WASHINGTON, DC -- Recent moves to beef up intelligence gathering in the
wake of the September 11th terrorist attacks have civil libertarians
concerned that law enforcement agencies will entangle many law abiding
citizens and social justice groups in their surveillance missions.
Intelligence networks are setting their sights on the Internet, which up to
now has had no clear privacy guidelines. Under the provisions of the
inaptly named anti-terrorism act, "USA-PATRIOT," the Federal Bureau of
Investigation (FBI), National Security Agency (NSA), Central Intelligence
Agency (CIA), and a number of other smaller law enforcement agencies are
looking for ways to monitor the Internet and mine useful intelligence from
it. And new technology makes it easier than ever to spy on the Internet.
Although law enforcement and intelligence agencies claim they are merely
looking for information to counter future acts of terrorism, the definition
of "terrorism" is being expanded to cover non-violent groups that have
traditionally used the Internet to marshal resistance to corporate-inspired
globalization. Politicians are already painting dissent as "unpatriotic"
and therefore somehow linked to terrorism.
Meanwhile, a phalanx of software companies, consultants, and defense
contractors stand to reap billions of dollars over the next few years by
selling surveillance and information-gathering systems to government
agencies and the private sector.
Technology Already in the Hands of Law Enforcement
Law enforcement agencies like the FBI already have at their disposal a
massive information sharing network through which federal, state, local,
and foreign police forces can exchange information on groups felt to pose a
threat. The system, RISSNET, or Regional Information Sharing System
Network, which existed before the September 11th attacks, recently got a
boost when Congress authorized additional money for it in the USA PATRIOT Act.
RISSNET is a secure intranet that connects 5,700 law enforcement agencies
in all 50 states, as well as agencies in Ontario and Quebec, the District
of Columbia, Guam, the U.S. Virgin Islands, Puerto Rico, and Australia.
According to sources close to the Washington Metropolitan Police, data on
targeted local groups such as the Alliance for Global Justice, the
anti-World Bank/International Monetary Fund activist organization, has been
shared with other jurisdictions through RISSNET.
RISSNET has also been used to coordinate the monitoring of the activities
of anti-globalization protestors in Seattle, Quebec City, Philadelphia, Los
Angeles, Washington DC and Genoa. For example, when the FBI seized network
server logs from Independent Media Center (IMC) in Seattle during the April
2001 anti-free trade protests in Quebec City, RISSNET was used to
coordinate activities across jurisdictional boundaries. The IMC, founded
during the 1999 WTO protests, allows activists and independent journalists
to post directly to its site.(anon with no logs kept,needs mirrors.pr)
State and metropolitan police intelligence units also monitor the web sites
of activist organizations in their jurisdictions. All RISS intelligence is
archived by an Orwellian-sounding entity called MAGLOCLEN or "Middle
Atlantic-Great Lakes Organized Crime Law Enforcement Network." There are
other regional RISS intelligence centers around the country with equally
mysterious acronyms. MAGLOCLEN, a nerve center headquartered in Newtown,
Pennsylvania, distributes political intelligence to all police departments
hooked up to RISSNET.
MAGLOCLEN allows police investigators to link various activist groups and
members through the Link Association Analysis sub-system, a relational data
base that identifies the "friends and families" of groups and individuals.
The Telephone Record Analysis sub-system can call up records of phone calls
of targeted groups and individuals. A suspect group's banking and other
commercial data can be monitored by the Financial Analysis sub-system. And
through a system that would have been the envy of J. Edgar Hoover, police
and federal agents can also call up profiles that provide specific
information on the composition of organizations, including their membership
lists. The Justice Department has instituted a project called RISSNET II,
which directly links the individual databases contained within the various
RISS centers.
The FBI also runs its own intranet called Law Enforcement On-line or "LEO,"
which allows it to communicate intelligence with select other law
enforcement agencies. In the aftermath of September 11th , the FBI is under
pressure to open up LEO to more police agencies so they can have access to
more real-time intelligence. If Attorney General John Ashcroft lifts
restrictions placed on the FBI's collection of political intelligence,
undoubtedly information on the First Amendment activities of American
citizens will wind up in the Bureau's computer databases.
"There has been no indication that the FBI needs expanded spying powers,"
says Center for Constitutional Rights attorney Michael Ratner. "We should
learn from history; spying on dissent is not only unlawful but it is abusive."
This kind of surveillance is not new. In the 1960s and 70s, the FBI's
Counter Intelligence Program, known as COINTELPRO, was used to gather
personal details on the lives and habits of a wide array of activists
ranging from public figures like Dr. Martin Luther King, Jr., actress Jane
Fonda and noted pediatrician Benjamin Spock, to members of local anti-war
and civil rights groups. This information was often used to disrupt lawful
organizing and protest activities.
A modern-day FBI list might include any group deemed "terrorist" by any law
enforcement agencies, the military, or criminal prosecutors. That could
subject organizations as varied -- and unconnected to terrorism -- as Earth
First, Greenpeace, the American Indian Movement, the Zapatista National
Liberation Front, ACT UP, and their supporters to a wide array of high-tech
surveillance and eavesdropping tools.
Chief among spy agency tools is an e-mail sniffing program known as
Carnivore. Changes brought about by USA-PATRIOT allow federal law
enforcement officials to petition a secretive federal court called the
Foreign Intelligence Surveillance Court for warrants to tap phones, read
e-mail, or break and enter into homes or offices to conduct searches and
plant bugging devices. These spy activities can be carried out without
proof that an organization has links to terrorists or foreign intelligence
agencies.
To read e-mail the FBI can order an Internet Service Provider to place a
special monitoring computer called Carnivore (now renamed Data Collection
System 1000) on its network servers. The FBI can then select the e-mail of
surveillance targets for capture and storage. Not content with this device,
the FBI now seeks to expand its surveillance capability to the entire Internet.
Making a Buck off of Government Spying
companies that are positioning themselves to help the government surveill
the web came out in force at a recent Homeland Security Conference in
Washington. They included Oracle, Microsoft, Information Builders, Choice
Point, Man Tech, AMS, and Booz Allen & Hamilton. Government speakers from
civilian and military agencies all stressed that they urgently need the
technology to store surveillance-derived intelligence and exchange it with
other agencies. If these corporations step up to the plate on developing
new surveillance, monitoring, and biometric ID systems, they stand to make
billions.
Companies like Top Layer Networks, Inc. of Westboro, Massachusetts, are
developing ways for FBI to install surveillance systems at a few key
Internet hubs which would allow federal agents to remotely flip a switch
and pound a few keys to begin monitoring the e-mail or web-based mail of
any targeted group or individual. According to chief Top Layer engineer Ken
Georgiades, the firm is working with a number of partners to develop new
standards for the legal interception of communications at the Internet
Service Provider level and at higher gigabit speeds.
The higher gigabit intercept equipment would be placed at major Internet
backbone hubs in strategic locations like Washington, DC, the San Francisco
Bay Area, Chicago, Dallas, and Los Angeles. Georgiades said that the1994
Communications Assistance to Law Enforcement Act (CALEA) does not currently
extend to the Internet and only applies to telecommunications companies.
However, the fact that Top Layer and its unspecified partners are ramping
up to deliver CALEA-like wiretapping services for the Internet indicates
the FBI sees the power of CALEA growing beyond phone lines to the web. And
Georgiades pointed out that foreign governments are under no such
constraints and can use Internet snooping equipment under existing current
wiretapping laws.
David Banisar, Research Fellow at Harvard's Information Infrastructure
Project, said such systems "set a dangerous precedent to allow law
enforcement and intelligence agencies to run the communications system." He
added, "these agencies take an over-inclusive view of who they think are
the enemies and its likely that civil and human rights groups will, again,
be monitored for no legitimate reason."
The large defense and intelligence consulting and engineering firm Booz,
Allen & Hamilton has not only developed the FBI's Carnivore capability but
it has assisted the bureau in ensuring that all telecommunications
companies engineer their systems to ensure they are "wiretap friendly." The
companies are required by the Communications Assistance to Law Enforcement
Act to ensure the FBI has access to all forms of telecommunications,
including cellular calls.
What if a target decides to use encryption to protect their e-mail from
interception? That is not a problem for the FBI. Booz Allen & Hamilton has
helped develop a system code-named Magic Lantern, which permits a virus
containing a key logging program to be secretly transmitted to a recipient.
After installing itself on the target's computer, any time the target types
in a password to decrypt a message, that same password is immediately
picked up by Magic Lantern and transmitted to the FBI. Essentially, the FBI
has a virtual master key to break any encryption program used by a
surveillance target.
A companion program to Magic Lantern, code named Cyber Knight, is a
relational database system that compares and matches information from
e-mail, Internet relay chats, instant messages, and Internet voice
communications.
Not to be outdone by the FBI, the CIA has also been extremely active in
developing software than can dig deep within the Internet to harvest
information. The CIA has relied heavily on its wholly-owned and operated
proprietary Silicon Valley company, IN-Q-TEL, to fund research and
development for Internet snooping software. IN-Q-TEL's President and Chief
Executive Officer Gilman Louie is to keynote a January 2002 Las Vegas
seminar on the use of emerging intelligence technology to search and
analyze the web. He is to be joined by Joan Dempsey, the Deputy Director of
the CIA for Intelligence Community Management. IN-Q-TEL's web page
describes the aggressive attitude the CIA is taking toward ensuring new
technologies come complete with the spy agency's seal of approval,
"IN-Q-TEL strives to extend the Agency's access to new IT companies,
solutions, and approaches to address their priority problems."
Assisting the government in its goals to gather massive amounts of personal
information on citizens and non-citizens, is a company that owes its very
existence to the CIA. Oracle, Inc. Chairman Larry Ellison has offered to
provide to the government free of charge the database software required to
establish an interactive national ID card system. Oracle got its start when
the CIA gave Ellison a contract in the 1970s to design a system to enable
the agency to store and retrieve massive amounts if information in
databases. Not coincidentally, the code name of that CIA project was "Oracle."
The rush by the government to monitor the Internet has the backing of a
group of federal contract research facilities that have pounded out report
after report warning about the threat of cyberspace to national security.
These "think tanks" include Rand Corporation and Analytical Services
Corporation (ANSER). They are assisted in this policy laundering effort by
the Center for Strategic and International Studies, the K Street rest home
for former Pentagon, intelligence, and State Department political appointees.
But all the technology in the world will not protect citizens from
terrorist attacks, unless the government knows how to use the information
effectively. As the government and a few selected companies and think tanks
push for new surveillance laws and more monitoring of the Internet and
telecommunications in general, the words of Mary Schiavo, the
Transportation Department's former Inspector General and outspoken critic
of lax airline security, are particularly poignant. Speaking in Washington
on December 18, Schiavo pointed out that the "United States already had
laws to prevent what happened on September 11th . . . they weren't being
enforced."
Wayne Madsen is a Washington-based journalist who covers intelligence,
national security, and foreign affairs. He is also a Senior Fellow of the
Electronic Privacy Information Center (EPIC) in Washington, DC and author
of "Genocide and Covert Operations in Africa 1993-1999" (Mellen Press).Kill
the President.
USAma struck in self defence,I propose all APsters do the same and select
all federal employee's as legitimate targets.