Is the Pentagon spying on Americans? Secret database obtained by NBC News tracks suspicious¹ domestic groups By Lisa Myers, Douglas Pasternak, Rich Gardella and the NBC Investigative Unit Updated: 7:51 p.m. ET Dec. 13, 2005 http://msnbc.msn.com/id/10454316/
WASHINGTON - A year ago, at a Quaker Meeting House in Lake Worth, Fla., a small group of activists met to plan a protest of military recruiting at local high schools. What they didn't know was that their meeting had come to the attention of the U.S. military. A secret 400-page Defense Department document obtained by NBC News lists the Lake Worth meeting as a ³threat² and one of more than 1,500 ³suspicious incidents² across the country over a recent 10-month period. ³This peaceful, educationally oriented group being a threat is incredible,² says Evy Grachow, a member of the Florida group called The Truth Project. ³This is incredible,² adds group member Rich Hersh. ³It's an example of paranoia by our government,² he says. ³We're not doing anything illegal.² The Defense Department document is the first inside look at how the U.S. military has stepped up intelligence collection inside this country since 9/11, which now includes the monitoring of peaceful anti-war and counter-military recruitment groups. ³I think Americans should be concerned that the military, in fact, has reached too far,² says NBC News military analyst Bill Arkin. The Department of Defense declined repeated requests by NBC News for an interview. A spokesman said that all domestic intelligence information is ³properly collected² and involves ³protection of Defense Department installations, interests and personnel.² The military has always had a legitimate ³force protection² mission inside the U.S. to protect its personnel and facilities from potential violence. But the Pentagon now collects domestic intelligence that goes beyond legitimate concerns about terrorism or protecting U.S. military installations, say critics. Four dozen anti-war meetings The DOD database obtained by NBC News includes nearly four dozen anti-war meetings or protests, including some that have taken place far from any military installation, post or recruitment center. One ³incident² included in the database is a large anti-war protest at Hollywood and Vine in Los Angeles last March that included effigies of President Bush and anti-war protest banners. Another incident mentions a planned protest against military recruiters last December in Boston and a planned protest last April at McDonald¹s National Salute to America¹s Heroes a military air and sea show in Fort Lauderdale, Fla. The Fort Lauderdale protest was deemed not to be a credible threat and a column in the database concludes: ³US group exercising constitutional rights.² Two-hundred and forty-three other incidents in the database were discounted because they had no connection to the Department of Defense yet they all remained in the database. The DOD has strict guidelines (.PDF link), adopted in December 1982, that limit the extent to which they can collect and retain information on U.S. citizens. Still, the DOD database includes at least 20 references to U.S. citizens or U.S. persons. Other documents obtained by NBC News show that the Defense Department is clearly increasing its domestic monitoring activities. One DOD briefing document stamped ³secret² concludes: ³[W]e have noted increased communication and encouragement between protest groups using the [I]nternet,² but no ³significant connection² between incidents, such as ³reoccurring instigators at protests² or ³vehicle descriptions.² The increased monitoring disturbs some military observers. ³It means that they¹re actually collecting information about who¹s at those protests, the descriptions of vehicles at those protests,² says Arkin. ³On the domestic level, this is unprecedented,² he says. ³I think it's the beginning of enormous problems and enormous mischief for the military.² Some former senior DOD intelligence officials share his concern. George Lotz, a 30-year career DOD official and former U.S. Air Force colonel, held the post of Assistant to the Secretary of Defense for Intelligence Oversight from 1998 until his retirement last May. Lotz, who recently began a consulting business to help train and educate intelligence agencies and improve oversight of their collection process, believes some of the information the DOD has been collecting is not justified. Make sure they are not just going crazy ³Somebody needs to be monitoring to make sure they are just not going crazy and reporting things on U.S. citizens without any kind of reasoning or rationale,² says Lotz. ³I demonstrated with Martin Luther King in 1963 in Washington,² he says, ³and I certainly didn¹t want anybody putting my name on any kind of list. I wasn¹t any threat to the government,² he adds. The military¹s penchant for collecting domestic intelligence is disturbing but familiar to Christopher Pyle, a former Army intelligence officer. ³Some people never learn,² he says. During the Vietnam War, Pyle blew the whistle on the Defense Department for monitoring and infiltrating anti-war and civil rights protests when he published an article in the Washington Monthly in January 1970. The public was outraged and a lengthy congressional investigation followed that revealed that the military had conducted investigations on at least 100,000 American citizens. Pyle got more than 100 military agents to testify that they had been ordered to spy on U.S. citizens many of them anti-war protestors and civil rights advocates. In the wake of the investigations, Pyle helped Congress write a law placing new limits on military spying inside the U.S. But Pyle, now a professor at Mt. Holyoke College in Massachusetts, says some of the information in the database suggests the military may be dangerously close to repeating its past mistakes. ³The documents tell me that military intelligence is back conducting investigations and maintaining records on civilian political activity. The military made promises that it would not do this again,² he says. Too much data? Some Pentagon observers worry that in the effort to thwart the next 9/11, the U.S. military is now collecting too much data, both undermining its own analysis efforts by forcing analysts to wade through a mountain of rubble in order to obtain potentially key nuggets of intelligence and entangling U.S. citizens in the U.S. military¹s expanding and quiet collection of domestic threat data. Two years ago, the Defense Department directed a little known agency, Counterintelligence Field Activity, or CIFA, to establish and ³maintain a domestic law enforcement database that includes information related to potential terrorist threats directed against the Department of Defense.² Then-Deputy Secretary of Defense Paul Wolfowitz also established a new reporting mechanism known as a TALON or Threat and Local Observation Notice report. TALONs now provide ³non-validated domestic threat information² from military units throughout the United States that are collected and retained in a CIFA database. The reports include details on potential surveillance of military bases, stolen vehicles, bomb threats and planned anti-war protests. In the program¹s first year, the agency received more than 5,000 TALON reports. The database obtained by NBC News is generated by Counterintelligence Field Activity. CIFA is becoming the superpower of data mining within the U.S. national security community. Its ³operational and analytical records² include ³reports of investigation, collection reports, statements of individuals, affidavits, correspondence, and other documentation pertaining to investigative or analytical efforts² by the DOD and other U.S. government agencies to identify terrorist and other threats. Since March 2004, CIFA has awarded at least $33 million in contracts to corporate giants Lockheed Martin, Unisys Corporation, Computer Sciences Corporation and Northrop Grumman to develop databases that comb through classified and unclassified government data, commercial information and Internet chatter to help sniff out terrorists, saboteurs and spies. One of the CIFA-funded database projects being developed by Northrop Grumman and dubbed ³Person Search,² is designed ³to provide comprehensive information about people of interest.² It will include the ability to search government as well as commercial databases. Another project, ³The Insider Threat Initiative,² intends to ³develop systems able to detect, mitigate and investigate insider threats,² as well as the ability to ³identify and document normal and abnormal activities and behaviors,¹² according to the Computer Sciences Corp. contract. A separate CIFA contract with a small Virginia-based defense contractor seeks to develop methods ³to track and monitor activities of suspect individuals.² ³The military has the right to protect its installations, and to protect its recruiting services,² says Pyle. ³It does not have the right to maintain extensive files on lawful protests of their recruiting activities, or of their base activities,² he argues. Lotz agrees. ³The harm in my view is that these people ought to be allowed to demonstrate, to hold a banner, to peacefully assemble whether they agree or disagree with the government¹s policies,² the former DOD intelligence official says. 'Slippery slope' Bert Tussing, director of Homeland Defense and Security Issues at the U.S. Army War College and a former Marine, says ³there is very little that could justify the collection of domestic intelligence by the Unites States military. If we start going down this slippery slope it would be too easy to go back to a place we never want to see again,² he says. Some of the targets of the U.S. military¹s recent collection efforts say they have already gone too far. ³It's absolute paranoia at the highest levels of our government,² says Hersh of The Truth Project. ³I mean, we're based here at the Quaker Meeting House,² says Truth Project member Marie Zwicker, ³and several of us are Quakers.² The Defense Department refused to comment on how it obtained information on the Lake Worth meeting or why it considers a dozen or so anti-war activists a ³threat.² © 2005 MSNBC.com URL: http://msnbc.msn.com/id/10454316/ You are a subscribed member of the infowarrior list. Visit www.infowarrior.org for list information or to unsubscribe. This message may be redistributed freely in its entirety. Any and all copyrights appearing in list messages are maintained by their respective owners.