Dana Priest and William M. Arkin at WaPo
Nine years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators.
The system, by far the largest and most technologically sophisticated in the nation’s history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing.
The government’s goal is to have every state and local law enforcement agency in the country feed information to Washington to buttress the work of the FBI, which is in charge of terrorism investigations in the United States.
Other democracies – Britain and Israel, to name two – are well acquainted with such domestic security measures. But for the United States, the sum of these new activities represents a new level of governmental scrutiny.
This localized intelligence apparatus is part of a larger Top Secret America created since the attacks. In July, The Washington Post described an alternative geography of the United States, one that has grown so large, unwieldy and secretive that no one knows how much money it costs, how many people it employs or how many programs exist within it.
Today’s story, along with related material on The Post’s Web site, examines how Top Secret America plays out at the local level. It describes a web of 4,058 federal, state and local organizations, each with its own counterterrorism responsibilities and jurisdictions. At least 935 of these organizations have been created since the 2001 attacks or became involved in counterterrorism for the first time after 9/11.
(Search our database for your state to find a detailed profile of counterterrorism efforts in your community.)
In The Washington Post today, Dana Priest and William Arkin continue their “Top Secret America” series by describing how America’s vast and growing Surveillance State now encompasses state and local law enforcement agencies, collecting and storing always-growing amounts of information about even the most innocuous activities undertaken by citizens suspected of no wrongdoing. As was true of the first several installments of their “Top Secret America,” there aren’t any particularly new revelations for those paying attention to such matters, but the picture it paints — and the fact that it is presented in an establishment organ such as The Washington Post — is nonetheless valuable.
Today, the Post reporters document how surveillance and enforcement methods pioneered in America’s foreign wars and occupations are being rapidly imported into domestic surveillance (wireless fingerprint scanners, military-grade infrared cameras, biometric face scanners, drones on the border). In sum:
The special operations units deployed overseas to kill the al-Qaeda leadership drove technological advances that are now expanding in use across the United States. On the front lines, those advances allowed the rapid fusing of biometric identification, captured computer records and cellphone numbers so troops could launch the next surprise raid. Here at home, it’s the DHS that is enamored with collecting photos, video images and other personal information about U.S. residents in the hopes of teasing out terrorists.
Meanwhile, the Obama Department of Homeland Security has rapidly expanded the scope and invasiveness of domestic surveillance programs — justified, needless to say, in the name of Terrorism:
[DHS Secretary Janet] Napolitano has taken her “See Something, Say Something” campaign far beyond the traffic signs that ask drivers coming into the nation’s capital for “Terror Tips” and to “Report Suspicious Activity.”
She recently enlisted the help of Wal-Mart, Amtrak, major sports leagues, hotel chains and metro riders. In her speeches, she compares the undertaking to the Cold War fight against communists.
“This represents a shift for our country,” she told New York City police officers and firefighters on the eve of the 9/11 anniversary this fall. “In a sense, this harkens back to when we drew on the tradition of civil defense and preparedness that predated today’s concerns.”
The results are predictable. Huge amounts of post/9-11 anti-Terrorism money flooded state and local agencies that confront virtually no Terrorism threats, and they thus use these funds to purchase technologies — bought from the private-sector industry that controls and operates government surveillance programs — for vastly increased monitoring and file-keeping on ordinary citizens suspected of no wrongdoing. The always-increasing cooperation between federal, state and local agencies — and among and within federal agencies — has spawned massive data bases of information containing the activities of millions of American citizens. “There are 96 million sets of fingerprints” in the FBI’s data base, the Post reports. Moreover, the FBI uses its “suspicious activities record” program (SAR) to collect and store endless amounts of information about innocent Americans:
At the same time that the FBI is expanding its West Virginia database, it is building a vast repository controlled by people who work in a top-secret vault on the fourth floor of the J. Edgar Hoover FBI Building in Washington. This one stores the profiles of tens of thousands of Americans and legal residents who are not accused of any crime. What they have done is appear to be acting suspiciously to a town sheriff, a traffic cop or even a neighbor.
To get a sense for what kind of information ends up being stored — based on the most innocuous conduct — read this page from their article describing Suspicious Activity Report No3821. Even the FBI admits the huge waste all of this is — “‘Ninety-nine percent doesn’t pan out or lead to anything’ said Richard Lambert Jr., the special agent in charge of the FBI’s Knoxville office” — but, as history conclusively proves, data collected on citizens will be put to some use even if it reveals no criminality.
Again, none of this is particularly surprising. Battlefield technologies almost always “migrate” to use at home, depending on its application and the cost. The city of LA had halftracks used in combating drug trafficking more than two decades ago, for one example, parodied in the movie Die Hard. The FBI collects data from many people and always has, which is one of the reasons why releasing the raw FBI files on political figures to the Clinton White House was such an egregious act. What they do with the data is, of course, the greater consideration. Picking the wrong imams isn’t just limited to “some law enforcement agencies,” as the Pentagon’s relationship with Anwar al-Awlaki demonstrated. The problem of government agencies acting with less than optimal efficiency at working across boundaries is hardly new, either.
It’s still valuable to have journalists dig into these problems on a regular basis so that we can demand better performance from security groups and Congress, rather than just shrug at inefficiency, waste, and abuses of power. But Liz Goodwin’s “5 most surprising revelations” from the WaPo entry today at Yahoo read as though Goodwin has never before reviewed governmental performance:
- The FBI has 161,948 suspicious activity files on “tens of thousands” of Americans – The FBI set up hotlines and websites for tips on terrorism immediately after 9/11. Each tip presumably opens up a file. In nine years, the effort has produced less than 20,000 tips per year and (assuming the maximum range of tens of thousands) about 10,000 suspects a year. That doesn’t seem very surprising to me. That they haven’t arrested anywhere near that many people is a function of what an investigation produces. Maintaining files on dead probes doesn’t mean anything, unless they get leaked.
- DHS has no idea how much it’s spending on liaison efforts to local agencies – I’d guess that many agencies don’t really know how much they spend on any one aspect of their operations. DHS is a huge federal agency, employing 216,000 people with an overall budget of about $52 billion with varied and overlapping jurisdictions.
- Local officials in these “fusion centers” get little or no training – Surprise! Government bureaucracies are notoriously inefficient. That’s why it’s a good idea to limit them to tasks that only government can and should do — although it’s worth pointing out that this happens to be one of those tasks.
- Local agencies are “left without guidance” from DHS – This is really the same thing as #3, isn’t it, or at least the same root problem? She points out that among those groups suspected of potential terrorist activity by state and local authorities were Tea Party activists, historically black colleges, and a group that campaigned for human rights and bike lanes. Again, that might have been based on tips received and followed up by the agencies, but also again, it’s part of a lack of competence and accountability endemic in bureaucracies.
- State and local agencies are taking counterterrorist funding and using it to support regular law-enforcement efforts instead – Who couldn’t have seen that coming? These funds are usually given in bloc grants, which means the recipient can use the money for whatever purpose they desire. All they need is a tenuous link to the original purpose of the funds to make it pass muster, and it’s certainly arguable that by enforcing the state and local law more vigorously, local law enforcement might be able to flush out terrorists. However, this is a problem because it makes local law enforcement dependent on federal funding, which is a bad idea in principle. Communities should pay for their own law enforcement needs and let the feds concentrate on actual federal crimes.
These aren’t surprises at all. They are, however, issues that need to be corrected — and it appears that the first item on correction should be a rethink of DHS and its top-heavy bureaucracy.
Spencer Ackerman at Danger Room at Wired:
Military technology has a tendency to trickle down to civilian applications, as evidenced by the fact that you’re reading this story on the internet that Darpa helped create. Usually that takes time, but police departments across the country are fielding tools that the military developed to keep tabs on insurgents are now in place to see if you’ve got any outstanding arrest warrants. That’s what the Washington Post found for the latest installment of its series on the expanding surveillance state: Arizona’s Maricopa County, for instance, keeps a database sized at “9,000 biometric digital mug shots a month.”
Here’s how the proliferation of biometrics works, as the Post discovers. The Department of Homeland Security wants more data points on potential homegrown terrorists. Through Federal-state law enforcement “fusion centers,” federal grants help finance law enforcement’s acquisition of ID tools like HIIDE, as well as powerful surveillance cameras and sensors. Police incorporate them into their regular law-enforcement duties, picking up information on suspects and using them to cut down on the time it takes to figure out who’s evading arrest.
As the military learned, positive identification depends on having a large data set of known insurgents. Cops and the feds are going just as broad. Fingerprint information from crime records gets sent to a FBI datafarm in West Virginia, where they “mingle” with prints from detainees in Iraq, Afghanistan and elsewhere. Military and Homeland Security officials can search through the FBI database for possible connections to terrorists.
It’s unclear if there are minimization procedures in place to void someone’s fingerprints in the datafarm after a distinct period of time, or how serious a crime has to be to merit a bioscan getting sent to West Virginia. And in many cases, the technology at use here just accelerates the speed at which, say, prints from a police station get sent to the FBI, rather than making the difference between inclusion at the datafarm and remaining at the police station. But it certainly looks like there’s not such a lag time between tech developed for a complex insurgency finding applications for crime-fighting at home.
Luckily, this stuff is only creepy when there’s a Republican President. Otherwise I’d be worried. But as we all know, to worry about this when there’s a Democrat in the White House is merely a sign of the “paranoid strain” in American politics.
Emptywheel at Firedoglake
Dropping The Charges
Justice Department dropping charges in the AIPAC case. Blogosphere reactions:
I believe it is Eli Lake in the Washington Times who broke the story.
Marc Ambider:
“In general, this is fairly good news for anyone who receives classified information — like journalists — and then publishes it in some form. (There are several types of classified information — if the defendants had passed signal intelligence or evidence about collection systems to Israel, they’d have been tried under a different statute). Had the case gone to trail, the government was facing a loss, as its efforts to keep information out of the discovery process failed and its contention that the two AIPAC officials, Steve Rosen and Keith Weissman, broke the law was challenged by U.S. government classification experts.”
Jonathan Tobin in Contentions.
Spencer Ackerman in Washington Independent:
“Put aside whatever you may feel about AIPAC. The case amounted to the criminalization of extremely routine practices in Washington: acquiring and distributing information that’s overclassified.
Technically, I published classified information last Monday when I reported that there was an undisclosed classified Office of Legal Counsel memorandum on torture from 2007. There’s a widespread recognition that way too much information is needlessly classified. Indeed, “Ninety-five percent of what we do shouldn’t be classified at all, or it should be a much lower level of classification,” Joan Dempsey, a former senior CIA and Pentagon official, recently estimated, according to Secrecy News. Neither Steve Rosen nor Keith Weissman, the AIPAC lobbyists in question, were government employees. Even if we’re to take the Justice Department’s former line that the leak itself was felonious, they were never accused of being the sources of it, since they couldn’t have been. (That was a guy named Larry Franklin.)”
Michael Crowley looks at the Harman angle in the New Republic.
Jeffrey Goldberg
BLT
More links? Put ’em in the comments.
Leave a comment
Filed under Israel/Palestine, Surveillance
Tagged as Blog of Legal Times, Commentary, Eli Lake, Jeffrey Goldberg, Jonathan Tobin, Marc Ambinder, Michael Crowley, Spencer Ackerman, Surveillance, The New Republic, Washington Independent, Washington Times