While the Snowden-NSA revelations continue to shock Americans on a daily basis, and illustrate how intrusive the government is in our lives, and how casually it violates our Fourth Amendment right against unwarranted searches, it just got worse.
It turns out the Drug Enforcement Agency (DEA) was spying on Americans, gathering metadata on our phone calls, almost a decade before 9/11, and right up to 2013. With help from the U.S. military.
Decades of Metadata Spying
In an exclusive report, USA Today learned the U.S. government started keeping secret records of Americans’ international telephone calls nearly a decade before the 9/11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed. The DEA spying only stopped, supposedly, in 2013, no longer needed due to the NSA.
For more than two decades, the Justice Department and the DEA amassed databases of virtually all telephone calls from the U.S. to as many as 116 countries “linked to drug trafficking.” The State Department officially says there are 195 countries out there, so the DEA was monitoring most of them. The Justice Department revealed in January that the DEA had collected data about calls to “designated foreign countries.” But the comprehensive scale of the operation has not been disclosed until now.
Federal investigators claim they used the call records — metadata — to track drug cartels’ distribution networks. They say they also used the records to help rule out foreign ties to the bombing in 1995 of a federal building in Oklahoma City and to identify U.S. suspects in other investigations.
Still believing metadata is not intrusive? Read this.
Telecoms Roll Over
America’s telecommunications and phone companies apparently turned over their records voluntarily and without asking for warrants. Officials said a few telephone companies were reluctant to provide so much information, but none ever challenged the issue in court. Those that hesitated received letters from the Justice Department urging them to comply.
The data collection was “one of the most important and effective Federal drug law enforcement initiatives,” the Justice Department said in a 1998 letter to Sprint. The previously undisclosed letter noted the operation had “been approved at the highest levels of Federal law enforcement authority,” including then-Attorney General Janet Reno and her deputy and later Attorney General during the NSA-spying era, Eric Holder.
The data collection began in 1992 during the administration of George H.W. Bush, nine years before his son, George W., authorized the NSA to gather its own logs of Americans’ phone calls in 2001. The program was re-approved by top Justice Department officials in the Clinton and Obama administrations. There was no oversight or court approval.
U.S. Military Involvement
The DEA program also employed U.S. military assets. When the volume of data threatened to overwhelm DEA, the military responded with a pair of supercomputers and intelligence analysts who had experience tracking the communication patterns of Soviet military units. The supercomputers were installed in DEA headquarters in Arlington, Virginia.
To keep the whole program secret and thus outside of any legal challenge, the DEA did not to use the information as evidence in criminal prosecutions per se. Instead, its Special Operations Division passed the data to field agents as tips, a process approved by Justice Department lawyers.
That process is know as “parallel construction,” and has a sordid history. Read this.
The Template
They just did it. The template for the NSA’s later spying on America was set long before 9/11. All the elements were already in place: no-questions-asked cooperation from the telcoms, no warrants or oversight, near-perfect secrecy, near-perfect pointless, dragnet security on American citizens in their homes. Multiple administrations, and multiple corporate executives of publicly-traded companies, kept silent.
One notes that despite all this spying, drugs are still quite available in the U.S. and while it is nice that there was no foreign connection to the 1995 Oklahoma City bombing, the DEA spying did miss a whopper of a terror attack some years later. At least 9/11 was not drug-related.
And for those criminal defense attorneys who might want to reopen some old cases and challenge guilty verdicts based on the unconstitutionality of these searches, sorry. The DEA has destroyed the databases.
BONUS: The DEA is still mass-targeting Americans, only now via large-scale subpoenas.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
The Bill of Rights was designed to protect the People from their government. That’s quite literally becoming history today as new challenges, now from local law enforcement, chip away at the Fourth Amendment’s protections of privacy. New laws and devices spread spying on Americans to the local level.
A Brief Explanation of Post-Constitutional America
The cornerstone of the Bill of Rights was that the People grant exceptions to those rights to the Government. Absent those specific exceptions, the rest of the stuff was inalienable, not up for grabs, not dependent in any way on Government’s decision to grant or withhold them. Constitutional America was clearly imperfect, but the underlying premise spoke of a striving toward an ideal.
The cornerstone of Post-Constitutional America is just the opposite. The People have what rights the Government chooses to allow them to have, such that privacy is the exception, free speech a variable, torture a tool to be used or withheld as the Government finds appropriate. It is a turning on its head of Constitutional America, back to a time when a tyrant and king (may we call old King George an “evil dictator” to use the preferred language of today?) controlled Americans’ daily lives by decree.
It should be unnecessary to have to argue the critical importance of the Fourth Amendment, but these days it seems necessary. If the First Amendment’s right to speak out publicly was the People’s wall of security, then the Fourth Amendment’s right to privacy was its buttress. Privacy is the right to think without the Government intruding. It is part of being American. If you want to personally give it away for yourself, feel free, but you are required to allow others to exercise it.
9/11 Changed Everything
Under the umbrella of post-9/11 fear, the relationship between the Government and the People of the United States changed. As early NSA whistleblowers Thomas Drake, Bill Binney, Kirk Wiebe and others made clear, within days after the attacks, the vast capability of the NSA was turned 180 degrees away from sites abroad toward a new definition of the People: we were now targets.
Such acts, along with flimsy pieces of faux-legislation such as the Patriot Act, were not only harmful to our privacy by themselves, they also sent clear signals to law enforcement at all levels that new rules applied; after all, if the federal government was spying on Americans in clear contrivance of the Fourth Amendment, then why couldn’t local law enforcement do the same? With such tacit approval, and the redefining of every person in America as a potential terrorist, it all fell into place.
So while the Snowden NSA revelations expose violations of the Fourth Amendment on the largest scale, let’s examine some examples of how those big-scale acts filter down to local levels.
Los Angeles
In 2008 the city of Los Angeles passed municipal ordinance 41.49 requiring hotels to gather, hold for at least 90 days and make available upon request a large amount of information on their guests. The information included guests’ credit card number, home address, driver’s license information and vehicle license number. Several dozen other cities, including Atlanta and Seattle, passed similar ordinances.
Ordinarily the police would need to show probable cause, and to seek individual warrants on a person-by-person, case-by-case basis, to gather such information. The L.A. ordinance, however, allows police to simply demand it from a hotel, with no judicial or other oversight. The premise was that the information was the property of the hotel once the guest voluntarily surrendered it in order to stay the night. Personal information transformed into “business records,” L.A. argues, is inherently less “private” than personal information per se.
Similarities to how the NSA collected mountains of phone call data from places like Verizon, claiming it too was simply now part of business records routinely available per the Patriot Act, are noted.
The U.S. Supreme Court, after two opposite rulings through lower courts, has agreed to hear the case after the City of Los Angeles’ petition to do so. L.A. claims “These laws expressly help police investigate crimes such as prostitution and gambling, capture dangerous fugitives and even authorize federal law enforcement to examine these registers, an authorization which can be vital in the immediate aftermath of a homeland terrorist attack.”
In addition to the clear, broad Fourth Amendment violations, opponents cite the reality that information, once gathered, can be disseminated anywhere for any purpose. Data gathered in L.A. for a perhaps legitimate gambling investigation can go on to populate an infinite number of databases indefinitely for an undeterminable range of purposes into the future. It does not go away. It waits to be used.
And all that brings us to Virginia.
Virginia Police Collect and Share Phone Data
Five local police departments in southeastern Virginia have been secretly and automatically sharing telephone data and compiling it into a large database for nearly two years. According to a 2012 memorandum of understanding published for the first time this week by the Center for Investigative Reporting (the database had been kept secret from the public,) the police departments from Hampton, Newport News, Norfolk, Chesapeake, and Suffolk all participate in something called the “Hampton Roads Telephone Analysis Sharing Network.”
Those police departments “agree to share telephone intelligence information derived from any source,” including subpoenaed telephone call detail records, subpoenaed telephone subscriber information, and seized mobile devices. The telephone intelligence information will be stored in the master Pen-Link telephone database and participating agencies can make inquires of the database by either telephone or e-mail contact with a member.”
Such data transfers, the document goes on to explain, can happen automatically if the agency agrees to have certain software installed on their computer, or via e-mail or DVD. No information is available as to what, if any, data security protocols are in place.
The significance of such data transfer cannot be underplayed. The assumption by the police is that any data gathered legally– for example, under warrant, after a showing of probable cause specific to a case or incident– can then be stored, shared and repurposed forever as the police see fit. The shaky legal premise for this whole system is that once taken in via some sort of legal means (though of course there is no outside control that all of the data was gathered legally), the data becomes akin to common property, and no further justification or judicial oversight needs to be applied to its use, any use, ever, forever.
An even shakier legal premise it that a secret database of any kind can be maintained by the police: Virginia law, The Government Data Collection and Dissemination Practices Act, specifically states “There shall be no personal information system whose existence is secret.”
Not an End in Sight
Local actions have commonalities with the larger actions the NSA has been doing. The use of the collective where the law intended the individual– a single phone call versus redefining every call as a single set of business records– is clear. The manipulation of a legal act, such as collecting information via a warrant and then repurposing it into a general pool of data in Virginia, is also a marker of modern times. The most significant commonality between local actions and federal ones is the broad contempt for civil liberties. And that describes Post-Constitutional America as clearly as anything else.
The examples above are, or likely soon will be, going to be tested in court. Other offenses to the Fourth Amendment have fallen to the People’s side: In 2012, a court ruled law enforcement authorities generally need search warrants when they attach GPS devices to a vehicle. In July 2014, the Supreme Court said that the authorities need warrants to dive into the mobile phones of people they arrest.
At the same time, the proliferation of low-cost surveillance devices, such as license plate scanners and Stingray, continue to raise new questions even as a handful of older ones are resolved. The battle against the tyrant King George continues.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
With Obama set to announce on Friday his plans to amend the electronic surveillance program at the National Security Agency, it is a good time to look more closely at what the NSA has been doing with some of the data it has been collecting on Americans for the last decade or so. But first some background.
As the very first info Edward Snowden’s information about the NSA began to emerge in June 2013, Obama made the following statement:
Nobody is listening to your telephone calls. That’s not what this program is about. As was indicated, what the intelligence community is doing is looking at phone numbers and durations of calls. They are not looking at people’s names, and they’re not looking at content. But by sifting through this so-called metadata, they may identify potential leads with respect to folks who might engage in terrorism.
(Obama also said in that same remark “Now, with respect to the Internet and emails — this does not apply to U.S. citizens and it does not apply to people living in the United States,” a statement which we now know, from Snowden’s revelations, was a complete lie. But that’s another column.)
Dianne Feinstein backed up the president that same day, telling nervous Americans “This is just metadata. There is no content involved.”
(Feinstein also had the gall to say in June 2013, “To my knowledge, we have not had any citizen who has registered a complaint relative to the gathering of this information.” But that’s another column.)
What is Metadata?
Metadata in 2013 was not a term widely-known to the general public. A quick definition might be that metadata is information about data– when and where the data was created, perhaps who created it, how long it took to create, that sort of thing. The metadata for this article might be something like “Created in New York City at 11:33 on April 2 by user Peter Van Buren.” Using this, while a snoop would not with the metadata alone know what I wrote, s/he could indeed place me at a specific location engaged in a specific task at a specific time with a specific computer. Potentially valuable information, especially in the aggregate.
If the metadata was for an interactive thing, like a phone call, then the snoop would also know to whom I was talking. Metadata can serve as a giant index to allow the snoop to know which “content” is worth looking at in detail. Matching a phone number to a business or person is painless within the U.S. and many other countries. It can done by most people over the internet (reverse directories) and has long been available using more sophisticated systems by law enforcement.
But let’s focus on the metadata alone, as did the Stanford University Security Lab. Scientists there asked subjects to voluntarily collect and share the same metadata about their cell calls as the NSA collects from them involuntarily. The scientists did this via an app one could download, a kind of willful piece of malware like the NSA could install on phones where it does not already have access to the full network (as it does in the U.S. and most allied nations.)
To Catch a Whistleblower
So what did Stanford find among all that metadata? They began with some simple, common-sense assumptions, primarily that the more calls you made to a specific place (i.e., a political group or a friend) and the longer in duration those calls were, the more significant the connection. If that same source called you back, frequently or for long durations, the connection was more or less confirmed. Mistakes could be made, but there is always some collateral damage in these things.
Let’s play along. Jennifer holds regular conference calls during business hours with the same set of people at numbers that resolve to an office in the Pentagon. She makes a significant set of short calls to an Anti-War organization during after-work hours, followed by another set of very long calls to a law office known to represent whistleblowers. She occasionally calls a journalist whose number resolves to New York City, often only speaking for a few seconds. Is Jennifer planning to blow the whistle on something and is setting up meets with a NY journalist? Let’s kick down her door tonight at 2 am and find out.
Looking to gather data that might be used to identify vulnerabilities, blackmail or character-assassinate someone? The Stanford people wrote “The degree of sensitivity among contacts took us aback. Participants had calls with Alcoholics Anonymous, gun stores, NARAL Pro-Choice, labor unions, divorce lawyers, sexually transmitted disease clinics, a Canadian import pharmacy, strip clubs, and much more.”
Knowing Everything
Let’s go deeper. Stanford found:
Participant A communicated with multiple local neurology groups, a specialty pharmacy, a rare condition management service, and a hotline for a pharmaceutical used solely to treat relapsing multiple sclerosis.
Participant B spoke at length with cardiologists at a major medical center, talked briefly with a medical laboratory, received calls from a pharmacy, and placed short calls to a home reporting hotline for a medical device used to monitor cardiac arrhythmia.
Participant C made a number of calls to a firearm store that specializes in the AR semiautomatic rifle platform. They also spoke at length with customer service for a firearm manufacturer that produces an AR line.
In a span of three weeks, Participant D contacted a home improvement store, locksmiths, a hydroponics dealer, and a head shop.
Participant E had a long, early morning call with her sister. Two days later, she placed a series of calls to the local Planned Parenthood location. She placed brief additional calls two weeks later, and made a final call a month after.
What Do They Know?
What could someone do with that kind of information about you? What if that someone also had, as we know the NSA does, access to your social media, email, snail mail, credit card data, travel information, air reservations, and bank records? Orwell was an amateur. Metadata is the key to stripping away the haystack so that the needle is just sitting there.
The Stanford metadata research program appears to still be up and running; volunteer to help by downloading their app. The NSA program is most certainly robustly ongoing.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
While poets and psychologists talk about soldiers bringing the battlefield home with them, in fact, the U.S. is doing just that. More and more, weapons, tactics, techniques and procedures that have been used abroad in war are coming home, this time employed against American Citizens.
A front-page article in the Washington Post confirms that wartime surveillance blimps– aerostats– used in Iraq and Afghanistan will now monitor most of the Northeast United States. The aerostats will be able to track individual cars and trucks as they move about their business.
Welcome Home Aerostat
The latest (known) example of war technology coming home is the aerostat, a medium-sized blimp tethered high above its target area. Anyone who served in Iraq or Afghanistan will recognize the thing, as one or more flew over nearly every military base of any size or importance (You can see photos online).
What did those blimps do in war? Even drones have to land sometime, but a blimp can stay aloft 24/7/forever. Blimps are cheaper and do not require skilled pilots. Blimps can carry literally tons of equipment, significantly more than a drone. The blimps can carry any sensor or technology the U.S. has available, suspending it at altitude to soak up whatever that sensor is aimed at– cell calls, radio waves, electronic whatevers. The aerostats also carried high-powered cameras, with heat and night vision of course. While in Iraq, I had the aerostat video feed on my desktop. Soldiers being soldiers, occasional diversions were found when a camera operator spotted almost anything of vague interest, including two dogs mating, an Iraqi relieving himself outdoors or on really dull days, even a person hanging out laundry. The device obviously also had much less benign tasks assigned to it.
The war has come home again, as the Army confirmed that by summer 2014 at least two of these aerostats will be permanently over the Washington DC area. They will be run by the Army, using operators who likely learned their trade at war. The aerostats are brought to you by the Raytheon company, who also makes some of America’s favorite weapons and surveillence gear.
Armor, Drones and Armed Drones
Others have written about the rise of warrior cops. Armored military-style vehicles are now part of most big-city police forces, as are military-style weapons. The FBI has admitted to using drones over America. In a 2010 Department of Homeland Security report, the Customs and Border Protection agency suggests arming their fleet of drones to “immobilize TOIs,” or targets of interest.
Stingray Knows Where You Are
Much of the technology and methodology the NSA and others have been shown to be using against American Citizens was developed on and for the battlefields of Iraq and Afghanistan, in particular the advanced use of cell phones to track people’s movements.
A technique now at use here at home is employing a fake cell phone tower under a program called Stingray. Stingrays spoof a legitimate cell phone tower in order to trick nearby cellphones and other wireless devices into connecting to the fake tower instead of a nearby real one. When devices connect, stingrays can harvest MAC addresses and other unique identifiers and data, as well as location information. To prevent detection, the stingray relays the call itself to a real tower so the pickup is transparent to the caller. By gathering the wireless device’s signal strength from various locations, the Feds can pinpoint where the device is being used with much more precision than they can get through data obtained from the mobile network provider’s fixed tower location.
Better yet, stingray bypasses the phone company entirely. Handy when the phone company is controlled by the enemy, handy when laws change and the phone companies no longer cooperate with the government, handy when you simply don’t want the phone company to know you’re snooping on its network.
Meta-Your-Data
Also refined in Iraq, Afghanistan and the greater archipelago of the war of terror was the use of metadata and data-mining, essentially amassing everything, however minor or unimportant, and then using increasingly powerful computers to pull out of that large pile actionable information, i.e., specific information to feed back to combat commanders and special forces to allow them to kill specific people. Knowing, for example, the name of a guy’s girlfriend leads to knowing what car she drives which leads to knowing when she left home which leads to listening to her make a date via cell phone which leads a credit card charge for a room which leads to a strike on a particular location at a specific time, high-tech flagrante delicto.
The FBI has followed the NSA’s wartime lead in creating its Investigative Data Warehouse, a collection of more than a billion documents on Americans including intelligence reports, social security files, drivers’ licenses, and private financial information including credit card data. All accessible to 13,000 analysts making a million queries monthly. One of them called it the “uber-Google.”
It’s All Good
No need to worry Citizens, as the aerostats will only be used for your own good. In fact, their sensors will scan for incoming cruise missiles, mine-laying ships, armed drones, or anything incoming from hundreds of miles away, because of course Washington is constantly being attacked by those sorts of things (I love the idea of protecting the city from mine-laying ships sneaking up the Potomac River).
Those DC-based aerostats will certainly not have employed the Gorgon Stare system, now in use in Afghanistan to rave reviews. Gorgon Stare, made up of nine video cameras, can transmit live images of physical movement across an entire town (four km radius), much wider in scope than any drone. Might be handy for VIP visits and presidential stuff, however, right?
And of course the temptation to mount a stingray device where it can ping thousands of cell phones would be ignored.
But I could be wrong about all the 1984-stuff, in which case the multi-million dollar aerostat program would be noteworthy only as another waste of taxpayer money. Remember when that was what made us the maddest about the government?
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.