issues.

"It was unconscionable conduct," said Democratic state Sen. Brian Frosh, who is backing legislation to ban similar spying in Maryland unless the police superintendent can document a "reasonable, articulable suspicion" of criminal activity.

The case is the latest to emerge since the Sept. 11 attacks spurred a sharp increase in state and federal surveillance of Americans. Critics say such investigations violate constitutional guarantees of freedom of speech and assembly, and serve to inhibit lawful dissent.

In the largest known effort, the Pentagon monitored at least 186 lawful protests and meetings -- including church services and silent vigils -- in California and other states.

The military also compiled more than 2,800 reports on Americans in a database of supposed terrorist threats. That program, known as TALON, was ordered closed in 2007 after it was exposed in news reports.

The Maryland operation also has ended, but critics still question why police spent hundreds of hours spying on Quakers and other peace groups in a state that reported more than 36,000 violent crimes last year.

Stephen Sachs, a former state attorney general, investigated the scandal for Gov. Martin O'Malley -- a Democrat elected in 2006. He concluded that state police had violated federal regulations and "significantly overreached."

According to Sachs' 93-page report and other documents, state police launched the operation in March 2005 out of concern that the planned execution of a convicted murderer might lead to violent protests.

They sent Lucy to join local activists at Takoma Park's Electrik Maid, a funky community center popular with punk rockers and slam poets. Ten people attended the gathering, including a local representative from Amnesty International.

"The meeting was primarily concerned with getting people to put up fliers and getting information out to local businesses and churches about the upcoming events," the undercover officer reported later. "No other pertinent intelligence information was obtained."

That proved true for all 29 meetings, rallies and protests that Lucy ultimately attended. Most drew only a handful of people, and none involved illegal or disruptive actions.

Using the aliases Lucy Shoup and Lucy McDonald, she befriended activists. "I want to get involved in different causes," she wrote in an e-mail, citing her interest in "anti-death penalty, antiwar and pro-animal actions!!!"

Max Obuszewski, a Baltimore pacifist who leads antiwar protests, said Lucy asked about civil disobedience, but didn't instigate any. "She never volunteered to do anything, not even hand out leaflets," he said. "She was not an agent provocateur."

Canada Greyhound introduces security screening of passengers

As the holiday travel season ramps up, Greyhound Canada announced it has begun screening passengers at major terminals with hand-held security wands.

The company implemented new security measures Tuesday at its Edmonton, Calgary and Winnipeg terminals, with other locations to follow starting on Dec. 15.

All luggage must now also be stored under the bus, with exceptions for essential travel items such as medications, baby formula and wallets, said Abby Wambaugh, a Greyhound spokeswoman from Dallas, Texas.

"This is something that has been at drivers' discretion and now it's mandatory that all luggage be stowed underneath the coach," she told CBC News.

Security guards will do the screening with the metal detector wands, she added.

Greyhound is not publicly releasing other security details that are in place.

"If we release them, they would no longer be effective," said Wambaugh.

"We're trying to make this as smooth a transition as possible," she added, acknowledging she is not sure if there will be delays because of the new measures.

The new measures follow a two-year security study, said the company.

"We hope to set an example for other carriers to follow. Yet, the high cost of implementing such a program should not fall squarely on the shoulders of the private sector, so we will continue to advocate federal support for bus security funding," Stuart Kendrick, Greyhound Canada's senior vice-president, said in a statement.

A list of restricted and prohibited items posted on the Greyhound Canada website includes firearms, ammunition, animals, flammable liquids and fruit.

In August, Winnipeg resident Tim McLean was killed on a Greyhound bus west of Portage la Prairie, Man. A fellow passenger, Vince Li, is charged with second-degree murder.

Apartheid: US takes Israel's lead, spying and killing at borders

By Brenda Norrell

TUCSON -- Border towers and automatic killzones are already a reality in Israel and could be the next step for the US/Mexico border. Meanwhile, an unmanned and malfunctioning Predator drone is headed for the US/Canadian border from the US/Mexico border to endanger lives there.

The drones, unmanned spy planes, were discontinued for a while after one crashed near Nogales, Ariz., in 2006. Congress, however, brought back the drones, equipped with lasers, to endanger lives on the ground again. The Predators are also used by the US to kill people in Iraq and Afghanistan, controlled by US soldiers in Arizona and Nevada.

Now, Noah Shachtman writes in WIRED that the US government has been trying with limited success to install a string of sensor-laden sentry towers at the US/Mexico border. In Israel, these towers have automatic weapons to spray death.

"On the U.S.-Mexico border, the American government has been trying, with limited success, to set up a string of sensor-laden sentry towers, which would watch out for illicit incursions. In Israel, they've got their own set of border towers. But the Sabras' model comes with automatic guns, operated from afar," Shachtman writes.

The Sentry Tech towers are basically remote weapons stations, stuck on top of silos. "As suspected hostile targets are detected and within range of Sentry-Tech positions, the weapons are slewing toward the designated target," David Eshel describes over at Ares. "As multiple stations can be operated by a single operator, one or more units can be used to engage the target, following identification and verification by the commander."

Wired said it flagged the towers last year, as the Israeli Defense Forces were setting up the systems, designed to create 1500-meter deep "automated kill zones" along the Gaza border.

Meanwhile, the US now has a Predator drone on the way to patrol the northern US border. It comes as no surprise that the first Predator drones for the US/Mexico border were purchased from Israel defense contractor Elbit Systems, the Apartheid maker who also worked on spy systems for Boeing at the US/Mexico border.

The southern drones have been stationed at Fort Huachuca in southern, Arizona, the site of recent protests over US Army training that resulted in torture at Abu Ghraib and Guantanamo. Fort Huachuca was also the site of production of the School of the Americas torture manual, made public in 1996, which resulted in tens of thousands of murders, rapes and tortures in the Americas in the 70s and 80s.

With so many US soldiers arrested and sentenced for smuggling drugs recently, from the border at Nogales to Phoenix, it would be good to know if anyone has checked to see if the unmanned drones are being used by the US military to smuggle drugs.

The FBI had to shut down the sting Operation Lively Green, because so many Army, Marine, Airforce and National Guard soldiers in Tucson, along with police and prison guards, wanted to smuggle cocaine from the Arizona border north. A similar sting resulted in the arrests of soldiers in Oklahoma, smuggling drugs north from the Texas border.

Today, the reality of the United States machinations and its mercenaries in Iraq became even clearer. US prosecutors charged five Blackwater guards with manslaughter. The US said Blackwater guards launched a grenade into unarmed Iraqis at a girls school in Baghdad.

YOU TUBE VIDEO: Watch El Paso and Texas elected leaders send message to Obama: Halt border wall

Leaders call for a halt to the construction and to tear down what has already been built:

http://www.youtube.com/watch?v=20Rr2zEFevA


Drone headed to US northern border:
http://blog.wired.com/defense/2008/12/drone-to-keep-w.html

Drone to Keep Watch on U.S.-Canada Border

749pxmq1_predator_2151267003

On Saturday, a Predator drone touched down at Grand Forks Air Force Base, N.D. The unmanned spy plane will provide eyes in the sky for U.S. Customs and Border Protection, which currently employs three Predators to monitor the U.S.-Mexican border.

The Predator's arrival was delayed by mechanical failure on Thursday -- and bad weather forced cancellation of another flight on Friday. According to the Grand Forks Herald, a Citation jet accompanied the drone on its cross-country journey from Sierra Vista, Ariz., in order to comply with FAA regulations.

Complying with civilian flight rules remains a tricky issue for the pilotless aircraft. Aviation Week reports that Customs and Border Protection has yet to reach agreement with the FAA on the flight restrictions for the Predator that will operate along the Canadian border. Initially, that drone will be controlled from North Dakota; its surveillance feed will be piped to operations centers in Washington, D.C., and Riverside, Calif.

Customs and Border Protection is planning to establish unmanned aerial vehicle operations centers for Northern Border Region and the Southeast Coastal Region. Drones in the north will focus on homeland security and defense; in the Southeast Coastal Region, they will focus on maritime security missions.

2008-12-08

NSA Builds New Data-Mining Center In San Antonio

Photo by Greg M. Schwartz
It looks innocent enough, but no loitering, please: The NSA’s Texas Cryptology Center, under construction at 410 and West Military.
SA Current | Surrounded by barbwire fencing, the anonymous yet massive building on West Military Drive near San Antonio’s Loop 410 freeway looms mysteriously with no identifying signs of any kind. Surveillance is tight, with security cameras surrounding the under-construction building. Readers are advised not to take any photos unless you care to be detained for at least a 45-minute interrogation by the National Security Agency, as this reporter was.

There’s a strangely blurry line during such an interrogation. After viewing the five photos I’d taken of the NSA’s new Texas Cryptology Center, the NSA officer asked if I would delete them. When I asked if he was ordering me to do so, he said no; he was asking as a personal favor. I declined and was eventually released.

America’s top spy agency has taken over the former Sony microchip plant and is transforming it into a new data-mining headquarters — oddly positioned directly across the street from a 24-hour Walmart — where billions of electronic communications will be sifted in the agency’s mission to identify terrorist threats.

“No longer able to store all the intercepted phone calls and e-mail in its secret city, the agency has now built a new data warehouse in San Antonio, Texas,” writes author James Bamford in the Shadow Factory, his third book about the NSA. “Costing, with renovations, upwards of $130 million, the 470,000-square-foot facility will be almost the size of the Alamodome. Considering how much data can now be squeezed onto a small flash drive, the new NSA building may eventually be able to hold all the information in the world.”

Bamford’s book focuses on the NSA’s transformation since 9/11, with the impetus for the new facility being a direct ramification of those attacks. At the time, the NSA had only about 7 percent of its facilities outside the Washington D.C./Baltimore area. But the realization that additional attacks could virtually wipe out the agency catalyzed a regional expansion. [See “Secret Agency Man,” November 5, 2008.]

The new facility is a potential boon to the local economy since it’s reportedly going to employ around 1,500 people, but questions remain about whether there will be adequate oversight to prevent civil-rights violations like Uncle Sam’s recent notorious warrantless wiretapping program. The NSA would suggest the facility’s ability to sort through surveillance data is one of America’s top defenses against terrorist threats, but the NSA’s presence comes with concerns that abuse of its secretive power could see the agency become akin to the “Thought Police” of 1984, George Orwell’s classic novel depicting the nightmare of a total surveillance society — and all for nothing. Even as the facility is completed, a new government-backed report has concluded that data surveillance is an ineffective method for identifying potential terrorists or preventing attacks.

So just what will be going on inside the NSA’s new San Antonio facility? Bamford describes former NSA Director Mike Hayden’s goals for the data-mining center as knowing “exactly what Americans were doing day by day, hour by hour, and second by second. He wanted to know where they shopped, what they bought, what movies they saw, what books they read, the toll booths they went through, the plane tickets they purchased, the hotels they stayed in… In other words, Total Information Awareness, the same Orwellian concept that John Poindexter had tried to develop while working for the Pentagon’s [Defense Advanced Research Projects Agency].”

Bamford details how Hayden, now head of the CIA, had originally leaned toward being overprotective of civil rights, not wanting to see the NSA revisit the scandal-ridden era of the 1970s and the violations of “Project Shamrock.” But 9/11 altered Hayden’s philosophical direction 180 degrees. The Total Information Awareness project supposedly died when the plan was exposed, Poindexter resigned, and Congress cut off further funding. But Bamford and others have reported that the project simply migrated to the NSA, “an agency with a far better track record than DARPA for keeping secrets.”

The NSA remembers the Alamo

The NSA was waffling on selection of a home for its new facility when the City of San Antonio sent a mission to NSA headquarters in January 2007 to lobby for it, part of a continuing effort to woo the agency. On January 18, Microsoft announced its selection of San Antonio for a new data center. The NSA followed suit three months later. Bexar County Judge Nelson Wolff was part of the effort to entice the NSA to choose San Antonio. He says talks centered on economic factors and what the city could do to facilitate the NSA’s plans.

“They’re pretty tight on what they do; they don’t share that information with you,” says Wolff. “I hope that the administration will be addressing [civil-rights violations], and I hope they’re correcting those concerns.”

Bamford writes about how NSA and Microsoft had both been eyeing San Antonio for years because it has the cheapest electricity in Texas, and the state has its own power grid, making it less vulnerable to power outages on the national grid. He notes that it seemed the NSA wanted assurance Microsoft would be here, too, before making a final commitment, due to the advantages of “having their miners virtually next door to the mother lode of data centers.” The new NSA facility is just a few miles from Microsoft’s data center of the same size. Bamford says that under current law, NSA could gain access to Microsoft’s stored data without even a warrant, but merely a fiber-optic cable.

“What the Microsoft people will have will be just storage of a lot of the email that is being sent. They keep this email — I don’t know why — and there should be some legislation saying how long it should be kept,” said Bamford in a phone interview last week. “The post office doesn’t keep copies of our letters when we mail letters; why should the telecom companies or the internet providers keep copies of our email? It doesn’t make sense to me. But there’s no legislation. So they need a place to store it, and that’s where they’re storing all this stuff.”

(Microsoft did not return a call for comment before press deadline.)

The new NSA facility boosts the agency’s already formidable presence in South Texas, where they have 2,000 employees on the Medina Annex of the Lackland Air Force Base — mostly Signals Intelligence, or Sigint, specialists, who use cutting-edge technology to intercept anything from faxes to emails and satellite communications.

NSA’s new facility also gives the agency easy access to UTSA’s Institute for Cyber Security and the school’s Center for Infrastructure Assurance and Security. The ICS was founded in 2007 with a $3.5-million grant from the Texas Emerging Technology Fund to continue efforts to protect American communities against cyber-attacks, with the CIAS — a think tank launched in 2001 — being rolled into the ICS. All of this led U.S. Representative Ciro Rodriguez (D-San Antonio) to declare San Antonio “the center of cybersecurity, in the country and the world.”

ICS Founding Executive Director Ravi Sandhu acknowledges some synergy between the NSA presence in San Antonio and UTSA’s cybersecurity work.

“Cybersecurity in the public domain has largely been about defense, but there’s certainly an attack component to it. To some degree, the U.S. Department of Defense and intelligence agencies are now starting to talk about the attack component in the public domain,” says Sandhu.

Sandhu says UTSA’s cybersecurity students are recruited by many of San Antonio’s local employers and doesn’t doubt that NSA is one of them. “Recruiting is one end … but it’s an attractive thing for NSA employees [too]. They can further their education — they can do degrees part-time, they can do advanced degrees … so there are advantages beyond direct recruitment of NSA students.”

Does automated data mining even work?

While the opening of the NSA’s massive new data center heightens existing civil-rights concerns, a new report from the National Research Council questions whether such data-mining is even effective. Sponsored by the Department of Homeland Security and the National Science Foundation and released in October of this year, the report suggests that pattern-based data-mining is not even a viable way to identify terrorists.

The 352-page study —“Protecting Individual Privacy in the Struggle Against Terrorists” — concludes that identification of terrorists through automated data-mining “is neither feasible as an objective nor desirable as a goal of technology development efforts.” It also says inevitable false positives will result in “ordinary, law-abiding citizens and businesses” being erroneously flagged as suspects.

“Actions such as arrest, search, or denial of rights should never be taken solely on the basis of an automated data-mining result,” says the report. The question, then, is how rigorously will human analysts vet such information before alleged leads are pursued, and who has oversight of the process?

“Part of the problem is … jurisdiction over national-security issues is very divided in Congress. You have the Homeland Security committee, the Justice committee, but, of course, you also have some basic issues — government oversight, appropriations,” says Professor Fred Cate, the NRC committee member who wrote most of the report and who serves as director of Indiana University’s Center for Applied Cybersecurity Research. “So I think in some ways one of the issues is the need for a more streamlined oversight system so that somebody takes responsibility for it.”

Cate says the migration of the TIA project to the NSA is part of the problem.

“Because so many different agencies are involved and because there are no consistent oversight mechanisms, it’s very hard [to monitor]. And Congress created a Privacy and Civil Liberties Oversight Board, and then it didn’t like the way it created it initially, so then it recreated it with more powers, but it never confirmed any members to it,” says Cate. “So for the past year, there’s been nobody in that critical position. So I think one immediate step for Congress and the new president will be to nominate members and get them confirmed.”

The lack of clearly delineated oversight remains a vital yet unsolved issue. Senator Jay Rockefeller (D-W.Virginia), Chairman of the Senate Intelligence Committee, would appear to be the Congressman with the most power to pursue such oversight.

“Eisenhower warned of the military-industrial complex, but now it’s mostly the security, industrial complex; it’s these people that build all the hardware and software for Homeland Security and Intelligence and all that,” says Bamford. “As far as I can see, nobody has a handle on how many contractors are out there, what they’re doing, how much money’s going to them, how much is useful, how much is wasted money.”

Cate says the NRC committee is not necessarily opposed to data-mining in principal, but is concerned about how it’s carried out. “The question is can you do it and make it work so that you don’t intrude unnecessarily into privacy and so that you reach reliable conclusions.”

Bamford writes in the Shadow Factory of how the NSA’s Georgia listening post has eavesdropped on Americans during the Iraq War, including journalists, without a warrant or any indication of terrorism. He also reports on NSA eavesdropping on undecided members of the United Nations Security Council in the run-up to the vote on the Iraq War resolution, with the Bush regime seeking information with which to twist the arms of voting countries. The spying was only revealed due to British Parliament whistleblower Claire Short, who admitted she’d read secret transcripts of UN Secretary-General Kofi Annan’s confidential conversations.

“The UN people have been aware of [NSA eavesdropping] for a long time, but there’s not much they can do about it,” says Bamford.

A common response to concerns about data surveillance is that those who keep their noses clean have nothing to worry about. But the reach of the NSA’s surveillance net combined with lack of oversight and the political paranoia escalated by the 9/11 attacks means that almost anyone could wind up on the terrorist watch list.

“The principal end product of all that data and all that processing is a list of names — the watch list — of people, both American and foreign, thought to pose a danger to the country,” writes Bamford. “Once containing just twenty names, today it is made up of an astonishing half a million — and it grows rapidly every day. Most on the list are neither terrorists nor a danger to the country, and many are there simply by mistake.”

Bamford reports that consequences of being on the list could include having an application for a Small Business Administration loan turned down; having a child’s application to one of the military academies rejected; or, because the names are shared with foreign governments, being turned away after landing in Europe for a vacation or business trip. All without ever being told why.

A senior intelligence official concerned about the situation told Bamford “the system is a disaster,” adding that the list at the National Counterterrorism Center isn’t even compatible with the NSA and CIA systems.

“They could be snooping on just about anything right now and not be accountable and be able to hold their hands up and go, ‘Our system doesn’t track that,’ when in many cases the system does, but the code is so convoluted you could never know it,” says the official.

Bamford also reports on Uncle Sam’s skyrocketing use of “national security letters” for obtaining personal information. The NSLs, which do not require probable cause or court approval, jumped from 8,500 in 2000 to 143,074 between 2003 and 2005, according to a 2007 Justice Department inspector general’s report. Under the revised version of the 1994 Communications Assistance for Law Enforcement Act, it’s not only a crime for any company to refuse to cooperate, it’s also become a crime for company officials to even disclose their cooperation.

“There was a lot of pressure by the FBI in ’94 to have CALEA enacted … but the Clinton Administration was in favor of doing all that,” says Bamford.

The question for us then becomes who, if anyone, is watching the watchdogs? One organization devoted to such duty is the Electronic Frontier Foundation, a San Francisco-based non-profit whose mission is to protect electronic civil liberties. Reducing the use of NSLs to gag and acquire data from online service providers is one of the planks in EFF’s proposed privacy agenda for the new Obama administration.

“The issue here is that when people are gagged, you can’t talk about it and [people] don’t know what kind of abuses there are,” says EFF media-relations coordinator Rebecca Jeschke. The EFF privacy agenda also includes repealing or repairing the FISA Amendments Act, reforming the Electronic Communications Privacy Act, and reform of the State Secrets Privilege, the latter which has been used by the Bush regime to shield its electronic surveillance activity from judicial review.

The EFF filed a lawsuit against the NSA in September on behalf of AT&T customers who were victims of warrantless wiretapping, with defendants including President Bush, Vice President Cheney, and NSA Director Keith Alexander. The EFF also filed suit against AT&T — until this summer headquartered in San Antonio, the telecom giant still maintains a sizable presence here — for participating in the illegal surveillance program, and is challenging the FISA Amendments Act passed by Congress in July — which gave retroactive immunity to the telecom companies — as being unconstitutional.

“Where I disagreed was the immunity to telecommunications entities … and that’s why I couldn’t support something that provided for the immunity provision,” says U.S. Representative Charlie Gonzalez (D-San Antonio) of the FISA Amendments Act. “We had something that we thought in the House was good, and then the Senate did their own thing. But I was never happy with the inclusion of the blanket-immunity provision to telecommunications entities, because I thought it relieved them of a responsibility and duty that they owe as corporate citizens.”

Gonzalez added that he thinks “there’s still tremendous shortcomings in the law when it comes to making sure that you don’t have abuses of the authority of eavesdropping.”

The Electronic Privacy Information Center in Washington, D.C., a public interest research group whose mission is similar to EFF’s, is suing the Department of Justice for access to documents authored by government lawyers regarding President Bush’s warrantless wiretapping program. These opinions, prepared by the Office of Legal Counsel, provided the legal rationale for Uncle Sam to wiretap American citizens in the United States without court approval. On October 31, a federal judge ordered the DOJ to provide for independent judicial inspection of documents relating to the program.

The latest news in Uncle Sam’s ongoing surveillance scandal happens to come from the FBI’s involvement with the NSA. The Washington Times reported in November that Supervisory Special Agent Bassem Youssef, who oversees the FBI’s role in the NSA’s warrantless surveillance program, says the FBI engaged in unlawful acts while carrying out that surveillance. Youssef, who now fears career retaliation for stepping up as a whisteblower, is due to testify with the Justice Department.

Whether or not the new Obama administration will enact any demonstrable change in the personnel and policies that created the civil-rights violations of recent years remains a question mark.

“Everything I’ve seen so far with Obama has not been focused on change. It’s been focused on bringing back the old Clinton Administration or continuing the same,” says Bamford, noting the President-elect’s decisions to nominate Hillary Clinton as Secretary of State and keep Robert Gates as Secretary of Defense. Bamford mentions Wisconsin Senator Russ Feingold as someone he feels would fight for greater accountability.

“That’s a person I would like to see rewarded for making the right decision, instead of people being rewarded for making the wrong decisions,” says Bamford of Feingold’s record in voting against the revised FISA Amendments Act and being the only senator to vote against the Patriot Act.

Bamford ends The Shadow Factory by quoting Senator Frank Church, the first chairman of the Senate Intelligence Committee, during the original hearings on the NSA in the 1970s. “If a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology,” said Church more than three decades ago.

That technology now sees its latest evolution occurring at the shadowy building on San Antonio’s West Military Drive. •


2008-11-29

It Isn’t About No-Knocks. It’s About Home Invasions.

Chris Roach notes last week’s drug raid death of FBI agent Sam Hicks, and writes…

…”libertarians’ silence on the Hicks’ case as the facts have come out is noteworthy. The pro-drug-dealer libertarians of the CATO [sic] Institute make a big show of every mistaken drug raid, while ignoring the many cases of brutal drug dealer violence against police and one another.”

Well first, my “silence” on the issue is due mainly to the fact that the case is only a few days old, and I’ve had other things to work on. But I’ll bite. Let’s look at this case. Unsubtly referring to me, Roach writes:

FBI agent, Samuel Hicks, was killed this week in Pittsburgh while serving an arrest warrant in a botched drug raid. He was 33. After the agent knocked on the suspect’s door and announced his intention, the suspect apparently proceeded to flush his stash of cocaine down the toilet. After the suspect didn’t answer, they were shot by the suspect’s wife when they came through the threshold. The arrest went down using the “knock and announce” tactics and non-SWAT gear that libertarians have long asked for.

Problem is, I haven’t “long asked for” police to knock and announce before blowing open doors and raiding private homes to enforce nonviolent, consensual crimes. I’ve explained on several occasions (including the last paragraph of the post he links to) that my problem with paramilitary raids for nonviolent offenses is not that the police don’t knock first, it’s with the forcible entry into a private home in the first place. These tactics create violence and confrontation where none existed before. An announcement is better than no announcement. But that’s beside the point. For the people inside (this case being the exception), the difference is usually negligible.

It’s the paramilitary tactics that are the problem. These tactics carry a very low margin for error, on the part of both the police and the suspects they’re raiding. You’re waking people up, and while they’re groggy and fearful, you’re forcing them to process and evaluate an armed confrontation. I don’t care how much force you bring, that’s a needlessly dangerous situation, not just for suspects and innocent bystanders, but for police officers. And even if all of these raids went down exactly as planned, there’s the broader question of whether the image of armed men dressed as soldiers battering down American citizens’ doors some 40-50,000 per year, mostly for consensual crimes, is one that’s consistent with a free society. I’d argue it isn’t.

Moreover, not only does the Korbe-Hicks raid not refute my position, it reinforces it. The police themselves have conceded that they didn’t consider Robert Korbe to be dangerous, or at least heavily armed. And in fact, he was neither. Korbe didn’t respond to the police knock at his door by shooting at them. He responded by fleeing to his basement to dispose of his supply of cocaine. That’s when they broke down his door.

It was Korbe’s wife who shot and killed Agent Hicks. Christina Korbe had no prior criminal record. She had a legal permit for the gun she used. She was upstairs with her two children, ages 10 and 4, when the police tore down the door at 6 am. She plausibly says she had no idea they were police.

For most people, Christina Korbe won’t be a particularly sympathetic person. She knew or should have known of her husband’s criminal history, and early indications suggest she benefited from the lifestyle his drug dealing afforded her.

That said, from what I know of the case, I don’t believe she knowingly shot and killed Agent Hicks. She says she didn’t hear the announcement, and thought her home was being robbed—not an unreasonable assumption. She says she fired at the men invading her home because she feared they might hurt her kids. More to the point, she was on the phone with a 911 operator during the raid. Now I’ll admit that I can’t easily assume the mindset of a cold-blooded cop killer, but it’s hard to imagine one who would knowingly kill a raiding police officer, then call the police to come investigate. The more logical explanation is precisely the one Christina Korbe has given—she was scared, and thought her home was being invaded. When I’ve talked to innocent people who’ve been targeted in these raids, every one of them has said the same thing—that their first thought was that their home was being invaded.

So yes, you could argue that Christina Korbe was foolish for continuing to live with a career criminal. You could argue that she was selfish for not getting her kids out of that environment. But I’m not arguing that she’s sympathetic. Only that she isn’t a cop killer. She reacted instinctively to defend her home and her family. Just like Cory Maye did. Just like Kathryn Johnston did. Just like Ryan Frederick did. Just as just about any of us would do if someone we couldn’t identify had just violently broken into our home.

Robert Korbe was wanted for a nonviolent crime. The police, once again, decided to employ violent, invasive tactics to arrest hi for it. Now an FBI agent is dead. And instead of taking a second look at whether or not these tactics were appropriate, they’ll just put the brunt of the blame on Christina Korbe, throw her in prison, and carry on with the raids, until the next time someone dies.

The cops knew all about Korbe. The knew he had a full-time job. They knew (or at least should have known) that his wife had a legally-registered gun. Why couldn’t they approach him and arrest him at work? Why not nab him as he’s coming or going from his house? Why was it necessary to tear down the man’s door and rush his house early in the morning, while his wife and kids were at home?

Roach thinks the cops should have used more overwhelming force—that if they hadn’t observed the knock-and-announce requirement, Agent Hicks would still be alive. Maybe. Or maybe that would have merely allowed them to advance further up the stairs before Christina Korbe fired her gun. At which point they may have fired back. At which point you’d not only have the cops and Christina Korbe shooting at one another, you’d also have two kids caught in the crossfire.

Even if Christina Korbe is a cold-blooded cop killer, if you don’t bring the violence into her home, she never gets the chance to shoot at Agent Hicks.

Want an alternate scenario were Agent Hicks unquestionably comes out unharmed? Here it is: The cops never raid the Korbe home in the first place. They approach Robert Korbe at work, or as he’s about to enter or exit his house. They don’t put Korbe’s family, the raiding officers, and Korbe himself at risk with the violence of a paramilitary-style drug raid. Christina Korbe isn’t put in the impossible position of having to determine in an instant if the armed men who’ve just broken into her home are cops or criminals. Robert Korbe is arrested without incident, and becomes another drug war statistic. Agent Hicks goes home to his wife and kids. The Korbe kids don’t have to grow up without their mother, and the Hicks kids without their father.

That’s a hell of a lot better scenario than what we ended up with, isn’t it?

MORE: Per a few comments below, when I say it would be better to apprehend nonviolent suspects at their place of work, or as they’re leaving coming home, I mean getting 3-4 plain clothes cops to show up to make a quick and low-key arrest. I don’t mean sending a SWAT team into the local McDonalds or neighborhood office park. This domestic application of the Powell doctrine (use overwhelming force, all the time) is what’s so troubling.

Also, Roach responds in addendum to the post linked above. I’ve had this debate with him before, and his addendum is filled with the same arguments I’ve rebutted dozens of times, on this site, in Overkill, and elsewhere. I have no interest in exchanging 3,000-word posts with him. But his response is there if you’re interested in reading it.

2008-11-26

Court upholds conviction from illegal traffic stop

(11-24) 20:50 PST San Francisco, CA (AP) --

The California Supreme Court on Monday reinstated the drug conviction of a man based on evidence found during an illegal traffic stop, in a case that had brought the issue of passenger rights before the nation's highest court.

The unanimous ruling came in the case of Bruce Brendlin, who was riding in a car that was pulled over in Yuba City after a deputy suspected something was wrong with the vehicle's registration. During the November 2001 stop, a Sutter County sheriff's deputy found equipment used to make methamphetamine in Brendlin's possession.

Brendlin challenged his conviction and four-year prison sentence, arguing that the drug evidence should have been suppressed at trial because it was found as the result of an illegal stop. The state had since conceded there was no basis to stop the car.

His appeals reached the U.S. Supreme Court, which ruled last year that passengers, like drivers, have a Fourth Amendment right to challenge the legality of traffic stops.

Brendlin's case, however, was complicated by the existence of an outstanding arrest warrant against him, which prosecutors said would have justified a search even if passengers can challenge traffic stops. The U.S. justices sent Brendlin's case back to the state courts to sort out that issue.

In its ruling Monday, the California justices said authorities were allowed to use the evidence because the deputy had recognized Brendlin and discovered the warrant prior to the search.

"Despite the unlawfulness of the initial traffic stop, the facts of this encounter demonstrate that the drug paraphernalia found ... was not the fruit of the unlawful seizure," Justice Marvin Baxter wrote for the court. "The police searched defendant's person and the vehicle only after they discovered a valid outstanding warrant for his arrest."

And even though the deputy would not have learned of the warrant if it hadn't been for the illegal stop, the deputy had acted "in the absence of purposeful or flagrant police misconduct" in pulling over the car.

Brendlin's attorneys, Elizabeth Campbell and James Johnson, did not return after-hours calls seeking comment.

2008-11-25

Joint Intelligence DNA Database Described

Scattered details of a little-known U.S. government database containing the DNA of suspected terrorists were gathered and reported today in the Financial Times. See “Fears over Covert DNA Database” by Stephen Fidler.

The Joint Federal Agencies [or more often: Antiterrorism] Intelligence DNA Database (JFAIDD) is described in a 2007 briefing slide (pdf) as “a searchable database of DNA profiles from detainees and known or suspected terrorists.”

The JFAIDD contains 15,000 DNA profiles, according to a 2007 report of the Defense Science Board, with “a queue of 30,000 new samples in the laboratory and 400 [pending] requests for DNA profiles, searches, or comparisons.” See “Defense Biometrics” (pdf, at page 32).

The collection of the DNA samples was described in a 2006 Army document. “U.S. military units shall collect two buccal [intra-oral cheek] swabs from each person.” See “Biometric Collection, Transmission and Storage Standards” (pdf), U.S. Army Biometrics Task Force, July 24, 2006 (at pp. 21-22).

“The FBI has been collecting biological evidence from improvised explosive devices (IEDs) removed from Iraq and Afghanistan and databasing the mtDNA profiles from this evidence since February 2004,” the Justice Department said in its 2009 budget justification book for the FBI (pdf). “Only occasionally can these profiles be compared to reference samples from suspected terrorists or their maternal relatives.”

“Collecting DNA from detainees and obtaining the mtDNA profiles from these samples has the potential to provide excellent actionable intelligence in the Global War on Terror through comparison with evidence already analyzed…”

But “The FBI can process [only] two samples every three days using manual methods. Given this rate, the DNA Analysis Unit… cannot keep up with the collection of these samples and would likely lose valuable intelligence from the lag time required to analyze these samples.”

The Justice Department therefore requested funding to automate the DNA analysis process, to permit analysis of 40 samples a day, five days a week so as to keep pace with the anticipated delivery of “approximately 9,000 samples per year from detainees of the U.S. government.” See the 2009 FBI budget justification (at page 6-112).

U.S. gov’t. taps Facebook, Google, MTV to ‘fight terrorism’

WASHINGTON (AFP) - The US State Department announced plans on Monday to promote online youth groups as a new and powerful way to fight crime, political oppression and terrorism.

Drawing inspiration from a movement against FARC rebels in Colombia, the State Department is joining forces with Facebook, Google, MTV, Howcast and others in New York City next week to get the "ball rolling."

It said 17 groups from South Africa, Britain and the Middle East which have an online presence like the "Million Voices Against the FARC" will attend a conference at Columbia University Law School from December 3-5.

Observers from seven organizations that do not have an online presence -- such as groups from Iraq and Afghanistan -- will attend. There will also be remote participants from Cuba.

They will forge an "Alliance of Youth Movement," said James Glassman, under secretary of state for public diplomacy.

"The idea is put all these people together, share best practices, produce a manual that will be accessible online and in print to any group that wants to build a youth empowerment organization to push back against violence and oppression around the world," he told reporters.

The conference will be streamed by MTV and Howcast, he said.

The list of organizations due to attend include the Burma Global Action Network, a human rights movement spurred into action by the ruling junta's crackdown on monks and other pro-democracy protesters last year.

There is also Shabab 6 of April, which has emerged as Egypt's largest pro-democracy youth group, and Invisible Children, which spotlights atrocities committed by the Lord's Resistance Army in Uganda, Glassman said.

Others include Fight Back, which fights domestic violence in India, the Save Darfur Coalition, as well as One Million Voices Against Crime in South Africa, said Jared Cohen, from the secretary's policy planning staff.

Also attending will be People's March Against Knife Crime from Britain and Young Civilians from Turkey.

Cohen said Young Civilians is a human rights and pro-democracy organization which works online but has brought thousands of protesters into the streets of Turkey.

Glassman said the State Department is providing about 50,000 dollars in order to help bring delegates from the groups to the United States.

Among the speakers will be actress Whoopi Goldberg and a co-founder of Facebook.

Court Backs Warrantless Searches Abroad

Published: November 24, 2008

The authorities may lawfully conduct searches and electronic surveillance against United States citizens in foreign countries without a warrant, a federal appeals court panel said on Monday, bolstering the government’s power to investigate terrorism by ruling that a key constitutional protection afforded to Americans does not apply overseas.

The unanimous decision by a three-judge panel of the United States Court of Appeals for the Second Circuit, in Manhattan, came in the case of three Al Qaeda terrorists convicted a few months before 9/11 in a conspiracy that involved the 1998 bombings of two American embassies in East Africa.

The court did not address the question of whether the government could conduct warrantless wiretaps of international calls involving people in the United States, an issue that drove a wedge between the Bush administration and Congress. But the ruling did give footing to those who say that terrorism suspects can be successfully and effectively prosecuted in civilian courts.

The warrantless searches must still be reasonable, as the Constitution requires, Judge José A. Cabranes wrote for the panel, adding that the government had met that standard in the case of one defendant, Wadih el-Hage, a close aide to Osama bin Laden and a naturalized American citizen who was living in Nairobi, Kenya. The government searched his home and monitored his phone conversations.

“The Fourth Amendment’s requirement of reasonableness — but not the Warrant Clause — applies to extraterritorial searches and seizures of U.S. citizens,” the judge wrote.

Mr. el-Hage and two other defendants had appealed their convictions for conspiring with Mr. bin Laden in a plot to kill Americans around the world.

The conspiracy included the 1998 bombings of the United States Embassies in Nairobi, Kenya, and Dar es Salaam, Tanzania, which killed 224 people and wounded thousands.

While noting that Mr. el-Hage “suffered, while abroad, a significant invasion of privacy by virtue of the government’s yearlong surveillance of his telephonic communications,” the panel offered a detailed analysis of why the search was reasonable under the Constitution, given the “self-evident need to investigate threats to national security” that foreign terrorist organizations presented.

The panel said the electronic surveillance was justified — and reasonable — for a number of reasons, including that “sustained and intense monitoring” was necessary to understand a “complex, wide-ranging and decentralized” organization like Al Qaeda; and that members of covert terrorist organizations often communicated in code.

“While the intrusion on el-Hage’s privacy was great, the need for the government to so intrude was even greater,” Judge Cabranes wrote.

“This is going to be a very important precedent that intelligence agencies are going to look at, that the new Obama administration is going to look at,” Orin S. Kerr, a law professor at George Washington University, said on Monday. “These issues are critical, and the courts rarely rule on them.”

The panel also made it easier for prosecutors to protect sensitive information in terrorism cases by holding that judges may bar defendants from having access to classified materials that their lawyers may otherwise examine, if there is concern that unauthorized disclosures of information could jeopardize lives or investigations.

The panel declined to declare, as a lower court judge had, that Miranda warnings were required in overseas interrogations of foreign suspects, but it said that a modified version of the warnings, adapted to local circumstances, could be acceptable.

“It is only through the cooperation of local authorities that U.S. agents obtain access to foreign detainees,” Judge Cabranes wrote. “We have no desire to strain that spirit of cooperation by compelling U.S. agents to press foreign governments for the provision of legal rights not recognized by their criminal justice systems.”

Michael J. Garcia, the United States attorney in Manhattan and one of the prosecutors who participated in the embassy case, called the decision “one further measure of justice for the victims of those attacks.”

Defense lawyers said that they were disappointed in the ruling, and would appeal. “We believe these issues are important enough to deserve Supreme Court review,” said Frederick H. Cohn, whose client, Mohamed Rashed Daoud al-’Owhali, was convicted in the Nairobi attack.

Joshua L. Dratel, a lawyer for Mr. el-Hage, said that the appellate decision “would seem to say that the government’s invocation of national security can trump a United States citizen’s constitutional rights across the board.”

The embassy case was the last of the large terrorism trials held in the United States before the Sept. 11, 2001, attacks.

Since then, there has been a national debate over whether people accused of terrorism should be treated as criminals and tried in the federal courts, or held as enemy combatants to be tried, if at all, before military tribunals, where defendants have fewer rights and there is less public disclosure.

David D. Cole, a law professor at Georgetown University, said the ruling underscored “that we don’t need a specialized national security court; that we don’t need to depart from the traditional criminal justice system approach for prosecuting terrorists.”

The decision, which was joined by Judges Jon O. Newman and Wilfred Feinberg, was divided into three separate opinions, which totaled 178 pages.

“This criminal case presents issues of great importance, many of which are complex and novel,” Judge Cabranes wrote, observing that the case had been in the courts for a decade.

The panel also praised Judge Leonard B. Sand, who handled the trial, and Judge Kevin Thomas Duffy, who handled later proceedings, for their care, patience and fairness.

The third defendant whose conviction was affirmed was Mohammed Saddiq Odeh. A fourth defendant, Khalfan Khamis Mohamed, did not appeal his conviction. All four men are serving life sentences in the so-called Super Max prison in Florence, Colo.