Monday, May 08, 2006


I Spy On You Spying On Me Spying...

Another two-fer, here. The first is from US News, via Truthout, and is about the vast amount of police spying—not the Feds, but our ordinary-cruising-down-the-street cop shops. US News and World Report is a conservative news and opinion magazine; they have a reputation of being about as paranoid as the Christian Science Monitor. When they pay attention to local police engaging in “anti-terrorist” activities, they see something.

A Georgia police department assembled a file on vegan activists demonstrating in front of a Honey Bake Ham store, in order to make sure there wasn’t any upcoming terrorist threat from the vegans—or maybe to make sure they weren’t Muslim extremists trying to keep people away from pork...

Half a billion, according to this article, has been dumped into local police and sheriff’s department in order to keep track of potential...potential what? Peace activists, vegetarians, civil rights and liberties groups, and people who oppose the Bush-Cheney Junta. Dissenting from the government may be a constitutionally-protected activity, but that doesn’t mean the cops aren’t snooping through people’s phone and library records, watching anybody who looks different or know, like the secret police used to do in those old spy movies. Only in those movies it was the Germans or the Russians spying on their own freedom-loving people. Now it’s Americans spying on Americans.

The second article, also from US News, looks at how the police really do operate, searching for “potential terrorist elements,” PTEs: PTEs were groups or individuals who might use force or violence "to intimidate or coerce" for a goal "possibly political or social in nature." The key words are “might” and “possibly,” two very very subjective termsl. It is, of course, up to the police to interpret those words. I suppose even a demonstration by wheelchair activists could be considered to have the potential for intimidation or might use violence... Hell, so could the aftermath of a Little League game... Well, it’s clear, the cops are going to have to spy on everybody.

Spies Among Us
By David E. Kaplan
US News

Monday 08 May 2006

Despite a troubled history, police across the nation are keeping tabs on ordinary Americans.

In the Atlanta suburbs of DeKalb County, local officials wasted no time after the 9/11 attacks. The second-most-populous county in Georgia, the area is home to the Centers for Disease Control and Prevention, the FBI's regional headquarters, and other potential terrorist targets. Within weeks of the attacks, officials there boasted that they had set up the nation's first local department of homeland security. Dozens of other communities followed, and, like them, DeKalb County put in for - and got - a series of generous federal counterterrorism grants. The county received nearly $12 million from Washington, using it to set up, among other things, a police intelligence unit.

The outfit stumbled in 2002, when two of its agents were assigned to follow around the county executive. Their job: to determine whether he was being tailed - not by al Qaeda but by a district attorney investigator looking into alleged misspending. A year later, one of its plainclothes agents was seen photographing a handful of vegan activists handing out antimeat leaflets in front of a HoneyBaked Ham store. Police arrested two of the vegans and demanded that they turn over notes, on which they'd written the license-plate number of an undercover car, according to the American Civil Liberties Union, which is now suing the county. An Atlanta Journal-Constitution editorial neatly summed up the incident: "So now we know: Glazed hams are safe in DeKalb County."

Glazed hams aren't the only items that America's local cops are protecting from dubious threats. U.S. News has identified nearly a dozen cases in which city and county police, in the name of homeland security, have surveilled or harassed animal-rights and antiwar protesters, union activists, and even library patrons surfing the Web. Unlike with Washington's warrantless domestic surveillance program, little attention has been focused on the role of state and local authorities in the war on terrorism. A U.S.News inquiry found that federal officials have funneled hundreds of millions of dollars into once discredited state and local police intelligence operations. Millions more have gone into building up regional law enforcement databases to unprecedented levels. In dozens of interviews, officials across the nation have stressed that the enhanced intelligence work is vital to the nation's security, but even its biggest boosters worry about a lack of training and standards. "This is going to be the challenge," says Los Angeles Police Chief William Bratton, "to ensure that while getting bin Laden we don't transgress over the law. We've been burned so badly in the past - we can't do that again."

Rap sheets. Chief Bratton is referring to the infamous city "Red Squads" that targeted civil rights and antiwar groups in the 1960s and 1970s (Page 48). Veteran police officers say no one in law enforcement wants a return to the bad old days of domestic spying. But civil liberties watchdogs warn that with so many cops looking for terrorists, real and imagined, abuses may be inevitable. "The restrictions on police spying are being removed," says attorney Richard Gutman, who led a 1974 class action lawsuit against the Chicago police that obtained hundreds of thousands of pages of intelligence files. "And I don't think you can rely on the police to regulate themselves."

Good or bad, intelligence gathering by local police departments is back. Interviews with police officers, homeland security officials, and privacy experts reveal a transformation among state and local law enforcement.

Among the changes:

Since 9/11, the U.S. Departments of Justice and Homeland Security have poured over a half-billion dollars into building up local and state police intelligence operations. The funding has helped create more than 100 police intelligence units reaching into nearly every state.

To qualify for federal homeland security grants, states were told to assemble lists of "potential threat elements" - individuals or groups suspected of possible terrorist activity. In response, state authorities have come up with thousands of loosely defined targets, ranging from genuine terrorists to biker gangs and environmentalists.

Guidelines for protecting privacy and civil liberties have lagged far behind the federal money. After four years of doling out homeland security grants to police departments, federal officials released guidelines for the conduct of local intelligence operations only last year; the standards are voluntary and are being implemented slowly.

The resurgence of police intelligence operations is being accompanied by a revolution in law enforcement computing. Rap sheets, intelligence reports, and public records are rapidly being pooled into huge, networked computer databases. Much of this is a boon to crime fighting, but privacy advocates say the systems are wide open to abuse.

Behind the windfall in federal funding is broad agreement in Washington on two areas: first, that local cops are America's front line of defense against terrorism; and second, that the law enforcement and intelligence communities must do a far better job of sharing information with state and local police. As a report by the International Association of Chiefs of Police stressed: "All terrorism is local." Oklahoma City bomber Timothy McVeigh was arrested by a state trooper after a traffic stop. And last year, local police in Torrance, Calif., thwarted what the FBI says could have been America's worst incident since 9/11 - planned attacks on military sites and synagogues in and around Los Angeles by homegrown jihadists.

The numbers tell the story: There are over 700,000 local, state, and tribal police officers in the United States, compared with only 12,000 FBI agents. But getting the right information to all those eyes and ears hasn't gone especially well. The government's failure at "connecting the dots," as the 9/11 commission put it, was key to the success of al Qaeda's fateful hijackings in 2001. Three of the hijackers, including ringleader Mohamed Atta, were pulled over in traffic stops before the attacks, yet local cops had no inkling they might be on terrorist watch lists. A National Criminal Intelligence Sharing Plan, released by the Justice Department in 2003, found no shortage of problems in sharing information among local law enforcement: a lack of trust and communication; lack of funding for a national intelligence network; lack of database connectivity; a shortage of intelligence analysts, software, and training; and a lack of standards and policies.

The flood of post-9/11 funding and attention, however, has started making a difference, officials say. Indeed, it has catalyzed reforms already underway in state and local law enforcement, giving a boost to what reformers call intelligence-led policing - a kind of 21st-century crime fighting driven by computer databases, intelligence gathering, and analysis. "This is a new paradigm, a new philosophy of policing," says the LAPD's Bratton, who previously served as chief of the New York Police Department. In that job, Bratton says, he spent 5 percent of his time on counterterrorism; today, in Los Angeles, he spends 50 percent. The key to counterterrorism work, Bratton adds, is intelligence.

The change is "huge, absolutely huge," says Michigan State University's David Carter, the author of Law Enforcement Intelligence. "Intelligence used to be a dirty word. But it's a more thoughtful process now." During the 1980s and 1990s, intelligence units were largely confined to large police departments targeting drug smugglers and organized crime, but the national plan now being pushed by Washington calls for every law enforcement agency to develop some intelligence capability. Experts estimate that well over 100 police departments, from big-city operations to small county sheriffs'offices, have now established intelligence units of one kind or another. Hundreds of local detectives are also working with federal agents on FBI-run Joint Terrorism Task Forces, which have nearly tripled from 34 before 9/11 to 100 today. And over 6,000 state and local cops now have federal security clearances, allowing them to see classified intelligence reports.

"The front line." Some police departments have grown as sophisticated as those of the feds. The LAPD has some 80 cops working counterterrorism, while other big units now exist in Atlanta, Chicago, and Las Vegas. Then there's the NYPD, which is in a class by itself - with a thousand officers assigned to homeland security. The Big Apple's intelligence chief is a former head of CIA covert operations; its counterterrorism chief is an ex-State Department counterterrorism coordinator. The NYPD has officers based in a half-dozen countries, and its counterterrorism agents visit some 200 businesses a week to check on suspicious activity.

Many of the nation's new intelligence units are dubbed "fusion centers." Run by state or local law enforcement, these regional hubs pool information from multiple jurisdictions. From a mere handful before 9/11, fusion centers now exist in 31 states, with a dozen more to follow. Some focus exclusively on terrorism; others track all manner of criminal activity. Federal officials hope to eventually see 70 fusion centers nationwide, providing a coast-to-coast intelligence blanket. This vision was noted by President Bush in a 2003 speech: "All across our country we'll be able to tie our terrorist information to local information banks so that the front line of defeating terror becomes activated and real, and those are the local law enforcement officials."

Intelligence centers are among the hottest trends in law enforcement. Last year, Massachusetts opened its Commonwealth Fusion Center, which boasts 18 analysts and 23 field-intelligence officers. The state of California is spending $15 million on a string of four centers this year, and north Texas and New Jersey are each setting up six. The best, officials say, are focused broadly and are improving their ability to counter sophisticated crimes that include not only terrorism but fraud, racketeering, and computer hacking. The federal Department of Homeland Security, which has bankrolled start-ups of many of the centers, has big plans for the emerging network. Jack Tomarchio, the agency's new deputy director of intelligence, told a law enforcement conference in March of plans to embed up to three DHS agents and intelligence analysts at every site. "The states want a very close synergistic relationship with the feds," he explained to U.S. News. "Nobody wants to play by the old rules. The old rules basically gave us 9/11."

"Reasonable suspicion." The problem, skeptics say, is that no one is quite sure what the new rules are. "Hardly anyone knows what a fusion center should do," says Paul Wormeli of the Integrated Justice Information Systems Institute, a Justice Department-backed training and technology center. "Some states have responded by putting 10 state troopers in a room to look at databases. That's a ridiculous approach." Another law enforcement veteran, deeply involved with the fusion centers, expressed similar frustration. "The money has been moved without guidance or structure, technical assistance, or training," says the official, who is not authorized to speak publicly. There are now guidelines, he adds, "but they're not binding on anyone." In the past year, the Justice Department has issued standards for local police on fusion centers and privacy issues, but they are only advisory. Most federal funding for the centers now comes from the Department of Homeland Security, but DHS also requires no intelligence standards from its grantees.

At the state level, regulations on police spying vary widely, but a general rule of thumb comes from the Justice Department's internal guidelines that forbid intelligence gathering on individuals unless there is a "reasonable suspicion" of criminal activity. Since the reforms of the 1970s, the FBI says its agents have followed this standard; Justice Department regulations require local police who receive federal funding to do the same in maintaining any intelligence files. But there is considerable leeway at the local level, and since 2001, judges have watered down police spying limits in Chicago and New York. The federal regs, moreover, have not stopped a parade of questionable cases.

Suspicion of spying is so rife among antiwar activists, who have loudly protested White House policy on Iraq, that some begin meetings by welcoming undercover cops who might be present. "People know and believe their activities are being monitored," says Leslie Cagan, national coordinator of United for Peace and Justice, the country's largest antiwar coalition. There is some evidence to back this up. Documents and videotapes obtained from lawsuits against the NYPD reveal that its undercover officers have joined antiwar and even bicycle-rider rallies. In at least one case, an apparent undercover officer incited a crowd by faking his arrest. In Fresno, Calif., activists learned in 2003 that their group, Peace Fresno, had been infiltrated by a local sheriff's deputy - piecing it together after the man died in a car crash and his obituary appeared in the paper.

The California Anti-Terrorism Information Center, a $7 million fusion center run by the state Department of Justice, also ran into trouble in 2003 when it warned of potential violence at an antiwar protest at the port of Oakland. Mike Van Winkle, then a spokesman for the center, explained his concern to the Oakland Tribune: "You can make an easy kind of a link that, if you have a protest group protesting a war where the cause that's being fought against is international terrorism, you might have terrorism at that protest. You can almost argue that a protest against [the war] is a terrorist act." Officials quickly distanced themselves from the statement. The center's staff had confused political protest with terrorism, announced California's attorney general, who oversees the office.

"Absurd" threats. But this expansive view of homeland security has at times also extended to union activists and even library Web surfers. In February 2006 near Washington, D.C., two Montgomery County, Md., homeland security agents walked into a suburban Bethesda library and forcefully warned patrons that viewing Internet pornography was illegal. (It is not.) A county official later called the incident "regrettable" and said those officers had been reassigned. Similarly, in 2004, two plainclothes Contra Costa County sheriff's deputies monitored a protest by striking Safeway workers in nearby San Francisco, identifying themselves to union leaders as homeland security agents.

Further blurring the lines over what constitutes "homeland security" has been a push by Washington for states to identify possible terrorists. In 2003, the Department of Homeland Security began requiring states to draft strategic plans that included figures on how many "potential threat elements" existed in their backyards. The definition of suspected terrorists was fairly loose - PTEs were groups or individuals who might use force or violence "to intimidate or coerce" for a goal "possibly political or social in nature." In response, some states came up with alarming numbers. Most of the reports are not available publicly, but U.S. News obtained nine state homeland security plans and found that local officials have identified thousands of "potential" terrorists. There are striking disparities, as well. South Carolina, for example, found 68 PTEs, but neighboring North Carolina uncovered 506. Vermont and New Hampshire found none at all. Most impressive was Texas, where in 2004 investigators identified 2,052 potential threat elements. One top veteran of the FBI's counterterrorism force calls the Texas number "absurd." Included among the threats cited by the states, sources say, are biker gangs, militia groups, and "save the whales" environmentalists.

"The PTE methodology was flawed," says a federal intelligence official familiar with the process, "and it's no longer being used." Nonetheless, these "threat elements" have, in some cases, become the basis for intelligence gathering by local and state police. Concern over the process prompted the ACLU in New Jersey to sue the state, demanding that eight towns turn over documents on PTEs identified by local police.

Another source of alarm for civil liberties watchdogs is the explosion in police computing power. Spurred by a 2004 White House directive ordering better information sharing, the Justice Department has poured tens of millions of dollars into expanding and tying together law enforcement databases and networks. In many respects, the changes are long overdue, yanking police into the 21st century and letting them use the tools that bankers, private investigators, and journalists routinely employ. From TV shows like 24 and CSI, Americans are accustomed to scenes of police accessing the most arcane data with a few keyboard clicks. The reality couldn't be more different. Law enforcement was slow to get on the technology bandwagon, and its information systems have developed into a patchwork of networks and databases that cannot talk to one another - even within the same county. Rap sheets, prison records, and court files are often all on different systems. This means that days or even weeks can pass before court-issued warrants show up on police wanted lists - leaving criminals out on the streets.

States and cities began linking up their systems in the 1990s, but since 9/11 their progress has been dramatic. At least 38 states are working on some 200 projects tying together their criminal justice records. Concerned over disjointed police networks around its key bases, the Navy's Criminal Investigative Service is funding projects in Norfolk, Va., and four other port cities, creating huge "data warehouses" stocked with crime files from dozens of law enforcement agencies. The FBI is also running pilot database centers in the St. Louis and Seattle areas in which the bureau makes its case files available to police. To local cops who have long complained about the FBI's lack of sharing, the development is downright revolutionary. "It made people nervous as hell, including me," says the FBI's Thomas Bush, who oversaw the initial program and now runs the FBI's Criminal Justice Information Services Division. "The technical aspect is easy, but you need to have the trust of the community and the security to safeguard the system."

The benefits of all this are undeniable. Armed with the latest information, police will be better able to catch crooks and spot criminal trends. But in this digital age, with so much data available about individual Americans, the lines between what is acceptable investigation and what is intrusive spying can quickly grow unclear. Consider the case of Matrix. Backed by $12 million in federal funds, at its peak in 2004 the Matrix system tapped into law enforcement agencies from a dozen states. Using "data mining" technology, its search engine ripped through billions of public records and matched them with police files, creating instant dossiers. In the days after 9/11, Matrix researchers searched out individuals with what they called "high terrorist factor" scores, providing federal and state authorities a list of 120,000 "suspects."

Law enforcement officials loved the system and made nearly 2 million queries to it. But what alarmed privacy advocates was the mixing of public data with police files, profiling techniques that smacked of fishing expeditions, and the fact that all these sensitive data were housed in a private corporation. Hounded by bad publicity and concerned that Matrix might be breaking privacy laws, states began pulling out of the system. Then, early last year, the Justice Department quietly cut off funding.

Matrix no longer exists, but similar projects are underway across the country, including one run by the California Department of Justice. Having learned from Matrix's mistakes, users are employing what tech specialists call "distributed computing." Instead of creating a single, vast database, they rapidly access information from sites in different states, often with a single query. The effect is essentially the same. "If people knew what we were looking at, they'd throw a fit," says a database trainer at one prominent police department.

Hacker's discovery. Another concern is the quality - and security - of all that information. In Minnesota, the state-run Multiple Jurisdiction Network Organization ran into controversy after linking together nearly 200 law enforcement agencies and over 8 million records. State Rep. Mary Liz Holberg, a Republican who oversees privacy issues, found much to be alarmed about when a local hacker contacted her after breaking into the system. The hacker had yanked out files on Holberg herself, showing she was classified as a "suspect" based on a neighbor's old complaint about where she parked her car. "We had a real mess in Minnesota," Holberg later wrote. "There was no effective policy for individuals to review the data in the system, let alone correct inaccuracies." In late 2003, state officials shut down the system amid concerns that it violated privacy laws in its handling of records on juvenile offenders and gun permits.

Such problems threaten to grow as law enforcement expands its reach with increased intelligence and computing power. The key to avoiding trouble, say experts, is ensuring that concerns over privacy and civil liberties are dealt with head-on. In a recent advisory aimed at police intelligence units, the Department of Justice stressed that success in safeguarding civil liberties "depends on appointing a high-level member of your agency to champion the initiative." But that message apparently hasn't gotten through, judging from the response at a conference sponsored by the Justice Department a few weeks back on information sharing. Among the crowd of some 200 local and state officials were intelligence officers, database managers, and chiefs of police. When a speaker asked who in the audience was working with privacy officials, not a single hand went up.

As Washington doles out millions of dollars for police intelligence, its reliance on voluntary guidelines may backfire, warn critics, who worry that abuses could wreck the important work that needs to be done. "We're still diddling around," says police technology expert Wormeli. "We're not setting clear policy on what we put in our databases. Should a patrol officer in Tallahassee be able to look at my credit report? Most people would say, 'Hell, no.'" Current regulations on criminal intelligence, he adds, were written before the computer age. "They were great in their day, but they need to be updated and expanded."

Civil liberties watchdogs like attorney Gutman, meanwhile, want to know how efforts to stop al Qaeda have ended up targeting animal rights advocates, labor leaders, and antiwar protesters. "You've got all this money and all this equipment - you're going to find someone to use it on," he warns. "If there aren't any external checks, there's going to be an inevitable drift toward abuses." But boosters of intelligence-led policing say that today's cops are too smart to repeat mistakes of the old Red Squads. "We're trying to develop policies to build trust and relationships, not spy," says Illinois State Police Deputy Director Kenneth Bouche. "We've learned a better way to do it." Perhaps. But for now, at least, the jury on this case is still out.


With Monica M. Ekman and Angie C. Marek

Go to Original

Undercover Cover-Up
By Kristian Williams
In These Times

Monday 08 May 2006

Was a Portland attorney the target of the NSA domestic spying program?

Thomas Nelson knew someone had been going through his northeast Portland law office. He didn't know who, or why, but several times - from January to July 2005 - he noticed that papers on his desk had been moved and his computer rebooted. Yet, he says, "as far as I [could] tell, nothing was taken."

Then he got an e-mail from Jon Norling, another lawyer in the same suite, alerting him that twice on a previous night someone posing as a member of the cleaning crew had tried to enter the office. "I know the cleaning crew," Norling says. "For a while they were all Hispanic, and women. … [This was] a middle-aged white guy speaking perfect English." A few weeks later, on July 5, it happened again.

Nelson met with the building manger, but was offered no explanations or solutions. Nelson started to feel nervous. "I didn't know what they were doing, what they were looking for … so I moved all my files," he says. He took them to his home in the mountain town of Zigzag, because "It's more inconvenient to get there. The home has a burglar alarm, and there's a gate getting into the subdivision."

Still, within a few weeks he noticed more disturbing signs. Mulitple times, he came home to find that the electricity had been out and the alarm deactivated. The alarm company failed to follow protocol and notify him of the lapse in service. When he called to inquire, they were uncharacteristically circumspect.

At that point, Nelson started to suspect federal involvement. "When the FBI wants to go to a place, they put out what's called a 'National Security Letter,'" he explains. "That letter tells, for example, the landlord, or another person who might have to facilitate the entry, that it is illegal to ever say anything about the assistance that is provided. My guess is that those letters went out to the building management, including the security company, and to the alarm company."

In December, when the New York Times revealed the existence of a National Security Agency (NSA) domestic eavesdropping program, the pieces started coming together. The NSA was listening in on international calls to or from the United States, and Nelson was representing an Islamic charity, Al-Haramain, that had been accused of funding Chechen terrorists. The charges were eventually dropped, but the organization's director, Soliman Al-Buthe, is still wanted for illegally taking money out of the country. Al-Buthe now lives in Saudi Arabia, communicating with his attorneys largely by phone and e-mail.

Nelson won't say how, but he had received a document showing, he says, that these confidential attorney-client conversations had been intercepted. He knew right away that the document was important, but didn't realize just how important it was. When he learned of the NSA program, it seemed what he had was not just evidence of the government overstepping its bounds in one particular case, but evidence suggesting an entire program of government misconduct.

The break-ins suddenly made a lot more sense: "Keep in mind that these break-ins occurred after the illegal wiretaps and before the illegal wiretaps were public knowledge. It's more than a neat coincidence," Nelson says. "Overall, I think they were fishing for a document that they thought perhaps could forestall the entire NSA investigation that's going on now."

In other words, the break-ins were part of an attempted cover-up. "It's worrisome," Nelson says, "that they went to that kind of effort to hide what we allege is an illegal program - not just 'kind of' illegal, but a fundamental violation of basic constitutional principles."

On Feb. 28, Nelson became the first attorney to file a suit alleging specific damages from the NSA spy program. The complaint - Al-Haramain Islamic Foundation v. Bush - accuses the NSA of monitoring communications between Al-Buthe and two of Al-Haramain's lawyers, Wendell Belew and Asim Ghafoor. It also alleges that the NSA then shared its information with the Treasury Department, who used it to freeze Al-Haramain's assets.

The NSA has refused to acknowledge or deny involvement. But Nelson's theory is plausible. The sort of surveillance the lawsuit alleges - focusing on international calls to supposed terror suspects - fits within the scope of the NSA's activities.

But it is impossible to verify Nelson's specific claims without seeing the evidence. And the crucial document has not only been sealed by the court, but transferred to Seattle and placed in a sensitive compartmented information facility (SCIF) - a specialized vault designed to hold classified documents. Steve Borgen, the security expert for the U.S. Attorney who determined that the document should be stored in the SCIF, declined to say why it required such protection, saying only that "it just had to do with the content of the document itself." Nelson won't discuss its contents either, except to say "the document supports the allegation that's in [our] complaint."

However, Nelson suggests that the document is being so closely guarded, not because of the information it reports, but because of how that information was collected. "I think the interesting thing about the document isn't what's in it, but rather … that it supports our complaint of warrantless wiretapping." If he's right, then the government is protecting a secret that is already public knowledge.

Nelson expects that the document will eventually be declassified. The Oregonian has petitioned the court to make it public. While the Justice Department opposes the newspaper's motion altogether, Nelson asks only that the attorney-client correspondence be deleted.

In the meantime, Nelson is focused on the larger issue: "I don't mind the spying. I don't mind the eavesdropping. [But] do it through a judge," he says. "If you take out the judges, which the NSA program does, you run a real serious possibility of tyranny."


Kristian Williams is the author of Our Enemies in Blue: Police and Power in America and the forthcoming American Methods: Torture and the Logic of Domination.

Comments: Post a Comment

<< Home

This page is powered by Blogger. Isn't yours?