Tag: surveillance

DoJ Fails to Report Electronic Surveillance Activities

Unlike with wiretaps, law enforcement agents are not required by federal statutes to obtain search warrants before employing pen registers or trap and trace devices. These devices record non-content information regarding telephone calls and Internet communications. (Of course, “non-content information” has quite a bit of content - who is talking to whom, how often, and for how long.)

The Electronic Privacy Information Center points out in a letter to Senate Judiciary Committee Chairman Patrick Leahy (D-VT) that the Department of Justice has consistently failed to report on the use of pen registers and trap and trace devices as required by law:

The Electronic Communications Privacy Act requires the Attorney General to “annually report to Congress on the number of pen register orders and orders for trap and trace devices applied for by law enforcement agencies of the Department of Justice.” However, between 1999 and 2003, the Department of Justice failed to comply with this requirement. Instead, 1999-2003 data was provided to Congress in a single “document dump,” which submitted five years of reports in November 2004. In addition, when the 1999-2003 reports were finally provided to Congress, the documents failed to include all of the information that the Pen Register Act requires to be shared with lawmakers. The documents do not detail the offenses for which the pen register and trap and trace orders were obtained, as required by 18 U.S.C. § 3126(2). Furthermore, the documents do not identify the district or branch office of the agencies that submitted the pen register requests, information required by 18 U.S.C. § 3126(8).

EPIC has found no evidence that the Department of Justice provided annual pen register reports to Congress for 2004, 2005, 2006, 2007, or 2008. “This failure would demonstrate ongoing, repeated breaches of the DOJ’s statutory obligations to inform the public and the Congress about the use of electronic surveillance authority,” they say.

It’s a good bet, when government powers are used without oversight, that they will be abused. Kudos to EPIC for pressing this issue. Senator Leahy’s Judiciary Committee should ensure that DoJ completes reporting on past years and that it reports regularly, in full, from here forward.

What Is a “Fifth Column” Anyway?

@RadleyBalko points to a Washington Examiner column in which Jim Kouri, Vice President and Public Information Officer of the National Association of Chiefs of Police, says that Obama administration policy changes with regard to the “global war on terrorism” allow “suspected Fifth Column-type groups … to make symbolic demands on agencies such as the Federal Bureau of Investigation and the Central Intelligence Agency.” He says the Council on American-Islamic Relations has called on the FBI to confirm or deny that a number of Long Island mosques are under law enforcement surveillance.

It’s hard to find the answer to the first question this raises: “So what?” Kouri does not make the case he implies: that something sinister lurks because this group, having a suspicion of something they see as wrongdoing, asks the agency in question whether it’s happening or not.

But the piece raised another question for me: “What’s a ‘Fifth Column,’ anyway?” The expression has been around forever, but what does it really mean?

Ahead of the Siege of Madrid in the Spanish Civil War, a general under Francisco Franco claimed that he would take the city with the four columns of troops under his command and a “fifth column” of nationalist sympathizers inside the city.

The city never fell to the nationalists, but fear of this “fifth column” caused the Republican government under Francisco Caballero to abandon Madrid for Valencia and it led to a massacre of nationalist prisoners in Madrid during the ensuing battle.

So a “fifth column” is not so much an insidious group of spies or traitors as it is the threat of such a group which causes the incumbent power to miscalculate and overreact. That doesn’t clear up what Kouri is trying to get across, but it does have the air of unintended confession.

TLJ: Holder Advocates Some Constitutional Principles

I’m a long-time reader and fan of TechLawJournal. Dogged reporter David Carney produces an amazing amount of content about technology-related goings-on in Washington, D.C. and the courts. Subscription information is here.

I also appreciate his editorial style, which often betrays a dose of concern for civil liberties and healthy skepticism about power. A wonderful example follows, reprinted with permission:

Holder Advocates Some Constitutional Principles
Attorney General Eric Holder gave a lengthy speech at the United States Military Academy in West Point, New York in which he discussed the role of law in “our current struggle against international terrorism”.

It was a plea for adherence to Constitutional principles. However, it was as significant for what he said – about detention of people in places like Guantanamo Bay – as for what he did not say – about interception of communications and seizure of data.

He spoke with specificity about Guantanamo Bay, detainees, and the history of American treatment of detained soldiers and citizens.

But, he said nothing that suggested an intent to reverse, or halt, the deterioration of Constitutional protection of privacy and liberty interests in the context of new communications and information technologies.

Eric HolderHolder (at right) said, “And so it is today, at the beginning of a new presidency, as we face a world filled with danger, that we must once again chart a course rooted in the rule of law and grounded in both the powers and the limitations it prescribes.”

He said that “we will not sacrifice our values or trample on our Constitution under the false premise that it is the only way to protect our national security. Discarding the very values that have made us the greatest nation on earth will not make us stronger – it will make us weaker and tear at the very fibers of who we are. There simply is no tension between an effective fight against those who have sworn to do us harm, and a respect for the most honored civil liberties that have made us who we are.”

This statement could equally apply to government surveillance activities. But, he did not say so. Perhaps Holder intends to speak in a similar speech about surveillance at a later date. Or perhaps, he does not, and his concern for Constitution rights is selective and does not extend to surveillance.

He did make one statement that may pertain to electronic surveillance and data. He said that “many national security decisions must by necessity be made in a manner that protects our ability to gather intelligence, investigate threats and execute wars”.

He did not reference the state secrets privilege, or the government’s assertion of it in legal proceedings involving warrantless wiretaps.

On April 3, 2009, the Department of Justice (DOJ) filed a motion to dismiss and memorandum in support [36 pages in PDF] in Jewell v. NSA, a case against the NSA, DOJ, Holder and officials, arising out of the NSA’s warrantless wiretap program.

The DOJ asserts the state secrets privilege, sovereign immunity, and other arguments, to evade litigation of this case on the merits.

The Electronic Freedom Foundation (EFF) stated in a release that “These are essentially the same arguments made by the Bush administration”.

This case is Carolyn Jewell, Tash Hepting, et al. v. National Security Agency, et al., U.S. District Court for the Northern District of California, San Francisco Division, D.C. No. C:08-cv-4373-VRW.

Ed Black, head of the Computer and Communications Industry Association (CCIA), stated in a release issued in response to Holder’s speech that “It’s disturbing that instead of helping investigate the extent of spying by the Bush administration, the new administration is not just defending those policies, but taking them a step further. In its April court brief (Jewel v. NSA), the Obama DOJ argued that the government is completely immune from litigation for illegal spying and even that it can never be sued for violating federal privacy laws with surveillance techniques. Those arguments sound more like ‘1984’ than 2009.”

Black continued that “President Obama appreciates more than most people how the Internet can be used as a tool to allow greater participation in a democracy. That same tool could also be the greatest innovation for surveillance and repression in the wrong regime. Defending practices like this sets a dangerous precedent down the road and makes it easier for a government to expand the programs from surveilling terrorists to surveilling political opponents.”

“The Obama administration had the courage to change policy on the treatment of terrorism suspects and how they were treated and sometimes tortured”, said Black. “But the abuse of the privacy rights of millions of U.S. citizens is a greater long term threat to the rule of law and the Constitutional rights of all Americans. The failure to allow the full investigation of the surveillance abuse by both the government and major collaborating industry giants would be a tragic betrayal by an administration so many were looking to for greater honesty, openness, and respect for all citizens’ constitutional rights.”

Will the Military Industrial Complex Save American Foreign Policy?

Missing from most of the commentary on the Secretary of Defense’s big defense spending speech yesterday is the fact that the program cuts he proposed are largely a result of freezing the topline – keeping defense spending level (once you adjust for inflation) for the next decade.

For nearly a decade the country has really had two defense budgets – one for imagined conventional wars against states like China, another from nation-building, peacekeeping and counterinsurgency. The first budget requires a small ground force and lots of big platforms operated by the Air Force and Navy. The latter requires much larger ground forces, a few niche capabilities like intelligence, surveillance and reconnaissance aircraft, and less high technology wonders.

The current American love affair with counterinsurgency has resulted in a gradual shift of dollars from the conventional budget to the unconventional one. We are reversing the old idea that the American way of war is to replace labor with capital, or manpower with technology. We are becoming a land power first.  We have been increasing manpower in the Army and Marines – adding 90,000 new troops – and paying them way more (compensation per service member is up by almost half since 1998). Personnel costs are taking more of the budget.  And for more complex reasons, including health care costs, the operations and maintenance part of the budget – essentially the day to day cost of running the military – has also been growing fast when measured per service member.  (For details on these issues, read this testimony by Stephen Daggett of the Congressional Research Service.)

That was bound to squeeze the other big parts of the defense budget – research, development and procurement of new weapons systems. There is too much future cost in the budget for everything to fit without topline growth, so something had to give. Big weapons programs are where the most give is, if you don’t want to cut manpower.

That conflict was delayed while the budget topline grew, but now that it is flat, it erupts. The manpower intensive military that follows from our current policies is eating into the conventional military that delivers manufactoring jobs across the country and the high-technology dreams of our military leaders.

What will be interesting to see is whether this shift encourages those leaders and their friends on the Hill to take up the arguments that people like me have been making for years: that small wars are mostly dumb wars.  Preparation for these wars didn’t much hurt the military industrial complex before, now it does. 

An additional note: Gates’ criticism of the acquisition process was on the mark. Rather than blaming out of control weapons costs on the kind of contracts we write or crafty contractors, as the President seems to, Gates noted correctly that the trouble is the requirements process – what we want, not how we buy it.

U.S. Chamber on Electronic Employment Verification

The U.S. Chamber of Commerce has a new paper out on electronic employment verification systems. Using government estimates, it finds that operating a nationwide worker background check system would cost $10 billion a year.

The Chamber is no opponent of requiring employers to check workers’ immigration status – I oppose the policy, preferring to live in a free country – but the paper has a lot of information about the practical impediments to giving the federal government a say in every hiring decision.

It also gives the last word to my paper, Electronic Employment Eligibility: Franz Kafka’s Solution to Illegal Immigration. In the paper, I discuss a method for verifying work eligibility under the current immigration law without creating a national identity system. It’s possible, but highly unlikely. As I say in my paper:

Unless the federal government can accept the risk of error and is willing to commit to lasting employment eligibility rules, it will require any internal enforcement program to use databases and tracking rather than just issuing cards that prove eligibility to work and nothing more. It will push Americans toward a national ID and worker surveillance system.

Week in Review: Bailout Bonuses, Marijuana and Eminent Domain Abuse

House Approves 90 Percent ‘Bonus Tax’

Sparked by outrage over the bonus checks paid out to AIG executives, the House approved a measure Thursday that would impose a 90 percent tax on employee bonuses for companies that receive more than $5 billion in federal bailout funds.

Chris Edwards, Cato’s director of tax policy studies, says the outrage over AIG is misplaced:

While Congress has been busy with this particular inquisition, the Federal Reserve is moving ahead with a new plan to shower the economy with a massive $1.2 trillion cash infusion — an amount 7,200 times greater than the $165 million of AIG retention bonuses.

So members of Congress should be grabbing their pitchforks and heading down to the Fed building, not lynching AIG financial managers, most of whom were not the ones behind the company’s failures.

Cato executive vice president David Boaz says this type of selective taxation is a form of tyranny:

The rule of law requires that like people be treated alike and that people know what the law is so that they can plan their lives in accord with the law. In this case, a law is being passed to impose taxes on a particular, politically unpopular group. That is a tyrannical abuse of Congress’s powers.

On a related note,  Cato senior fellow Richard W. Rahn defended the use of tax havens in a recent Wall Street Journal op-ed, saying the practice will only become more prevalent as taxes increase in the United States:

U.S. companies are being forced to move elsewhere to remain internationally competitive because we have one of the world’s highest corporate tax rates. And many economists, including Nobel Laureate Robert Lucas, have argued that the single best thing we can do to improve economic performance and job creation is to eliminate multiple taxes on capital gains, interest and dividends. Income is already taxed once, before it is invested, whether here or abroad; taxing it a second time as a capital gain only discourages investment and growth.

Obama to Stop Raids on State Marijuana Distributors

Attorney General Eric Holder announced this week that the president would end federal raids on medical marijuana dispensaries that were common under the Bush administration.

It’s about time, says Tim Lynch, director of Cato’s Project on Criminal Justice:

The Bush administration’s scorched-earth approach to the enforcement of federal marijuana laws was a grotesque misallocation of law enforcement resources. The U.S. government has a limited number of law enforcement personnel, and when a unit is assigned to conduct surveillance on a California hospice, that unit is necessarily neglecting leads in other cases that possibly involve more violent criminal elements.

The Cato Institute hosted a forum Tuesday in which panelists debated the politics and science of medical marijuana. In a Cato daily podcast, Dr. Donald Abrams explains the promise of marijuana as medicine.

Cato Links

• A new video tells the troubling story of Susette Kelo, whose legal battle with the city of New London, Conn., brought about one of the most controversial Supreme Court rulings in many years. The court ruled that Kelo’s home and the homes of her neighbors could be taken by the government and given over to a private developer based on the mere prospect that the new use for her property could generate more tax revenue or jobs. As it happens, the space where Kelo’s house and others once stood is still an empty dustbowl generating zero economic impact for the town.

• Daniel J. Ikenson, associate director of Cato’s Center for Trade Policy Studies, explains why the recent news about increasing protectionism will be short-lived.

• Writing in the Huffington Post, Cato foreign plicy analyst Malou Innocent says Americans should ignore Dick Cheney’s recent attempt to burnish the Bush administration’s tarnished legacy.

• Reserve your spot at Cato University 2009: “Economic Crisis, War, and the Rise of the State.”

Put Surveillance Cameras on Police Guns, Not Street Corners

Mayor Daley of Chicago is planning to put a surveillance camera on every corner to aid first responders and deter terrorism.  As I’ve said before, cameras don’t deter terrorism, but they do satisfy the need to “do something” without really improving security.  Police officers prevent attacks with traditional investigation and intelligence gathering; cameras are only useful in picking up the pieces after the attack is done.  My colleague Jim Harper is cited in this piece that addresses their utility in more detail.  Cameras didn’t stop the 7/7 bombings in London, but they took lots of pictures of the attack (creepy Big Brother shots here).  The London police doubled down on mass surveillance, but reported that the cameras have not reduced crime.  Worse yet, the British have effectively outlawed taking photos of police officers, prompting photo protests.

Chicago isn’t the first major American city to take this route.  New York did so, as did the District of Columbia.  The cameras in D.C. have not prevented crime, and this piece makes the case that they are a waste of resources - no one can point to a prosecution that used the camera footage to obtain a conviction, and several murders have been committed within a block of a surveillance camera.

Surveillance cameras can and should play a prominent role in law enforcement - mounted on officers’ firearms.  A company is now producing a camera that attaches to the tactical rail found on modern pistols and rifles.  A New York county has invested in the technology for its officers, and their experience looks promising.  Putting a camera on the guns of SWAT officers will keep them honest and prevent falsification of evidence after the fact to cover up a mistaken address or unlawful use of lethal force.

Mayor Cheye Calvo can attest to these horrors, as detailed in a recent Washington Post Sunday Magazine cover story, this Cato Policy Report, and this Cato Policy Forum, “Should No-Knock Police Raids be Rare-or Routine?”  Click here for video - Mayor Calvo calmly captures the raw shock of having your life turn into a tactical problem for a SWAT team to solve, and he is now advocating for a Maryland state statute to mandate tracking the deployment of tactical law enforcement teams.  As Radley Balko would tell you, this is long overdue.