Obama’s cybersecurity plan: Monitor more of the Internet
RT | March 21, 2013
President Barack Obama’s plan to protect the United States’ critical infrastructure against cyberattacks is accelerating quickly as more private sector businesses are signing on to share information with the federal government.
When Pres. Obama rolled out his ‘Improving Critical Infrastructure Cybersecurity’ executive order last month, he asked that classified cyber threat and technical information collected by the government be given to eligible commercial service providers that offer security services to businesses linked to the country’s critical infrastructure.
But in the few short weeks since the order was announced during the president’s annual State of the Union address, warnings of an imminent attack have only increased. CIA Director John Brennan told a panel last week that “the seriousness and the diversity of the threats that this country faces in the cyber domain are increasing on a daily basis,” and US national intelligence chief James Clapper claims there is “a remote chance of a major cyberattack against US critical infrastructure systems during the next two years that would result in long-term, wide-scale disruption of services, such as a regional power outage.”
Upon announcement of the executive order, a handful of defense contractors and telecom companies — namely Lockheed Martin, Raytheon, AT&T and CenturyLink — confirmed that they’d be voluntarily sharing information back and forth with the country’s top intelligence agencies in order to closely monitor any threats that could collapse the country’s critical infrastructure, a vaguely defined category assumed to include the nation’s power systems, telecommunication wires and other major utilities.
“The demand is there. I think the priority is there, and the threat is serious,” Steve Hawkins, vice president of information and security solutions for Raytheon, told Bloomberg earlier in the month.
As warnings of a cyberattack increase, however, the latest news out of Washington is that even more private sector companies with ties to critical infrastructure will be participating in the program. In a report published on Thursday by Reuters, the newswire notes that the framework first outlined during last month’s executive order is already quickly shaping up, with tasks being delegated throughout the US so that threat information can be adequately passed to applicable persons.
According to Reuters’ latest write-up, the executive order will require the National Security Agency to collect classified intelligence on serious hacking attempts aimed at American businesses, which will then be handed over to the Department of Homeland Security to pass on to the telecom and cybersecurity providers — Raytheon, AT&T and others — where employees holding security clearances will scan incoming emails and routine Web traffic for threats to the infrastructure.
But while the government has long asked the entities to open up lines of communication with the NSA and other offices, smaller private-sector businesses could soon be signing on. According to Joseph Menn and Deborah Charles of Reuters, the government is already expanding their cybersecurity program so that even more Web traffic heading into and out of defense contractors will be scanned to include far more of the country’s private, civilian-run infrastructure.
“As a result, more private sector employees than ever before, including those at big banks, utilities and key transportation companies, will have their emails and Web surfing scanned as a precaution against cyberattacks,” they write.
Once those participating companies sign on to get data from Homeland Security, the DHS will send them computer threat “signatures” obtained by the NSA that will offer a list of red flags to be watching out for as huge amounts of Web data is scanned second-by-second and bit-by-bit.
“The companies can use this intelligence to strengthen cybersecurity services they sell to businesses that maintain critical infrastructure,” Bloomberg News reports.
That intelligence, including but not limited to cyber timestamps, indicators and the critical sector potentially, can then be monitored to search for malicious code and viruses sent through America’s Internet with the intent of causing harm. In exchange, the critical infrastructure companies that could be targeted by cyberterrorists will pay the contractors and telecoms for their help.
The threat of a cyberwar crippling America’s power grid and communication systems has been ramped-up in recent weeks, particularly in light of a highly-touted report that linked Chinese state actors with repeated attempts to sabotage US businesses and conduct espionage to steal secrets.
“Increasingly, US businesses are speaking out about their serious concerns about sophisticated, targeted theft of confidential business information and proprietary technologies through cyber intrusions emanating from China on an unprecedented scale,” National Security Adviser Thomas Donilon told the Asia Society in New York last week. “The international community cannot afford to tolerate such activity from any country.”
The Drug Trade and the Increasing Militarization of the Caribbean
By Kevin Edmonds | The Other Side of Paradise | February 8, 2013
Given the current controversy surrounding the extent of the U.S. drone program and targeted killings, it is important to revisit that in the summer of 2012, the U.S. Customs and Border Protection Agency announced that unmanned drones would begin patrolling Caribbean airspace as an expansion of the Caribbean Basin Security Initiative (CBSI). This is only one aspect of how the War on Drugs in the Caribbean is increasingly looking like the War on Terror.
The U.S.–Caribbean border is the often ignored “Third Border,” which the Department of Homeland Security has referred to as an “open door for drug traffickers and terrorists.” A recent study by the National Defence University has stated that “the region’s nexus to the United States uniquely positions it in the proximate U.S. geopolitical and strategic sphere. Thus, there is an incentive, if not an urgency, for the United States to proactively pursue security capacity-building measures in the Caribbean region.”
While the drones are unarmed for the time being, they will be primarily used to locate drug traffickers operating fishing boats, fast boats, and semi-submarines and would relay information to the Coast Guard, Navy or Caribbean authorities to carry out the interception and arrests. It has been revealed that the drones will be operating out of bases in Corpus Christi, Texas, Cocoa Beach, Florida and potentially the Dominican Republic and Puerto Rico.
The shift towards the use of drones in the region is largely based off of an unconvincing pilot program carried out over 18 months in the Bahamas, in which “During more than 1,260 hours in the air off the southeastern coast of Florida, the Guardian (drones) assisted in only a handful of large-scale busts.” That said, the Caribbean governments increased militarization in the region when they implemented the never-ending War on Drugs without any public consultation or debate. This erosion of regional sovereignty may be a slippery slope to a dangerous future in which Caribbean nationals may very well find themselves on kill lists instead of facing a trial.
Such a conclusion is not baseless, as a November 2012 report by the U.S. House Committee on Homeland Security recommended that Latin American drug cartels be classified as terrorist organizations “so there is increased ability to counter their threat to national security.” Furthermore, in 2009, the U.S. Military drew criticism for placing 50 suspected Afghani drug traffickers on a “kill list” as part of their ongoing efforts to cut off finance stream of the Taliban. The controversy arose due to the fact that drug traffickers (generally classified as civilians) had now been placed into the same legal category as the Taliban “insurgents” and thus became legitimate targets.
This is especially important in light of how the extradition of Jamaican kingpin Christopher “Dudus” Coke was handled. In September 2009, the United States requested his extradition to face drug trafficking charges, but Jamaican Prime Minister Bruce Golding blocked the request due to his deep political connections with Coke. It was only after months of intense pressure that Golding caved in May 2010. Jamaican Police and the Jamaican Defense Forces led the bloody operation to arrest Coke, which resulted in the deaths of more than 70 civilians—the vast majority of which were unarmed.
The resulting scandal led to the downfall of Golding as Prime Minister but highlighted the power that drug traffickers and gang leaders have had in Jamaican government and politics. It has since been reinforced that the operation was “assisted by the U.S. government and carried out, to a large degree, at its behest.” Information has emerged which reveals that a U.S. spy plane participated in the raid of Coke’s stronghold of Tivoli Gardens, and a Freedom of Information Act action has recently been levied against the Drug Enforcement Agency (DEA) by a group of law students to reveal the extent of U.S. involvement.
To prevent such explosive outcomes in the future, there has been a call for closer integration between Caribbean police forces and the U.S. DEA in a clear escalation of the War on Drugs. A September 2012 Senate Report revealed that Jamaica has been floated as a target for a Sensitive Investigative Unit, which consists of a highly trained police that collaborate with the DEA. A similar program exists in Kandahar, where U.S. and British troops have created and participated in a task force made up of Afghan police officers and U.S. DEA agents to disrupt the drug trade and investigate corrupt Afghan officials.
According to a seemingly benign Department of Homeland Security (DHS) press release announcing the drone program, the “DHS is partnering with Caribbean nations to enhance border security in the region through the Caribbean Basin Security Initiative (CBSI) . . . . The DHS is conducting border security training in conjunction with CBSI to increase partner nation capacity to secure their borders.” The problem with such statements is that there is always more shady business going on behind the scenes. Given the direction of U.S. policy in the region, it will only be a matter of time until the War on Drugs becomes eerily similar to the War on Terror.
Related article
Homeland Security Approves Seizure of Cell Phones and Laptops within 100 Miles of Border; Report Remains Secret
By Matt Bewig | AllGov | February 11, 2013

(graphic: ACLU)
Americans have no Fourth Amendment rights against unreasonable searches and seizures if they happen to be within 100 miles of the border, according to the “Executive Summary” of a still-secret report by the Department of Homeland Security (DHS). As the ACLU-created map above shows, nearly 2/3 of Americans (197 million people)—including the entire populations of Florida, Maine, New Hampshire, Vermont, Massachusetts, Connecticut, Rhode Island, New Jersey, Delaware, Maryland, Washington, DC, and Michigan—live in this “Constitution free” zone, as do the residents of the nation’s five most populous cities: New York, Los Angeles, Chicago, Houston and Philadelphia.
The secret report is DHS’s response (two years late) to critics of its policy, in place since at least 2008, of allowing border control agents, without a warrant or even a suspicion of wrongdoing, to search any travelers’ electronic devices (laptops, cell phones, tablets, cameras, etc.) and seize data they find. According to a Freedom of Information Act request (FOIA) filed three years ago by the ACLU, DHS subjected more than 6,500 travelers—nearly half of them U.S. citizens—to searches under this policy between October 2008 and June 2010.
The Executive Summary of the secret report, which DHS is allowing the public to see, sets forth its conclusions without even summarizing the reasoning underlying them. Thus it asserts that “imposing a requirement that officers have reasonable suspicion in order to conduct a border search of an electronic device would be operationally harmful without concomitant civil rights/civil liberties benefits,” but is silent on how DHS defines “civil rights/civil liberties benefits” or how it balances these against its institutional needs.
The ACLU, which has already filed an FOIA request demanding the full report, released a statement arguing that “allowing government agents to search through all of a traveler’s data without reasonable suspicion is completely incompatible with our fundamental rights: our Fourth Amendment right to privacy—and more specifically the right to be free from unreasonable searches—is implicated when the government can rummage through our computers and cell phones for no reason other than that we happen to have traveled abroad. Suspicionless searches also open the door to profiling based on perceived or actual race, ethnicity, or religion. And our First Amendment rights to free speech and free association are inhibited when agents at the border can target us for searches based on our exercise of those rights.”
To Learn More:
DHS Watchdog OKs ‘Suspicionless’ Seizure of Electronic Devices Along Border (by David Kravets, Wired)
Legal Review of Presidential Power to Engage in Preemptive Cyber Strikes to Remain Secret
By Kevin Gosztola | FDL | February 4, 2013
A recently published story from the New York Times reports a “secret legal review” has been conducted on the use of cyber warfare by the United States. It concluded President Barack Obama has “the broad power to order a preemptive strike if the United States detects credible evidence of a major digital attack looming from abroad.”
Unnamed officials involved in the review inform that the administration is moving in the coming weeks to “approve the nation’s first rules for how the military can defend, or retaliate, against a major cyber attack.” These rules, according to David Sanger and Thom Shanker, will “govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States.” If the president approves a strike, the government will be able to “attack adversaries by injecting them with destructive code — even if there is no declared war.”
It further adds, “The Pentagon would not be involved in defending against ordinary cyberattacks on American companies or individuals, even though it has the largest array of cybertools. Domestically, that responsibility falls to the Department of Homeland Security, and investigations of cyberattacks or theft are carried out by the FBI.”
The Times story points out the rules—like the rules “governing drone strikes”—are highly classified and will be kept secret. The officials from the administration providing details spoke “on condition of anonymity because they were not authorized to talk on the record.” They selectively leaked a scant amount of details on evolving cyber warfare policy to allay concerns about this power the administration is claiming.
One official claimed the US had been “restrained in its use of cyberweapons” and said, “There are levels of cyberwarfare that are far more aggressive than anything that has been used or recommended to be done.” A “senior American official” said cyberweapons were as powerful as nuclear weapons and “should be unleashed only on the direct orders of the commander in chief.” The official added the decision to launch cyber operations will rarely be made by someone at a level “below the president,” which means “‘automatic’ retaliation if a cyber attack on America’s infrastructure is detected” has reportedly been “ruled out.”
The story suggests the Obama administration had their best and brightest minds think about preemptive attack and the ramifications of launching such strikes on a country. “One senior official” said a country could “claim it was innocent” and undermine the “justification for the attack” because it would be “very hard to provide evidence to the world that you hit some deadly dangerous computer code.” They also thought through “‘what constitutes reasonable and proportionate force’ in halting or retaliating against a cyber attack,” according to another official.
The leaking of details on the “secret legal review” comes just over a week after the Washington Post reported the FBI was engaging in a fishing expedition for journalistic communications as part of an investigation into the sources of leaks on Stuxnet or Olympic Games, the cyber warfare against Iranian nuclear enrichment facilities that was launched by Obama (which Sanger published details on in a major story in June of last year and also described in detail in his book, Confront & Conceal).
It is a bit appalling that officials are speaking without authorization when it is known the FBI has spent the past six or seven months prying into the communications of government employees, who were sources for the Times story.
Back in November, the Post reported the White House was engaged in “the most extensive” effort “to date to wrestle with what constitutes an ‘offensive’ and a ‘defensive’ action in the rapidly evolving world of cyberwar and cyberterrorism.” This “secret legal review” may or may not be a result of this effort that was authorized by Presidential Policy Directive 20 to make it possible for the United States military to respond more aggressively to “thwart cyberattacks on the nation’s web of government and private computer networks.” But, given what Ellen Nakashima reported, the secret directive was to “establish” a “broad and strict set of standards to guide the operations of federal agencies.” It was also to, for the first time, make “a distinction between network defense and cyber operations to guide officials charged with making often rapid decisions when confronted with threats.”
As I wrote, the “secret policy” was to map out a process for vetting “operations outside government and defense networks” and ensuring “US citizens’ and foreign allies’ data and privacy are protected and international laws of war are followed.” As one senior administration official told the Post, “What it does, really for the first time, is it explicitly talks about how we will use cyber operations…Network defense is what you’re doing inside your own networks. . . .Cyber operations is stuff outside that space, and recognizing that you could be doing that for what might be called defensive purposes.”
On May 30, 2011, the Wall Street Journal reported the Pentagon had “concluded that computer sabotage from another country” could “constitute an act of war.” WSJ suggested this would open the door to responding to sabotage with “traditional military force.” These details came from a formal cyber strategy the Pentagon had put together for responding to cyber threats to critical infrastructure. One imperious military official was quoted, “If you shut down our power grid, maybe we will put a missile down one of your smokestacks.”
About a week ago, the Pentagon announced it would be expanding its “cyber security unit.” Glenn Greenwald detailed how the force that was expected to go from 900 to over 4000 individuals would continue a trend of “disguising aggression as ‘defense.’”
The Pentagon now has a policy, a “cyber security” policy authorized by a presidential directive has now pushed for the development of policy and a “secret legal review” has grappled with questions and determined preemptive strikes on countries’ infrastructure could be carried out if the president orders such attacks.
What we know about the legal questions Obama has grappled with is all secret. The development of “cybersecurity” policy or cyber warfare policies indicate a further expansion of the body of secret law under Obama.
The government has secret legal opinions on when it can and cannot kill US citizens with drones. Senator Ron Wyden of Oregon has made requests to view these opinions but the Obama administration has refused to let him see targeted killing memos, even though he is by law supposed to view them so he can conduct oversight. The ACLU has requested these memos be released but a judge ruled that the government was within its right under FOIA to not release the legal interpretations.
The Foreign Intelligence Surveillance Court makes rulings authorizing warrantless surveillance under the FISA Amendments Act (FAA). Despite efforts by Senator Jeff Merkley of Oregon to amend the reauthorization of the FAA at the end of 2012, this was rejected by the Obama administration (even though the administration had previously indicated to Wyden it would be open to a process of making the court’s secret rulings public in some form).
The government also has secret interpretations of at least one section of the PATRIOT Act—Section 215. The ACLU’s Alexander Abdo said they make it possible for “the government to get secret orders from a special surveillance court (the FISA Court) requiring Internet service providers and other companies to turn over ‘any tangible things.’” (Not to mention the fact that there are national security directives issued by President George W. Bush that to this day remain secret and could have been released at least in summary form.)
The administration’s argument for keeping the “rules” or legal basis is that sources or methods would be revealed that would make it easier for adversaries to attack the United States. That is simply an argument to provide cover for the fact that the government wants wide latitude to be able to respond without being constrained by the law or politics. It is possible to inform the public of when the administration thinks the government has the power to launch attacks and go through several hypothetical scenarios. The reality is the government just does not want to do that because, if the scenario occurred and the administration responded differently, there could be controversy if it was found out they did not follow the “rules.”
Finally, like with the drone program, President Barack Obama is presiding over the creation and development of a power that previous presidents never imagined having. The national security state is effectively appointing him and all future presidents the proverbial judge, jury and executioner when it comes to cyber warfare.
There is no indication that any group of members in Congress or judicial body will have to approve of a preemptive strike before it is carried out. As has become typical, the president wants to be able to conduct war without needing authorization.
The policy will expand the imperial presidency and the public and civil society organizations, which have a distinct interest in knowing what the government is doing, will be kept in the dark on what is legal and illegal in cyber operations. The Congress will barely make any effort to defend its right to provide oversight of this new power. And any future details on this power will mostly come from selective leaks provided by officials, who do not think they will face repercussions for talking to the press. The policy itself, the rules for cyber war, will remain concealed.
FBI Documents Reveal Secret Nationwide Occupy Monitoring
Partnership for Civil Justice Fund | December 22, 2012
FBI documents just obtained by the Partnership for Civil Justice Fund (PCJF) pursuant to the PCJF’s Freedom of Information Act demands reveal that from its inception, the FBI treated the Occupy movement as a potential criminal and terrorist threat even though the agency acknowledges in documents that organizers explicitly called for peaceful protest and did “not condone the use of violence” at occupy protests.
The PCJF has obtained heavily redacted documents showing that FBI offices and agents around the country were in high gear conducting surveillance against the movement even as early as August 2011, a month prior to the establishment of the OWS encampment in Zuccotti Park and other Occupy actions around the country.
“This production, which we believe is just the tip of the iceberg, is a window into the nationwide scope of the FBI’s surveillance, monitoring, and reporting on peaceful protestors organizing with the Occupy movement,” stated Mara Verheyden-Hilliard, Executive Director of the Partnership for Civil Justice Fund (PCJF). “These documents show that the FBI and the Department of Homeland Security are treating protests against the corporate and banking structure of America as potential criminal and terrorist activity. These documents also show these federal agencies functioning as a de facto intelligence arm of Wall Street and Corporate America.”
“The documents are heavily redacted, and it is clear from the production that the FBI is withholding far more material. We are filing an appeal challenging this response and demanding full disclosure to the public of the records of this operation,” stated Heather Benno, staff attorney with the PCJF.
As early as August 19, 2011, the FBI in New York was meeting with the New York Stock Exchange to discuss the Occupy Wall Street protests that wouldn’t start for another month. By September, prior to the start of the OWS, the FBI was notifying businesses that they might be the focus of an OWS protest.
The FBI’s Indianapolis division released a “Potential Criminal Activity Alert” on September 15, 2011, even though they acknowledged that no specific protest date had been scheduled in Indiana. The documents show that the Indianapolis division of the FBI was coordinating with “All Indiana State and Local Law Enforcement Agencies,” as well as the “Indiana Intelligence Fusion Center,” the FBI “Directorate of Intelligence” and other national FBI coordinating mechanisms.
Documents show the spying abuses of the FBI’s “Campus Liaison Program” in which the FBI in Albany and the Syracuse Joint Terrorism Task Force disseminated information to “sixteen (16) different campus police officials,” and then “six (6) additional campus police officials.” Campus officials were in contact with the FBI for information on OWS. A representative of the State University of New York at Oswego contacted the FBI for information on the OWS protests and reported to the FBI on the SUNY-Oswego Occupy encampment made up of students and professors.
Documents released show coordination between the FBI, Department of Homeland Security and corporate America. They include a report by the Domestic Security Alliance Council (DSAC), described by the federal government as “a strategic partnership between the FBI, the Department of Homeland Security and the private sector,” discussing the OWS protests at the West Coast ports to “raise awareness concerning this type of criminal activity.” The DSAC report shows the nature of secret collaboration between American intelligence agencies and their corporate clients – the document contains a “handling notice” that the information is “meant for use primarily within the corporate security community. Such messages shall not be released in either written or oral form to the media, the general public or other personnel… ” (The DSAC document was also obtained by the Northern California ACLU which has sought local FBI surveillance files.)
Naval Criminal Investigative Services (NCIS) reported to the DSAC on the relationship between OWS and organized labor for the port actions. The NCIS describes itself as “an elite worldwide federal law enforcement organization” whose “mission is to investigate and defeat criminal, terrorist, and foreign intelligence threats to the United States Navy and Marine Corps ashore, afloat and in cyberspace.” The NCIS also assists with the transport of Guantanamo prisoners.
DSAC issued several tips to its corporate clients on “civil unrest” which it defines as ranging from “small, organized rallies to large-scale demonstrations and rioting.” It advised to dress conservatively, avoid political discussions and “avoid all large gatherings related to civil issues. Even seemingly peaceful rallies can spur violent activity or be met with resistance by security forces. Bystanders may be arrested or harmed by security forces using water cannons, tear gas or other measures to control crowds.”
The FBI in Anchorage reported from a Joint Terrorism Task Force meeting of November 3, 2011, about Occupy activities in Anchorage.
A port Facility Security Officer in Anchorage coordinated with the FBI to attend the meeting of protestors and gain intelligence on the planning of the port actions. He was advised to request the presence of an Anchorage Police Department official to also attend the event. The FBI Special Agent told the undercover private operative that he would notify the Joint Terrorism Task Force and that he would provide a point of contact at the Anchorage Police Department.
The Jacksonville, Florida FBI prepared a Domestic Terrorism briefing on the “spread of the Occupy Wall Street Movement” in October 2011. The intelligence meeting discussed Occupy venues identifying “Daytona, Gainesville and Ocala Resident Agency territories as portions … where some of the highest unemployment rates in Florida continue to exist.”
The Tampa, Florida FBI “Domestic Terrorism” liaison participated with the Tampa Police Department’s monthly intelligence meeting in which Occupy Lakeland, Occupy Polk County and Occupy St. Petersburg were discussed. They reported on an individual “leading the Occupy Tampa” and plans for travel to Gainesville for a protest planning meeting, as well as on Veterans for Peace plans to protest at MacDill Air Force Base.
The Federal Reserve in Richmond appears to have had personnel surveilling OWS planning. They were in contact with the FBI in Richmond to “pass on information regarding the movement known as occupy Wall Street.” There were repeated communications “to pass on updates of the events and decisions made during the small rallies and the following information received from the Capital Police Intelligence Unit through JTTF (Joint Terrorism Task Force).”
The Virginia FBI was collecting intelligence on the OWS movement for dissemination to the Virginia Fusion Center and other Intelligence divisions.
The Milwaukee division of the FBI was coordinating with the Ashwaubenon Public Safety division in Green Bay Wisconsin regarding Occupy.
The Memphis FBI’s Joint Terrorism Task Force met to discuss “domestic terrorism” threats, including, “Aryan Nations, Occupy Wall Street, and Anonymous.”
The Birmingham, AL division of the FBI sent communications to HAZMAT teams regarding the Occupy Wall Street movement.
The Jackson, Mississippi division of the FBI attended a meeting of the Bank Security Group in Biloxi, MS with multiple private banks and the Biloxi Police Department, in which they discussed an announced protest for “National Bad Bank Sit-In-Day” on December 7, 2011.
The Denver, CO FBI and its Bank Fraud Working Group met and were briefed on Occupy Wall Street in November 2011. Members of the Working Group include private financial institutions and local area law enforcement.
Jackson, MS Joint Terrorism Task Force issued a “Counterterrorism Preparedness” alert. This heavily redacted document includes the description, “To document…the Occupy Wall Street Movement.”
You can read the FBI – OWS documents below where we have uploaded them in searchable format for public viewing.
The PCJF filed Freedom of Information Act demands with multiple federal law enforcement agencies in the fall of 2011 as the Occupy crackdown began. The FBI initially attempted to limit its search to only one limited record keeping index. Recognizing this as a common tactic used by the FBI to conduct an inadequate search, the PCJF pressed forward demanding searches be performed of the FBI headquarters as well as FBI field offices nationwide.
The PCJF will continue to push for public disclosure of the government’s spy files and will release documents as they are obtained.
Click here to see the FBI documents obtained by the PCJF.
Related article and video
- Terrorists and criminals: Documents prove FBI monitored OWS (alethonews)
- Policing Dissent (video report)
Senate Report: Counterterrorism “Fusion Centers” Invade Innocent Americans’ Privacy and Don’t Stop Terrorism
By Mark M. Jaycox and Trevor Timm | Electronic Frontier Foundation | October 9, 2012
The Department of Homeland Security’s 70 counterterrrorism “fusion centers” produce “predominantly useless information,” “a bunch of crap,” while “running afoul of departmental guidelines meant to guard against civil liberties” and are “possibly in violation of the Privacy Act.”
These may sound like the words of EFF, but in fact, these conclusions come from a new report issued by a US Senate committee. At the cost of up to $1.4 billion, these fusion centers are supposed to facilitate local law enforcement sharing of valuable counterterrorism information to DHS, but according to the report, they do almost everything but.
DHS described its fusion centers as “one of the centerpieces of [its] counterterrorism strategy” and its database was supposed to be a central repository of known or “appropriately suspected” terrorists. In theory, local law enforcement officers, in conjunction with DHS officials, conduct surveillance and write up a report—known as a Homeland Intelligence Report (HIR)—for DHS to review. If credible, DHS would then spread the information to the larger intelligence community.
Yet, the Senate report found the fusion centers failed to uncover a single terrorist threat. Instead, like so many post-9/11 surveillance laws passed under the vague guise of “national security,” the system was overwhelmingly used for ordinary criminal investigations, while at the same time facilitating an egregious amount of violations of innocent Americans’ rights.
An entire section of the Senate report is dedicated to Privacy Act violations and the collection of information completely unrelated to any criminal or terrorist activity in the HIRs. In one instance, a DHS intelligence officer filed a draft report about a US citizen who appeared at a Muslim organization to deliver a day-long motivational talk and a lecture on positive parenting. In another, one intelligence officer decided to report on two men who were fishing at the US-Mexican border. A reviewer commented, “I… think that this should never have been nominated for production, nor passed through three reviews.” A report was even initiated on a motorcycle group for passing out leaflets informing members of their legal rights. A reviewer commented, “The advice given to the groups’ members is protected by the First Amendment.”
Over and over again the Senate report quotes reviewers chastising DHS officials for recording constitutionally protected activities and for publishing such reports. One reviewer wrote, “The number of things that scare me about this report are almost too many to write into this [review] form.” In some cases, DHS retained cancelled draft reports that may have contained information in violation of the Privacy Act for a year or more after the date of the reports’ cancellation. Worse, the intelligence officials responsible “faced no apparent sanction for their transgressions.”
While it’s commendable the Senate exposing these civil liberties violations, the problems detailed in the report are not new. Since the government started its various information sharing programs after 9/11, media organizations have extensively documented how, when they’re not being outright abused by local law enforcement, are overwhelmingly used for ordinary investigations that had nothing to do with terrorism. EFF has long warned that completely innocent Americans’ privacy has become collateral damage in the government’s thirst to collect more and more digital information on its own citizens.
Even DHS’ own internal audits of the fusion centers showed they didn’t work, according to the Senate report. The privacy disaster is also a boondoggle for taxpayers: DHS can’t account for much of the money it spent on the program, estimating they spent between $289 million and $1.4 billion—a discrepancy of more than $900 million dollars.
Despite these facts, Attorney General Eric Holder issued new guidelines in March for the National Counter Terrorism Center (NCTC) that dramatically expanded the NCTC’s information sharing powers. The NCTC can now mirror entire federal databases containing personal information and hold onto the information for ten times longer than they could before—even if the person is not suspected of any involvement in terrorism. Journalist Marcy Wheeler summed up the new guidelines at the time, saying, “So…the data the government keeps to track our travel, our taxes, our benefits, our identity? It just got transformed from bureaucratic data into national security intelligence.”
Now that the Senate’s Permanent Subcommittee on Investigations has issued this unusually harsh report lambasting the same type of information sharing centers, Eric Holder should also rescind his new data retention guidelines for NCTC counterterrorism centers until new safeguards are put in place. EFF also joins the ACLU’s call for full Congressional hearings on the DHS fusion centers. In fact, the government should issue a moratorium on all fusion centers until this problem is fixed. Local governments can also prevent their law enforcement agencies from participating.
While “information sharing” centers were sold to the American people as providing “a vital role in keeping communities safe all across America,” it’s clear all they’ve done is play a vital role in violating American’s civil liberties.
Related articles
New Documents: Big Sis Lied About Canceling Mobile Body Scanner Program
Homeland Security claimed it had “dropped the plans at an early stage”
By Steve Watson | Prisonplanet | August 17, 2012

Newly released documents clearly show that the The Homeland Security Department continued to pursue a mobile surveillance program, moving radiation firing body scanners out of airports and into streets and shopping malls, despite claiming it has dropped the plans altogether.
The Electronic Privacy Information Center (EPIC) yesterday released the documents, obtained under the Freedom of Information Act, showing that the DHS was still operating the program in March 2011, just two days prior to claiming it had “dropped the projects in a very early phase after testing showed flaws”.
Previous EPIC FOIA work produced records showing that the DHS is actively moving to install radiation firing scanners in all manner of public places.
The technologies include “intelligent video,” backscatter x-ray, Millimeter Wave Radar, and Terahertz Wave, and could be deployed at subway platforms, sidewalks, sports arenas, and shopping malls.
EPIC filed a specific lawsuit against the DHS for attempting to keep the program secret.
EPIC’s suit asked a federal court to order disclosure of nearly 1,000 pages of additional records detailing the controversial program – records the agency repeatedly refused to make public, despite freedom of information requests and appeals over the course of several months.
The lawsuit points to an agency under the DHS umbrella, the Science and Technology Directorate, which has released only 15 full pages of documents on the mobile scanners, whilst heavily redacting another 158 pages and withholding 983 pages of documents.
In February 2011, EPIC discovered (PDF) that the DHS had paid contractors “millions of dollars on mobile body scanner technology that could be used at railways, stadiums, and elsewhere” on crowds of moving people.
According to the documents obtained by EPIC, the Transport Security Agency plans to expand the use of these systems to peer under clothes and inside bags away from airports.
The documents included a “Surface Transportation Security Priority Assessment” [PDF] which revealed details of conducting risk assessments and possible implementation of body scanners in “Mass transit, commuter and long-distance passenger rail, freight rail, commercial vehicles (including intercity buses), and pipelines, and related infrastructure (including roads and highways), that are within the territory of the United States.”
The DHS maintained that it had discontinued the program, but refused to provide the proof, invoking several FOIA exemption clauses, ironically including one that cited “invasion of personal privacy”.
EPIC also noted that the DHS has actively deployed “mobile body scanner technology in vans that are able to scan other vehicles while driving down public roadways.”
“These vans, known as ‘Z Backscatter Vans,’ are capable of seeing through vehicles and clothing and routinely store the images that they generate.” EPIC’s lawsuit notes.
As we previously reported, while the focus remained on the TSA’s use of naked body scanners at airports, the feds had already purchased hundreds of x-ray scanners mounted in vans that were being used to randomly scan vehicles, passengers and homes in complete violation of the 4th amendment and with wanton disregard for any health consequences.
WSBTV reported on one instance of the mobile scanners being used to check trucks for explosive devices at an internal checkpoint set up by Homeland Security, the Department of Transportation, and the TSA. Officials admitted there was no specific threat that justified the checkpoint, and although it was labeled a “counter-terror operation,” the scans were also being conducted in the name of “safety”.
EPIC will continue to pursue the case in an attempt to discover whether the DHS still plans to roll out mobile body scanners across America.
Related articles
- Court Orders TSA to Explain Lawless Use of Naked Body Scanners (thenewamerican.com)
- TSA flouts the law on body scanners (juneauempire.com)
UC Berkeley to use federal funds to purchase $200,000 ‘armed personnel carrier’
By Josiah Ryan | Campus Forum | June 29, 2012
The University of California – Berkeley Police Department (UCPD) has acquired a $200,000 grant from the Department of Homeland Security to purchase an “Armored Response Counter Attack Truck,” a police department spokesman told Campus Reform on Friday.
The eight-ton vehicle, commonly referred to as a “Bearcat,” is used by U.S. troops on the battlefield and is often equipped with a rotating roof hatch, powered turrets, gun ports, a battering ram, and a weapon system used to remotely engage a target with lethal force.

Lt. Eric Tejada, a spokesman for UCPD, said the university plans to use the vehicle along with neighboring counties in dangerous situations that could involve heavy weapons.
Tejada said that although he does know of any incident in the university’s 144-year history in which such a vehicle would have saved a life, the police department would have liked to deploy it in an incident last year when they mistakenly believed a man had an AK-47 assault rifle.
University of Virginia Professor Dewey Cornell, an expert in violence prevention and school safety, told Campus Reform on Friday that with approximately 4800 four-year colleges in the U.S., and an average of 10 homicides per year on college campuses, the average college can expect a homicide about once every 480 years.
“With all we hear we hear about the federal deficit it’s a shame there is money available for things like this but not for prevention,” said Cornell. “If a university has to resort to a Bearcat that means there is a failure somewhere else.”
A June 19 log of a Berkeley City Council meeting, however, suggests that that UCPD also intends to use the vehicle for “large incidents” including university sporting events and an annual street festival called the Solana Stroll.
The tactical working group of which the UCPD is a member said “the armored vehicle is needed for ‘large incidents’ such as CAL games and the Solano Stroll,” notes the meeting meetings minutes.
The grant was obtained under the DHS’s Urban Areas Security Initiative. The vehicle will be shared with two neighboring jurisdictions and likely will not be stored on UC-Berkeley’s campus, said Tejada.
Follow the author of this article on twitter: @JosiahRyan
