Tag: dhs

Behavior Detection as Interrogation

With the Department of Homeland Security constantly spinning out new projects and programs (plus re-branded old ones) to investigate you, me, and the kitchen sink, it’s sometimes hard to keep up. But I was intrigued with a report that behvaior detection officers are getting another look from the Transportation Security Administration. Behavior detection is the unproven, and so far highly unsuccessful (Rittgers, Harper), program premised on the idea that telltale cues can reliably and cost-effectively indicate intent to do harm at airports.

But there’s a new behavior detection program already underway. Or is it interrogation?

Due to a bottleneck at the magnetometers in one concourse of the San Francisco airport (no strip-search machines!), I recently had the chance to briefly interview a Transportation Security Administration agent about a new security technique he was implementing. As each passenger reached him, he would begin to examine the traveler’s documentation and simultaneously ask the person’s last name. He confirmed to me that the purpose was to detect people who did not immediately, easily, and accurately respond. In thousands of interactions, he would quickly and naturally learn to detect obfuscation on the part of anyone carrying an ID that does not have the last name they usually use.

As a way of helping to confirm identity, it’s a straightforward and sensible technique. Almost everyone knows his or her last name, and quickly and easily repeats it. The average TSA agent with some level of experience will fluently detect people who do not quickly and easily repeat the name on the identity card they carry. The examination is done quickly. This epistemetric check (of a “something-you-know” identifier—see my book, Identity Crisis) occurs during the brief time that the documents are already getting visual examination.

Some people will not repeat their name consistent with custom, of course. The hard of hearing, speakers of foreign languages, people who are very nervous, people who have speech or other communication impediments, and another group of sufferers—recently married women—may exhibit “suspicious” failure to recite their recently changed surnames. Some of these anomalies TSA agents will quickly and easily dismiss as non-suspicious. Others they won’t, and in marginal cases they might use non-suspicious indicia like ethnicity or rudeness to adjudge someone “suspicious.”

The question whether these false positives are a problem depends on the sanction that attaches to suspicion. If a stutterer gets a gauntlet at the airport each time he or she fails to rattle off a name, the cost of the technique grows compared to the value of catching … not the small number of people who travel on false identification—the extremely small number of people who travel on false identification so as to menace air transportation.

We used this and closely related techniques, such as asking a person’s address or the DMV office where a license was issued, at the bar where I worked in college. It did pretty well to ferret out people carrying their older friends’ IDs. Part of the reason it worked well is because our expert doormen could quickly escalate to further inquiry, dismissing their own suspicions or denying entry to the bar very quickly. The cost of getting it wrong was to deny a person entry to the bar and sometimes possession of a license. These are relatively small costs to college students, unlike the many hours in time-costs to a traveler wrongly held up at the airport. According to my interview, suspicion generated this way at the airport requires a call to a supervisor, but I did not learn if secondary search is standard procedure, or if cases are handled some other way.

TSA agents are not doormen at bars, of course, and the subjects they are examining are not college kids out to get their drink on. These are government agents examining citizens, residents, and visitors to the United States as they travel for business and pleasure, often at high cost in dollars and time. The stakes are higher, and when the government uses a security technique like this, a layer of constitutional considerations joins the practical issues and security analysis.

I see three major legal issues with this new technique: Fourth Amendment search and seizure, the Fifth Amendment right against self-incrimination, and Due Process. When questioning joins an ID check at the airport, it’s a deepening of a search that is already constitutionally suspect. The Fifth Amendment issues are interesting because travelers are being asked to confess through their demeanor whether they are lying or telling the truth. It would seem to cross a Fifth Amendment line and the rule against forced self-incrimination. The Due Process issues are serious and fairly straightforward. When a TSA screener makes his or her judgment that a person is not responding consistent with custom and is therefore “suspicious,” these judgement calls allow the screeners to import their prejudices. Record-keeping about suspicion generated using this technique should determine whether administration of this epistemetric check violates constitutional due process in its application.

In its constant effort to ferret out terrorist attacks on air transportation, the TSA is mustering all its imagination. Its programs raise scores of risk management issues, they create constitutional problems, and they are a challenge to our tradition of constitutionally limited government. The threat that a person will use false identification to access a plane, defeating an otherwise working watch-list sytem, to execute some attack is utterly small. At what cost in dollars and American values do we attack that tiny threat?

The founding problem is the impetuous placement of federal government agents in the role of securing domestic passenger aviation. There are areas where government is integral to securing airports, airlines, and all the rest of the country—foreign intelligence and developing leads about criminal plots, for example—but the day-to-day responsibility for securing infrastructure like airports and airplanes should be the responsibility of its owners.

If the TSA were to go away, air security measures might be similar in many respects, but they would be conducted by organizations who must keep travelers happy and safe for their living. The TSA hasn’t anything like private airports’ and airlines’ incentives to balance security with convenience, privacy, cost-savings, and all other dimensions of a satisfactory travel experience. Asking people their names at airport security checkpoints is an interesting technique, and not an ineffective one, but it should probably be scrapped because it provides so little security at a relatively great cost.

Debt Deal Signed, Fights over Military Spending Next

The legislation signed by President Obama yesterday, as a solution to the debt ceiling debate, includes the possibility of cuts to military spending. But as Chris Preble points out, the legislation guarantees no defense cuts. Republicans will try to dump all the required cuts on non-defense areas. And the White House has already distanced itself from the prospect of any real defense budget cuts, as did Secretary of Defense Leon Panetta. Both support only the first round of cuts, which will at best halt Pentagon growth at roughly inflation.

On The Skeptics blog, I take a more detailed look at deal’s likely impact on military spending. I also examine its political effect, arguing that it will cause at least four political fights.

The first concerns war funding. As Russell Rumbaugh notes, hawks will be tempted to shift the Pentagon’s bill into the war appropriations (overseas contingency operations, officially), which the bill does not cap. That problem is not new, but the bill worsens it. We’ll see if the White House and Congressional Democrats fight to stop it.

Second, for the two years while the security cap is in place, the bill pits security agencies and their congressional advocates in zero sum combat. For obvious electoral reasons, no one will go after veterans. Defense hawks and top military officers will push to make DHS and State eat the minor cuts required. House Republicans negotiated to expand the security category for this reason. DHS, State and the subcommittees that pass their appropriations will fight back. Republicans and thus the House will tend to the first camp; Democrats and the Senate to the second. So the fight will occur in the appropriation committees, conference, and probably White House-Hill discussions. The paucity of cuts limits the carnage, of course.

Third, if the legislation remains in place after two years and a single cap covers all discretionary spending, the fight will shift and become more partisan. To get under the cap, Republicans will push domestic spending cuts. Democrats will prefer defense cuts. The 2012 elections will determine the institutional contours of this fight.

The fourth fight will center on the Joint Committee, with the most interesting conflict among Republicans. Democrats will likely advocate taxes and more defense spending cuts. Even if they can get a deal including taxes with Republican committee members, the House is unlikely to pass it. Democrats’ most attractive option may then be sequestration. Anti-tax Republicans will accept that outcome but clash with neoconservative Republicans happy to raise taxes to pay for military expenditures.

Those that see this plan as a disaster for defense ought to explain why hawks, like Rep. Buck McKeon (Chairman of the House Armed Services Committee), Rep. Bill Young (a leading House defense appropriator), and Senator John McCain, support it. They evidently prefer this deal to any available alternative and are gambling that they can protect military spending from the knife.

My guess is that defense spending will be level in 2012, growing roughly with inflation, but get hit by sequestration, meaning real defense cuts in 2013. After that, who knows? The political dynamics will then be quite different.

An original version of this post appeared on the National Interest.

The Obama Administration’s FOIA Compliance

Jim Harper has done a lot of work on the Obama administration’s efforts to be more transparent, especially with regard to “sunlight before signing,” earmark data, and FOIA compliance. The Obama administration could do a lot more on the FOIA front.

The Transactional Records Access Clearinghouse (TRAC) recently added a FOIA Project, which lists all FOIA requests that have become the subject of federal litigation since October 1, 2009. This includes an interactive FOIA Map that lets you zoom in and locate lawsuits across the United States.

TRAC has proven an invaluable resource for tracking federal government activities, and has been litigating FOIA requests for years. A recent Supreme Court decision, Milner v. Department of the Navy, reduced the ability of government agencies to withhold data under FOIA exemptions. Undeterred, an Immigration and Customs Enforcement official “informed TRAC that those who had requested and been denied access to documents under the FOIA prior to the court’s ground-breaking decision was rendered had no right to obtain them.” More details are available here.

It’s pretty bad when ICE is hiding behind procedural barriers to sidestep FOIA requests; it’s another ballgame entirely at the Department of Homeland Security. DHS officials tried to turn the objective standard of FOIA — disclosure to one is disclosure to all — into a subjective one, looking into the political beliefs of the requester to avoid embarrassment for DHS. An email trail shows how a former Obama staffer asked DHS employees to redact “politically sensitive” details from FOIA releases. Obama officials defended DHS’s FOIA policy in congressional hearings, and a DHS attorney tried to remove exhibits from the hearings. His explanation:

“As counsel for DHS, I object to counsel for the committee’s refusal to allow exhibits they had shown to the witness and that all are e-mail messages from DHS personnel to DHS personnel on their official DHS-issued accounts and use of e-mail services. These are not committee records, these are, rather, DHS records; and so there is no reason the committee should be able to prevent us from taking them, since they have shown them to the witness and used them in this interview.”

The Obama administration declared that it would be “the most open and transparent in history.” It is falling well short of the mark.

Does Rep. Aderholt Support or Oppose Having a National ID?

Rep. Robert Aderholt (R-AL) is the chairman of the House Appropriations Subcommittee on Homeland Security. That’s the subcommittee that makes spending decisions for the Department of Homeland Security and the programs within it, including the REAL ID Act.

Earlier this month, a constituent of his from Fyffe, Alabama posted a question on Mr. Aderholt’s Facebook page:

Rep. Aderholt, I’ve seen reports that the “REAL ID ACT” will be implemented in May of this year, giving the govt the ability to track every person who has a drivers license via encoded GPS. Is this actually the case and if so, what is the House going to do to stop this Orwellian infringement of our Liberty. Also, HOW could this have happened in the first place!

Mr. Aderholt has not replied.

But Right Side News recently reported on a hearing in which DHS Secretary Janet Napolitano presented her agency’s budget request. The DHS has not requested funds for implementing REAL ID. But according to the report, Chairman Aderholt “pointedly reminded” the committee of the need for funding of REAL ID.

It is good of Representative Aderholt to give his constituents a means to contact him and to invite public discussion of the issues. It’s an open question whether he will listen more closely to the voice of his constituents or to influences in Washington, D.C. who would like to see law-abiding American citizens herded into a national ID system.

Is the REAL ID Rebellion Coming to Florida?

Until now, Florida has not been one of the states to buck the federal government’s national ID mandate, established in the REAL ID Act of 2005. A pair of grand jury reports in 2002 had moved the state to tighten its driver licensing processes prior to any federal action, so it was already doing many of the things that the Department of Homeland Security is now seeking to require of states in the name of REAL ID.

Full compliance with REAL ID remains a distant hope, so DHS has set out a list of 18 “milestones,” progress toward which it is treating as REAL ID compliance. Full compliance with REAL ID includes putting driver information into a network for nationwide information sharing—including scanned copies of basic identity documents. It includes giving all licensees and ID holders a nationally uniform driver’s license or ID card so their identity can be checked at airports, federal facilities, and wherever the Secretary of Homeland Security determines to have federal checkpoints.

Again, the state of Florida meets DHS’ milestones. Starting from an already strict driver licensing regime, the state’s bureaucrats have been doing (and asking the legislature to do) things that match up with the requirements of the national ID law. But now, thanks to the work of Florida’s Tenth Amendment Center, Floridians Against REAL ID, and others, the legislature is beginning to pay attention.

Why is it so hard for law-abiding citizens and residents of Florida to get or renew their licenses? What kinds of barriers to progress are being thrown in front of lawful immigrants from Haiti, who haven’t the documentation required to get a license and thus a job?

Rep. Geraldine Thompson (D-Orlando) has lived in Florida since 1955 and was elected to the Florida legislature in 2006. She was born in New Orleans and is not able to get a copy of her birth certificate. The Florida Department of Motor Vehicles would not accept her Florida House ID card as proof of her identity!

Several members of the Florida legislature are concerned that the state is scanning and databasing the basic identity documents of Floridians, exposing those documents and the people of Florida to unknown cybersecurity risks. If these databases were hacked, Floridians’ data would be treasure trove for identity fraud. A breach of an entire state’s identity data could collapse the system we now rely on to know who people are. This is not an improvement in security for Floridians.

Florida’s Cuban ex-pat population has some idea of what could result if they were herded into a national identity system. They are too familiar with central government control of access to goods, services, employment, and other essentials of life. Advocates of national ID systems here in the United States have already argued for using REAL ID to control access to employment, to financial services and credit, to medicines, to housing, and more.

In my testimony to the Florida legislature, I noted that the federal government is impotent to enforce REAL ID. The political costs of a DHS attack on air travel (if it refused to recognize drivers’ licenses from non-compliant states at airport checkpoints) would be too high. Indeed, word is spreading that DHS will soon extend the REAL ID deadline once again.

What’s clear from my visit to Florida is that legislators there respond to what they hear from their constituents. It’s unclear what the Florida legislature will do to reassert control of its driver licensing policy from the concerted action of the federal government and its motor vehicle bureaucrats.

One of the questions they might ask is, “Who committed Florida to comply with REAL ID?” That’s item number seventeen in the DHS’ eighteen-point material compliance checklist.

TSA’s Pistole Says ‘Risk-Based,’ Means ‘Privacy Invasive’

There is one thing you can take to the bank from TSA administrator John Pistole’s statement that he wants to shift to “risk-based” screening at airports: it hasn’t been risk-based up to now. That’s a welcome concession because, as I’ve said before, the DHS and its officials routinely mouth risk terminology, but rarely subject themselves to the rigor of actual risk analysis.

What Administrator Pistole envisions is nothing new. It’s the idea of checking the backgrounds of air travelers more deeply, attempting to determine which of them present less of a threat and which prevent more. That opens security holes that the risk-averse TSA is unlikely to actually tolerate, and it has significant privacy and Due Process consequences, including migration toward a national ID system. 

I wrote about one plan for a “trusted traveler”-type system recently. As the details of what Pistole envisions emerge, I’ll look forward to reviewing it.

The DHS Privacy Committee published a document several years ago that can help Pistole with developing an actual risk-based system and with managing its privacy consequences. The Privacy Committee itself exists to review programs like these, but has not been used for this purpose recently despite claims that it has.

If Pistole wants to shift to risk-based screening, he should require a full risk-based study of airport screening and publish it so that the public, commentators, and courts can compare the actual security benefits of the TSA’s policies with their costs in dollars, risk transfer, privacy, and constitutional values.

We’re All Terrorists Now

The Tennessee ACLU sent a letter to public schools warning them not to celebrate Christmas as a religious holiday. The Tennessee Fusion Center (H/T Uncle) put the communication on its map of “terrorism events and other suspicious activity”:

“ACLU cautions Tennessee schools about observing ‘one religious holiday,’” the website’s explanation reads.

Also among the map’s highlights: “McMinn County Teen Brings Gun to School,” and “Turkish National Salih Acarbulut Indicted in Chattanooga for Alleged $12 million Ponzi Scheme.”

Mike Browning, a spokesman for the Fusion Center, said “that was a mistake” to label the ACLU letter as a suspicious activity. He said the Fusion Center meant to use the icon that means merely general information. The icon was changed after the ACLU sent its news release, he said.

“It’s still on the map,” Browning told The City Paper. “It has been reclassified into the general information category.”

But a look at the website shows there is no icon for general information. Instead, the icon for the ACLU letter now signifies “general terrorism news,” according to the website’s legend.

This follows a long line of fusion center and DHS reports labeling broad swaths of the public as a threat to national security. The North Texas Fusion System labeled Muslim lobbyists as a potential threat; a DHS analyst in Wisconsin thought both pro- and anti-abortion activists were worrisome; a Pennsylvania homeland security contractor watched environmental activists, Tea Party groups, and a Second Amendment rally; the Maryland State Police put anti-death penalty and anti-war activists in a federal terrorism database; a fusion center in Missouri thought that all third-party voters and Ron Paul supporters were a threat; and the Department of Homeland Security described half of the American political spectrum as “right wing extremists.”

The ACLU fusion center report and update lay out some good background on these issues, and the Spyfiles report describes how monitoring lawful dissent has become routine for police departments around the nation. Cato hosted Mike German, a former FBI counterterrorism agent and co-author of the ACLU fusion report at a forum on fusion centers, available here.