FAIR USE NOTICE

FAIR USE NOTICE

A BEAR MARKET ECONOMICS BLOG


This site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in an effort to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. we believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law.

In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml

If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.

FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates
FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates

All Blogs licensed under Creative Commons Attribution 3.0

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.

Wednesday, July 31, 2013

Revealed: NSA Program Collects 'Nearly Everything a User Does on the Internet'




XKeyscore gives 'widest-reaching' collection of online data; NSA analysts require no prior authorization for searches; Sweeps up emails, social media activity and browsing history

by Glenn Greenwald 
 
 
 


One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet'A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet.
The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10.

"I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.

KS1

The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.

Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.

One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.

Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.

A slide entitled "plug-ins" in a December 2012 document describes the various fields of information that can be searched. It includes "every email address seen in a session by both username and domain", "every phone number seen in a session (eg address book entries or signature block)" and user activity – "the webmail and chat activity to include username, buddylist, machine specific cookies etc".

 

Email monitoring


In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual's email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.

One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".

To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.


KS2
KS3


The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.

The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, "communications that transit the United States and communications that terminate in the United States".

One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:


KS4

 

Chats, browsing history and other internet activity

Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.


KS5

An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.


KS6

Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.


KS7

As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls "nearly everything a typical user does on the internet".


KS8

The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.


KS9

The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.

William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."

The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: "At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours."

To solve this problem, the NSA has created a multi-tiered system that allows analysts to store "interesting" content in other databases, such as one named Pinwale which can store material for up to five years.

It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.





KS10

In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.


KS11

Legal v technical restrictions

While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA's foreign targets.

The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.

"The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.

An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.


KS12

In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.

Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.

Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. "It's very rare to be questioned on our searches," Snowden told the Guardian in June, "and even when we are, it's usually along the lines of: 'let's bulk up the justification'."

In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.

Acknowledging what he called "a number of compliance problems", Clapper attributed them to "human error" or "highly sophisticated technology issues" rather than "bad faith".

However, Wyden said on the Senate floor on Tuesday: "These violations are more serious than those stated by the intelligence community, and are troubling."

In a statement to the Guardian, the NSA said: "NSA's activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.
"XKeyscore is used as a part of NSA's lawful foreign signals intelligence collection system.

"Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA's analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring."
"Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.

"These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad."


Friday, July 26, 2013

Shocking 'Extermination' Fantasies By the People Running America's Empire on Full Display at Aspen Summit





Tea Party and the Right  
comments_image 216 COMMENTS

 

Security Forum participants expressed total confidence in American empire, but could not contain their panic at the mention of Snowden.

 
 
 
 
 
Seated on a stool before an audience packed with spooks, lawmakers, lawyers and mercenaries, CNN’s Wolf Blitzer introduced recently retired CENTCOM chief General James Mattis. “I’ve worked with him and I’ve worked with his predecessors,” Blitzer said of Mattis. “I know how hard it is to run an operation like this.”

Reminding the crowd that CENTCOM is “really, really important,” Blitzer urged them to celebrate Mattis: “Let’s give the general a round of applause.”
Following the gales of cheering that resounded from the room, Mattis, the gruff 40-year Marine veteran who once volunteered his opinion that “it’s fun to shoot some people,” outlined the challenge ahead. The “war on terror” that began on 9/11 has no discernable end, he said, likening it to the “the constant skirmishing between [the US cavalry] and the Indians” during the genocidal Indian Wars of the 19th century.

“The skirmishing will go on likely for a generation,” Mattis declared.
Mattis’ remarks, made beside a cable news personality who acted more like a sidekick than a journalist, set the tone for the entire 2013 Aspen Security Forum this July. A project of the Aspen Institute, the Security Forum brought together the key figures behind America’s vast national security state, from military chieftains like Mattis to embattled National Security Agency Chief General Keith Alexander to top FBI and CIA officials, along with the bookish functionaries attempting to establish legal groundwork for expanding the war on terror.

Partisan lines and ideological disagreements faded away inside the darkened conference hall, as a parade of American securitocrats from administrations both past and present appeared on stage to defend endless global warfare and total information awareness while uniting in a single voice of condemnation against a single whistleblower bunkered inside the waiting room of Moscow International Airport: Edward Snowden.

With perhaps one notable exception, none of the high-flying reporters junketed to Aspen to act as interlocutors seemed terribly interested in interrogating the logic of the war on terror. The spectacle was a perfect window into the world of access journalism, with media professionals brown-nosing national security elites committed to secrecy and surveillance, avoiding overly adversarial questions but making sure to ask the requisite question about how much Snowden has caused terrorists to change their behavior.

Jeff Harris, the communications director for the Aspen Institute, did not respond to questions I submitted about whether the journalists who participated in the Security Forum accepted fees. (It is likely that all relied on Aspen to at least cover lodging and travel costs). CNN sponsored the forum through a special new website called CNN Security Clearance, promoting the event through Twitter and specially commissioned op-eds from participating national security figures like former CIA director John McLaughlin.

Another forum sponsor was Academi, the private mercenary corporation formerly known as Blackwater. In fact, Academi is Blackwater’s third incarnation (it was first renamed “Xe”) since revelations of widespread human rights abuses and possible war crimes in Iraq and Afghanistan threw the mercenary firm into full damage control mode. The Aspen Institute did not respond to my questions about whether accepting sponsorship from such an unsavory entity fit within its ethical guidelines.

'Exterminating People'


John Ashcroft, the former Attorney General who prosecuted the war on terror under the administration of George W. Bush, appeared at Aspen as a board member of Academi. Responding to a question about U.S. over-reliance on the “kinetic” approach of drone strikes and special forces, Ashcroft reminded the audience that the U.S. also likes to torture terror suspects, not just “exterminate” them.

“It's not true that we have relied solely on the kinetic option,” Ashcroft insisted. “We wouldn't have so many detainees if we'd relied on the ability to exterminate people…We've had a blended and nuanced approach and for the guy who's on the other end of a Hellfire missile he doesn't see that as a nuance.”

Hearty laughs erupted from the crowd and fellow panelists. With a broad smile on her face, moderator Catherine Herridge of Fox News joked to Ashcroft, “You have a way with words.”

But Ashcroft was not done. He proceeded to boast about the pain inflicted on detainees during long CIA torture sessions: “And maybe there are people who wish they were on the end of one of those missiles.”

Competing with Ashcroft for the High Authoritarian prize was former NSA chief Michael Hayden, who emphasized the importance of Obama’s drone assassinations, at least in countries the U.S. has deemed to be Al Qaeda havens. “Here's the strategic question,” Hayden said. “People in Pakistan? I think that's very clear. Kill 'em. People in Yemen? The same. Kill 'em.”

“We don’t smoke [drug] cartel leaders but personally I’d support it,” remarked Philip Mudd, the former deputy director of Bush’s Counterterrorism Center, earning more guffaws from his fellow panelists and from Herridge. Ironically, Mudd was attempting to argue that counter-terror should no longer be a top U.S. security priority because it poses less of a threat to Americans than synthetic drugs and child obesity.

Reflection was not on the agenda for most of the Security Forum’s participants. When asked by a former US ambassador to Denmark the seminal question “This is a great country, why are we always the bad guy?,” Mudd replied, “They think that anything the U.S. does [in the Middle East], even though we helped Muslim communities in Bosnia and Kuwait, everything is rewritten to make us the bad guys.”

The clamoring about U.S. invasions, drone strikes, bankrolling of Israel’s occupation, and general political meddling, could all be written off as fevered anti-Americanism borne from the desert canyons of the paranoid Arab mind.
And the wars could go on.

Delusions of Empire


Throughout the three days of the Security Forum, the almost uniformly white cast of speakers were called on to discuss recent geopolitical developments, from "Eye-rak" and "Eye-ran" to Egypt, where a military coup had just toppled the first elected government in the country’s history.

Mattis carefully toed the line of the Obama administration, describing the overthrow of Egypt’s government not as a coup, but as “military muscle saddled on top of this popular uprising.”

Warning that using terms like “coup” could lead to a reduction in U.S. aid to Egypt, where the military controls about one-third of the country’s economy, Mattis warned, “We have to be very careful about passing laws with certain words when the reality of the world won’t allow you to.”

Wolf Blitzer mentioned that Egypt’s new military-imposed foreign minister, Nabil Fahmy, had been a fixture in Washington during the Mubarak days. “These are people the West knows, the U.S. knows,” he said of the new cabinet in Cairo. “I assume from the U.S. perspective, the United States is so much more happy with this.”

Later, one of the few Arab participants in the forum, Al Jazeera DC bureau chief Abderrahim Foukara, claimed that the Arab revolts were inspired by the U.S. invasion of Iraq. “The iconic image of Saddam being pulled out of a hole did something to the dynamic between ruler and ruled in the Arab world,” Foukara claimed.

With the revolts blurring the old boundaries imposed on the Arab world during the late colonial era, former CIA director John McLaughlin rose from the audience to call for the U.S. to form a secret, Sikes-Picot-style commission to draw up a new set of borders.

“The American government should now have such a group asking how we should manage those lines and what should those lines be,” McLaughlin told the panelists, who dismissed the idea of a new Great Game even as they discussed tactics for preserving U.S. dominance in the Middle East.

ABC’s Chris Isham asked Jim Jeffrey, the former U.S. ambassador to Iraq, why, with a recession on its hands and Middle Eastern societies spiraling out of control, should the U.S. remain militarily involved in the region. Without hesitation, Jeffrey rattled off the reasons: Saudi Arabia, Turkey, Israel, and “world oil markets.”

“What could we have done better?” Isham asked the ambassador.

“Probably not too much.”

 

NSA Heroes, Saving Lives of Potential Consumers


While participants in the Security Forum expressed total confidence in American empire, they could not contain their panic, outrage, and fear at the mere mention of Snowden.

“Make no mistake about it: These are great people who we’re slamming and tarnishing and it’s wrong. They’re the heroes, not this other and these leakers!” NSA chief General Keith Alexander proclaimed, earning raucous applause from the crowd.

Snowden’s leaks had prompted a rare public appearance from Alexander, forcing the normally imperious spy chief into the spotlight to defend his agency’s Panopticon-style programs and its dubious mechanisms of legal review. Fortunately for him, NBC’s Pete Williams offered him the opportunity to lash out at Snowden and the media that reported the leaks, asking whether the "terrorists” (who presumably already knew they were being spied on) had changed their behavior as a result of the leaks.

“We have concrete proof that terrorists are taking action, making changes, and it’s gonna make our job harder,” Alexander declared, offering nothing to support his claim.

Alexander appeared in full military regalia, with colorful decorations and medallions covering his left breast. Casting himself as a stern but caring father who has the best interests of all Americans at heart, even if he can't fully disclose his methods, he turned to the crowd and explained, “The bad guys…hide amongst us to kill our people. Our job is to stop them without impacting your civil liberties and privacy and these programs are set up to do that.”

“The reason we use secrecy is not to hide it from the American people, but to hide it from the people who walk among you and are trying to kill you,” Alexander insisted.

Corporations like AT&T, Google and Microsoft that had been compelled to hand over customer data to the NSA “know that we’re saving lives,” the general claimed. With a straight face, he continued, “And that’s good for business because there’s more people out there who can buy their products.”

Self-Reporting


So who were the "bad guys” who “walk among us,” and how could Americans be sure they had not been ensnared by the NSA’s all-encompassing spying regime, either inadvertently or intentionally? Nearly all the Security Forum participants involved in domestic surveillance responded to this question by insisting that the NSA had the world’s most rigorous program of oversight, pointing to Congress and the Foreign Intelligence Surveillance Act (FISA) courts as the best and only means of ensuring that “mistakes” are corrected.
“We have more oversight on this [PRISM] program than any other program in any government that I’m aware of,” Alexander proclaimed, ramming home a talking point repeated throughout the forum.

“I can assure these are some of the judges who are renowned for holding the government to a very high standard,” John Carlin, the Assistant US Attorney General for National Security, stated.

But in the last year, FISA courts received 1,856 applications for surveillance from the government. In 100 percent of cases, they were approved. As for Congress, only two senators, Ron Wyden and Mark Udall, demanded the NSA explain why PRISM was necessary or questioned its legality. Despite the fact that the entire regime of oversight was a rubber stamp, or perhaps because of it, none of those who appeared at the Security Forum to defend it were willing to consider any forum of independent civilian review.

“You have to do [domestic surveillance] within a closed bubble in order to do it effectively,” Dennis Blair, the director of National Intelligence conceded under sustained grilling from the Washington Post’s Barton Gellman, one of the reporters who broke Snowden’s leaks and perhaps the only journalist at the Security Forum who subjected participants to tough scrutiny.

When Gellman reminded Alexander that none of the oversight mechanisms currently in place could determine if the NSA had improperly targeted American citizens with no involvement in terror-related activity, the general declared, “we self-report those mistakes.”

“It can't be, let's just stop doing it, cause we know, that doesn't work,” Alexander maintained. “We've got to have some program like [PRISM].”
The wars would go on, and so would the spying.

Reinstituting Public Confidence


During a panel on inter-agency coordination of counter-terror efforts, Mike Leiter, the former director of the National Counterterrorism Center (NCC), suggested that one of the best means of preserving America’s vast and constantly expanding spying apparatus was “by reinstituting faith among the public in our oversight.”

Even as current NCC director Matthew Olsen conceded, “There really are limits in how transparent we can be,” Leiter demanded that the government “give the public confidence that there’s oversight.

Since leaving the NCC, Leiter has become the senior counsel of Palantir Technologies, a private security contractor that conducts espionage on behalf of the FBI, CIA, financial institutions, the LAPD and the NYPD, among others. In 2011, Palantir spearheaded a dirty tricks campaign against critics of the U.S. Chamber of Commerce, including journalists, compiling electronic dossiers intended to smear them. Palantir’s target list included progressive groups like Think Progress, SEIU and U.S. Chamber Watch.

In the friendly confines of the Aspen Institute’s Security Forum, Leiter did his best to burnish his company’s tarnished image, and do some damage control on behalf of the national security apparatus it depends on for contracts. Like most other participants, Leiter appeared in smart casual dress, with an open collar, loafers, a loose-fitting jacket and slacks.
“Just seeing us here,” he said, “that inspires [public] confidence, because we’re not a bunch of ogres.”


Max Blumenthal is the author of Republican Gomorrah (Basic/Nation Books, 2009). Twitter at @MaxBlumenthal.

Monday, July 15, 2013

How Obama Is Expanding the Century-Long Project to Build a Total Surveillance State



Civil Liberties  


“Surveillance blowback” from America’s wars has ensured the creation of an ever more massive and omnipresent security apparatus. 


To stay on top of important articles like these, sign up to receive the latest updates from TomDispatch.com here.

The American surveillance state is now an omnipresent reality, but its deep history is little known and its future little grasped.  Edward Snowden’s leaked documents reveal that, in a post-9/11 state of war, the National Security Agency (NSA) was able to create a surveillance system that could secretly monitor the private communications of almost every American in the name of fighting foreign terrorists. The technology used is state of the art; the impulse, it turns out, is nothing new. For well over a century, what might be called “surveillance blowback” from America’s wars has ensured the creation of an ever more massive and omnipresent internal security and surveillance apparatus.  Its future (though not ours) looks bright indeed.

In 1898, Washington occupied the Philippines and in the years that followed pacified its rebellious people, in part by fashioning the world’s first full-scale “surveillance state” in a colonial land.  The illiberal lessons learned there then migrated homeward, providing the basis for constructing America’s earliest internal security and surveillance apparatus during World War I.  A half-century later, as protests mounted during the Vietnam War, the FBI, building on the foundations of that old security structure, launched large-scale illegal counterintelligence operations to harass antiwar activists, while President Richard Nixon’s White House created its own surveillance apparatus to target its domestic enemies.

In the aftermath of those wars, however, reformers pushed back against secret surveillance.  Republican privacy advocates abolished much of President Woodrow Wilson’s security apparatus during the 1920s, and Democratic liberals in Congress created the FISA courts in the 1970s in an attempt to prevent any recurrence of President Nixon’s illegal domestic wiretapping.

Today, as Washington withdraws troops from the Greater Middle East, a sophisticated intelligence apparatus built for the pacification of Afghanistan and Iraq has come home to help create a twenty-first century surveillance state of unprecedented scope. But the past pattern that once checked the rise of a U.S. surveillance state seems to be breaking down.  Despite talk about ending the war on terror one day, President Obama has left the historic pattern of partisan reforms far behind. In what has become a permanent state of “wartime” at home, the Obama administration is building upon the surveillance systems created in the Bush years to maintain U.S. global dominion in peace or war through a strategic, ever-widening edge in information control.  The White House shows no sign -- nor does Congress -- of cutting back on construction of a powerful, global Panopticon that can surveil domestic dissidents, track terrorists, manipulate allied nations, monitor rival powers, counter hostile cyber strikes, launch preemptive cyberattacks, and protect domestic communications.

Writing for TomDispatch four years ago during Obama’s first months in office, I suggested that the War on Terror has “proven remarkably effective in building a technological template that could be just a few tweaks away from creating a domestic surveillance state -- with omnipresent cameras, deep data-mining, nano-second biometric identification, and drone aircraft patrolling ‘the homeland.’"

That prediction has become our present reality -- and with stunning speed. Americans now live under the Argus-eyed gaze of a digital surveillance state, while increasing numbers of surveillance drones fill American skies.  In addition, the NSA’s net now reaches far beyond our borders, sweeping up the personal messages of many millions of people worldwide and penetrating the confidential official communications of at least 30 allied nations. The past has indeed proven prologue. The future is now.

The Coming of the Information Revolution

The origins of this emerging global surveillance state date back over a century to “America’s first information revolution” for the management of textual, statistical, and analytical data -- a set of innovations whose synergy created the technological capacity for mass surveillance.

Here’s a little litany of “progress” to ponder while on the road to today’s every-email-all-the-time version of surveillance.

Within just a few years, the union of Thomas A. Edison’s quadruplex telegraph with Philo Remington’s commercial typewriter, both inventions of 1874, allowed for the accurate transmission of textual data at the unequalled speed of 40 words per minute across America and around the world.

In the mid-1870s as well, librarian Melvil Dewey developed the “Dewey decimal system” to catalog the Amherst College Library, thereby inventing the “smart number” for the reliable encoding and rapid retrieval of limitless information.

The year after engineer Herman Hollerith patented the punch card (1889), the U.S. Census Bureau adopted his Electrical Tabulating machine to count 62,622,250 Americans within weeks -- a triumph that later led to the founding of International Business Machines, better known by its acronym IBM.
By 1900, all American cities were wired via the Gamewell Corporation’s innovative telegraphic communications, with over 900 municipal police and fire systems sending 41 million messages in a single year.

A Colonial Laboratory for the Surveillance State

On the eve of empire in 1898, however, the U.S. government was still what scholar Stephen Skowronek has termed a “patchwork” state with a near-zero capacity for domestic security.  That, of course, left ample room for the surveillance version of modernization, and it came with surprising speed after Washington conquered and colonized the Philippines.

Facing a decade of determined Filipino resistance, the U.S. Army applied all those American information innovations -- rapid telegraphy, photographic files, alpha-numeric coding, and Gamewell police communications -- to the creation of a formidable, three-tier colonial security apparatus including the Manila Police, the Philippines Constabulary, and above all the Army’s Division of Military Information.

In early 1901, Captain Ralph Van Deman, later dubbed “the father of U.S. Military Intelligence,” assumed command of this still embryonic division, the Army’s first field intelligence unit in its 100-year history. With a voracious appetite for raw data, Van Deman’s division compiled phenomenally detailed information on thousands of Filipino leaders, including their physical appearance, personal finances, landed property, political loyalties, and kinship networks.

Starting in 1901, the first U.S. governor-general (and future president) William Howard Taft drafted draconian sedition legislation for the islands and established a 5,000-man strong Philippines Constabulary.  In the process, he created a colonial surveillance state that ruled, in part, thanks to the agile control of information, releasing damning data about enemies while suppressing scandals about allies.

When the Associated Press’s Manila bureau chief reported critically on these policies, Taft’s allies dug up dirt on this would-be critic and dished it out to the New York press.  On the other hand, the Division of Military Information compiled a scandalous report about the rising Filipino politician Manuel Quezon, alleging a premarital abortion by his future first lady.  Quezon, however, served the Constabulary as a spy, so this document remained buried in U.S. files, assuring his unchecked ascent to become the first president of the Philippines in 1935.

American Blueprint

During the U.S. conquest of the Philippines, Mark Twain wrote an imagined history of twentieth-century America.  In it, he predicted that a “lust for conquest” had already destroyed “the Great [American] Republic,” because  “trampling upon the helpless abroad had taught her, by a natural process, to endure with apathy the like at home.” Indeed, just a decade after Twain wrote those prophetic words, colonial police methods came home to serve as a template for the creation of an American internal security apparatus in wartime.

After the U.S. entered World War I in 1917 without an intelligence service of any sort, Colonel Van Deman brought his Philippine experience to bear, creating the U.S. Army’s Military Intelligence Division (MID) and so laying the institutional foundations for a future internal security state.

In collaboration with the FBI, he also expanded the MID’s reach through a civilian auxiliary organization, the American Protective League, whose 350,000 citizen-operatives amassed more than a million pages of surveillance reports on German-Americans in just 14 months, arguably the world’s most intensive feat of domestic surveillance ever.

After the Armistice in 1918, Military Intelligence joined the FBI in two years of violent repression of the American left marked by the notorious Luster raids in New York City, J. Edgar Hoover’s “Palmer Raids” in cities across the northeast and the suppression of union strikes from New York City to Seattle.

When President Wilson left office in 1921, incoming Republican privacy advocates condemned his internal security regime as intrusive and abusive, forcing the Army and the FBI to cut their ties to patriotic vigilantes. In 1924, Attorney General Harlan Fiske Stone, worrying that “a secret police may become a menace to free government,” announced “the Bureau of Investigation is not concerned with political or other opinions of individuals.” Epitomizing the nation’s retreat from surveillance, Secretary of War Henry Stimson closed the Military Intelligence cipher section in 1929, saying famously, "Gentlemen do not read each other's mail."

After retiring at the rank of major general that same year, Van Deman and his wife continued from their home in San Diego to coordinate an informal intelligence exchange system, compiling files on 250,000 suspected “subversives.”  They also took reports from classified government files and slipped them to citizen anti-communist groups for blacklisting. In the 1950 elections, for instance, Representative Richard Nixon reportedly used Van Deman’s files to circulate “pink sheets” at rallies denouncing California Congresswoman Helen Gahagan Douglas, his opponent in a campaign for a Senate seat, launching a victorious Nixon on the path to the presidency.

From retirement, Van Deman, in league with FBI Director J. Edgar Hoover, also proved crucial at a 1940 closed-door conference that awarded the FBI control over domestic counterintelligence.  The Army’s Military Intelligence, and its successors, the CIA and NSA, were restricted to foreign espionage, a division of tasks that would hold, at least in principle, until the post-9/11 years. So armed, during World War II the FBI used warrantless wiretaps, “black bag” break-ins, and surreptitious mail opening to track suspects, while mobilizing more than 300,000 informers to secure defense plants against wartime threats that ultimately proved “negligible.”

The Vietnam Years

In response to the civil rights and anti-Vietnam protests of the 1960s, the FBI deployed its COINTELPRO operation, using what Senator Frank Church’s famous investigative committee later called "unsavory and vicious tactics... including anonymous attempts to break up marriages, disrupt meetings, ostracize persons from their professions, and provoke target groups into rivalries that might result in deaths."

In assessing COINTELPRO’s 2,370 actions from 1960 to 1974, the Church Committee branded them a "sophisticated vigilante operation" that "would be intolerable in a democratic society even if all of the targets had been involved in violent activity." Significantly, even this aggressive Senate investigation did not probe Director Hoover’s notorious “private files” on the peccadilloes of leading politicians that had insulated his Bureau from any oversight for more than 30 years.

After New York Times reporter Seymour Hersh exposed illegal CIA surveillance of American antiwar activists in 1974, Senator Church’s committee and a presidential commission under Nelson Rockefeller investigated the Agency’s “Operation Chaos,” a program to conduct massive illegal surveillance of the antiwar protest movement, discovering a database with 300,000 names.  These investigations also exposed the excesses of the FBI’s COINTELPRO, forcing the Bureau to reform.

To prevent future abuses, President Jimmy Carter signed the Foreign Intelligence Surveillance Act (FISA) in 1978, creating a special court to approve all national security wiretaps.  In a bitter irony, Carter’s supposed reform ended up plunging the judiciary into the secret world of the surveillance managers where, after 9/11, it became a rubberstamp institution for every kind of state intrusion on domestic privacy.

How the Global War on Terror Came Home

As its pacification wars in Afghanistan and Iraq sank into bloody quagmires, Washington brought electronic surveillance, biometric identification, and unmanned aerial vehicles to the battlefields.  This trio, which failed to decisively turn the tide in those lands, nonetheless now undergirds a global U.S. surveillance apparatus of unequalled scope and unprecedented power.

After confining the populations of Baghdad and the rebellious Sunni city of Falluja behind blast-wall cordons, the U.S. Army attempted to bring the Iraqi resistance under control in part by collecting, as of 2011, three million Iraqi fingerprints,iris, and retinal scans.  These were deposited in a biometric database in West Virginia that American soldiers at checkpoints and elsewhere on distant battlefields could at any moment access by satellite link.

Simultaneously, the Joint Special Operations Command under General Stanley McChrystal centralized all electronic and satellite surveillance in the Greater Middle East to identify possible al-Qaeda operatives for assassination by Predator drones or hunter-killer raids by Special Operations commandos from Somalia to Pakistan.

Domestically, post-9/11, the White House tried to create a modern version of the old state-citizen alliance for domestic surveillance. In May 2002, President Bush’s Justice Department launched Operation TIPS with "millions of American truckers, letter carriers, train conductors, ship captains, utility employees, and others" spying on fellow citizens. But there was vocal opposition from members of Congress, civil libertarians, and the media, which soon forced Justice to quietly kill the program.

In a digital iteration of the same effort, retired admiral John Poindexter began to set up an ominously titled Pentagon program called Total Information Awareness to amass a "detailed electronic dossier on millions of Americans." Again the nation recoiled, Congress banned the program, and the admiral was forced to resign.

Defeated in the public arena, the Bush administration retreated into the shadows, where it launched secret FBI and NSA domestic surveillance programs. Here, Congress proved far more amenable and pliable.  In 2002, Congress erased the bright line that had long barred the CIA from domestic spying, granting the agency the power to access U.S. financial records and audit electronic communications routed through the country.

Defying the FISA law, in October 2001 President Bush ordered the NSA to commence covert monitoring of private communications through the nation's telephone companies without the requisite warrants. According to the Associated Press, he also “secretly authorized the NSA to plug into the fiber optic cables that enter and leave the United States” carrying the world’s “emails, telephone calls, video chats, websites, bank transactions, and more.” Since his administration had already conveniently decided that “metadata was not constitutionally protected,” the NSA began an open-ended program, Operation Stellar Wind, “to collect bulk telephony and Internet metadata.”

By 2004, the Bush White House was so wedded to Internet metadata collection that top aides barged into Attorney General John Ashcroft’s hospital room to extract a reauthorization signature for the program.  They were blocked by Justice Department officials led by Deputy Attorney General James Comey, forcing a two-month suspension until that FISA court, brought into existence in the Carter years, put its first rubber-stamp on this mass surveillance regime.

Armed with expansive FISA court orders allowing the collection of data sets rather than information from specific targets, the FBI’s “Investigative Data Warehouse” acquired more than a billion documents within five years, including intelligence reports, social security files, drivers’ licenses, and private financial information.  All of this was accessible to 13,000 analysts making a million queries monthly. In 2006, as the flood of data surging through fiber optic cables strained NSA computers, the Bush administration launched the Intelligence Advanced Research Projects Activity to develop supercomputing searches powerful enough to process this torrent of Internet information.

In 2005, a New York Times investigative report exposed the administration’s illegal surveillance for the first time. A year later, USA Today reported that the NSA was “secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon, and Bell South.” One expert called it  "the largest database ever assembled in the world," adding presciently that the Agency's goal was "to create a database of every call ever made."

In August 2007, in response to these revelations, Congress capitulated.  It passed a new law, the Protect America Act, which retrospectively legalized this illegal White House-inspired set of programs by requiring greater oversight by the FISA court.  This secret tribunal -- acting almost as a “parallel Supreme Court” that rules on fundamental constitutional rights without adversarial proceedings or higher review -- has removed any real restraint on the National Security Agency’s bulk collection of Internet metadata and regularly rubberstamps almost 100% of the government’s thousands of surveillance requests. Armed with expanded powers, the National Security Agency promptly launched its PRISM program (recently revealed by Edward Snowden).  To feed its hungry search engines, the NSA has compelled nine Internet giants, including Microsoft, Yahoo, Google, Facebook, AOL, and Skype, to transfer what became billions of emails to its massive data farms.

Obama’s Expanding Surveillance Universe

Instead of curtailing his predecessor’s wartime surveillance, as Republicans did in the 1920s and Democrats in the 1970s, President Obama has overseen the expansion of the NSA’s wartime digital operations into a permanent weapon for the exercise of U.S. global power.

The Obama administration continued a Bush-era NSA program of “bulk email records collection” until 2011 when two senators protested that the agency’s “statements to both Congress and the Court... significantly exaggerated this program’s effectiveness.”  Eventually, the administration was forced to curtail this particular operation. Nonetheless, the NSA has continued to collect the personal communications of Americans by the billions under its PRISM and other programs.

In the Obama years as well, the NSA began cooperating with its long-time British counterpart, the Government Communications Headquarters (GCHQ), to tap into the dense cluster of Trans-Atlantic Telecommunication fiber optic cables that transit the United Kingdom. During a visit to a GCHQ facility for high-altitude intercepts at Menwith Hill in June 2008, NSA Director General Keith Alexander asked, “Why can’t we collect all the signals all the time? Sounds like a good summer project for Menwith.”

In the process, GCHQ’s Operation Tempora achieved the “biggest Internet access” of any partner in a “Five Eyes” signals-intercept coalition that, in addition to Great Britain and the U.S., includes Australia, Canada, and New Zealand. When the project went online in 2011, the GCHQ sank probes into 200 Internet cables and was soon collecting 600 million telephone messages daily, which were, in turn, made accessible to 850,000 NSA employees.

The historic alliance between the NSA and GCHQ dates back to the dawn of the Cold War.  In deference to it, the NSA has, since 2007, exempted its “2nd party” Five Eyes allies from surveillance under its “Boundless Informant” operation. According to another recently leaked NSA document, however, “we can, and often do, target the signals of most 3rd party foreign partners.”  This is clearly a reference to close allies like Germany, France, and Italy.

On a busy day in January 2013, for instance, the NSA collected 60 million phone calls and emails from Germany -- some 500 million German messages are reportedly collected annually -- with lesser but still hefty numbers from France, Italy, and non-European allies like Brazil. To gain operational intelligence on such allies, the NSA taps phones at the European Council headquarters in Brussels, bugs the European Union (EU) delegation at the U.N., has planted a “Dropmire” monitor “on the Cryptofax at the EU embassy DC,” and eavesdrops on 38 allied embassies worldwide.

Such secret intelligence about its allies gives Washington an immense diplomatic advantage, says NSA expert James Bamford. “It’s the equivalent of going to a poker game and wanting to know what everyone’s hand is before you place your bet.” And who knows what scurrilous bits of scandal about world leaders American surveillance systems might scoop up to strengthen Washington’s hand in that global poker game called diplomacy.

This sort of digital surveillance was soon supplemented by actual Internet warfare.  Between 2006 and 2010, Washington launched the planet’s first cyberwar, with Obama ordering devastating cyberattacks against Iran's nuclear facilities. In 2009, the Pentagon formed the U.S. Cyber Command (CYBERCOM), with a cybercombat center at Lackland Air Base initially staffed by 7,000 Air Force employees. Over the next two years, by appointing NSA chief Alexander as CYBERCOM’s concurrent commander, it created an enormous concentration of power in the digital shadows.  The Pentagon has also declared cyberspace an “operational domain” for both offensive and defensive warfare.

Controlling the Future

By leaking a handful of NSA documents, Edward Snowden has given us a glimpse of future U.S. global policy and the changing architecture of power on this planet. At the broadest level, this digital shift complements Obama’s new defense strategy, announced in 2012, of reducing costs (cutting, for example, infantry troops by 14%), while conserving Washington’s overall power by developing a capacity for “a combined arms campaign across all domains -- land, air, maritime, space, and cyberspace.”

While cutting conventional armaments, Obama is investing billions in constructing a new architecture for global information control. To store and process the billions of messages sucked up by its worldwide surveillance network (totaling 97 billion items for March alone), the NSA is employing 11,000 workers to build a $1.6 billion data center in Bluffdale, Utah, whose storage capacity is measured in “yottabytes,” each the equivalent of a trillion terabytes.  That’s almost unimaginable once you realize that just 15 terabytes could store every publication in the Library of Congress.

From its new $1.8 billion headquarters, the third-biggest building in the Washington area, the National Geospatial-Intelligence Agency deploys 16,000 employees and a $5 billion budget to coordinate a rising torrent of surveillance data from Predators, Reapers, U-2 spy planes, Global Hawks, X-37B space drones, Google Earth, Space Surveillance Telescopes, and orbiting satellites.

To protect those critical orbiting satellites, which transmit most U.S. military communications, the Pentagon is building an aerospace shield of pilotless drones. In the exosphere, the Air Force has since April 2010 been successfully testing the X-37B space drone that can carry missiles to strike rival satellite networks such as the one the Chinese are currently creating.

For more extensive and precise surveillance from space, the Pentagon has been replacing its costly, school-bus-sized spy satellites with a new generation of light, low cost models such as the ATK-A200. Successfully launched in May 2011, this module is orbiting 250 miles above the Earth with remote-controlled, U-2 quality cameras that now provide the “U.S. Central Command an assured ISR (Intelligence, Surveillance, and Reconnaissance) capability.”

In the stratosphere, close enough to Earth for audiovisual surveillance, the Pentagon is planning to launch an armada of 99 Global Hawk drones -- each equipped with high-resolution cameras to surveil all terrain within a 100-mile radius, electronic sensors to intercept communications, and efficient engines for continuous 24-hour flight.

Within a decade, the U.S. will likely deploy this aerospace shield, advanced cyberwarfare capabilities, and even vaster, more omnipresent digital surveillance networks that will envelop the Earth in an electronic grid capable of blinding entire armies on the battlefield, atomizing a single suspected terrorist, or monitoring millions of private lives at home and abroad.

Sadly, Mark Twain was right when he warned us just over 100 years ago that America could not have both empire abroad and democracy at home.  To paraphrase his prescient words, by “trampling upon the helpless abroad” with unchecked surveillance, Americans have learned, “by a natural process, to endure with apathy the like at home.”

Monday, July 8, 2013

10 Most Shocking Things the FBI Has Done Since 9/11


 

                    

10 Most Shocking Things the FBI Has Done Since 9/11

We can be both safe and free. But the FBI has undermined our civil liberties in deeply disturbing ways since 9/11.

 
 
A crest of the Federal Bureau of Investigation is seen inside the J. Edgar Hoover FBI Building in Washington, DC, on August 3, 2007.

 
 
 
As Congress considers the nomination of James B. Comey to lead the FBI for the next ten years, lawmakers should examine measures to rein in a bureau that has undermined civil liberties in the name of fighting terrorism. This is a false trade off: we can be both safe and free.

 

1. USA Patriot Act Abuse

 
The recent revelation about the FBI using the Patriot Act's "business records provision" to track all U.S. telephone calls is only the latest in a long line of abuse. Five Justice Department Inspector General audits documented widespread FBI misuse of Patriot Act authorities (1,2,3,4,5), and a federal district court recently struck down the National Security Letter (NSL) statute because of its unconstitutional gag orders. The IG also revealed the FBI's unlawful use of "exigent letters" that claimed false emergencies to get private information without NSLs, but in 2009 the Justice Department secretly re-interpreted the law to allow the FBI to get this information without emergencies or legal process. Congress and the American public need to know the full scope of the FBI's spying on Americans under the Patriot Act and all other surveillance authorities enacted since 9/11, like the FISA Amendments Act that underlies the PRISM program.

 

2. 2008 Amendments to the Attorney General's Guidelines

 
Attorney General Michael Mukasey re-wrote the FBI's rulebook in the final months of the Bush administration, giving FBI agents unfettered authority to investigate people without any factual basis for suspecting wrongdoing. The 2008 Attorney General's Guidelines created a new kind of intrusive investigation called an "assessment," which required no "factual predicate" before FBI agents could search through government or commercial databases, conduct overt or covert FBI interviews, and task informants to gather information about people or infiltrate lawful organizations. In a two-year period from 2009 to 2011, the FBI opened over 82,000 "assessments" of individuals or organizations, less than 3,500 of which discovered information justifying further investigation.
 

3. Racial and Ethnic Mapping

 
The 2008 Attorney General's Guidelines also authorized "domain management assessments" which allow the FBI to map American communities by race and ethnicity based on crass stereotypes about the crimes they are likely to commit. FBI documents obtained by the ACLU show the FBI mapped entire Chinese and Russian communities in San Francisco on the theory that they might commit organized crime, all Latino communities in New Jersey and Alabama because a street gang has Latino members, African Americans in Georgia to find "Black separatists," and Middle-Eastern communities in Detroit for terrorism investigations. The FBI's racial and ethnic mapping program is simply racial and religious profiling of entire communities.
 

4. Unrestrained Data Collection and Data Mining

 
The FBI has claimed the authority to secretly sweep up voluminous amounts of private information from data aggregators for data mining purposes. In 2007 the FBI said it amassed databases containing 1.5 billion records, which were predicted to grow to 6 billion records by 2012, or equal to "20 separate ‘records' for each man, woman and child in the United States." When Congress sought information about one of these programs, the FBI refused to give the Government Accountability Office access. That program was temporarily defunded, but its successor, the FBI Foreign Terrorist Tracking Task Force, currently has 360 staff members running 40 separate projects. Records show analysts are allowed to use data mining tools to establish "risk scores" for U.S. persons. A 2013 IG audit questioned the task force's effectiveness, concluding it "did not always provide FBI field offices with timely and relevant information."
 

5. Suppressing Internal Dissent: The FBI War on Whistleblowers

 
The FBI is exempt from the Whistleblower Protection Act. Though the law required it to establish internal mechanisms to protect whistleblowers, it has a long history of retaliating against them. As a result, a 2009 IG report found that 28 percent of non-supervisory FBI employees and 22 percent of FBI supervisors at the GS-14 and GS-15 levels "never" reported misconduct they have seen or heard about on the job. The FBI has also aggressively investigated whistleblowers from other agencies, leading to an unprecedented increase in Espionage Act prosecutions under the Obama administration, almost invariably targeting critics of government policies.
 

6. Targeting Journalists

 
The FBI's overzealous pursuit of government whistleblowers has resulted in the inappropriate targeting of journalists for investigation, potentially chilling press freedoms. Recently, the FBIobtained records from 21 telephone lines used by over 100 Associated Press journalists, including the AP's main number in the U.S. House of Representatives' press gallery. And an FBI search warrant affidavitclaimed Fox News reporter James Rosen aided, abetted, or co-conspired in criminal activity because of his news gathering activities, in an apparent attempt to circumvent legal restrictions designed to protect journalists. In 2010, the IG reported that the FBI unlawfully used an "exigent letter" to obtain the telephone records of seven New York Times and Washington Post reporters and researchers during a media leak investigation.

 

7. Thwarting Congressional Oversight

 
The FBI has thwarted congressional oversight by withholding information, limiting or delayingresponses to members' inquiries, or worse, by providing false or misleading information to Congress and the American public. Examples include false information regarding FBI investigations of domestic advocacy groups, misleading information about the FBI's awareness of detainee abuse, and deceptive responses to questions about government surveillance authorities.
 

8. Targeting First Amendment Activity

 
Several ACLU Freedom of Information Act requests have uncovered significant evidence that the FBI has used its expanded authorities to target individuals and organizations because of their participation in First Amendment-protected activities. A 2010 IG report confirmed the FBI conducted inappropriate investigations of domestic advocacy groups engaged in environmental and anti-war activism, and falsified public responses to hide this fact. Other FBI documents showed FBI exploitation ofcommunity outreach programs to secretly collect information about law-abiding citizens, including a mosque outreach program specifically targeting American Muslims. Many of these abuses are likely a result of flawed FBItraining materials and intelligence products that expressed anti-Muslim sentiments and falsely identified religious practices or other First Amendment activities as indicators of terrorism.
 

9. Proxy Detentions

 
The FBI increasingly operates outside the U.S., where its authorities are less clear and its activities much more difficult to monitor. Several troubling cases indicate that during the Bush administration the FBI requested, facilitated, and/or exploited the arrests and detention of U.S. citizens by foreign governments, often without charges, so they could be interrogated, sometimes tortured, then interviewed by FBI agents. The ACLU represents two victims of such activities. Amir Meshal was arrested at the Kenya border by a joint U.S., Kenyan, and Ethiopian task force in 2007, subjected to more than four months of detention, and transferred between three different East African countries without charge, access to counsel, or presentment before a judicial officer, all at the behest of the U.S. government. FBI agents interrogated Meshal more than thirty times during his detention. Similarly, Naji Hamdan, a Lebanese-American businessman, sat for interviews with the FBI several times before moving from Los Angeles to the United Arab Emirates in 2006. In 2008, he was arrested by U.A.E. security forces and held incommunicado for nearly three months, beaten, and tortured. At one point an American participated in his interrogation; Hamdan believed this person to be an FBI agent based on the interrogator's knowledge of previous FBI interviews. Another case in 2010, involving anAmerican teenager jailed in Kuwait, may indicate this activity has continued into the Obama administration.

 

10. Use of No Fly List to Pressure Americans Abroad to Become Informants

 
The number of U.S. persons on the No Fly List has more than doubled since 2009, and people mistakenly on the list are denied their due process rights to meaningfully challenge their inclusion. In many cases Americans only find out they are on the list while they are traveling abroad, which all but forces them to interact with the U.S. government from a position of extreme vulnerability, and often without easy access to counsel. Many of those prevented from flying home have been subjected to FBI interviews while they sought assistance from U.S. Embassies to return. In those interviews, FBI agents sometimes offer to take people off the No Fly List if they agree to become an FBI informant. In 2010 the ACLU and its affiliates filed a lawsuit on behalf of 10 American citizens and permanent residents, including several U.S. military veterans, seven of whom were prevented from returning home until the suit was filed. We argue that barring them from flying without due process was unconstitutional. There are now 13 plaintiffs; none have been charged with a crime, told why they are barred from flying, or given an opportunity to challenge their inclusion on the No Fly List.