-Caveat Lector- www.ctrl.org DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at:

http://www.mail-archive.com/[EMAIL PROTECTED]/ <A HREF="">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

--- Begin Message --- -Caveat Lector-
Surveillance and the War on Terrorism

by Jim Harper

Jim Harper is director of information policy studies at the Cato Institute

Ask any CEO about the power of branding, and you'll get an earful. Most corporate chiefs would give anything to have the positive brand recognition of a Coke, a Kodak or a Google.

The architects of the surveillance state are using brand management, too, but with precisely the opposite purpose: to escape negative recognition. A case in point is a provision in an intelligence reform bill that passed the Senate last week. It calls for a "trusted" government surveillance network.

Few have forgotten the Defense Department's doomed surveillance proposal, Total Information Awareness. It would have comprehensively scanned the commercial activities and communications of all Americans in an attempt to weed out terrorists. It was lamely rebranded "Terrorism Information Awareness" before Congress terminated the program.

But Total Information Awareness may not stay dead all that long. The Senate intelligence bill, now being reconciled with similar House legislation, calls for a new "trusted information environment." The bill is, at best, ambiguous about how widely it would sweep as it conscripts privately held data for surveillance purposes.

Of course, Congress cannot decree that such a network will be "trusted." That is up to the American people. If government investigators are going to put citizens' eBay listings and credit-card records in the same pool as information about Hamas leaders, one doubts that trust will be forthcoming. And calling this surveillance network an "environment" will not make it more palatable either.

The idea for a "trusted" information network comes from a group assembled by the Markle Foundation, a New York nonprofit, that articulated such a program late last year. The group has tried to grab the high ground by painting opponents of comprehensive surveillance as anti-technology Luddites. Defending Total Information Awareness, the Markle group said, "We are disappointed that Congress found it necessary to ban research and development of technologies that would make use of privately held data."

But searching privately held data without a warrant is not a technology: It is a policy, and a bad one. The Markle group has analyzed the federal laws that control government access to private-sector information, a road map of sorts for law changes that will fold private data even further into national surveillance.

If there is to be a network, the mission should define the network, rather than the network defining the mission. Let there be networked delivery of warrants dealing with particular suspects, and networked responses to those warrants. Using technology consistent with the Constitution is perfectly acceptable, and there is no need for new legal authority if a network serves an existing legitimate purpose. But any technology that promises something "better" than law enforcement consistent with the Constitution -- well, that's just not better.

The rebranding of government surveillance programs continues with CAPPS II, the Computer Assisted Passenger Pre-Screening System -- now called "Secure Flight." The Transportation Security Administration put together this intrusive traveler background-check system to fight a crucial battle in the war on terrorism, but one that has probably passed as the terrorists move to new techniques. CAPPS II fell under the weight of congressional scrutiny when it abjectly failed to provide adequate protections for due process, privacy and other interests, as found by a Government Accountability Office study.

When he announced the supposed end of CAPPS II, Secretary of Homeland Security Tom Ridge joked about putting a dagger through its heart. Even a wooden stake, garlic and holy water would not have worked, unfortunately, because his foe is far more resilient than any vampire or zombie. CAPPS III/Secure Flight is up and walking around. It will soon be tested using data commandeered from the airlines regarding everyone who traveled domestically during June 2004. CAPPS III shares many hallmarks of the failed CAPPS II, though little information about the program is available yet. Foremost, Privacy Act protections will not apply, due to a law enforcement/national security exception to the act. This treats every American who flew domestically during June 2004 as a terrorism suspect. Travelers will not be allowed to decline participation.

The CAPPS III/Secure Flight program places no limits on how long data will be retained. Mission creep will inevitably lead the program to maintain records of Americans' travels well beyond the time when there is a legitimate terrorism-prevention purpose.

Finally, CAPPS III will use data compiled by commercial data aggregators in ways that have yet to be defined. This is an end run around the Privacy Act that deserves debate before federal agencies assume it is acceptable. Renaming CAPPS II "Secure Flight" does not change or make its avoidance of the Privacy Act acceptable.

Some consumer data companies, retailers and Internet companies may view the government surveillance market as a good one for them. They should think twice. The companies that sell data to government for this purpose, and the companies that sell data to those companies, may find themselves needing to re- brand because of public revulsion at the practice.

This article originally appeared in the San Francisco Chronicle on October 15, 2004.


"Get off your ass and take your government back." ~Rocky Ward

www.federalobserver.com

http://groups.yahoo.com/group/libertarianisland/


Do you Yahoo!?
Yahoo! Mail Address AutoComplete - You start. We finish.

Complete archives at http://www.sitbot.net/

Please let us stay on topic and be civil.

OM



Yahoo! Groups Sponsor
ADVERTISEMENT
click here


Yahoo! Groups Links

www.ctrl.org DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at:

http://www.mail-archive.com/[EMAIL PROTECTED]/ <A HREF="">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om
--- End Message ---

Reply via email to