From: <<mailto:[email protected]>[email protected]>
Date: Mon, Dec 20, 2010 at 12:12 PM
Subject: Monitoring America - US assembling vast domestic 
intelligence apparatus to collect information about Americans

<http://projects.washingtonpost.com/top-secret-america/articles/monitoring-america/print/>http://projects.washingtonpost.com/top-secret-america/articles/monitoring-america/print/

Monitoring America

Monday, December 20, 2010; 1:40 AM

Nine years after the terrorist attacks of 2001, the United States is 
assembling a vast domestic intelligence apparatus to collect 
information about Americans, using the FBI, local police, state 
homeland security offices and military criminal investigators.

The system, by far the largest and most technologically sophisticated 
in the nation's history, collects, stores and analyzes information 
about thousands of U.S. citizens and residents, many of whom have not 
been accused of any wrongdoing.

The government's goal is to have every state and local law 
enforcement agency in the country feed information to Washington to 
buttress the work of the FBI, which is in charge of terrorism 
investigations in the United States.

Other democracies - Britain and Israel, to name two - are well 
acquainted with such domestic security measures.

But for the United States, the sum of these new activities represents 
a new level of governmental scrutiny.

This localized intelligence apparatus is part of a larger Top Secret 
America created since the attacks.

In July, The Washington Post described an alternative geography of 
the United States, one that has grown so large, unwieldy and 
secretive that no one knows how much money it costs, how many people 
it employs or how many programs exist within it.

Today's story, along with related material on The Post's Web site, 
examines how Top Secret America plays out at the local level.

It describes a web of 4,058 federal, state and local organizations, 
each with its own counterterrorism responsibilities and jurisdictions.

At least 935 of these organizations have been created since the 2001 
attacks or became involved in counterterrorism for the first time after 9/11.

The months-long investigation, based on nearly 100 interviews and 
1,000 documents, found that:

* Technologies and techniques honed for use on the battlefields of 
Iraq and Afghanistan have migrated into the hands of law enforcement 
agencies in America.

* The FBI is building a database with the names and certain personal 
information, such as employment history, of thousands of U.S. 
citizens and residents whom a local police officer or a fellow 
citizen believed to be acting suspiciously.

It is accessible to an increasing number of local law enforcement and 
military criminal investigators, increasing concerns that it could 
somehow end up in the public domain.

* Seeking to learn more about Islam and terrorism, some law 
enforcement agencies have hired as trainers self-described experts 
whose extremist views on Islam and terrorism are considered 
inaccurate and counterproductive by the FBI and U.S. intelligence agencies.

* The Department of Homeland Security sends its state and local 
partners intelligence reports with little meaningful guidance, and 
state reports have sometimes inappropriately reported on lawful 
meetings.The need to identify U.S.-born or naturalized citizens who 
are planning violent attacks is more urgent than ever, U.S. 
intelligence officials say. This month's FBI sting operation 
involving a Baltimore construction worker who allegedly planned to 
bomb a Maryland military recruiting station is the latest example. It 
followed a similar arrest of a Somali-born naturalized U.S. citizen 
allegedly seeking to detonate a bomb near a Christmas tree lighting 
ceremony in Portland, Ore. There have been nearly two dozen other 
cases just this year.

"The old view that 'if we fight the terrorists abroad, we won't have 
to fight them here' is just that - the old view," Homeland Security 
Secretary Janet Napolitano told police and firefighters recently.

The Obama administration heralds this local approach as a much-needed 
evolution in the way the country confronts terrorism..However, just 
as at the federal level, the effectiveness of these programs, as well 
as their cost, is difficult to determine.

The Department of Homeland Security, for example, does not know how 
much money it spends each year on what are known as state fusion 
centers, which bring together and analyze information from various 
agencies within a state.

The total cost of the localized system is also hard to gauge. The DHS 
has given $31 billion in grants since 2003 to state and local 
governments for homeland security and to improve their ability to 
find and protect against terrorists, including $3.8 billion in 2010.

At least four other federal departments also contribute to local efforts.

But the bulk of the spending every year comes from state and local 
budgets that are too disparately recorded to aggregate into an overall total.

The Post findings paint a picture of a country at a crossroads, where 
long-standing privacy principles are under challenge by these new 
efforts to keep the nation safe.

The public face of this pivotal effort is Napolitano, the former 
governor of Arizona, which years ago built one of the strongest state 
intelligence organizations outside of New York to try to stop illegal 
immigration and drug importation.

Napolitano has taken her "See Something, Say Something" campaign far 
beyond the traffic signs that ask drivers coming into the nation's 
capital for "Terror Tips" and to "Report Suspicious Activity."

She recently enlisted the help of Wal-Mart, Amtrak, major sports 
leagues, hotel chains and metro riders.

In her speeches, she compares the undertaking to the Cold War fight 
against communists.

"This represents a shift for our country," she told New York City 
police officers and firefighters on the eve of the 9/11 anniversary 
this fall. "In a sense, this harkens back to when we drew on the 
tradition of civil defense and preparedness that predated today's 
concerns."----

 From Afghanistan to Tennessee

On a recent night in Memphis, a patrol car rolled slowly through a 
parking lot in a run-down section of town.

The military-grade infrared camera on its hood moved robotically from 
left to right, snapping digital images of one license plate after 
another and analyzing each almost instantly.

Suddenly, a red light flashed on the car's screen along with the word 
"warrant."

"Got a live one! Let's do it," an officer called out.

The streets of Memphis are a world away from the streets of Kabul, 
yet these days, the same types of technologies and techniques are 
being used in both places to identify and collect information about 
suspected criminals and terrorists.

The examples go far beyond Memphis.

* Hand-held, wireless fingerprint scanners were carried by U.S. 
troops during the insurgency in Iraq to register residents of entire 
neighborhoods.

L-1 Identity Solutions is selling the same type of equipment to 
police departments to check motorists' identities.

* In Arizona, the Maricopa County Sheriff's Facial Recognition Unit, 
using a type of equipment prevalent in war zones, records 9,000 
biometric digital mug shots a month.

* U.S. Customs and Border Protection flies General Atomics' Predator 
drones along the Mexican and Canadian borders - the same kind of 
aircraft, equipped with real-time, full-motion video cameras, that 
has been used in wars in Kosovo, Iraq and Afghanistan to track the enemy.

The special operations units deployed overseas to kill the al-Qaeda 
leadership drove technological advances that are now expanding in use 
across the United States.

On the front lines, those advances allowed the rapid fusing of 
biometric identification, captured computer records and cellphone 
numbers so troops could launch the next surprise raid.

Here at home, it's the DHS that is enamored with collecting photos, 
video images and other personal information about U.S. residents in 
the hopes of teasing out terrorists.

The DHS helped Memphis buy surveillance cameras that monitor 
residents near high-crime housing projects, problematic street 
corners, and bridges and other critical infrastructure.

It helped pay for license plate readers and defrayed some of the cost 
of setting up Memphis's crime-analysis center.

All together it has given Memphis $11 million since 2003 in homeland 
security grants, most of which the city has used to fight crime.

"We have got things now we didn't have before," said Memphis Police 
Department Director Larry Godwin, who has produced record numbers of 
arrests using all this new analysis and technology.

"Some of them we can talk about. Some of them we can't."

One of the biggest advocates of Memphis's data revolution is John 
Harvey, the police department's technology specialist, whose computer 
systems are the civilian equivalent of the fancier special ops 
equipment used by the military.

Harvey collects any information he can pry out of government and 
industry. When officers were wasting time knocking on the wrong doors 
to serve warrants, he persuaded the local utility company to give him 
a daily update of the names and addresses of customers.

When he wanted more information about phones captured at crime 
scenes, he programmed a way to store all emergency 911 calls, which 
often include names and addresses to associate with phone numbers.

He created another program to upload new crime reports every five 
minutes and mine them for the phone numbers of victims, suspects, 
witnesses and anyone else listed on them.

Now, instead of having to decide which license plate numbers to type 
into a computer console in the patrol car, an officer can simply 
drive around, and the automatic license plate reader on his hood 
captures the numbers on every vehicle nearby.

If the officer pulls over a driver, instead of having to wait 20 
minutes for someone back at the office to manually check records, he 
can use a hand-held device to instantly call up a mug shot, a Social 
Security number, the status of the driver's license and any 
outstanding warrants.

The computer in the cruiser can tell an officer even more about who 
owns the vehicle, the owner's name and address and criminal history, 
and who else with a criminal history might live at the same address.

Take a recent case of two officers with the hood-mounted camera 
equipment who stopped a man driving on a suspended license.

One handcuffed him, and the other checked his own PDA.

Based on the information that came up, the man was ordered downtown 
to pay a fine and released as the officers drove off to stop another car.

That wasn't the end of it, though.

A record of that stop - and the details of every other arrest made 
that night, and every summons written - was automatically transferred 
to the Memphis Real Time Crime Center, a command center with three 
walls of streaming surveillance video and analysis capabilities that 
rival those of an Army command center.

There, the information would be geocoded on a map to produce a visual 
rendering of crime patterns.

This information would help the crime intelligence analysts predict 
trends so the department could figure out what neighborhoods to swarm 
with officers and surveillance cameras.

But that was still not the end of it, because the fingerprints from 
the crime records would also go to the FBI's data campus in Clarksburg, W.Va.

There, fingerprints from across the United States are stored, along 
with others collected by American authorities from prisoners in Saudi 
Arabia and Yemen, Iraq and Afghanistan.

There are 96 million sets of fingerprints in Clarksburg, a volume 
that government officials view not as daunting but as an opportunity.

This year for the first time, the FBI, the DHS and the Defense 
Department are able to search each other's fingerprint databases, 
said Myra Gray, head of the Defense Department's Biometrics Identity 
Management Agency, speaking to an industry group recently.

"Hopefully in the not-too-distant future," she said, "our 
relationship with these federal agencies - along with state and local 
agencies - will be completely symbiotic."

----The FBI's 'suspicious' files

At the same time that the FBI is expanding its West Virginia 
database, it is building a vast repository controlled by people who 
work in a top-secret vault on the fourth floor of the J. Edgar Hoover 
FBI Building in Washington.

This one stores the profiles of tens of thousands of Americans and 
legal residents who are not accused of any crime.

What they have done is appear to be acting suspiciously to a town 
sheriff, a traffic cop or even a neighbor.

If the new Nationwide Suspicious Activity Reporting Initiative, or 
SAR, works as intended, the Guardian database may someday hold files 
forwarded by all police departments across the country in America's 
continuing search for terrorists within its borders.

The effectiveness of this database depends, in fact, on collecting 
the identities of people who are not known criminals or terrorists - 
and on being able to quickly compile in-depth profiles of them.

"If we want to get to the point where we connect the dots, the dots 
have to be there," said Richard A. McFeely, special agent in charge 
of the FBI's Baltimore office.

In response to concerns that information in the database could be 
improperly used or released, FBI officials say anyone with access has 
been trained in privacy rules and the penalties for breaking them.

But not everyone is convinced.

"It opens a door for all kinds of abuses," said Michael German, a 
former FBI agent who now leads the American Civil Liberties Union's 
campaign on national security and privacy matters.

"How do we know there are enough controls?"

The government defines a suspicious activity as "observed behavior 
reasonably indicative of pre-operational planning related to 
terrorism or other criminal activity" related to terrorism.

State intelligence analysts and FBI investigators use the reports to 
determine whether a person is buying fertilizer to make a bomb or to 
plant tomatoes; whether she is plotting to poison a city's drinking 
water or studying for a metallurgy test; whether, as happened on a 
Sunday morning in late September, the man snapping a picture of a 
ferry in the Newport Beach harbor in Southern California simply liked 
the way it looked or was plotting to blow it up.

Suspicious Activity Report N03821 says a local law enforcement 
officer observed "a suspicious subject . . . taking photographs of 
the Orange County Sheriff Department Fire Boat and the Balboa Ferry 
with a cellular phone camera."

The confidential report, marked "For Official Use Only," noted that 
the subject next made a phone call, walked to his car and returned 
five minutes later to take more pictures.

He was then met by another person, both of whom stood and "observed 
the boat traffic in the harbor."

Next another adult with two small children joined them, and then they 
all boarded the ferry and crossed the channel.All of this information 
was forwarded to the Los Angeles fusion center for further 
investigation after the local officer ran information about the 
vehicle and its owner through several crime databases and found 
nothing.Authorities would not say what happened to it from there, but 
there are several paths a suspicious activity report can take:At the 
fusion center, an officer would decide to either dismiss the 
suspicious activity as harmless or forward the report to the nearest 
FBI terrorism unit for further investigation.At that unit, it would 
immediately be entered into the Guardian database, at which point one 
of three things could happen:The FBI could collect more information, 
find no connection to terrorism and mark the file closed, though 
leaving it in the database.It could find a possible connection and 
turn it into a full-fledged case.Or, as most often happens, it could 
make no specific determination, which would mean that Suspicious 
Activity Report N03821 would sit in limbo for as long as five years, 
during which time many other pieces of information about the man 
photographing a boat on a Sunday morning could be added to his file: 
employment, financial and residential histories; multiple phone 
numbers; audio files; video from the dashboard-mounted camera in the 
police cruiser at the harbor where he took pictures; and anything 
else in government or commercial databases "that adds value," as the 
FBI agent in charge of the database described it.That could soon 
include biometric data, if it existed; the FBI is working on a way to 
attach such information to files...






------------------------------------

---------------------------------------------------------------------------
LAAMN: Los Angeles Alternative Media Network
---------------------------------------------------------------------------
Unsubscribe: <mailto:[email protected]>
---------------------------------------------------------------------------
Subscribe: <mailto:[email protected]>
---------------------------------------------------------------------------
Digest: <mailto:[email protected]>
---------------------------------------------------------------------------
Help: <mailto:[email protected]?subject=laamn>
---------------------------------------------------------------------------
Post: <mailto:[email protected]>
---------------------------------------------------------------------------
Archive1: <http://www.egroups.com/messages/laamn>
---------------------------------------------------------------------------
Archive2: <http://www.mail-archive.com/[email protected]>
---------------------------------------------------------------------------
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/laamn/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/laamn/join
    (Yahoo! ID required)

<*> To change settings via email:
    [email protected] 
    [email protected]

<*> To unsubscribe from this group, send an email to:
    [email protected]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/

Reply via email to