View Single Post
Old 22-12-05, 09:59 PM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,017
Default

Surveillance

Britain Will Be First Country To Monitor Every Car Journey

From 2006 Britain will be the first country where every journey by every car will be monitored
Steve Connor

Britain is to become the first country in the world where the movements of all vehicles on the roads are recorded. A new national surveillance system will hold the records for at least two years.

Using a network of cameras that can automatically read every passing number plate, the plan is to build a huge database of vehicle movements so that the police and security services can analyse any journey a driver has made over several years.

The network will incorporate thousands of existing CCTV cameras which are being converted to read number plates automatically night and day to provide 24/7 coverage of all motorways and main roads, as well as towns, cities, ports and petrol- station forecourts.

By next March a central database installed alongside the Police National Computer in Hendon, north London, will store the details of 35 million number-plate "reads" per day. These will include time, date and precise location, with camera sites monitored by global positioning satellites.

Already there are plans to extend the database by increasing the storage period to five years and by linking thousands of additional cameras so that details of up to 100 million number plates can be fed each day into the central databank.

Senior police officers have described the surveillance network as possibly the biggest advance in the technology of crime detection and prevention since the introduction of DNA fingerprinting.

But others concerned about civil liberties will be worried that the movements of millions of law-abiding people will soon be routinely recorded and kept on a central computer database for years.

The new national data centre of vehicle movements will form the basis of a sophisticated surveillance tool that lies at the heart of an operation designed to drive criminals off the road.

In the process, the data centre will provide unrivalled opportunities to gather intelligence data on the movements and associations of organised gangs and terrorist suspects whenever they use cars, vans or motorcycles.

The scheme is being orchestrated by the Association of Chief Police Officers (Acpo) and has the full backing of ministers who have sanctioned the spending of £24m this year on equipment.

More than 50 local authorities have signed agreements to allow the police to convert thousands of existing traffic cameras so they can read number plates automatically. The data will then be transmitted to Hendon via a secure police communications network.

Chief constables are also on the verge of brokering agreements with the Highways Agency, supermarkets and petrol station owners to incorporate their own CCTV cameras into the network. In addition to cross- checking each number plate against stolen and suspect vehicles held on the Police National Computer, the national data centre will also check whether each vehicle is lawfully licensed, insured and has a valid MoT test certificate.

"Every time you make a car journey already, you'll be on CCTV somewhere. The difference is that, in future, the car's index plates will be read as well," said Frank Whiteley, Chief Constable of Hertfordshire and chairman of the Acpo steering committee on automatic number plate recognition (ANPR).

"What the data centre should be able to tell you is where a vehicle was in the past and where it is now, whether it was or wasn't at a particular location, and the routes taken to and from those crime scenes. Particularly important are associated vehicles," Mr Whiteley said.

The term "associated vehicles" means analysing convoys of cars, vans or trucks to see who is driving alongside a vehicle that is already known to be of interest to the police. Criminals, for instance, will drive somewhere in a lawful vehicle, steal a car and then drive back in convoy to commit further crimes "You're not necessarily interested in the stolen vehicle. You're interested in what's moving with the stolen vehicle," Mr Whiteley explained.

According to a strategy document drawn up by Acpo, the national data centre in Hendon will be at the heart of a surveillance operation that should deny criminals the use of the roads.

"The intention is to create a comprehensive ANPR camera and reader infrastructure across the country to stop displacement of crime from area to area and to allow a comprehensive picture of vehicle movements to be captured," the Acpo strategy says.

"This development forms the basis of a 24/7 vehicle movement database that will revolutionise arrest, intelligence and crime investigation opportunities on a national basis," it says.

Mr Whiteley said MI5 will also use the database. "Clearly there are values for this in counter-terrorism," he said.

"The security services will use it for purposes that I frankly don't have access to. It's part of public protection. If the security services did not have access to this, we'd be negligent."
http://news.independent.co.uk/uk/tra...icle334686.ece





Bush Acknowledges Approving Eavesdropping
AP

President Bush said Saturday he has no intention of stopping his personal authorizations of a post-Sept. 11 secret eavesdropping program in the U.S., lashing out at those involved in revealing it while defending it as crucial to preventing future attacks.

''This is a highly classified program that is crucial to our national security,'' he said in a radio address delivered live from the White House's Roosevelt Room.

''This authorization is a vital tool in our war against the terrorists. It is critical to saving American lives. The American people expect me to do everything in my power, under our laws and Constitution, to protect them and their civil liberties and that is exactly what I will continue to do as long as I am president of the United States,'' Bush said.

Angry members of Congress have demanded an explanation of the program, first revealed in Friday's New York Times and whether the monitoring by the National Security Agency without obtaining warrants from a court violates civil liberties. One Democrat said in response to Bush's remarks on the radio that Bush was acting more like a king than the elected president of a democracy.

Bush said the program was narrowly designed and used ''consistent with U.S. law and the Constitution.'' He said it is used only to intercept the international communications of people inside the United States who have been determined to have ''a clear link'' to al-Qaida or related terrorist organizations.

The program is reviewed every 45 days, using fresh threat assessments, legal reviews by the Justice Department, White House counsel and others, and information from previous activities under the program, the president said.

Without identifying specific lawmakers, Bush said congressional leaders have been briefed more than a dozen times on the program's activities.

The president also said the intelligence officials involved in the monitoring receive extensive training to make sure civil liberties are not violated.

Appearing angry at points during his eight-minute address, Bush said he had reauthorized the program more than 30 times since the terrorist attacks of Sept. 11, 2001, and plans to continue doing so.

''I intend to do so for as long as our nation faces a continuing threat from al-Qaida and related groups,'' he said.

The president contended the program has helped ''detect and prevent possible terrorist attacks in the U.S. and abroad,'' but did not provide specific examples.

He said it is designed in part to fix problems raised by the Sept. 11 commission, which found that two of the suicide hijackers were communicating from San Diego with al- Qaida operatives overseas.

''The activities I have authorized make it more likely that killers like these 9-11 hijackers will be identified and located in time,'' he said.

In an effort by the administration that appeared coordinated to stem criticism, Bush's remarks echoed -- in many cases word-for-word -- those issued Friday night by a senior intelligence official who spoke on condition of anonymity. The president's highly unusual discussion of classified activities showed the sensitive nature of the program, whose existence was revealed as Congress was trying to renew the terrorism-fighting Patriot Act and complicated that effort, a top priority of Bush's.

Senate Democrats joined with a handful of Republicans on Friday to stall the bill. Those opposing the renewal of key provisions of the act that are expiring say they threaten constitutional liberties.

Reacting to Bush's defense of the NSA program, Sen. Russell Feingold, D-Wis., said the president's remarks were ''breathtaking in how extreme they were.''

Feingold said it was ''absurd'' that Bush said he relied on his inherent power as president to authorize the wiretaps.

''If that's true, he doesn't need the Patriot Act because he can just make it up as he goes along. I tell you, he's President George Bush, not King George Bush. This is not the system of government we have and that we fought for,'' Feingold told The Associated Press in a telephone interview.

The president had harsh words for those who talked about the program to the media, saying their actions were illegal and improper.

''As a result, our enemies have learned information they should not have,'' he said. ''The unauthorized disclosure of this effort damages our national security and puts our citizens at risk.''
http://www.nytimes.com/aponline/poli...n er=homepage





Is The Pentagon Spying On Americans?

Secret database obtained by NBC News tracks ‘suspicious’ domestic groups
Lisa Myers, Douglas Pasternak, Rich Gardella and the NBC Investigative Unit

A year ago, at a Quaker Meeting House in Lake Worth, Fla., a small group of activists met to plan a protest of military recruiting at local high schools. What they didn't know was that their meeting had come to the attention of the U.S. military.

A secret 400-page Defense Department document obtained by NBC News lists the Lake Worth meeting as a “threat” and one of more than 1,500 “suspicious incidents” across the country over a recent 10-month period.

“This peaceful, educationally oriented group being a threat is incredible,” says Evy Grachow, a member of the Florida group called The Truth Project.

“This is incredible,” adds group member Rich Hersh. “It's an example of paranoia by our government,” he says. “We're not doing anything illegal.”

The Defense Department document is the first inside look at how the U.S. military has stepped up intelligence collection inside this country since 9/ 11, which now includes the monitoring of peaceful anti-war and counter-military recruitment groups.

“I think Americans should be concerned that the military, in fact, has reached too far,” says NBC News military analyst Bill Arkin.

The Department of Defense declined repeated requests by NBC News for an interview. A spokesman said that all domestic intelligence information is “properly collected” and involves “protection of Defense Department installations, interests and personnel.” The military has always had a legitimate “force protection” mission inside the U.S. to protect its personnel and facilities from potential violence. But the Pentagon now collects domestic intelligence that goes beyond legitimate concerns about terrorism or protecting U.S. military installations, say critics.

Four dozen anti-war meetings
The DOD database obtained by NBC News includes nearly four dozen anti-war meetings or protests, including some that have taken place far from any military installation, post or recruitment center. One “incident” included in the database is a large anti-war protest at Hollywood and Vine in Los Angeles last March that included effigies of President Bush and anti-war protest banners. Another incident mentions a planned protest against military recruiters last December in Boston and a planned protest last April at McDonald’s National Salute to America’s Heroes — a military air and sea show in Fort Lauderdale, Fla.

The Fort Lauderdale protest was deemed not to be a credible threat and a column in the database concludes: “US group exercising constitutional rights.” Two-hundred and forty-three other incidents in the database were discounted because they had no connection to the Department of Defense — yet they all remained in the database.

The DOD has strict guidelines (.PDF link), adopted in December 1982, that limit the extent to which they can collect and retain information on U.S. citizens.

Still, the DOD database includes at least 20 references to U.S. citizens or U.S. persons. Other documents obtained by NBC News show that the Defense Department is clearly increasing its domestic monitoring activities. One DOD briefing document stamped “secret” concludes: “[W]e have noted increased communication and encouragement between protest groups using the [i]nternet,” but no “significant connection” between incidents, such as “reoccurring instigators at protests” or “vehicle descriptions.”

The increased monitoring disturbs some military observers.

“It means that they’re actually collecting information about who’s at those protests, the descriptions of vehicles at those protests,” says Arkin. “On the domestic level, this is unprecedented,” he says. “I think it's the beginning of enormous problems and enormous mischief for the military.”

Some former senior DOD intelligence officials share his concern. George Lotz, a 30-year career DOD official and former U.S. Air Force colonel, held the post of Assistant to the Secretary of Defense for Intelligence Oversight from 1998 until his retirement last May. Lotz, who recently began a consulting business to help train and educate intelligence agencies and improve oversight of their collection process, believes some of the information the DOD has been collecting is not justified.

Make sure they are not just going crazy
“Somebody needs to be monitoring to make sure they are just not going crazy and reporting things on U.S. citizens without any kind of reasoning or rationale,” says Lotz. “I demonstrated with Martin Luther King in 1963 in Washington,” he says, “and I certainly didn’t want anybody putting my name on any kind of list. I wasn’t any threat to the government,” he adds.

The military’s penchant for collecting domestic intelligence is disturbing — but familiar — to Christopher Pyle, a former Army intelligence officer.

“Some people never learn,” he says. During the Vietnam War, Pyle blew the whistle on the Defense Department for monitoring and infiltrating anti- war and civil rights protests when he published an article in the Washington Monthly in January 1970.

The public was outraged and a lengthy congressional investigation followed that revealed that the military had conducted investigations on at least 100,000 American citizens. Pyle got more than 100 military agents to testify that they had been ordered to spy on U.S. citizens — many of them anti-war protestors and civil rights advocates. In the wake of the investigations, Pyle helped Congress write a law placing new limits on military spying inside the U.S.

But Pyle, now a professor at Mt. Holyoke College in Massachusetts, says some of the information in the database suggests the military may be dangerously close to repeating its past mistakes.

“The documents tell me that military intelligence is back conducting investigations and maintaining records on civilian political activity. The military made promises that it would not do this again,” he says.

Too much data?
Some Pentagon observers worry that in the effort to thwart the next 9/11, the U.S. military is now collecting too much data, both undermining its own analysis efforts by forcing analysts to wade through a mountain of rubble in order to obtain potentially key nuggets of intelligence and entangling U.S. citizens in the U.S. military’s expanding and quiet collection of domestic threat data.

Two years ago, the Defense Department directed a little known agency, Counterintelligence Field Activity, or CIFA, to establish and “maintain a domestic law enforcement database that includes information related to potential terrorist threats directed against the Department of Defense.” Then-Deputy Secretary of Defense Paul Wolfowitz also established a new reporting mechanism known as a TALON or Threat and Local Observation Notice report. TALONs now provide “non-validated domestic threat information” from military units throughout the United States that are collected and retained in a CIFA database. The reports include details on potential surveillance of military bases, stolen vehicles, bomb threats and planned anti-war protests. In the program’s first year, the agency received more than 5,000 TALON reports. The database obtained by NBC News is generated by Counterintelligence Field Activity.

CIFA is becoming the superpower of data mining within the U.S. national security community. Its “operational and analytical records” include “reports of investigation, collection reports, statements of individuals, affidavits, correspondence, and other documentation pertaining to investigative or analytical efforts” by the DOD and other U.S. government agencies to identify terrorist and other threats. Since March 2004, CIFA has awarded at least $33 million in contracts to corporate giants Lockheed Martin, Unisys Corporation, Computer Sciences Corporation and Northrop Grumman to develop databases that comb through classified and unclassified government data, commercial information and Internet chatter to help sniff out terrorists, saboteurs and spies.

One of the CIFA-funded database projects being developed by Northrop Grumman and dubbed “Person Search,” is designed “to provide comprehensive information about people of interest.” It will include the ability to search government as well as commercial databases. Another project, “The Insider Threat Initiative,” intends to “develop systems able to detect, mitigate and investigate insider threats,” as well as the ability to “identify and document normal and abnormal activities and ‘behaviors,’” according to the Computer Sciences Corp. contract. A separate CIFA contract with a small Virginia-based defense contractor seeks to develop methods “to track and monitor activities of suspect individuals.”

“The military has the right to protect its installations, and to protect its recruiting services,” says Pyle. “It does not have the right to maintain extensive files on lawful protests of their recruiting activities, or of their base activities,” he argues.

Lotz agrees.

“The harm in my view is that these people ought to be allowed to demonstrate, to hold a banner, to peacefully assemble whether they agree or disagree with the government’s policies,” the former DOD intelligence official says.

'Slippery slope'
Bert Tussing, director of Homeland Defense and Security Issues at the U.S. Army War College and a former Marine, says “there is very little that could justify the collection of domestic intelligence by the Unites States military. If we start going down this slippery slope it would be too easy to go back to a place we never want to see again,” he says.

Some of the targets of the U.S. military’s recent collection efforts say they have already gone too far.

“It's absolute paranoia — at the highest levels of our government,” says Hersh of The Truth Project.

“I mean, we're based here at the Quaker Meeting House,” says Truth Project member Marie Zwicker, “and several of us are Quakers.”

The Defense Department refused to comment on how it obtained information on the Lake Worth meeting or why it considers a dozen or so anti-war activists a “threat.”
http://msnbc.msn.com/id/10454316





Administration Cites War Vote in Spying Case
Eric Lichtblau and David E. Sanger

President Bush and two of his most senior aides argued Monday that the highly classified program to spy on suspected members of terrorist groups in the United States grew out of the president's constitutional authority and a 2001 Congressional resolution that authorized him to use all necessary force against those responsible for the Sept. 11 attacks.

Offering their most forceful and detailed defense of the program in a series of briefings, television interviews and a hastily called presidential news conference, administration officials argued that the existing Foreign Intelligence Surveillance Act was not written for an age of modern terrorism. In these times, Mr. Bush said, a "two-minute phone conversation between somebody linked to Al Qaeda here and an operative overseas could lead directly to the loss of thousands of lives."

Mr. Bush strongly hinted that the government was beginning a leak investigation into how the existence of the program was disclosed. It was first revealed in an article published on The New York Times Web site on Thursday night, though some information that administration officials argued could be useful to terrorists had been omitted.

"We're at war, and we must protect America's secrets," Mr. Bush said. "And so the Justice Department, I presume, will proceed forward with a full investigation."

He also lashed out again, as he did Saturday, at Democrats and Republicans in the Senate who have blocked the reauthorization of the broad antiterrorism law known as the USA Patriot Act, saying they voted for it after the Sept. 11 attacks "but now think it's no longer necessary."

Several of the senators responded that Mr. Bush would not accept amendments to the act that they say are necessary to protect civil liberties and that he would not accept a short-term renewal of the existing law while negotiations continue.

In the first of a series of appearances Monday to defend the intelligence operations, Attorney General Alberto R. Gonzales told reporters that "this electronic surveillance is within the law, has been authorized" by Congress. "That is our position," he added.

Officials with knowledge of the program have said the Justice Department did two sets of classified legal reviews of the program and its legal rationale. Mr. Gonzales declined to release those opinions Monday.

Two of the key Democrats who had been briefed on the program said Monday that they had been told so little that there was no effective Congressional oversight for it.

In a highly unusual move, Senator John D. Rockefeller IV of West Virginia released a letter he sent to Vice President Dick Cheney on July 17, 2003, complaining that "given the security restrictions associated with this information, and my inability to consult staff or counsel on my own, I feel unable to fully evaluate, much less endorse these activities." The letter was handwritten because secrecy rules prevented him from giving it to anyone to type.

On Monday Mr. Rockefeller said that after he sent his letter to Mr. Cheney, "these concerns were never addressed, and I was prohibited from sharing my views with my colleagues."

Senator Arlen Specter, the Pennsylvania Republican who is chairman of the Judiciary Committee, said, "I am skeptical of the attorney general's citation of authority, but I am prepared to listen."

Mr. Specter, who has said he will hold hearings on the program soon after the confirmation hearings for the Supreme Court nominee, Judge Samuel A. Alito Jr., said he did not believe the president's decision to inform a handful of members of Congress was sufficient.

"I think it does not constitute a check and balance," he said. "You can't have the administration and a select number of members alter the law. It can't be done."

Mr. Specter also predicted that the domestic spying debate would spill over into Judge Alito's confirmation. On Monday, he sent the judge a letter saying he intended to ask "what jurisprudential approach" the judge would use in determining if the president had authority to establish the program.

"The fat's in the fire," Mr. Specter said. "This is going to be a big, big issue. There's a lot of indignation across the country, from what I see."

Mr. Bush, Mr. Gonzales and Lt. Gen. Gen. Michael V. Hayden, the nation's second-ranking intelligence official and a former director of the National Security Agency, which conducted the surveillance, stepped around questions about why officials decided not to use emergency powers they have under the existing foreign surveillance law. The law allows them to tap international communications of people in the United States and then go to a secret court up to 72 hours later for retroactive permission.

"The whole key here is agility," General Hayden said, adding that the aim "is to detect and prevent."

Administration officials, speaking anonymously because of the sensitivity of the information, suggested that the speed with which the operation identified "hot numbers" - the telephone numbers of suspects - and then hooked into their conversations lay behind the need to operate outside the old law.

Soon after Mr. Bush spoke, three senior Democrats influential on national security matters - Senators Carl Levin of Michigan, Jack Reed of Rhode Island and Russell Feingold of Wisconsin - assailed the president for bypassing the court that Congress set up a quarter-century ago to make sure intelligence agencies do not infringe on the privacy of Americans.

"He can go to the court retroactively," Mr. Levin, the ranking Democrat on the Armed Services Committee, told reporters, referring to the 72-hour rule.

Mr. Bush - who initially resisted a public investigation into the Sept. 11 attacks and the intelligence failures in Iraq - used his news conference Monday to discourage Congress from publicly delving into the program, saying that "public hearings on programs will say to the enemy, 'Here's what they do, adjust.' " He repeatedly cited the case of Osama bin Laden, who was widely reported to have stopped using a satellite telephone after news reports that intelligence agencies were listening in.

The White House briefing itself was unusual, with two of the administration's most senior officials discussing legal and operational details of what Mr. Gonzales described as "probably the most classified program that exists in the United States government."

Mr. Gonzales said the president had "the inherent authority under the Constitution" as commander in chief to authorize the program. He also argued that the legal rationale followed the logic in a Supreme Court decision last year in the case of an enemy combatant named Yaser Esam Hamdi, an American citizen who was detained in Afghanistan on the battlefield.

In addition, Mr. Gonzales said the administration believed that Congress gave the president clear and broad authorization to attack Al Qaeda in a resolution passed on Sept. 14, 2001, that set the stage for the invasion of Afghanistan. That resolution authorized the president "to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on Sept. 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons."

Many members of Congress say that in authorizing the military invasion of Afghanistan days after the Sept. 11 attacks, they never intended or envisioned that the authority could be applied to searches without warrants within the United States.

Mr. Gonzales and General Hayden were careful to emphasize that the surveillance program was "limited" in scope.

"People are running around saying that the United States is somehow spying on American citizens calling their neighbors," Mr. Gonzales said. In fact, he said, it was "very, very important to understand" that the program is limited to calls and communications between the United States and foreign countries.

"What we're trying to do is learn of communications, back and forth, from within the United States to overseas members of Al Qaeda," he said. "And that's what this program is about."

He added: "This is not about wiretapping everybody. This is about a very concentrated, very limited program focused on gaining information about our enemy."

As the administration has argued since the disclosure of the program Thursday night, Mr. Gonzales and General Hayden said the normal system for issuing warrants for a domestic surveillance operation - required in 1978 in a program that grew out of the improper surveillance of political dissidents - was inadequate in some cases.

Regarding a possible leak investigation, which would be handled by the Justice Department, Mr. Gonzales said: "This is really hurting national security, this has really hurt our country, and we are concerned that a very valuable tool has been compromised. As to whether or not there will be a leak investigation, we'll just have to wait and see."

When questions at the news conference turned to Iraq, Mr. Bush urged reporters to look at rationales he offered for invading the country that went beyond its suspected caches of weapons of mass destruction, including his vision of creating democratic havens in the Middle East. But he acknowledged that the failure to find weapons in Iraq made it difficult to make the case "in the public arena" that countries like Iran are pursuing nuclear weapons, as Mr. Bush has charged.

He said, "People will say, if we're trying to make the case on Iran, well, the intelligence failed in Iraq, therefore how can we trust the intelligence in Iran?" Later, he added, "It's no question that the credibility of intelligence is necessary for good diplomacy."

Eric Schmitt and Sheryl Gay Stolberg contributed reporting for this article.
http://www.nytimes.com/2005/12/20/po... ner=homepage





Behind Power, One Principle as Bush Pushes Prerogatives
Scott Shane

A single, fiercely debated legal principle lies behind nearly every major initiative in the Bush administration's war on terror, scholars say: the sweeping assertion of the powers of the presidency.

From the government's detention of Americans as "enemy combatants" to the just-disclosed eavesdropping in the United States without court warrants, the administration has relied on an unusually expansive interpretation of the president's authority. That stance has given the administration leeway for decisive action, but it has come under severe criticism from some scholars and the courts.

With the strong support of Vice President Dick Cheney, legal theorists in the White House and Justice Department have argued that previous presidents unjustifiably gave up some of the legitimate power of their office. The attacks of Sept. 11, 2001, made it especially critical that the full power of the executive be restored and exercised, they said.

The administration's legal experts, including David S. Addington, the vice president's former counsel and now his chief of staff, and John C. Yoo, deputy assistant attorney general in the Office of Legal Counsel of the Justice Department from 2001 to 2003, have pointed to several sources of presidential authority.

The bedrock source is Article 2 of the Constitution, which describes the "executive power" of the president, including his authority as commander in chief of the armed forces. Several landmark court decisions have elaborated the extent of the powers.

Another key recent document cited by the administration is the joint resolution passed by Congress on Sept. 14, 2001, authorizing the president to "use all necessary and appropriate force" against those responsible for Sept. 11 in order to prevent further attacks.

Mr. Yoo, who is believed to have helped write a legal justification for the National Security Agency's secret domestic eavesdropping, first laid out the basis for the war on terror in a Sept. 25, 2001, memorandum that said no statute passed by Congress "can place any limits on the president's determinations as to any terrorist threat, the amount of military force to be used in response, or the method, timing and nature of the response."

That became the underlying justification for numerous actions apart from the eavesdropping program, disclosed by The New York Times on Thursday night. Those include the order to try accused terrorists before military tribunals; the detention of so-called enemy combatants at Guantánamo Bay, Cuba, and in secret overseas jails operated by the Central Intelligence Agency; the holding of two Americans, Jose Padilla and Yaser Esam Hamdi, as enemy combatants; and the use of severe interrogation techniques, including some banned by international agreements, on Al Qaeda figures.

Mr. Yoo, now a law professor at the University of California, Berkeley, declined to comment for this article. But Bradford A. Berenson, who served as associate counsel to President Bush from 2001 to 2003, explained the logic behind the assertion of executive power.

"After 9/11 the president felt it was incumbent on him to use every ounce of authority available to him to protect the American people," Mr. Berenson said.

He said he was not familiar with the N.S.A. program, in which the intelligence agency, without warrants, has monitored international telephone calls and international e-mail messages of people inside the United States. He said that he could not comment on whether the program was justified, but that he believed intelligence gathering on an enemy was clearly part of the president's constitutional war powers.

"Any program like this would have been very carefully analyzed by administration lawyers," Mr. Berenson said. "It's easy, now that four years have passed without another attack, to forget the sense of urgency that pervaded the country when the ruins of the World Trade Center were still smoking."

But some legal experts outside the administration, including some who served previously in the intelligence agencies, said the administration had pushed the presidential- powers argument beyond what was legally justified or prudent. They say the N.S.A. domestic eavesdropping illustrates the flaws in Mr. Bush's assertion of his powers.

"Obviously we have to do things differently because of the terrorist threat," said Elizabeth Rindskopf Parker, former general counsel of both N.S.A. and the Central Intelligence Agency, who served under both Republican and Democratic administrations. "But to do it without the participation of the Congress and the courts is unwise in the extreme."

Even if the administration believes the president has the authority to direct warrantless eavesdropping, she said, ordering it without seeking Congressional approval was politically wrongheaded. "We're just relearning the lessons of Vietnam and Watergate," said Ms. Parker, now dean of the University of the Pacific McGeorge School of Law.

Jeffrey H. Smith, who served as C.I.A. general counsel in 1995 and 1996, said he was dismayed by the N.S.A. program, which he said was the latest instance of legal overreach by the administration.

"Clearly the president felt after 9/11 that he needed more powers than his predecessors had exercised," Mr. Smith said. "He chose to assert as much power as he thought he needed. Now the question is whether that was wise and consistent with our values."

William C. Banks, a widely respected authority on national security law at Syracuse University, said the N.S.A. revelation came as a shock, even given the administration's past assertions of presidential powers.

"I was frankly astonished by the story," he said. "My head is spinning."

Professor Banks said the president's power as commander in chief "is really limited to situations involving military force - anything needed to repel an attack. I don't think the commander in chief power allows" the warrantless eavesdropping, he said.

Mr. Berenson, the former White House associate counsel, said that in rare cases, the presidents' advisers may decide that an existing law violates the Constitution "by invading the president's executive powers as commander in chief."

The Foreign Intelligence Surveillance Act of 1978 typically requires warrants for the kind of eavesdropping carried out under the special N.S.A. program. Whether administration lawyers argued that that statute unconstitutionally infringed the president's powers is not known.

But Mr. Smith, formerly of the C.I.A., noted that when President Carter signed the act into law in 1978, he seemed to rule out any domestic eavesdropping without court approval.

"The bill requires, for the first time, a prior judicial warrant for all electronic surveillance for foreign intelligence or counterintelligence purposes in the United States" if an American's communications might be intercepted, President Carter said when he signed the act.

By asserting excessive powers, Mr. Smith said, President Bush may provoke a reaction from Congress and the courts that ultimately thwarts executive power.

"The president may wind up eroding the very powers he was seeking to exert," Mr. Smith said.
http://www.nytimes.com/2005/12/17/politics/17legal.html





F.B.I. Watched Activist Groups, New Files Show
Eric Lichtblau

Counterterrorism agents at the Federal Bureau of Investigation have conducted numerous surveillance and intelligence-gathering operations that involved, at least indirectly, groups active in causes as diverse as the environment, animal cruelty and poverty relief, newly disclosed agency records show.

F.B.I. officials said Monday that their investigators had no interest in monitoring political or social activities and that any investigations that touched on advocacy groups were driven by evidence of criminal or violent activity at public protests and in other settings.

After the attacks of Sept. 11, 2001, John Ashcroft, who was then attorney general, loosened restrictions on the F.B.I.'s investigative powers, giving the bureau greater ability to visit and monitor Web sites, mosques and other public entities in developing terrorism leads. The bureau has used that authority to investigate not only groups with suspected ties to foreign terrorists, but also protest groups suspected of having links to violent or disruptive activities.

But the documents, coming after the Bush administration's confirmation that President Bush had authorized some spying without warrants in fighting terrorism, prompted charges from civil rights advocates that the government had improperly blurred the line between terrorism and acts of civil disobedience and lawful protest.

One F.B.I. document indicates that agents in Indianapolis planned to conduct surveillance as part of a "Vegan Community Project." Another document talks of the Catholic Workers group's "semi-communistic ideology." A third indicates the bureau's interest in determining the location of a protest over llama fur planned by People for the Ethical Treatment of Animals.

The documents, provided to The New York Times over the past week, came as part of a series of Freedom of Information Act lawsuits brought by the American Civil Liberties Union. For more than a year, the A.C.L.U. has been seeking access to information in F.B.I. files on about 150 protest and social groups that it says may have been improperly monitored.

The F.B.I. had previously turned over a small number of documents on antiwar groups, showing the agency's interest in investigating possible anarchist or violent links in connection with antiwar protests and demonstrations in advance of the 2004 political conventions. And earlier this month, the A.C.L.U.'s Colorado chapter released similar documents involving, among other things, people protesting logging practices at a lumber industry gathering in 2002.

The latest batch of documents, parts of which the A.C.L.U. plans to release publicly on Tuesday, totals more than 2,300 pages and centers on references in internal files to a handful of groups, including PETA, the environmental group Greenpeace and the Catholic Workers group, which promotes antipoverty efforts and social causes.

Many of the investigative documents turned over by the bureau are heavily edited, making it difficult or impossible to determine the full context of the references and why the F.B.I. may have been discussing events like a PETA protest. F.B.I. officials say many of the references may be much more benign than they seem to civil rights advocates, adding that the documents offer an incomplete and sometimes misleading snapshot of the bureau's activities.

"Just being referenced in an F.B.I. file is not tantamount to being the subject of an investigation," said John Miller, a spokesman for the bureau.

"The F.B.I. does not target individuals or organizations for investigation based on their political beliefs," Mr. Miller said. "Everything we do is carefully promulgated by federal law, Justice Department guidelines and the F.B.I.'s own rules."

A.C.L.U officials said the latest batch of documents released by the F.B.I. indicated the agency's interest in a broader array of activist and protest groups than they had previously thought. In light of other recent disclosures about domestic surveillance activities by the National Security Agency and military intelligence units, the A.C.L.U. said the documents reflected a pattern of overreaching by the Bush administration.

"It's clear that this administration has engaged every possible agency, from the Pentagon to N.S.A. to the F.B.I., to engage in spying on Americans," said Ann Beeson, associate legal director for the A.C.L.U.

"You look at these documents," Ms. Beeson said, "and you think, wow, we have really returned to the days of J. Edgar Hoover, when you see in F.B.I. files that they're talking about a group like the Catholic Workers league as having a communist ideology."

The documents indicate that in some cases, the F.B.I. has used employees, interns and other confidential informants within groups like PETA and Greenpeace to develop leads on potential criminal activity and has downloaded material from the groups' Web sites, in addition to monitoring their protests.

In the case of Greenpeace, which is known for highly publicized acts of civil disobedience like the boarding of cargo ships to unfurl protest banners, the files indicate that the F.B.I. investigated possible financial ties between its members and militant groups like the Earth Liberation Front and the Animal Liberation Front.

These networks, which have no declared leaders and are only loosely organized, have been described by the F.B.I. in Congressional testimony as "extremist special interest groups" whose cells engage in violent or other illegal acts, making them "a serious domestic terrorist threat."

In testimony last year, John E. Lewis, deputy assistant director of the counterterrorism division, said the F.B.I. estimated that in the past 10 years such groups had engaged in more than 1,000 criminal acts causing more than $100 million in damage.

When the F.B.I. investigates evidence of possible violence or criminal disruptions at protests and other events, those investigations are routinely handled by agents within the bureau's counterterrorism division.

But the groups mentioned in the newly disclosed F.B.I. files questioned both the propriety of characterizing such investigations as related to "terrorism" and the necessity of diverting counterterrorism personnel from more pressing investigations.

"The fact that we're even mentioned in the F.B.I. files in connection with terrorism is really troubling," said Tom Wetterer, general counsel for Greenpeace. "There's no property damage or physical injury caused in our activities, and under any definition of terrorism, we'd take issue with that."

Jeff Kerr, general counsel for PETA, rejected the suggestion in some F.B.I. files that the animal rights group had financial ties to militant groups, and said he, too, was troubled by his group's inclusion in the files.

"It's shocking and it's outrageous," Mr. Kerr said. "And to me, it's an abuse of power by the F.B.I. when groups like Greenpeace and PETA are basically being punished for their social activism."
http://www.nytimes.com/2005/12/20/po... ner=homepage





Lawmakers Back Use of Evidence Coerced From Detainees
Eric Schmitt and Tim Golden

House and Senate negotiators agreed Friday to a measure that would enable the government to keep prisoners at Guantánamo Bay indefinitely on the basis of evidence obtained by coercive interrogations.

The provision, which has been a subject of extensive bargaining with the Bush administration, could allow evidence that would not be permitted in civilian courts to be admissable in deciding whether to hold detainees at the American military prison in Guantánamo Bay, Cuba. In recent days, the Congressional negotiators quietly eliminated an explicit ban on the use of such material in an earlier version of the legislation.

The measure is contained in the same military policy bill that includes Senator John McCain's provision to ban the cruel, inhuman and degrading treatment of detainees in American custody worldwide. Mr. Bush reluctantly embraced Mr. McCain's ban on Thursday. The full House is expected to approve the compromise bill soon, with the Senate to follow in the next few days, Congressional officials said.

The juxtaposition of the seemingly contradictory measures immediately led lawyers for Guantánamo prisoners to assert that Congressional Republicans were helping to preserve the utility of coercive interrogations that senior White House officials have argued are vital to the fight against war against terror.

While the measure would allow the Guantánamo prisoners to challenge in federal court their status as enemy combatants and to appeal automatically any convictions and sentences handed down by military tribunals in excess of 10 years, it would still prevent the detainees from asking civilian courts to intervene with the administration over harsh treatment or prison conditions.

Thomas B. Wilner, a lawyer who represents a group of Kuwaiti detainees at Guantánamo Bay, said in an interview that the new language would render the McCain restrictions unenforceable at the Cuban prison. "If McCain is one small step forward, enactment of this language would be two giant steps backwards," Mr. Wilner said.

Two of the main Senate sponsors of the measure, Lindsey Graham, Republican of South Carolina, and Carl Levin, Democrat of Michigan, defended the changes made to the language that the Senate passed last month, 84 to 14.

Mr. Graham acknowledged the measure's intention to make it possible to use information obtained by coercive interrogation techniques in military panels that evaluate whether detainees at Guantánamo are being rightfully held as "enemy combatants." He argued that the techniques were not abusive.

He also said that under his measure, the panels would weigh the value of the intelligence gained from an interrogation against a judgment on whether the statement was coerced. He said in a telephone interview with reporters that the amendment would promote "a balanced approach." A similar rule now applies in the military commissions that have been established to prosecute terror suspects at Guantánamo.

Human rights advocates criticized Mr. Levin, the chief Senate Democratic negotiator, for agreeing to restrict further the legal rights of Guantánamo detainees. Mr. Levin suggested that he had settled for the less damaging of two bad outcomes, saying he had deflected more onerous provisions that House Republicans wanted, including a demand that interrogators who abused prisoners be granted immunity from prosecution. Mr. Levin added in a telephone interview, "I don't think courts will allow coerced evidence in any proceeding."

The Bush administration has repeatedly considered - and rejected - explicitly prohibiting the use of evidence obtained by torture in the military commissions. Most recently, the issue was a major part of a lengthy internal debate over new rules for the tribunals that were promulgated on Aug. 31 in response to longstanding criticism in the United States and overseas that the tribunals are unfair.

Several officials familiar with the internal discussions said State Department officials and some senior Defense Department aides had strongly advocated an explicit ban on the use of evidence obtained by torture in a series of interagency discussions that began last December.

At one point in that process, the Pentagon official in charge of the tribunals, Maj. Gen. John D. Altenburg Jr., who is now retired, proposed barring any "confession or admission that was procured from the accused by torture," according to parts of a draft document read to a reporter. The rule defined torture as any act "specifically intended to inflict severe physical or mental pain and suffering."

The ban was also championed by the counselor of the State Department, Philip D. Zelikow, two officials said. The deputy defense secretary, Gordon R. England, also supported the ban in meetings on the revised commission rules, as did some senior military officers, said a spokesman for Mr. England, Capt. Kevin Wensing.

But such a prohibition was opposed by other officials involved in the debate, including David S. Addington, who was then Vice President Dick Cheney's counsel and is now his chief of staff. A spokesman for the vice president said Mr. Addington would have no comment on his reported role in the policy debates.

Since the drafting of the presidential order that established the commissions on Nov. 13, 2001, White House officials have sought to give the commissions wide latitude to consider evidence that would be inadmissible in civilian courts.

Mr. Addington, who was a primary architect of the presidential order, argued in the debates earlier this year that by explicitly prohibiting evidence obtained by torture, the administration would raise an unnecessary red flag. suggesting at least implicitly that prisoners in American custody were, in fact, being tortured, officials said.

Justice Department officials involved in the debates contended that such a prohibition was not necessary because the matter was already covered by the Convention Against Torture and Other Cruel, Inhuman and Degrading Treatment or Punishment, a treaty adopted by the United Nations more than two decades ago and ratified by the United States in 1994.
http://www.nytimes.com/2005/12/17/po.../17detain.html





U.S. Judge On Spy Court Resigns Post
Letter follows reports on Bush wiretap OKs

Carol D. Leonnig and Dafna Linzer, The Washington Post. Post writers Jonathan Weisman and Charles Babington and researcher Julie Tate contributed to this report, as did Tribune news services

A federal judge has resigned from the court that oversees government surveillance in intelligence cases in protest of President Bush's secret authorization of a domestic spying program, according to two sources.

U.S. District Judge James Robertson, one of 11 members of the secret Foreign Intelligence Surveillance Court, sent a letter to Chief Justice John Roberts Jr. late Monday notifying him of his resignation without providing an explanation.

Two associates familiar with his decision said Tuesday that Robertson privately expressed deep concern that the warrantless surveillance program authorized by the president in 2001 was legally questionable and may have tainted the work of the FISA court, established under the Foreign Intelligence Surveillance Act.

Robertson, appointed to the federal bench by President Bill Clinton in 1994 and later was selected by Chief Justice William Rehnquist to serve on the foreign intelligence court, declined to comment Tuesday.

Word of Robertson's resignation came as two Senate Republicans joined the call for congressional investigations into the National Security Agency's warrantless interception of telephone calls and e-mails to overseas locations by U.S. citizens suspected of links to terrorist groups.

Sens. Chuck Hagel of Nebraska and Olympia Snowe of Maine echoed concerns raised by Arlen Specter (R-Pa.), chairman of the Senate Judiciary Committee, who has promised hearings in the new year.

At the White House, spokesman Scott McClellan was asked to explain why Bush last year said that surveillance required court approval.

"Any time you hear the United States government talking about wiretap, it requires--a wiretap requires a court order," Bush said at the time. "Nothing has changed, by the way. When we're talking about chasing down terrorists, we're talking about getting a court order before we do so."

McClellan said the quote referred only to the USA Patriot Act.

Vice President Dick Cheney on Tuesday defended the secret wiretaps.

"You know, it's not an accident that we haven't been hit in four years," the vice president said, speaking with reporters on Air Force Two en route from Pakistan to Oman.

Revelation of the program last week by The New York Times also spurred considerable debate among federal judges, including some who serve on the FISA court. For more than a quarter-century, that court had been seen as the only body that could legally authorize secret surveillance of espionage and terrorism suspects, and only when the Justice Department could show probable cause that its targets were foreign governments or their agents.

Robertson indicated privately to colleagues in recent conversations he was concerned that information gained from warrantless NSA surveillance could have then been used to obtain foreign intelligence warrants. FISA court Presiding Judge Colleen Kollar-Kotelly, who had been briefed on the spying program by the administration, raised the same concern in 2004, and insisted that the Justice Department certify in writing that it was not occurring.

"They just don't know if the product of wiretaps were used for FISA warrants--to kind of cleanse the information," said one source, who spoke on the condition of anonymity because of the classified nature of the FISA warrants. "What I've heard some of the judges say is they feel they've participated in a Potemkin court."
http://www.chicagotribune.com/news/n...ck=1&cset=true





House Passes One-Month Extension of Patriot Act
Charles Babington and Michael A. Fletcher


The House of Representatives agreed to extend a controversial domestic surveillance law this afternoon, but it limited the extension to one month and rejected a carefully brokered compromise from the Senate that had given the law a six-month reprieve.

Top Senate aides said they believed the Senate would endorse the House plan tonight.

President Bush, who had earlier rejected a three-month extension and yesterday embraced the six-month deal, issued a statement this evening saying, "I appreciate the strong commitment by the majority of the House and of the Senate to re-authorize the Patriot Act. . . . I will work closely with the House and Senate to make sure that we are not without this crucial law for even a day."

Major provisions of the Patriot Act are set to expire Dec. 31.

Rep. F. James Sensenbrenner Jr. (R-Wis.), who chairs the House Judiciary Committee, offered the change to a one-month extension, and the Democrats did not object.

After the House vote, Sensenbrenner, who is a strong supporter of the Patriot Act, said he made the change in an effort to force the Senate to act quickly on a long- term version of the bill.

"A six-month extension, in my opinion, would have simply allowed the Senate to duck the issue until the last week in June," Sensenbrenner told reporters, according to the Associated Press.

Bush, who had repeatedly said he would not accept a short-term extension of the Patriot Act, said in a statement: "I appreciate the Senate for working to keep the existing Patriot Act in law through next July, despite boasts last week by the Democratic leader that he had blocked the Act. No one should be allowed to block the Patriot Act to score political points, and I am grateful the Senate rejected that approach."

Congress passed the Patriot Act after the Sept. 11, 2001, terrorist attacks. The law makes it easier for FBI agents to monitor phone calls and e-mails, to search homes and offices, and to obtain the business records of terrorism suspects.

Critics say the proposed four-year renewal, which the House approved last week, is too slanted in the government's favor regarding national security letters and special subpoenas that give the FBI significant leeway in obtaining records. The targeted people should have a greater opportunity to challenge such subpoenas and the government should be required to show stronger evidence linking the items being sought to possible terrorism, they say. Now they have more time to press their case in the bill's rewrite.

Senate Majority Leader Bill Frist (R-Tenn.) said he decided on the six-month extension, although he, too, had repeatedly said he would reject "short-term" extensions such as for three months.

The agreement to extend the Patriot Act in its existing form for six months "made the most sense," Sen. John E. Sununu (R-N.H.) told reporters moments after Senate leaders announced the breakthrough. He was among a handful of Republicans who joined most Senate Democrats in insisting that the planned four-year renewal of the law contain more civil liberties protections.

Sen. Charles E. Schumer (D-N.Y.) said the key to breaking the impasse in the Senate was a letter -- signed earlier yesterday by 52 of the 100 senators, including eight Republicans -- that urged GOP leaders to call a truce in the battle over the act's renewal. They sought a three-month extension of the existing statute but later agreed to six months.

Bush and top Senate Republicans had repeatedly insisted on the full four-year renewal that the House passed on Dec. 14. But they could not overcome the Senate filibuster backed by Sununu, three GOP colleagues and all but two Democrats.

Bush and others have said the Patriot Act is essential to safeguarding the nation from terrorists. Nonetheless, the White House and the Senate had engaged in a week of brinkmanship, refusing to reach an accord and vowing to blame each other if the law expired.

"This is a common-sense solution that gives the Senate more time to craft a consensus bill that will promote our security while preserving our freedom," Sen. Patrick J. Leahy (D-Vt.) said in a statement. "I am pleased the Republican leadership listened to a bipartisan majority of us in the Senate on this important matter that affects all Americans."

All week, Senate leaders had privately acknowledged that there was no hope of overcoming the filibuster led by Democrats and supported by four Republicans. Bush and his top appointees, however, repeatedly called on the Senate to pass the House-approved version.

Even as the 52 senators signed a letter to Frist urging a three-month extension, Bush showed no signs of yielding early yesterday. Speaking to reporters in the morning, he reiterated his demand that the Senate accept the House-passed measure. "This obstruction is inexcusable," Bush said. "The senators obstructing the Patriot Act need to understand that the expiration of this vital law will endanger America and will leave us in a weaker position in the fight against brutal killers."

Asked in the afternoon whether Bush would veto a short-term extension of the act, White House spokesman Scott McClellan referred reporters to his Dec. 16 statement that "the president has made it very clear that he is not interested in signing any short-term renewal."

While the Senate considered the measure, Rep. Sensenbrenner showed little willingness to renegotiate the four-year extension his chamber had originally approved. "Any talk of a short-term extension is fruitless," his spokesman Jeff Lungren said several hours before the Senate six-month deal was announced. "Chairman Sensenbrenner will not accept anything less than a four-year extension of the Patriot Act."
http://www.washingtonpost.com/wp-dyn...201229_pf.html





There's No Getting Off That No-Fly List
Caroline Drees

Sarah Zapolsky was checking in for a flight to Italy when she discovered her 9-month-old son's name was on the United States' "no-fly" list of suspected terrorists.

"We pointed down to the stroller, and he sat there and gurgled," Zapolsky said, recalling the incident at Dulles International Airport outside Washington in July. "The desk agent started laughing. ... She couldn't print us out a boarding pass because he's on the no-fly list."

Zapolsky, who did not want her son's name made public, said she was initially amused by the mix-up. "But when I found out you can't actually get off the list, I started to get a bit annoyed."

Zapolsky isn't alone.

According to the Transportation Security Administration, more than 28,000 people have applied to the TSA redress office to get on the "cleared list," which takes note of individuals whose names are similar to those on the terrorism watch list, but does not guarantee an end to no-fly list hassles.

The TSA does not reveal how many or which names are actually on the list, and complaints do not get names removed since they refer to suspected terrorists. The best innocent travelers can hope for is a letter from the TSA which it says should facilitate travel, but is no panacea.

In addition to babies, the victims of mistaken identity on the no-fly list have included aging retirees and public figures such as Democratic Sen. Edward Kennedy of Massachusetts, Republican Rep. Don Young of Alaska and Democratic Rep. John Lewis of Georgia.

"It's a significant problem," said Brenda Jones, the spokeswoman for Rep. Lewis, who travels by plane at least twice a week. She said the congressman had written to the TSA, but "he is still on the no-fly list, and the problems persist."

Secretive List

The classified no-fly list was adopted after the September 11, 2001, hijacked plane attacks to prevent suspected terrorists from getting on aircraft or coming to the United States. Airlines must check passenger names against the list before they are allowed to get on a plane.

While the number of suspected terrorists on the list is unknown, aviation sources estimate it includes tens of thousands of names, if not more.

TSA spokesman Christopher White said the agency had seven people working full-time on processing applications to get on the cleared list. Considering the number of applications, that works out to more than 4,000 complaints per redress officer.

"We do take the cleared list very seriously, and it's also important for us to focus on the right people. It does us no good to focus on the wrong John Doe," White said.

Cleared individuals receive a letter from the TSA which says "we have provided sufficient personal information to the airlines to distinguish you from other individuals" but cautions that "TSA cannot ensure that your travel will be delay free."

John Graham, a 63-year-old former State Department official, said his TSA letter had not helped at all.

"I'm at a point now where I don't really care whether my name is on the list as a mistake, as mistaken identity, or whether someone at TSA does intend to hassle me. The fact is, there's a total absence of due process," he said.

The American Civil Liberties Union calls the no-fly list system unconstitutional, saying it treats people as guilty without a trial and unfairly deprives them of freedoms. It also says the system is an inaccurate and ineffective security method.

Despite efforts by the TSA to address complaints and concerns about the no-fly list, ACLU attorney Reggie Shuford said very little had changed to improve the process.

"We continually hear from people being caught up on the no-fly list with the same frustrating experiences and inability to get off the list," he said.

Peter Johnson, a retired bibliographer at Princeton University, said travel became "hellish" after he discovered his name was on the no-fly list in August 2004.

"I'm not sure if what's behind this is an effort to simply control people or if it's largely mismanagement and poorly conceptualized programming," Johnson said, adding a TSA official had told him there were more than 2,000 other Peter Johnsons in the United States who reported similar problems.
http://today.reuters.com/news/newsse...y&searchtype=a





Aging Computers Hobble Homeland Security
Declan McCullagh

Thousands of airline passengers unexpectedly found themselves stranded in line at U.S. border checkpoints in August, after a Department of Homeland Security computer crashed.

At Miami International, some 4,500 frustrated travelers waited in cramped conditions. Airport staff handed out bottles of water and coloring books with crayons for children during the wait for the computer, which checks identities, to come back up.

"This incident was extraordinary," said Greg Chin, an airport spokesman. "In other cases when the computers have been down, it has only been for less than half an hour."

Index cards of biographical data
The crash shuttered the government's main immigration database in Virginia, affecting scores of border entry points. The shutdown highlights the computer problems that the Homeland Security Department is grappling with, as it struggles to reshuffle myriad functions once performed by the now-defunct Immigration and Naturalization Service.

It has been a daunting task. Aging, incompatible systems and outdated processes have contributed to a backlog of approximately 1 million people waiting for a decision from the department's Citizenship and Immigration Services bureau. Computer problems at its Immigration and Customs Enforcement bureau caused a snafu in which student visa holders were jailed overnight or barred from entering the United States.

The U.S. Citizenship and Immigration Services's systems have come in for particular criticism from outside analysts and government auditors, who say these are simply not up to the task of serving the public, especially when coupled with a continuing reliance on paper forms. In some cases, for instance, information typed into one computer must be manually retyped into a second or third.

"All filings are paper-based, which means that everything you submit has to be keyed into the computer, which of course opens up the additional possibility of error, slows the process down and prevents some processes from being automated," said Crystal Williams, deputy director for programs at the American Immigration Lawyers Association.

The USCIS bureau has spent $280 million over the last two years as part of its "backlog initiative" to reduce the number of outstanding cases, but most of that has gone to hire temporary employees. Less than two percent, or $4.5 million, was devoted to computer upgrades. (The Department of Homeland Security's overall budget is $30.8 billion for fiscal year 2006.)

One problem is that applications for different types of immigration status are saved in separate records. These aren't interlinked, which means an application for a H1-B visa is not tied to the same person's application for a green card--causing more paperwork and delays, until the two records can be matched by hand.

Other procedures are equally inefficient. "Heaven forbid if an attorney should change their address," Williams said. "They have to send a change of address for every separate case they've got pending. (Once) I had between 500 and 1,000 cases pending at one time."

Data stumbling blocks
The holdups can be attributed in part to the Homeland Security Department's antiquated computer systems. The agency's mainframes do not share data and are accessible only by some offices. An upgrade to Microsoft's Windows 2000 operating system failed because of application incompatibilities, which meant one division had to undertake a cumbersome reversion back to Windows 95.

In the case of the immigration bureau, there has never been a centralized electronic method for managing the more than 7 million applications that stream each year into 250 USCIS offices scattered across the country and abroad.

Instead, the bureau's outposts rely on about a dozen different systems designed to enter, store and track more than 50 types of forms that cover everything from citizenship applications to student and worker visas and adoptions.

Not one of the systems can talk with another, according to government reports, and not all offices are equipped to log into the systems they need to update records.

Even the bureau's two primary case-management systems, called CLAIMS 3 and CLAIMS 4, are accessible only to certain staff at certain offices. These rely on proprietary software developed by a string of contractors in the early 1990s, "do not share data, and are extremely expensive to modify," the ombudsman concluded. (CLAIMS stands for Computer Linked Application Information Management System.)

CLAIMS 3, for instance, runs on both client-server and mainframe platforms, and USCIS service centers across the country independently use six different versions of the system. On a nightly basis, employees upload the information they've entered that day into a central CLAIMS 3 mainframe--which essentially means that changes to files aren't available until the next day.

All that suggests that a real dent in the USCIS backlog--which peaked at 3.8 million cases in January 2004 and has now settled at around 1 million--is unlikely to occur until the immigration bureau overhauls its geographically dispersed, often incompatible case-management processes.

"Despite repeated assessments and attempts to modernize, USCIS' processing of immigration benefits continues to be inefficient, hindering its ability to effectively carry out its mission," concluded a 56-page report (click for PDF) released this fall by the office of Homeland Security Inspector General Richard Skinner, who is responsible for investigating the department's 22 umbrella agencies.

A decade has elapsed since the last bureauwide upgrade of IT equipment. Some offices have adopted the practice of performing haphazard changes when budget money is left over, Skinner said, leading to a confusing patchwork of hardware and software across the bureau.

In his most recent annual report to Congress, Prakash Khatri, the immigration bureau's ombudsman, warned the Homeland Security Department's outdated technological infrastructure meant that "customer service is compromised." Khatri acts as a representative for people who have encountered problems.

The agency acknowledges that its computer systems remain a daunting obstacle. "The state of USCIS' current systems prevents it from implementing key initiatives, and has only allowed for incremental change," Tarrazzia Martin, the chief information officer for U.S. Customs and Immigration (USCIS), wrote in an e-mail interview with CNET News.com.

Inefficiencies yield delays, frustrations
Oleg Baklenov knows firsthand how paperwork delays by the USCIS can roil a technology worker's family life.

Baklenov, a 34-year-old Russian electrical engineer who came to the U.S. 11 years ago to earn his doctoral degree, currently has a visa that permits him to work for a company in Greensboro, N.C.

Three years ago, he applied for what's commonly known as a green card, a form of immigration status that would permit him to become a permanent resident and seek citizenship. But a technical difficulty in submitting his name to the FBI for a mandatory criminal background check has delayed the process, he said.

People with worker visas have to file extra paperwork--which can take several months to process--to leave and re- enter the United States. Confident that his green-card application would be processed, Baklenov decided not to undertake the task of submitting those additional forms.

But now his ailing grandmother has been admitted to a Czech hospital, and the unexpected delay has effectively barred Baklenov from leaving the country to visit her. "The system will be more efficient if one computer system can communicate with different agencies and request all the checks that they need," said Baklenov, who is representing himself in a federal lawsuit filed in North Carolina, but is hoping for an out-of-court resolution.

William Strassberger, a USCIS spokesperson, said he's not sure what caused Baklenov's problems and said the agency was still waiting for the security check. "If he wanted to make a request for advance parole for emergency medical reasons on behalf of his grandmother, it should be possible to do," Strassberger said. "Usually, we recommend submitting an application four weeks ahead of time, but if it's a situation where it requires urgent travel, it's possible to do that."

Barriers to progress
The situation is complicated by the ripple effects of the federal law creating the Department of Homeland Security, signed by President Bush in 2002, which carved the former Immigration and Naturalization Service into three slices.

Border patrol and customs agents formed the new U.S. Customs and Border Protection unit, while the bureaucracy for processing immigration- related requests was renamed U.S. Citizenship and Immigration Services. The similarly named U.S. Immigration and Customs Enforcement division now includes former INS "detention and removal" agents, federal air marshals and the Federal Protective Service.

Michael Garcia, an assistant secretary at the Department of Homeland Security, has likened the integration process to "trying to change the engine in an airplane in mid-flight." In testimony to the Senate in March, Garcia said: "We have had to build a new agency almost from the ground up--bringing together divisions from four separate agencies into a single functioning unit, and melding the cultures and missions of various units into a unified whole."

Large, distributed government systems are too often victims of poor planning, said Peter Neumann, a principal scientist in the computer science lab at SRI International, a not-for-profit research institute.

"What is needed is a set of requirements that really makes sense in the first place and an architecture that is capable of satisfying those requirements--a very serious software engineering discipline to ensure a system is not only going to meet those requirements but be evolvable over time," said Neumann, who has served on technical advisory committees for the IRS and the Government Accountability Office.

Referring to the August crash that left travelers waiting in line, Homeland Security Department spokesman Jarrod Agen said that some problems are inevitable. "They have computer glitches from time to time due to the complexity of the system, and they're not a frequent thing, but they do happen on occasion, and that was one instance of it." Agen said that contrary to some initial reports, there was no evidence it was caused by a virus.

Plans for change
The USCIS didn't set up its own centralized information technology office until March 2004, a year after Homeland Security was formed. It now says it has a multiyear "IT Transformation Strategy"--but officials have refused to disclose the cost or the anticipated timetable.

Nor is a single document publicly available. Instead, the plans are scattered around in multiple documents, such as a "mission needs" statement, presentations, white papers, and so on, spokesperson Strassberger said. The bureau is currently in the process of awarding contracts and cannot discuss the details, he said.

Some attempts at modernization have been made. It's now possible, for instance, for immigration applicants to file nine types of forms electronically and to check their status online. But because the e-filing system can't talk to any of the existing case management systems that employees use, those employees must manually retype those forms into the appropriate database.

In November, the department completed a "refresh" of workstations in its California service center, installing more than 1,200 new workstations, printers and monitors, and "modernizing and standardizing" its network, according to a December bureau newsletter. Similar updates are scheduled for several more offices in 2006.

Robert Divine, the bureau's acting deputy director, said the organization is committed to making the fixes, but it can't do so without a big budget increase.

Because most of the bureau's revenue comes from application fees, not from the federal government's pockets, "the type of significant, up-front funding that will be required for fully modernizing information technology is not clearly within USCIS' means," Divine said in a September letter to the Department of Homeland Security's assistant inspector general for information technology.

On ICE
Problems have also plagued computers used by the U.S. Immigration and Customs Enforcement bureau. Since 2003, schools and student-exchange programs have been required to use a Internet-based tool known as the Foreign Student and Exchange Visitor Information System (SEVIS) to store and track personal information about foreign students before, during and after their stay in the United States.

University administrators testifying before a congressional committee have complained that SEVIS frequently lost data, could not handle large batches of information submitted at once, did not provide real-time access to records. The system would sometimes result in documents--many of a confidential nature--inexplicably being printed out on computers at completely different schools.

In its most recent evaluation of SEVIS, published in March, the Government Accountability Office acknowledged that the system is now receiving fewer gripes from educational organizations. GAO said that's partly due to better help desk staffing and training, and new software releases. However, ICE has not resolved all of the system's glitches, it said.

Meanwhile, immigrants like Baklenov continue to wait for results. "We're trying to do as much as we could thru the phone and through talking to our friends in the Czech Republic and asking them to help," he said, referring to his grandmother. "She's still in the hospital and we're trying to do the best for her--from overseas, unfortunately."
http://news.com.com/Aging+computers+...3-5995856.html





Cheney Defends Eavesdropping Without Warrants
Richard W. Stevenson and Adam Liptak

In his first discussion of the underpinnings of the Bush administration's decision to eavesdrop without warrants on communications between the United States and abroad, Vice President Dick Cheney cast the action today as part of a broader effort to reassert powers of the presidency that he said had been dangerously eroded in the years after Vietnam and Watergate.

Talking with a small group of reporters on Air Force Two as he flew from Pakistan to Oman, Mr. Cheney spoke in far broader terms about the effort to expand the powers of the executive than President Bush did on Monday during an hourlong news conference.

"I believe in a strong, robust executive authority and I think that the world we live in demands it," said Mr. Cheney, who was in many ways the intellectual instigator of the rapid expansion of presidential authority as soon as Mr. Bush came to office.

Today, he made no effort to play down his central role in aggressively seizing those powers, citing his early battle to keep private the names of people he consulted while drawing up recommendations for Mr. Bush on energy policy. That effort was ultimately upheld in the courts.

Mr. Cheney appears to have been the first senior administration official to brief a very small number of Congressional leaders on the program and the underlying technology that has permitted the National Security Agency to find and immediately tap into "hot numbers" - telephone calls and e-mail messages suspected to contain communications between terror suspects in the United States and abroad.

Ordinarily, any tap that includes one party inside the United States has required obtaining a warrant from a secret court that oversees the enforcement of the Foreign Intelligence Surveillance Act - itself an effort to address of the abuses during the Watergate scandal.

Mr. Cheney was unapologetic about circumventing the legal protections, echoing President Bush's declarations that it was an appropriate use of executive authority, and going further than Mr. Bush by insisting that it has prevented subsequent attacks.

"The fact of the matter is this is a good, solid program," he said on CNN during his stopover in Pakistan. "It has saved thousands of lives, we are doing exactly the right thing, we are doing it in accordance with the Constitution of the United States, and it ought to be supported. This is not about violating civil liberties, because we're not."

Later, aboard Air Force Two, he said, "I'm sure there is going to be a debate," adding, "It's an important subject." But having served in Congress as chief of staff to President Ford - a period when he first became concerned about infringements on presidential power - he said he believed the pendulum had swung back too far after the Nixon resignation.

After expressing respect for the powers of Congress, he told reporters: "But I do believe that especially in the day and age we live in, the nature of the threats we face, the president of the United States needs to have his constitutional powers unimpaired, if you will, in terms of the conduct of national security policy."

He described the War Powers Resolution, passed in 1973 in a post-Vietnam effort by Congress to prevent the president from committing troops without sharp congressional oversight, as "an infringement on the authority of the presidency" and suggested it could be unconstitutional. Similarly, he said budget legislation passed in the 1970's restricted the president's ability to impound money.

"Watergate and a lot of the things around Watergate and Vietnam both during the '70's served, I think, to erode the authority I think the president needs to be effective, especially in the national security area," Mr. Cheney said.

Mr. Cheney's philosophy on both the wiretap issues and detention and interrogation policy took legal form in a series of memorandums and briefs, many of them written by John C. Yoo, then a deputy assistant attorney general in the Justice Department's office of legal counsel.

Professor Yoo, a mild-mannered legal scholar from Boalt Hall, the law school at the University of California at Berkeley, has told friends that he was taken aback when he became the best-known proponent of pushing the envelope of presidential powers. But many of the documents he and his colleagues wrote described broad and unilateral executive power to combat terrorism, including detaining people without charge indefinitely, subjecting detainees to harsh interrogations and to eavesdropping without first obtaining warrants, under some conditions.

For example, in a Sept. 21, 2001, memorandum, administration lawyers said that eavesdropping on telephone calls and e-mail messages without a court's permission could be proper, notwithstanding the Fourth Amendments ban on unreasonable searches and seizures.

"The government may be justified," Mr. Yoo wrote in the memorandum, "in taking measures which in less troubled conditions could be seen as infringements of individual liberties." Four days later, Mr. Yoo wrote that Congress cannot place "limits on the president's determinations as to any terrorist threat, the amount of military force to be used in response, or the method, timing, and nature of the response."

"These decisions," wrote Mr. Yoo, who left the administration two years ago, "under our Constitution, are for the president alone to make."

Both Mr. Bush and Mr. Cheney in the past two days have drawn on that theory as they pointed to two basic sources of legal power. The first is in Article II of the Constitution itself, which vests the "executive power" in the president and makes him commander in chief of the military. Mr. Cheney discussed that at length today. The second is Congressional authorization to use military force in response to the Sept. 11 attacks.

"When we were hit on 9/11," Mr. Cheney said, President Bush "was granted authority by the Congress to use all means necessary to take on the terrorists, and that's what we've done." At another point he noted that "the 9/11 commission criticized everybody in government because we didn't connect the dots."

"Now we are connecting the dots and they're still complaining, so it seems to me you can't have it both ways," he said.

But it is not clear that either of those sources of legal authority fully support all aspects of the administration's expansive view of executive power.

"Broad claims of authority and broad claims of illegality are equally suspect," said Douglas W. Kmiec, a law professor at Pepperdine University.

Geoffrey R. Stone, a law professor at the University of Chicago, said he found the issue straightforward, at least as regards surveillance by the National Security Agency.

"Some legal questions are hard," Professor Stone said. "This one is not. The president's authorizing of N.S.A. to spy on Americans is blatantly unlawful and unconstitutional."

Mr. Cheney, unsurprisingly, took the opposite view, noting that he has been expressing his views on the subject as far back as 1987, when, as a Republican member of Congress from Wyoming, he contributed to the minority views in the Congressional report on the Iran-contra affair.

"Part of the argument in Iran-Contra was whether or not the president had the authority to do what was done in the Reagan years," he said. "And those of us in the minority wrote minority views that were actually authored by a guy working for me, one of my staff people, that I think are very good at laying out a robust view of the president's prerogatives with respect to the conduct of especially foreign policy and national security matters."

Asked if the proper balance had been restored under Mr. Bush, he said, "I do think it's swung back."

Mr. Cheney suggested that Democrats who push to pare back the powers of the presidency in the wake of the disclosure of the eavesdropping program would pay a political price.

"Either we're serious about fighting the war on terror or we're not," he said. "Either we believe that there are individuals out there doing everything they can to try to launch more attacks, try to get ever deadlier weapons to use against us or we don't. The president and I believe very deeply that there is a hell of a threat."

It is unclear that Mr. Bush's order to the N.S.A. will reach the courts; the names of those tapped are kept secret. Nor is it clear whether the courts will be ready to adopt the broad definition of presidential power expressed by Mr. Bush, Mr. Cheney and Professor Yoo.
http://www.nytimes.com/2005/12/20/po...gewanted=print





Symantec refuses to sell audit tool outside the US

Return Of The Crypto Wars?
John Leyden

Exclusive Symantec has stopped selling a password auditing tool to customers outside the US and Canada, citing US Government export regulations.

A Reg reader who works for a large UK supermarket was this month unable to buy a copy of LC 5, a tool developed by @stake prior to its recent acquisition by Symantec. LC 5 is the commercial version of a password auditing / breaking tool better known as L0phtCrack.

"A month ago I could have bought it from the @stake web site, that website has gone and the product has not appeared on the Symantec web site. I inquired if I could purchase the product, only to be told that it will only be sold to US and Canadian customers," our correspondent informs us. "I guess I'll just have to go back to using John the Ripper."

Symantec's restrictions recall the dark days of the crypto wars when users outside the US were not entitled to buy products featuring strong ciphers. These rules, relaxed by the Clinton administration and following a long running campaign by cryptography experts and net activists, are once again rearing their head. Symantec's response to our reader (below) suggests the policy was imposed on it by the US government.

Unfortunately, due to strict US Government export regulations Symantec is only able to fulfill new LC5 orders or offer technical support directly with end-users located in the United States and commercial entities in Canada, provided all screening is successful.

Commodities, technology or software is subject to U.S. Dept. of Commerce, Bureau of Industry and Security control if exported or electronically transferred outside of the USA. Commodities, technology or software are controlled under ECCN 5A002.c.1, cryptanalytic.

You can also access further information on our web site at the following address: http://www.symantec.com/region/reg_e...ise/index.html

Beyond confirming that "the statement you have received from your reader is correct", Symantec declined to field questions on the rationale for its policy and whether it applies to other products. Any US government policy to impose export regulations on security technologies would be futile since, to cite only one reason, many security firms are based outside the US and therefore unaffected by such regulations.
http://www.theregister.co.uk/2005/11...t_controversy/






How A Terror Group Cloned Ted Rogers' Cellphone
Peter Cheney

A journey of 1,000 miles begins with a single step — and so it was that law professor Susan Drummond's long, strange trip into the world of wireless security, where she learned that a terrorist organization had appropriated Ted Rogers' cellphone number, was launched by the arrival of a phone bill for $12,237.60.

Ms. Drummond, who had just returned from a month-long trip to Israel, went numb as she looked at the stupefying figure, which was more than 160 times higher than her typical monthly bill of about $75. The Rogers Wireless bill included a five-page list of calls charged to her phone, almost all of them to foreign countries that included Pakistan, Libya, Syria, India and Russia.

Ms. Drummond quickly determined what had happened: Someone had stolen her phone while she was away. She called Rogers Wireless, which told her there was nothing it could do, and she would have to pay the entire amount.

“I was shocked,” she said. “Who wouldn't be?”

Since making that call to Rogers last August, Ms. Drummond and her partner, Harry Gefen, have been researching the cellphone giant, yielding some unexpected discoveries, among them that the phones of senior Rogers executives, including Mr. Rogers himself, were repeatedly “cloned” by terrorist groups that used them to make thousands of overseas calls.

That bit of information came out at a conference Mr. Gefen attended in September, where he spoke with Cindy Hopper, a manager in Rogers security department, who told him that the phones of top Rogers executives had been the target of repeated cloning by a group linked to Hezbollah. (Cloning involves the duplication of a cellphone's identity by capturing its number and encrypted security code.)

Speaking into Mr. Gefen's tape recorder — and unaware that he was an aggrieved customer — Ms. Hopper said terrorist groups had identified senior cellphone company officers as perfect targets, since the company was loath to shut off their phones for reasons that included inconvenience to busy executives and, of course, the public- relations debacle that would take place if word got out.

“They were cloning the senior executives repeatedly, because everyone was afraid to cut off Ted Rogers' phone,” Ms. Hopper says on the tape.

“They were using actually a pretty brilliant psychology. Nobody wants to cut off Ted Rogers' phone or any people that are directly under Ted Rogers, so they took their scanners to our building, like our north building, where our senior top, top, top executives are. They took their scanners there and also to Yorkville, where there are a lot of high rollers and like it would be a major PR blunder to shoot first and ask questions later. . . . Nobody wants to shut off Ted. Even if he is calling Iran, Syria, Lebanon, and Kuwait.”

Ms. Hopper also told Mr. Gefen what he had come to suspect — that Rogers has automated security systems that alert them to radical changes in calling patterns like the ones that Ms. Drummonds' phone had undergone.

Armed with this knowledge, Ms. Drummond is pursuing legal action against the cellphone giant, charging that the company can easily spot a fraud-in-progress, yet “lets the meter run.”

“There's a lot they don't want people to know,” Ms. Drummond says. “They're afraid that people will lose faith in the system.”

Ms. Drummond, who teaches law at Osgoode Hall, is suing Rogers in small claims court, and has filed hundreds of pages of documents to support her charges that the company is profiting from crime by failing to shut down stolen or cloned cellphones.

“There's more at stake here than money,” she says.

But as the battle between Ms. Drummond and Rogers Wireless mounts, so do the charges. Each month, the company has added late fees to the outstanding balance (according to Ms. Drummond, the interest rate works out to 26 per cent annually). Rogers now wants a total of $14,141.00.

Ms. Drummond and Mr. Gefen, a technology journalist, have spent the past several months researching cellphone security. Mr. Gefen, who describes himself as “curious by nature,” hit pay dirt in September when he attended the Toronto Fraud Forum, an annual conference for security experts.

He decided to go after noticing that one of the speakers was Cindy Hopper, a manager in Rogers fraud and security department, who was scheduled to give a speech titled “Using Cellphone Records to Investigate Fraud, Insurance Claims and Crime.”

On Sept. 27, Mr. Gefen arrived at the conference, which was held at a Ramada Inn near Highway 401 and the Don Valley Parkway in Toronto. He paid a $200 registration fee and wore a nametag marked “Harry Gefen/ Knowledge Media.”

After listening to Ms. Hopper's speech, Mr. Gefen engaged her in a tape-recorded follow-up conversation that provided an unexpected glimpse into the secret world of cellphone security. Ms. Hopper said Rogers definitely has the means to spot unusual activity on an account, using technology similar to that used by banks to spot fraudulent activity involving debit or credit cards.

“We have a fraud-management system that looks for extraordinary patterns,” she told Mr. Gefen.

“And what activates it?” he asked.

“It would be something like, say, you'd never called long distance before and suddenly your phone gets, uh, nonstop to India,” she replied.

“What happens after that point?” Mr. Gefen asked.

“Someone calls the customer and asks them whether they're really doing that or whether someone's stolen their phone,” she said. Ms. Hopper said that if a customer can't be reached, the company sometimes cuts off the phone's long-distance access to prevent further fraud.

In her statement of claim against Rogers, Ms. Drummond charges that Rogers Wireless knew that something was amiss with her cellphone, yet did nothing to stop it. She notes that she had never made an overseas call with the phone, yet in the month of August, it was used to make more than 300.

“Rogers has a systematic, computer-generated program that immediately alerts their fraud department of atypical calling patterns,” she says in one court filing. “. . . In relation to the contract for my cellphone number, Rogers breached its duty of care to prevent fraudulent phone calls being made. . . .”

Jan Innes, a vice-president with Rogers Communications, confirmed that the company has an automatic fraud-detection system that flags suspicious calling patterns, but refused to say how it works. “We do not give out information that might help people get around the system,” she said.

Ms. Innes said that Rogers has a policy of contacting consumers if fraud is suspected. In some cases, she admitted, phones are shut off automatically, but refused to say what criteria were used. (Ms. Drummond and Mr. Gefen believe that the company bases the decision on a customer's creditworthiness. “If you have the financial history, they let the meter run,” Ms. Drummond said.) Ms. Drummond noted that she has a salary of more than $100,000, and a sterling credit history. “They knew something was wrong, but they thought they could get the money out of me. It's ridiculous.”

Ms. Innes denies that charge. “Creditworthiness doesn't enter into it,” she said. Ms. Innes conceded that the hundreds of calls made to foreign hot spots represented a dramatic change in Ms. Drummond's phone usage, but insists that Rogers does not bear responsibility for failing to shut off the service when they couldn't contact her.

“That was in the terms of her contract,” she said. “. . . Many of our customers have unusual patterns. It would be onerous if we shut them all down.”

In court filings, the company has made it clear that it intends to hold Ms. Drummond responsible for the calls made on her phone. “. . . the plaintiff is responsible for all calls made on her phone prior to the date of notification that her phone was stolen,” the company says. “The Plaintiff's failure to mitigate deprived the Defendant of the opportunity to take any action to stop fraudulent calls prior to the 28th of August 2005.”

Ms. Innes said the company has offered to settle the case with Ms. Drummond, but said she has refused. Ms. Drummond confirmed that the company had offered to write off the bill if she pays $2,000, but she has rejected the offer.

“I shouldn't have to pay any of this,” she said. “The company knew what was going on. I'm not going to pay them for theft.”
http://www.theglobeandmail.com/servl...ry/Technology/





NYC Police Infiltrate Protests, Videotapes Show
Jim Dwyer

Undercover New York City police officers have conducted covert surveillance in the last 16 months of people protesting the Iraq war, bicycle riders taking part in mass rallies and even mourners at a street vigil for a cyclist killed in an accident, a series of videotapes show.

In glimpses and in glaring detail, the videotape images reveal the robust presence of disguised officers or others working with them at seven public gatherings since August 2004.

The officers hoist protest signs. They hold flowers with mourners. They ride in bicycle events. At the vigil for the cyclist, an officer in biking gear wore a button that said, "I am a shameless agitator." She also carried a camera and videotaped the roughly 15 people present.

Beyond collecting information, some of the undercover officers or their associates are seen on the tape having influence on events. At a demonstration last year during the Republican National Convention, the sham arrest of a man secretly working with the police led to a bruising confrontation between officers in riot gear and bystanders.

Until Sept. 11, the secret monitoring of events where people expressed their opinions was among the most tightly limited of police powers.

Provided with images from the tape, the Police Department's chief spokesman, Paul J. Browne, did not dispute that they showed officers at work but said that disguised officers had always attended such gatherings - not to investigate political activities but to keep order and protect free speech. Activists, however, say that police officers masquerading as protesters and bicycle riders distort their messages and provoke trouble.

The pictures of the undercover officers were culled from an unofficial archive of civilian and police videotapes by Eileen Clancy, a forensic video analyst who is critical of the tactics. She gave the tapes to The New York Times. Based on what the individuals said, the equipment they carried and their almost immediate release after they had been arrested amid protesters or bicycle riders, The Times concluded that at least 10 officers were incognito at the events.

After the 2001 terrorist attacks, officials at all levels of government considered major changes in various police powers. President Bush acknowledged last Saturday that he has secretly permitted the National Security Agency to eavesdrop without a warrant on international telephone calls and e-mail messages in terror investigations.

In New York, the administration of Mayor Michael R. Bloomberg persuaded a federal judge in 2003 to enlarge the Police Department's authority to conduct investigations of political, social and religious groups. "We live in a more dangerous, constantly changing world," Police Commissioner Raymond W. Kelly said.

Before then, very few political organizations or activities were secretly investigated by the Police Department, the result of a 1971 class-action lawsuit that charged the city with abuses in surveillance during the 1960's. Now the standard for opening inquiries into political activity has been relaxed, full authority to begin surveillance has been restored to the police and federal courts no longer require a special panel to oversee the tactics.

Mr. Browne, the police spokesman, said the department did not increase its surveillance of political groups when the restrictions were eased. The powers obtained after Sept. 11 have been used exclusively "to investigate and thwart terrorists," Mr. Browne said. He would not answer specific questions about the disguised officers or describe any limits the department placed on surveillance at public events.

Jethro M. Eisenstein, one of the lawyers who brought the lawsuit 34 years ago, said: "This is a level-headed Police Department, led by a level-headed police commissioner. What in the world are they doing?"

For nearly four decades, civil liberty advocates and police officials have fought over the kinds of procedures needed to avoid excessive intrusion on people expressing their views, to provide accountability in secret police operations and to assure public safety for a city that has been the leading American target of terrorists.

To date, officials say no one has complained of personal damage from the information collected over recent months, but participants in the protests, rallies and other gatherings say the police have been a disruptive presence.

Ryan Kuonen, 32, who took part in a "ride of silence" in memory of a dead cyclist, said that two undercover officers - one with a camera - subverted the event. "They were just in your face," she said. "It made what was a really solemn event into something that seemed wrong. It made you feel like you were a criminal. It was grotesque."

Ms. Clancy, a founder of I-Witness Video, a project that collected hundreds of videotapes during the Republican National Convention that were used in the successful defense of people arrested that week, has assembled videotape of other public events made by legal observers, activists, bystanders and police officers.

She presented examples in October at a conference of defense lawyers. "What has to go on is an informed discussion of policing tactics at public demonstrations, and these images offer a window into the issues and allow the public to make up their own mind," Ms. Clancy said. "How is it possible for police to be accountable when they infiltrate events and dress in the garb of protesters?"

The videotapes that most clearly disclosed the presence of the disguised officers began in August 2004. What happened before that is unclear.

Among the events that have drawn surveillance is a monthly bicycle ride called Critical Mass. The Critical Mass rides, which have no acknowledged leadership, take place in many cities around the world on the last Friday of the month, with bicycle riders rolling through the streets to promote bicycle transportation. Relations between the riders and the police soured last year after thousands of cyclists flooded the streets on the Friday before the Republican National Convention. Officials say the rides cause havoc because the participants refuse to obtain a permit. The riders say they can use public streets without permission from the government.

In a tape made at the April 29 Critical Mass ride, a man in a football jersey is seen riding along West 19th Street with a group of bicycle riders to a police blockade at 10th Avenue. As the police begin to handcuff the bicyclists, the man in the jersey drops to one knee. He tells a uniformed officer, "I'm on the job." The officer in uniform calls to a colleague, "Louie - he's under." A second officer arrives and leads the man in the jersey - hands clasped behind his back - one block away, where the man gets back on his bicycle and rides off.

That videotape was made by a police officer and was recently turned over by prosecutors to Gideon Oliver, a lawyer representing bicycle riders arrested that night.

Another arrest that appeared to be a sham changed the dynamics of a demonstration. On Aug. 30, 2004, during the Republican National Convention, a man with vivid blond hair was filmed as he stood on 23rd Street, holding a sign at a march of homeless and poor people. A police lieutenant suddenly moved to arrest him. Onlookers protested, shouting, "Let him go." In response, police officers in helmets and with batons pushed against the crowd, and at least two other people were arrested.

The videotape shows the blond-haired man speaking calmly with the lieutenant. When the lieutenant unzipped the man's backpack, a two-way radio could be seen. Then the man was briskly escorted away, unlike others who were put on the ground, plastic restraints around their wrists. And while the blond-haired man kept his hands clasped behind his back, the tape shows that he was not handcuffed or restrained.

The same man was videotaped a day earlier, observing the actress Rosario Dawson as she and others were arrested on 35th Street and Eighth Avenue as they filmed "This Revolution," a movie that used actual street demonstrations as a backdrop. At one point, the blond-haired man seemed to try to rile bystanders.

After Ms. Dawson and another actress were placed into a police van, the blond-haired man can be seen peering in the window. According to Charles Maol, who was working on the film, the blond-haired man is the source of a voice that is heard calling: "Hey, that's my brother in there. What do you got my brother in there for?"

After Mr. Browne was sent photographs of the people involved in the convention incidents and the bicycle arrests, he said, "I am not commenting on descriptions of purported or imagined officers."

The federal courts have long held that undercover officers can monitor political activities for a "legitimate law enforcement purpose." While the police routinely conduct undercover operations in plainly criminal circumstances - the illegal sale of weapons, for example - surveillance at political events is laden with ambiguity. To retain cover in those settings, officers might take part in public dialogue, debate and demonstration, at the risk of influencing others to alter opinions or behavior.

The authority of the police to conduct surveillance of First Amendment activities has been shaped over the years not only by the law but also by the politics of the moment and the perception of public safety needs.

In the 1971 class-action lawsuit, the city acknowledged that the Police Department had used infiltrators, undercover agents and fake news reporters to spy on yippies, civil rights advocates, antiwar activists, labor organizers and black power groups.

A former police chief said the department's intelligence files contained a million names of groups and individuals - more in just the New York files than were collected for the entire country in a now-discontinued program of domestic spying by the United States Army around the same time. In its legal filings, the city said any excesses were aberrational acts.

The case, known as Handschu for the lead plaintiff, was settled in 1985 when the city agreed to extraordinary new limits in the investigation of political organizations, among them the creation of an oversight panel that included a civilian appointed by the mayor. The police were required to have "specific information" that a crime was in the works before investigating such groups.

The Handschu settlement also limited the number of police officers who could take part in such investigations and restricted sharing information with other agencies.

Over the years, police officials made no secret of their belief that the city had surrendered too much power. Some community affairs officers were told they could not collect newspaper articles about political gatherings in their precincts, said John F. Timoney, a former first deputy commissioner who is now the chief of police in Miami.

The lawyers who brought the Handschu lawsuit say that such concerns were exaggerated to make limits on police behavior seem unreasonable. The city's concessions in the Handschu settlement, while similar to those enacted during that era in other states and by the federal government, surpassed the ordinary limits on police actions.

"It was to remedy what was a very egregious violation of people's First Amendment rights to free speech and assemble," said Jeremy Travis, the deputy police commissioner for legal affairs from 1990 to 1994.

At both the local and federal level, many of these reforms effectively discouraged many worthy investigations, Chief Timoney said. "The police departments screw up and we go to extremes to fix it," Chief Timoney said. "In going to extremes, we leave ourselves vulnerable."

Mr. Travis, who was on the Handschu oversight panel, said that intelligence officers understood they could collect information, provided they had good reason.

"A number of courts decided there should be some mechanism set up to make sure the police didn't overstep the boundary," said Mr. Travis, who is now the president of John Jay College of Criminal Justice. "It was complicated finding that boundary." The authority to determine the boundary would be handed back to the Police Department after the Sept. 11 attacks.

On Sept. 12, 2002, the deputy police commissioner for intelligence, David Cohen, wrote in an affidavit that the police should not be required to have a "specific indication" of a crime before investigating. "In the case of terrorism, to wait for an indication of crime before investigating is to wait far too long," he wrote.

Mr. Cohen also took strong exception to limits on police surveillance of public events.

In granting the city's request, Charles S. Haight, a federal judge in Manhattan, ruled that the dangers of terrorism were "perils sufficient to outweigh any First Amendment cost."

New guidelines say undercover agents may be used to investigate "information indicating the possibility of unlawful activity"- but also say that commanders should consider whether the tactics are "warranted in light of the seriousness of the crime."

Ms. Clancy said those guidelines offered no clear limits on intrusiveness at political or social events. Could police officers take part in pot-luck suppers of antiwar groups, buy drinks for activists? Could they offer political opinions for broadcast or publication while on duty but disguised as civilians?

Mr. Browne, the police spokesman, declined to answer those questions. Nor would he say how often - if ever - covert surveillance at public events has been approved by the deputy commissioner for intelligence, as the new guidelines require.
http://www.nytimes.com/2005/12/22/ny...rtner=homepage





Federal Agents' Visit Was A Hoax

Student admits he lied about Mao book
Aaron Nicodemus

The UMass Dartmouth student who claimed to have been visited by Homeland Security agents over his request for "The Little Red Book" by Mao Zedong has admitted to making up the entire story.

The 22-year-old student tearfully admitted he made the story up to his history professor, Dr. Brian Glyn Williams, and his parents, after being confronted with the inconsistencies in his account.

Had the student stuck to his original story, it might never have been proved false.

But on Thursday, when the student told his tale in the office of UMass Dartmouth professor Dr. Robert Pontbriand to Dr. Williams, Dr. Pontbriand, university spokesman John Hoey and The Standard-Times, the student added new details.

The agents had returned, the student said, just last night. The two agents, the student, his parents and the student's uncle all signed confidentiality agreements, he claimed, to put an end to the matter.

But when Dr. Williams went to the student's home yesterday and relayed that part of the story to his parents, it was the first time they had heard it. The story began to unravel, and the student, faced with the truth, broke down and cried.

It was a dramatic turnaround from the day before.

For more than an hour on Thursday, he spoke of two visits from Homeland Security over his inter-library loan request for the 1965, Peking Press version of "Quotations from Chairman Mao Tse-Tung," which is the book's official title.

His basic tale remained the same: The book was on a government watch list, and his loan request had triggered a visit from an agent who was seeking to "tame" reading of particular books. He said he saw a long list of such books.

In the days after its initial reporting on Dec. 17 in The Standard-Times, the story had become an international phenomenon on the Internet. Media outlets from around the world were requesting interviews with the students, and a number of reporters had been asking UMass Dartmouth students and professors for information.

The story's release came at a perfect storm in the news cycle. Only a day before, The New York Times had reported that President Bush had allowed the National Security Agency to conduct wiretaps on international phone calls from the United States without a warrant. The Patriot Act, created in the aftermath of the Sept. 11, 2001, attacks to allow the government greater authority to monitor for possible terrorism activities, was up for re-authorization in Congress.

There was an increased sense among some Americans that the U.S. government was overstepping its bounds and trampling on civil liberties in order to thwart future attacks of terrorism. The story of a college student being questioned for requesting a 40-year old book on Communism fed right into that atmosphere.

In Thursday's retelling of the story, the student added several new twists, ones that the professors and journalist had not heard before. The biggest new piece of information was an alleged second visit of Homeland Security agents the previous night, where two agents waited in his living room for two hours with his parents and brother while he drove back from a retreat in western Massachusetts. He said he, the agents, his parents and his uncle all signed confidentiality agreements that the story would never be told.

He revealed the agents' names: one was Nicolai Brushaev or Broshaev, and the other was simply Agent Roberts. He said they were dressed in black suits with thin black ties, "just like the guys in Men in Black."

He had dates and times and places, things he had signed and sent back in order to receive the book. The tale involved his twin brother, who allegedly requested the book for him at UMass Amherst; his uncle, a former FBI attorney who took care of all the paperwork; and his parents, who signed those confidentiality agreements.

But by now, the story had too many holes. Every time there was a fact to be had that would verify the story -- providing a copy of the confidentiality agreements the student and agent signed, for example -- there would be a convenient excuse. The uncle took all the documents home to Puerto Rico, he said.

What was the address of the Homeland Security building in Boston where he and his uncle visited the agency and actually received a copy of the book? It was a brick building, he said, but he couldn't remember where it was, or what was around it.

He said he met a former professor at the mysterious Homeland Security building who had requested a book on bomb-making, along with two Ph.D. students and a one pursuing a master's degree who had also been stopped from accessing books. The student couldn't remember their names, but the former professor had appeared on the Bill O'Reilly show on Fox News recently, he said.

The former professor's appearance on The O'Reilly Factor did not check out.

Other proof was sought.

Were there any copies of the inter-library loan request? No.

Did the agents leave their cards, or any paperwork at your home? No.

His brother, a student at Amherst, told Dr. Williams that he had never made the inter-library loan request on behalf of his brother.

While The Standard-Times had tape recorded the entire tale on Thursday, the reporter could not reach the student for comment after he admitted making up the story. Phone calls and a note on the door were not returned.

At the request of the two professors and the university, The Standard-Times has agreed to withhold his name.

During the whole episode, the professors said that while they wanted to protect the student from the media that were flooding their voice mails and e-mail boxes seeking comment and information, they also wanted to know: Was the story true?

"I grew skeptical of this story, as did Bob, considering the ramifications," Dr. Williams said yesterday. "I spent the last five days avoiding work, and the international media, and rest, trying to get names and dates and facts. My investigation eventually took me to his house, where I began to investigate family matters. I eventually found out the whole thing had been invented, and I'm happy to report that it's safe to borrow books."

Dr. Williams said he does not regret bringing the story to light, but that now the issue can be put to rest.

"I wasn't involved in some partisan struggle to embarrass the Bush administration, I just wanted the truth," he said.

Dr. Pontbriand said the entire episode has been "an incredible experience and exposure for something a student had said." He said all along, his only desire had been to "get to the bottom of it and get the truth of the matter."

"When it blew up into an international story, our only desire was to interview this student and get to the truth. We did not want from the outset to declare the student a liar, but we wanted to check out his story," he said. "It was a disastrous thing for him to do. He needs attention, he needs care. I feel for the kid. We have great concern for this student's health and welfare."

Mr. Hoey, the university spokesman, said the university had been unable to substantiate any of the facts of the story since it first was reported in The Standard-Times on Dec. 17.

As to any possible repercussions against the student, Mr. Hoey said, "We consider this to be an issue to be handled faculty member to student. We wouldn't discuss publicly any other action. Student discipline is a private matter."

Dr. Williams said the whole affair has had one bright point: The question of whether it is safe for students to do research has been answered.

"I can now tell my students that it is safe to do research without being monitored," he said. "With that hanging in the air like before, I couldn't say that to them."

The student's motivation remains a mystery, but in the interview on Thursday, he provided a glimpse.

"When I came back, like wow, there's this circus coming on. I saw my cell phone, and I see like, wow, I have something like 75 messages and like something like 87 missed calls," he said. "Wow, I was popular. I usually get one or probably two a week and that's about it, and I usually pick them up."
http://www.southcoasttoday.com/daily...5/a01lo719.htm
JackSpratts is offline   Reply With Quote