Posts Tagged ‘surveillance’

“If you’re not a terrorist, if you’re not a threat, prove it. This is the price you pay to live in free society right now. It’s just the way it is.”—Sergeant Ed Mullins of the New York Police Department

Immediately following the devastating 9/11 attacks, which destroyed the illusion of invulnerability which had defined American society since the end of the Cold War, many Americans willingly ceded their rights and liberties to government officials who promised them that the feeling of absolute safety could be restored.

In the 12 years since, we have been subjected to a series of deceptions, subterfuges and scare tactics by the government, all largely aimed at amassing more power for the federal agencies and extending their control over the populace. Starting with the wars in Afghanistan and Iraq, continuing with the torture of detainees at Abu Ghraib and Guantanamo Bay, and coming to a head with the assassination of American citizens abroad, the importing of drones and other weapons of compliance, and the rise in domestic surveillance, we have witnessed the onslaught of a full-blown crisis in government.

Still Americans have gone along with these assaults on their freedoms unquestioningly.

Even with our freedoms in shambles, our country in debt, our so-called “justice” system weighted in favor of corporations and the police state, our government officials dancing to the tune of corporate oligarchs, and a growing intolerance on the part of the government for anyone who challenges the status quo, Americans have yet to say “enough is enough.”

Now, in the wake of the Boston Marathon bombing, we are once again being assured that if we only give up a few more liberties and what little remains of our privacy, we will achieve that elusive sense of security we’ve yet to attain. This is the same song and dance that comes after every tragedy, and it’s that same song and dance which has left us buying into the illusion that we are a free, safe society.

The reality of life in America tells a different tale, however. For example, in a May 2013 interview with CNN, former FBI counterterrorism agent Tim Clemente disclosed that the federal government is keeping track of all digital communications that occur within the United States, whether or not those communicating are American citizens, and whether or not they have a warrant to do so.

As revelatory as the disclosure was, it caused barely a ripple of dismay among Americans, easily distracted by the torrent of what passes for entertainment news today. Yet it confirms what has become increasingly apparent in the years after 9/11: the federal government is literally tracking any and all communications occurring within the United States, without concern for the legal limitations of such activity, and without informing the American people that they are doing so.

Clemente dropped his bombshell during a CNN interview about authorities’ attempts to determine the nature of communications between deceased Boston bombing suspect Tamerlan Tsarnaev and his widow Katherine Russell. In the course of that conversation, Clemente revealed that federal officials will not only be able to access any voicemails that may have been left by either party, but that the entirety of the phone conversations they had will be at federal agents’ finger tips.

“We certainly have ways in national security investigations to find out exactly what was said in that conversation,” stated Clemente. “All of that stuff [meaning phone conversations occurring in America] is being captured as we speak whether we know it or like it or not.” A few days later, Clemente was asked to clarify his comments, at which point he said, “There is a way to look at all digital communications in the past. No digital communication is secure.”

In other words, there is no form of digital communication that the government cannot and does not monitor—phone calls, emails, text messages, tweets, Facebook posts, internet video chats, etc., are all accessible, trackable and downloadable by federal agents.

At one time, such actions by the government would not only have been viewed as unacceptable, they would also have been considered illegal. However, government officials have been engaged in an ongoing attempt to legitimize these actions by passing laws that make the lives of all Americans an open book for government agents. For example, while the nation was caught up in the drama of the Boston bombing and the ensuing military-style occupation of the city by local and federal police, Congress passed a little-noticed piece of legislation known as the Cyber Intelligence Sharing and Protection Act (CISPA). The legislation, which the House of Representatives approved by an overwhelming margin of 288-127, will allow internet companies to share their users’ private data with the federal government and other private companies in order to combat so-called “cyber threats.”

In short, the law dismantles any notion of privacy on the internet, opening every action one undertakes online, whether emailing, shopping, banking, or just browsing, to scrutiny by government agents. While CISPA has yet to clear the U.S. Senate Committee on Commerce, Science, and Transportation, the spirit of it is alive and well. In fact, officials in the Obama administration have for some time now been authorizing corporate information sharing and spying in secret through the use of executive orders and other tactics.

The Justice Department, for instance, has been issuing so-called “2511 letters” to various internet service providers like AT&T, which immunize them from being prosecuted under federal wiretapping laws for providing the federal government with private information. Despite federal court rulings to the contrary, the Department of Justice continues to assert that it does not require a warrant to access Americans’ emails, Facebook chats, and other forms of digital communication.

NSA Surveillance Octopus

While it may be tempting to lay the full blame for these erosions of our privacy on the Obama administration, they are simply continuing a system of mass surveillance, the seeds of which were planted in the weeks after 9/11, when the National Security Agency (NSA) began illegally tracking the communications of American citizens. According to a Washington Post article published in 2010, the NSA continues to collect 1.7 billion communications, whether telephone, email or otherwise, every single day.

The NSA and Department of Justice are just two pieces of a vast surveillance network which encompasses and implicates most of the federal government, as well as the majority of technology and telecommunications companies in the United States. For the past two years, the United States Foreign Intelligence Surveillance Court has approved literally every single request by the federal government to spy on people within the United States. There have been some 4,000 applications rubberstamped by the court in the past two years, applications which allow federal officials to monitor the communications of any person in the United States, including American citizens, if they are believed to be in contact with someone overseas.

These government-initiated spying programs depend in large part on the willingness of corporations to hand over personal information about their customers to government officials. Sometimes the government purchases the information outright. At other times, the government issues National Security Letters, which allow the government to force companies to hand over personal information without a warrant or probable cause.

Some web companies, such as Skype, have already altered their products to allow government access to personal information. In fact, government agents can now determine the credit card information and addresses of Skype users under suspicion of criminal activity. Aside from allowing government agents backdoor access to American communications, corporations are also working on technologies to allow government agents even easier access to Americans’ communications.

For example, Google has filed a patent for a “Policy Violation Checker,” software which would monitor an individual’s communications as they type them out, whether in an email, an Excel spreadsheet or some other digital document, then alert the individual, and potentially their employer or a government agent, if they type any “problematic phrases” which “present policy violations, have legal implications, or are otherwise troublesome to a company, business, or individual.” The software would work by comparing the text being typed to a pre-defined database of “problematic phrases,” which would presumably be defined on a company-by-company basis.

The emergence of this technology fits in well with Google chairman Eric Schmidt’s view on privacy, which is that “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.” Unfortunately, this is not just the attitude of corporate benefactors who stand to profit from creating spy technology and software but government officials as well.

Additionally, police officials throughout the country have become increasingly keen on monitoring social media websites in real time. Rob D’Ovido, a criminal justice professor at Drexel University, has noted that, “The danger of this in light of the tragedy in Boston is that law enforcement is being so risk-averse they are in danger of crossing that line and going after what courts would ultimately deem as free speech.”

Cameron Dambrosio

For example, Cameron Dambrosio, a teenager and self-styled rap artist living in Metheun, Massachusetts, posted a video of one of his original songs on the internet which included references to the White House and the Boston bombing. While the song’s lyrics may well have been crude and ill-advised in the wake of the Boston bombing, police officers exacerbated the situation by arresting Dambrosio and charging him with communicating terrorist threats, a felony charge which could land him in prison for twenty years.

Unfortunately, cases like Dambrosio’s may soon become the norm, as the FBI’s Next Generation Cyber Initiative has announced that its “top legislative priority” this year is to get social media giants like Facebook and Google to comply with requests for access to real-time updates of social media websites. The proposed method of encouraging compliance is legal inquiries and hefty fines leveled at these companies. The Obama administration is expected to support the proposal.

The reality is this:  we no longer live in a free society. Having traded our freedoms for a phantom promise of security, we now find ourselves imprisoned in a virtual cage of cameras, wiretaps and watchful government eyes. All the while, the world around us is no safer than when we started on this journey more than a decade ago. Indeed, it well may be that we are living in a far more dangerous world, not so much because the terrorist threat is any greater but because the government itself has become the greater threat to our freedoms. — John W. Whitehead

“There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.”—George Orwell,1984

Advanced technology now provides government agents and police officers with the ability to track our every move. The surveillance state is our new society. It is here, and it is spying on you, your family and your friends every day. Worse yet, those in control are using life’s little conveniences, namely cell phones, to do much of the spying. And worst of all, the corporations who produce these little conveniences are happy to hand your personal information over to the police so long as their profit margins increase. To put it simply, the corporate-surveillance state is in full effect, and there is nowhere to hide.

Using the data transferred from, received by, and stored in your cell phone, police are now able to track your every move. Your texts, web browsing, and geographic location are all up for grabs. Using “stingray” devices, often housed in mobile surveillance vans, federal agents track the cell phones of unsuspecting people. By triangulating the source of a cell phone signal, agents are able to track down the whereabouts of the person holding it. Just recently, the Washington Post reported that federal investigators in Northern California routinely used StingRays “to scoop up data from cellphones and other wireless devices in an effort to track criminal suspects — but failed to detail the practice to judges authorizing the probes.”

The issues, judges and activists say, are twofold: whether federal agents are informing courts when seeking permission to monitor suspects, and whether they are providing enough evidence to justify the use of a tool that sweeps up data not only from a suspect’s wireless device but also from those of bystanders in the vicinity…

The Justice Department has generally maintained that a warrant based on probable cause is not needed to use a “cell-site simulator” because the government is not employing them to intercept conversations, former officials said. But some judges around the country have disagreed and have insisted investigators first obtain a warrant…

Chris Soghoian, the ACLU’s principal technologist, said cell-site simulators are being used by local, state and federal authorities. “No matter how the StingRay is used — to identify, locate or intercept — they always send signals through the walls of homes,” which should trigger a warrant requirement, Soghoian said. “The signals always penetrate a space protected by the Fourth Amendment.”

These surveillance sweeps target all cell phone signals, not just those of criminal suspects. Examples of extralegal police surveillance in the years since 9/11 are numerous, from the NSA’s warrantless wiretapping program to the NYPD’s spy network that targeted Muslims in the New York area.

Unfortunately, the now widespread tactic of spying on people via their cell phones resides in a legal grey area, which has allowed police agencies to take drastic steps to record the daily activity of all Americans. Whereas cell phone tracking once fell only in the purview of federal agents, local police departments, big and small, are beginning to engage in cell phone tracking with little to no oversight. Small police agencies are shelling out upwards of $244,000 to get the technology necessary to track cell phones. And as you might expect, most police departments have attempted to keep knowledge of their cell phone tracking programs secret, fearing (as they should) a public backlash.

Federal courts are divided on the issue, some saying that a warrant is necessary before executing a cell phone search. However, the United States Court of Appeals for the Sixth Circuit recently ruled that tracking the location of a cell phone without a warrant is legal and, thus, not a violation of the Fourth Amendment. This lack of concern for the Fourth Amendment—which requires reasonable suspicion that you’re up to something illegal before the police conduct surveillance on you—is widely shared among the federal and state courts. In fact, courts issue tens of thousands of cell tracking orders a year, allowing police agencies to accurately pinpoint people’s locations within meters. Unless they’re charged with a crime, most people remain unaware that their cell data has been tracked.

Although government agencies are increasingly acquiring the technology to track cell phones themselves, most rely on cell phone companies to provide them with the user data. In July 2012, it was revealed that cell phone carriers had responded to an astonishing 1.3 million requests from police agencies for personal information taken from people’s cell phones. One of the larger carriers, AT&T, responds to roughly 700 requests a day, 230 of which are so-called “emergencies,” exempting them from standard court orders. This number has tripled since 2007. A relatively small carrier, C Spire Wireless, said that it received 12,500 requests in 2011. Sprint received the most requests, averaging 1,500 per day. The number of requests is almost certainly higher than 1.3 million, and the number of people affected much higher, because a single request often involves targeting multiple people.

The problem is exacerbated by the fact that the telecommunications companies which produce cell phone technology are more than happy to comply with government requests for personal information. They even make a handsome profit from selling the details of your private life to the government. Indeed, cell phone carriers are making a killing charging police agencies “surveillance fees”—from a few hundred to a few thousands dollars per request—to share information on a person’s location and activities. AT&T collected $8.3 million in 2011 for their surveillance activities, up from $2.8 million in 2007.

Telecommunications providers have also come up with price lists for easy reference for police agencies. For example, “Sprint charged $120 per target number for ‘Pictures and Video,’ $60 for ‘E-Mail,’ $60 for ‘Voicemail,’ and $30 for ‘SMS Content.’” Sprint actually has 110 employees who work solely on responding to information requests from the government. And government agents need not worry about maximizing resources by seeking only high priority targets. One agent can track 200 or 300 people at a time.

On the rare occasion that a telecom corporation resists a police effort to spy on a particular cell phone customer, there are methods by which companies are coerced to comply with the data requests. Telecoms are frequently harassed by the FBI with National Security Letters (NSL), which are demands for user information without warrant or judicial oversight. These include a gag order, which prevents the recipient from discussing the demand with others, including the media. Roughly 300,000 of these NSLs have been sent out since 2000, implying a massive spying effort on the part of the federal government. One telecom is currently in a battle with the federal government over an NSL demanding user data. The telecom refused to abide by the NSL, and in response the federal government has sued the telecom, insisting that their refusal jeopardizes national security. The end logic of this is that our private data is actually not private. The federal government claims that knowing our personal information is critical to preserving national security, and thus neither telecoms nor users may resist the sharing of that information.

Of course, corporations are just as interested in tracking people’s daily activities as the government. Cell phone companies and the software companies that create applications for their devices track your personal information so that they can market their services to you. Unfortunately, this leads to mass aggregation of user data which is then used by government agents to spy on and track all cell phone users. For example, Carrier IQ, a software company, and cell phone manufacturers HTC and Samsung are currently in the midst of a class-action lawsuit brought by Android phone users whose phone activities are recorded by a “rootkit,” a piece of software surreptitiously installed on cell phones that records the keystrokes of phone users. The FBI denied a December 2011 FOIA request to determine how the government was utilizing Carrier IQ’s software, as it could have an adverse impact on ongoing investigations. The agency’s refusal suggests that not only is Carrier IQ spying on cell phone users for their corporate purposes, but that federal agents are utilizing the software to conduct their own spying campaigns.

Unfortunately, with intelligence gathering and surveillance doing booming business, and corporations rolling out technologies capable of filtering through vast reams of data, tapping into underseas communication cables, and blocking websites for entire countries, life as we know it will only get worse. As journalist Pratap Chatterjee has noted, “[T]hese tools have the potential to make computer cables as dangerous as police batons.” Telecoms hold on to user data, including text messages and Internet browsing history, for months to years at a time. This, of course, has some ominous implications. For example, British researchers have created an algorithm that accurately predicts someone’s future whereabouts at a certain time based upon where she and her friends have been in the past.

So where does this leave us? As George Orwell warned, you have to live with the assumption that everything you do, say and see is being tracked by those who run the corporate surveillance state.