-Caveat Lector-

Not completely recent, but recent enough, and it bears repeating.

- jt

=====

from - http://www.corpwatch.org/issues/PID.jsp?articleid=1108

Homeland Security, Homeland Profits

By Wayne Madsen
Special to CorpWatch
December 21, 2001

WASHINGTON, DC -- Recent moves to beef up intelligence gathering in the wake of
the September 11th terrorist attacks have civil libertarians concerned that law
enforcement agencies will entangle many law abiding citizens and social justice
groups in their surveillance missions. Intelligence networks are setting their
sights on the Internet, which up to now has had no clear privacy guidelines.
Under the provisions of the inaptly named anti-terrorism act, "USA-PATRIOT," the
Federal Bureau of Investigation (FBI), National Security Agency (NSA), Central
Intelligence Agency (CIA), and a number of other smaller law enforcement
agencies are looking for ways to monitor the Internet and mine useful
intelligence from it. And new technology makes it easier than ever to spy on the
Internet.

Although law enforcement and intelligence agencies claim they are merely looking
for information to counter future acts of terrorism, the definition of
"terrorism" is being expanded to cover non-violent groups that have
traditionally used the Internet to marshal resistance to corporate-inspired
globalization. Politicians are already painting dissent as "unpatriotic" and
therefore somehow linked to terrorism.

Meanwhile, a phalanx of software companies, consultants, and defense contractors
stand to reap billions of dollars over the next few years by selling
surveillance and information-gathering systems to government agencies and the
private sector.

Technology Already in the Hands of Law Enforcement

Law enforcement agencies like the FBI already have at their disposal a massive
information sharing network through which federal, state, local, and foreign
police forces can exchange information on groups felt to pose a threat. The
system, RISSNET, or Regional Information Sharing System Network, which existed
before the September 11th attacks, recently got a boost when Congress authorized
additional money for it in the USA PATRIOT Act.

RISSNET is a secure intranet that connects 5,700 law enforcement agencies in all
50 states, as well as agencies in Ontario and Quebec, the District of Columbia,
Guam, the U.S. Virgin Islands, Puerto Rico, and Australia. According to sources
close to the Washington Metropolitan Police, data on targeted local groups such
as the Alliance for Global Justice, the anti-World Bank/International Monetary
Fund activist organization, has been shared with other jurisdictions through
RISSNET.

RISSNET has also been used to coordinate the monitoring of the activities of
anti-globalization protestors in Seattle, Quebec City, Philadelphia, Los
Angeles, Washington DC and Genoa. For example, when the FBI seized network
server logs from Independent Media Center (IMC) in Seattle during the April 2001
anti-free trade protests in Quebec City, RISSNET was used to coordinate
activities across jurisdictional boundaries. The IMC, founded during the 1999
WTO protests, allows activists and independent journalists to post directly to
its site.

State and metropolitan police intelligence units also monitor the web sites of
activist organizations in their jurisdictions. All RISS intelligence is archived
by an Orwellian-sounding entity called MAGLOCLEN or "Middle Atlantic-Great Lakes
Organized Crime Law Enforcement Network." There are other regional RISS
intelligence centers around the country with equally mysterious acronyms.
MAGLOCLEN, a nerve center headquartered in Newtown, Pennsylvania, distributes
political intelligence to all police departments hooked up to RISSNET.

MAGLOCLEN allows police investigators to link various activist groups and
members through the Link Association Analysis sub-system, a relational data base
that identifies the "friends and families" of groups and individuals. The
Telephone Record Analysis sub-system can call up records of phone calls of
targeted groups and individuals. A suspect group's banking and other commercial
data can be monitored by the Financial Analysis sub-system. And through a system
that would have been the envy of J. Edgar Hoover, police and federal agents can
also call up profiles that provide specific information on the composition of
organizations, including their membership lists. The Justice Department has
instituted a project called RISSNET II, which directly links the individual
databases contained within the various RISS centers.

The FBI also runs its own intranet called Law Enforcement On-line or "LEO,"
which allows it to communicate intelligence with select other law enforcement
agencies. In the aftermath of September 11th , the FBI is under pressure to open
up LEO to more police agencies so they can have access to more real-time
intelligence. If Attorney General John Ashcroft lifts restrictions placed on the
FBI's collection of political intelligence, undoubtedly information on the First
Amendment activities of American citizens will wind up in the Bureau's computer
databases.

"There has been no indication that the FBI needs expanded spying powers," says
Center for Constitutional Rights attorney Michael Ratner. "We should learn from
history; spying on dissent is not only unlawful but it is abusive."

This kind of surveillance is not new. In the 1960s and 70s, the FBI's Counter
Intelligence Program, known as COINTELPRO, was used to gather personal details
on the lives and habits of a wide array of activists ranging from public figures
like Dr. Martin Luther King, Jr., actress Jane Fonda and noted pediatrician
Benjamin Spock, to members of local anti-war and civil rights groups. This
information was often used to disrupt lawful organizing and protest activities.

A modern-day FBI list might include any group deemed "terrorist" by any law
enforcement agencies, the military, or criminal prosecutors. That could subject
organizations as varied -- and unconnected to terrorism -- as Earth First,
Greenpeace, the American Indian Movement, the Zapatista National Liberation
Front, ACT UP, and their supporters to a wide array of high-tech surveillance
and eavesdropping tools.

Chief among spy agency tools is an e-mail sniffing program known as Carnivore.
Changes brought about by USA-PATRIOT allow federal law enforcement officials to
petition a secretive federal court called the Foreign Intelligence Surveillance
Court for warrants to tap phones, read e-mail, or break and enter into homes or
offices to conduct searches and plant bugging devices. These spy activities can
be carried out without proof that an organization has links to terrorists or
foreign intelligence agencies.

To read e-mail the FBI can order an Internet Service Provider to place a special
monitoring computer called Carnivore (now renamed Data Collection System 1000)
on its network servers. The FBI can then select the e-mail of surveillance
targets for capture and storage. Not content with this device, the FBI now seeks
to expand its surveillance capability to the entire Internet.

Making a Buck off of Government Spying

Companies that are positioning themselves to help the government surveill the
web came out in force at a recent Homeland Security Conference in Washington.
They included Oracle, Microsoft, Information Builders, Choice Point, Man Tech,
AMS, and Booz Allen & Hamilton. Government speakers from civilian and military
agencies all stressed that they urgently need the technology to store
surveillance-derived intelligence and exchange it with other agencies. If these
corporations step up to the plate on developing new surveillance, monitoring,
and biometric ID systems, they stand to make billions.

Companies like Top Layer Networks, Inc. of Westboro, Massachusetts, are
developing ways for the FBI to install surveillance systems at a few key
Internet hubs which would allow federal agents to remotely flip a switch and
pound a few keys to begin monitoring the e-mail or web-based mail of any
targeted group or individual. According to chief Top Layer engineer Ken
Georgiades, the firm is working with a number of partners to develop new
standards for the legal interception of communications at the Internet Service
Provider level and at higher gigabit speeds.

The higher gigabit intercept equipment would be placed at major Internet
backbone hubs in strategic locations like Washington, DC, the San Francisco Bay
Area, Chicago, Dallas, and Los Angeles. Georgiades said that the 1994
Communications Assistance to Law Enforcement Act (CALEA) does not currently
extend to the Internet and only applies to telecommunications companies.
However, the fact that Top Layer and its unspecified partners are ramping up to
deliver CALEA-like wiretapping services for the Internet indicates the FBI sees
the power of CALEA growing beyond phone lines to the web. And Georgiades pointed
out that foreign governments are under no such constraints and can use Internet
snooping equipment under existing current wiretapping laws.

David Banisar, Research Fellow at Harvard's Information Infrastructure Project,
said such systems "set a dangerous precedent to allow law enforcement and
intelligence agencies to run the communications system." He added, "these
agencies take an over-inclusive view of who they think are the enemies and its
likely that civil and human rights groups will, again, be monitored for no
legitimate reason."

The large defense and intelligence consulting and engineering firm Booz, Allen &
Hamilton has not only developed the FBI's Carnivore capability but it has
assisted the bureau in ensuring that all telecommunications companies engineer
their systems to ensure they are "wiretap friendly." The companies are required
by the Communications Assistance to Law Enforcement Act to ensure the FBI has
access to all forms of telecommunications, including cellular calls.

What if a target decides to use encryption to protect their e-mail from
interception? That is not a problem for the FBI. Booz Allen & Hamilton has
helped develop a system code-named Magic Lantern, which permits a virus
containing a key logging program to be secretly transmitted to a recipient.
After installing itself on the target's computer, any time the target types in a
password to decrypt a message, that same password is immediately picked up by
Magic Lantern and transmitted to the FBI. Essentially, the FBI has a virtual
master key to break any encryption program used by a surveillance target.

A companion program to Magic Lantern, code named Cyber Knight, is a relational
database system that compares and matches information from e-mail, Internet
relay chats, instant messages, and Internet voice communications.

Not to be outdone by the FBI, the CIA has also been extremely active in
developing software than can dig deep within the Internet to harvest
information. The CIA has relied heavily on its wholly-owned and operated
proprietary Silicon Valley company, IN-Q-TEL, to fund research and development
for Internet snooping software. IN-Q-TEL's President and Chief Executive Officer
Gilman Louie is to keynote a January 2002 Las Vegas seminar on the use of
emerging intelligence technology to search and analyze the web. He is to be
joined by Joan Dempsey, the Deputy Director of the CIA for Intelligence
Community Management. IN-Q-TEL's web page describes the aggressive attitude the
CIA is taking toward ensuring new technologies come complete with the spy
agency's seal of approval, "IN-Q-TEL strives to extend the Agency's access to
new IT companies, solutions, and approaches to address their priority problems."

Assisting the government in its goals to gather massive amounts of personal
information on citizens and non-citizens, is a company that owes its very
existence to the CIA. Oracle, Inc. Chairman Larry Ellison has offered to provide
to the government free of charge the database software required to establish an
interactive national ID card system. Oracle got its start when the CIA gave
Ellison a contract in the 1970s to design a system to enable the agency to store
and retrieve massive amounts if information in databases. Not coincidentally,
the code name of that CIA project was "Oracle."

The rush by the government to monitor the Internet has the backing of a group of
federal contract research facilities that have pounded out report after report
warning about the threat of cyberspace to national security. These "think tanks"
include Rand Corporation and Analytical Services Corporation (ANSER). They are
assisted in this policy laundering effort by the Center for Strategic and
International Studies, the K Street rest home for former Pentagon, intelligence,
and State Department political appointees.

But all the technology in the world will not protect citizens from terrorist
attacks, unless the government knows how to use the information effectively. As
the government and a few selected companies and think tanks push for new
surveillance laws and more monitoring of the Internet and telecommunications in
general, the words of Mary Schiavo, the Transportation Department's former
Inspector General and outspoken critic of lax airline security, are particularly
poignant. Speaking in Washington on December 18, Schiavo pointed out that the
"United States already had laws to prevent what happened on September 11th . . .
they weren't being enforced."


Wayne Madsen is a Washington-based journalist who covers intelligence, national
security, and foreign affairs. He is also a Senior Fellow of the Electronic
Privacy Information Center (EPIC) in Washington, DC and author of "Genocide and
Covert Operations in Africa 1993-1999" (Mellen Press).

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to