Tag Archives: GIWG

FBI to launch nationwide facial recognition service

Kaye Beach

Oct 9, 2011

This is just the tip of the iceberg….

From NextGov.com

By Aliya Sternstein 10/07/2011

The FBI by mid-January will activate a nationwide facial recognition service in select states that will allow local police to identify unknown subjects in photos, bureau officials told Nextgov.

The federal government is embarking on a multiyear, $1 billion dollar overhaul of the FBI’s existing fingerprint database to more quickly and accurately identify suspects, partly through applying other biometric markers, such as iris scans and voice recordings.

Often law enforcement authorities will “have a photo of a person and for whatever reason they just don’t know who it is [but they know] this is clearly the missing link to our case,” said Nick Megna, a unit chief at the FBI’s criminal justice information services division. The new facial recognition service can help provide that missing link by retrieving a list of mug shots ranked in order of similarity to the features of the subject in the photo.

Read more

Looking Back-A Refresher

A compulsory global biometric identification system for law abiding people is not, will never be justifiable.

Our government seems to have backed off on their denials that Real ID and similar legislation is in fact, a national ID.  But what you should know is that any national ID system is also international.  It’s all about sharing these days and that means with our “international Partners’ too

The following is just a mere sampling of news articles, government documents and sources of information that clearly show the absolute intention to use our state driver’s licenses and the biometric data collected for them, as a an instrument of global identification,  tracking and control.

2003

Viisage receives $12 million award from Oklahoma

FEBRUARY 19, 2003–Viisage Technology Inc. (Littleton, MA; http://www.viisage.com) has been chosen to fulfill the new digital driver’s license contract by the state of Oklahoma’s Department of Public Safety. The contract will include the design, development, and implementation of the statewide secure license production program. The total value of this new multiyear contract is approximately $12 million. Oklahoma is the 19th state to utilize Viisage in the production of identity verification documents and the third state in recent months to give Viisage a major driver’s license contract. The three latest contracts total approximately $35 million. The solution will integrate multiple, advanced identification security features, including FaceEXPLORER facial-recognition software and SAGEM Morpho finger imaging technology

http://tinyurl.com/ViisageOKla

Oklahoma has collected Face, Fingerprint scans and signature biometrics since 2004

Biometric Drivers Licenses Make Debut in Oklahoma

April 20, 2004

SAGEM Morpho, Inc. a proven provider of mission-critical biometric systems and services, announced the successful deployment of biometric technology solutions for the Oklahoma Department Public Safety (DPS) in conjunction with Viisage, a provider of advanced technology identity solutions. SAGEM Morpho will combine its finger imaging recognition technology with Viisage’s facial recognition technology to create accurate biometric records of the state’s approximately four million licensed drivers.  http://www.tmcnet.com/usubmit/2004/apr/1033349.htm

NLETS the International Justice and Public Safety Information Sharing Network, links together every state, local, and federal and International law enforcement (INTERPOL), justice and public safety agency for the purpose of exchanging critical information http://www.nlets.org


2004

The NLETS Candle Project In a related NIJ-funded project, NLETS is working with the American Association of Motor Vehicle Administrators (AAMVA) to standardize critical information from departments of motor vehicles (DMVs) around the country.

The project, entitled Collaboration between AAMVA and NLETS for Driver’s License Exchange (Candle), seeks to develop and deploy standards and solutions to exchange standardized driver and motor vehicle records over the NLETS network.

Candle builds upon the existing NLETS infrastructure, as well as the Web services advancements made in the Aisle project, and seeks to deploy an international capability for driver and motor vehicle exchanges based upon XML standards, greatly increasing the efficiency. . .

The Candle project provides a first step in transitioning AAMVA to a new generation of technology. This effort will result in consolidating interstate DMV transactions into a single standardized service for both the DMV and law enforcement communities.

From The Police Chief, vol. 71, no. 6, June 2004. 
Copyright held by the International Association of Chiefs of Police,
 515 North Washington Street, Alexandria, VA 22314 USA.

AAMVA was directly involved in the crafting of the Real ID Act 2005. In the DHS-published final rules document for the Real ID Act, the AAMVA was referred to as its “hub” and “backbone.”’ UPDATE: Real ID

2006

Source-THE NEW PARADIGM—MERGING LAW ENFORCEMENT AND COUNTERTERRORISM STRATEGIES Secure Cities 2006 http://www.scribd.com/doc/21970726/IACP-Intelligence-Led-Policing-2006-New-Paradigm

2007

SB 474-Oklahoma prohibited participation in the REAL ID in 2007. (So far, 25 states either by law or resolution have done the same) Although Oklahoma lags behind other states in full implementation of Real ID, there is no reason to believe Oklahoma will not eventually come into full compliance with the act.

2007

FBI Seeks to Build Massive Identification System

 The Federal Bureau of Investigation awarded a $1B, 10-year contract to design, develop, document, integrate, test, and deploy the Next Generation Identification (NGI) System to Lockheed Martin. This new database will expand on the current fingerprint-based system; the FBI will increase its collection and storage not only fingerprints but also iris scans, palm prints and facial images.

The FBI is also in talks with the U.K. police to establish a unified database for the tracking of this biometric information.

The UK has said that the new NGI System could easily be integrated with the U.K.’s current Ident1 database

http://epic.org/privacy/biometrics/

2007 News article;

–The Homeland Security Department’s plans for sharing biometric information internationally designed to counter the threat of terrorism — face resistance from domestic privacy advocates and European governments that follow stricter privacy laws that protect personal data.

Senior DHS officials speaking at a recent conference on biometrics and privacy policy outlined the ethical imperative for technical standards that would foster unrestricted biometric data sharing.

Robert Mocny, acting program manager for the U.S. Visitor and Immigrant Status Indicator Technology program, sketched the outline of a Global Security Envelope of internationally shared biometric data that would permanently link individuals with their personal data held by governments and corporations.

“information sharing is appropriate around the world,” and DHS plans to create a “Global Security Envelope of internationally shared biometric data that would permanently link individuals with biometric ID, personal information held by governments and corporations”

—-Robert Mocny

Read more… http://www.gcn.com/print/26_03/43061-1.html

2007 The National Information Sharing Initiative ;

The Bush Administration’s 2007 National Information Sharing Strategy established state and local fusion centers as the federal government’s primary mechanism for collecting and disseminating domestic intelligence. 

The federal government has fueled the growth of these state and local intelligence centers, and has organized them into a national network that feeds information gathered at the local level into the Director of National Intelligence’s Information Sharing Environment (ISE), where it becomes accessible to all participating law enforcement agencies as well as the larger intelligence community. Link

The Biometric Interoperability Program promotes biometric-based information sharing between the Federal Bureau of Investigation’s (FBI) Integrated Automated Fingerprint Identification System (IAFIS) and other federal and international biometric systems.

http://www.biometriccoe.gov/_doc/FBI_CJIS_0808_One%20Pager_8%205x11_BIOMETRICS_v3.pdf

2008 -Fusion Centers Tap Into Personal Databases

Many fusion centers have not shared with the public what databases they use. This was demonstrated in an April 2, 2008 article in The Washington Post titled “Centers Tap into Personal Databases.” It revealed that several fusion centers in the northeast have access to millions of people’s information including unlisted cell phone numbers, insurance claims, driver’s license photographs

–Rebecca Andino, PMP, CIPP/G, president and founder of Highlight Technologies

______________________________

Ann Cavoukian, Ph.D. (Information and Privacy Commissioner for Ontario) and Alex Stoianov, Ph.D. point out that in the not too distant future a person’s unique biometric template could be used as an identifying key to link together all the different databases that contain entries for that person. It would enable someone to build up a complete picture of that individual without their knowledge or consent.

“When the use of biometrics grows, an ordinary person will be enrolled in various biometrically controlled databases, such as travel documents, driver licenses, health care, access control, banking, shopping, etc. Current biometric systems can use the same biometric template for all of them. The template becomes the ultimate unique identifier of the person. This is where biometric data mining comes into effect: the different databases, even if some of them are anonymous, may be linked together to create comprehensive personal profiles for all the users. To do this, no fresh biometric sample is even required. The linking of the databases can be done offline using template-to-template matching, in a very efficient one-to-many mode. The privacy implications explode at this point.”

 

2008

DHS Human Factors Division:  Social-Behavioral Threat Analysis

Mission:

To apply the social, behavioral and physical sciences to improve identification, analysis, and understanding of the threats posed by individuals, groups, and radical movements; to support community preparedness, response, and recovery to catastrophic events; and to advance national security by integrating the human element into homeland security science & technology. http://www.scribd.com/doc/27037194/Behave-Fast-Tsadhs

MONITORING EVERYDAY BEHAVIOR

In April 2008, the Wall Street Journal and the Los Angeles Times both reported on a new Los Angeles Police Department order that compels LAPD officers to begin reporting “suspicious behaviors” in addition to their other duties—creating a stream of “intelligence” about a host of everyday activities that, according to documents, will be fed to the local fusion center.


LAPD Special Order #11, dated March 5, 2008, states that it is the policy of the LAPD to “gather, record, and analyze information of a criminal or non-criminal nature, that could indicate activity or intentions related to either foreign or domestic terrorism,” and includes a list of 65 behaviors LAPD officers “shall” report. The list includes such innocuous, clearly subjective, and First Amendment protected activities as:

– taking measurements

– using binoculars

– taking pictures or video footage “with no apparent esthetic value”

– abandoning vehicle

– drawing diagrams

– taking notes

– espousing extremist views

LAPD’s Program is now the Nationwide SAR Initiative (NSI)

Nationwide SAR Initiative Vision: By 2014, every Federal, State, local, tribal and law enforcement entity operating domestically will participate in a standardized integrated approach to gather, document, process, analyze, and share terrorism-related suspicious activity

28 C.F.R. part 23

28 CRF Part 23 is a US Federal Code that basically says you cannot be entered into a criminal data system unless you are a legitimate suspect.  Not so anymore.

The April 2003 GIWG meeting minutes record approval for the weakening of 28 CFR 23 and note that GIWG member Daniel J. Oates indicated he was excited about the proposed changes to 28 CFR Part 23, specifically the area dealing with changing the reasonable suspicion collection criteria to reasonable indication. If the rule is passed, officers on the street can gather small bits of information that can be entered into an intelligence database. Under the old standard, this could not be done. Read more

28 C.F.R. Part 23 was promulgated pursuant to 42 U.S.C. §3789(g)(c) which requires state and local law enforcement agencies receiving federal funding  to

“…collect, maintain, and disseminate criminal intelligence  information in conformance with policy standards which are  prescribed by the Office of Justice Programs and which are written to  assure that the funding and operation of these systems further the purpose of this chapter and to assure that some systems are not  utilized in violation of the privacy and constitutional rights of individuals.

 

Why did we need 28 CFR 23?dep

The Department of Justice Office of Justice Programs (OJP) in 1993 explained;

“Because criminal intelligence information is both conjectural and subjective in nature, may be widely disseminated through the interagency exchange of information and cannot be accessed by criminal suspects to verify that the information is accurate and complete, the protections and limitations set forth in the regulation are necessary to protect the privacy interests of the subjects and potential suspects of a criminal intelligence system.”

They have decided that now-we are no longer due these legal protections.

It actually took them until 2008 before the desired weakening of federal code was officially achieved

In July  2008, the Department of Justice proposed a rule to amend the primary federal regulation governing criminal intelligence databases (28 CFR Part 23) to expand both what information can be collected by law enforcement agencies, and with whom it may be shared.  (see 73 Fed. Reg. 44673) read more

. . .the Department of Justice has relaxed restrictions on when the Federal Bureau of Investigation can begin investigations, and worked to increase intelligence-sharing among local, state, and federal law enforcement agencies as well as with federal (intelligence) agencies in ways that will compromise civil liberties (through a change in federal regulation 28 C.F.R. part 23).

Read more FBI Guidelines 28 C.F.R. part 23

2008

Comments on proposed amendments to 28 Code of Federal

Regulations Part 23 –

. . .intelligence fusion centers universally claimed  compliance with 28 CFR Part 23 as the appropriate regulation governing the conduct of  their intelligence collection efforts.

The Congressional Research Service reported that “many state and local law enforcement and fusion center staff” expressed concerns regarding sharing law enforcement sensitive information with non-law enforcement personnel including analysts working under contract to the Department of Homeland Security.10

In January 2008 the Director of National Intelligence (DNI) published “functional standards” for suspicious activity reports (SAR) produced by state and local law enforcement.

The DNI standards actually encourage state and local law enforcement to report non-criminal suspicious activities to the intelligence community by defining the scope of suspicious activity as “observed behavior that may be indicative of intelligence gathering or pre-operational planning related to terrorism, criminal, or other illicit intention.”

READ MORE

Oklahoma Information Fusion Center Privacy Policy;

The OIFC may retain information that is based on mere suspicion, such as tips and leads. Suspicious Activity Reports (SAR) information will be retained in the future once the SAR project is finalized and guidelines are issued to Fusion Centers.  http://www.scribd.com/doc/24732421/Oklahoma-Information-Fusion-center-Privacy-Policy

**Please Note-This is NOT a genuine OIFC Notice. If the OIFC files a suspicious activity report on you-You would never know it.

Nationwide Suspicious Activity Reporting Initiative IJIS (Fusion Centers)

http://www.scribd.com/doc/41496999/Nationwide-Suspicious-Activity-Reporting-Initiative-IJIS-Fusion-Centers

NSI

http://www.scribd.com/doc/21970535/Nationwide-SAR-suspicious-activity-reports-Initiative

SAR and Amtrak

http://www.scribd.com/doc/44933611/Nationwide-SAR-Initiative-Partnership-With-Amtrak

Oct. 20, 2008

International Police Organization Proposes Worldwide Facial Recognition System.

An Interpol face-recognition database would permit Interpol member nations to search records containing travelers’ personal biometric information, and could be used in conjunction with travel watch lists.

“There will be such a large role in the future for fingerprints and facial recognition”

— Mark Branchflower, head of Interpol’s fingerprint unit

2009

BIOMETRICS TASK FORCE

http://www.scribd.com/doc/26083198/Army-War-College-Bio-Metrics-Task-Force-April-15-2009

Across All Government Biometric Information Coordination

Collaboration Data Sharing Biometrics Mission Sets Population Census Targeting / Tracking Base & Checkpoint Security Police, Military, & Govt. Official Vetting Border Control / Ports of Entry (POEs) Detainee Operations

2008-2009

Homeland Security Presidential Directive 24, signed in 2008 and revalidated in 2009 by the current administration, mandates that interoperability with respect to biometrics spans the military, civil, and criminal arenas.

http://www.biometrics.dod.mil/Newsletter/issues/2009/Sep/V5issue3.html

FBI delves into DMV photos in search for fugitives

October 12, 2009

RALEIGH, N.C. — In its search for fugitives, the FBI has begun using facial-recognition technology on millions of motorists, comparing driver’s license photos with pictures of convicts in a high-tech analysis of chin widths and nose sizes.

The project in North Carolina has already helped nab at least one suspect. Agents are eager to look for more criminals and possibly to expand the effort nationwide. But privacy advocates worry that the method allows authorities to track people who have done nothing wrong.

http://www.publicintelligence.info/fbi-delves-into-dmv-photos-in-search-for-fugitives/

October 13, 2009

According to the AP’s report, the FBI has assembled a panel of experts tasked with standardizing drivers license photos and push use of biometric-mining nationwide. But the value of mining DMV records with the biometric software is limited for one simple reason, expressed perfectly by Marc Rotenberg of the Electronic Privacy Information Center. “We don’t have good photos of terrorists,” he explains.

 “Most of the facial-recognition systems today are built on state DMV records because that’s where the good photos are

http://www.thetruthaboutcars.com/fbi-mining-dmv-photos-for-fugitives

Fusion Centers “fuse” information shared between Military and Civilian forces, Public and Private Institutions, State Federal and International Governments.

September 15, 2009

WASHINGTON – The Department of Homeland Security (DHS) announced Monday that it was giving state and local fusion centers access to the classified military intelligence in Department of Defense (DOD) databases. The federal government has facilitated the growth of a network of fusion centers since 9/11 to expand information collection and sharing practices among law enforcement agencies, the private sector and the intelligence community.

http://www.aclu.org/national-security_technology-and-liberty/fusion-centers-obtain-access-classified-military-intelligen

2009 Biometric Consortium Conference

Biometric Enabled Intelligence has been a powerful tool in the law enforcement community, linking individuals to events, evidence and ultimately to solved crimes. That same concept can make biometrics a so what enabler of military operations, physical security, logical security, and forensic analysis by linking people, places, activities and events.

As we learn to link biometrics to biographic, geospatial, social networks and other forms of data, we can develop patterns of activities for both individuals and organizations

Mrs. Del Greco initiated two high profile, multi-million dollar  development efforts: “Next Generation Identification” (NGI), which will expand biometric and criminal history capabilities; and “Biometric Interoperability”, which will ensure information sharing between the FBI’s Integrated Automated Fingerprint Identification System (IAFIS) and other key biometric-based systems within the Federal Government and international partners

http://biometrics.org/bc2009/bios/delgreco_k.pdf

 

 Tag!  You’re It!

“Face recognition already exists through photo IDs, which can be used of individuals that are not enrolled”

http://www.scribd.com/doc/44675297/Sensor-Nets-the-Business-of-Surveillance

2010

Stripping Away Anonymity-The Secretary of Defense Funding Doc

“Biometrics technologies can be used to both verify an individual’s claimed identity and, when combined with additional intelligence and/or forensic information, biometrics technologies can establish an unknown individual’s identity, thus stripping away his anonymity. “

“This program will develop the technology that will improve the quality of biometrics derived information provided to the operational forces for the purpose of identifying and classifying anonymous individuals. It will enable execution of a DoD and interagency coordinated biometrics science and technology plan that supports technology transition to acquisition programs in FY10 and the out-years.”

See the document; www.dtic.mil/descriptivesum/Y2010/OSD/0603665D8Z.pdf

 

2010

Biometrics Identity Management Agency (BIMA)

Warfighter, Business, Intelligence, and Security & Law Enforcement

The Department of the Army General Order (DAGO) 2010-06, signed by the Secretary of the Army (SecArmy), redesignated BTF (biometrics task force) as the Biometrics Identity Management Agency (BIMA) on 23 March 2010.

Sept 1, 2010

Get REAL . . .

But open rebellion against REAL ID, which was so heated two or three years ago, has calmed considerably. States are no longer lining up to add themselves to the list of those refusing to fund of implement the federal law’s requirements.

Instead, many state motor vehicle departments are quietly doing the work to meet the law’s initial 18 benchmarks. According to DHS, all but the 14 holdout states say they’ll be able to meet the law’s operational requirements by the end of this year.

Read more

June 22, 2011

Making REAL ID a Reality: Next Steps for Congress

At least 32 states are close to REAL ID material compliance, while a total of 44 states and territories have indicated that they fully intend to meet REAL ID compliance

State unveils new, secure driver’s license

Starting Monday, Alabama residents will be able to obtain a new, more secure form of identification.In compliance with REAL ID Act of 2005, the Alabama De­partment of Public Safety has developed a driver’s license and identification program called STAR I.D. Congress passed the REAL ID Act in re­sponse to acts of terrorism against the United States.

Connecticut to begin controversial Real ID program

Connecticut launched a campaign today to publicize how to obtain a drivers license that meets the stricter verification standards of a federal “Real ID” law passed in 2005, but never implemented in face of objections from two dozen states

And Many. Many more!

“If You See Something, Say Something” Re-Branding the Brown Shirts



Kaye Beach

Feb 17, 2010

Think the comparison is extreme? It’s your call.

DHS expands ‘see something, say something’ campaign to fusion centers

Sept 15, 2010

Read More Here

DHS Expands If You See Something Say Something Campaign

Nov. 15, 2010

Read More Here

Secretary Napolitano Announces Expansion of “If You See Something, Say Something” Campaign to Walmart Stores Across the Nation

Release Date: December 6, 2010

Read More Here

If You See Something Say Something Expands To Federal Buildings

Dec 8, 2010

Read More Here

Secretary Napolitano Announces “If You See Something, Say Something™” Campaign Partnership with NBA

Release Date: February 15, 2011

Read more Here

When the snitching starts getting in your face at
Wal-Mart, you kind of have to start paying attention.  I’m so glad I quit that great American institution back when they started chipping under drawers. Before the next Homeland Security outrage turns our attention away from Ms. Napolitano’s wally-world endeavor, I’d like to take a little peek behind the curtain.

Where did “If You See Something, Say Something” come from?


See Something, Say Something is just a slogan for a much broader project– Suspicious Activity Reporting or SAR.

What is a SAR?

Suspicious Activity Reporting (SAR) is the process of documenting the observation of behavior that may be indicative of intelligence gathering or pre-operational planning related to terrorism, criminal, or other illicit intentions.

Nationwide SAR Initiative (NSI)

Integrates state, local, and tribal law enforcement agencies’ SAR processes into a nationwide standardized and institutionalized effort

More

The program is tied into the Fusion Centers’ Nationwide SAR Initiative (NSI)


The Fusion Center Guidelines states that, “nontraditional collectors of intelligence, such as public safety entities and private sector organizations” will ‘fused’ with law enforcement data” (formerly known as “criminal justice information” which indicated correctly that “law enforcement data” should be concerned with  legitimate criminal investigations)

“The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) builds on what law enforcement and other agencies have been doing for years—gathering information regarding behaviors and incidents associated with criminal activity. . .” (Emphasis mine)

This is NOT what law enforcement has been doing for years! Remember “reasonable suspicion“? How about “probable cause”?

Many, many laws and policies have been changed. It used to be that only legitimate criminals and suspects were permitted to be entered into a system of criminal records. The reason for this is obvious.

The Department of Justice Office of Justice Programs (OJP) in 1993 explained the reason very well.

“Because criminal intelligence information is both conjectural and subjective in nature, may be widely disseminated through the interagency exchange of information and cannot be accessed by criminal suspects to verify that the information is accurate and complete, the protections and limitations set forth in the regulation are necessary to protect the privacy interests of the subjects and potential suspects of a criminal intelligence system.” (Emphasis mine)

Things have changed.

The goal is information sharing across all jurisdictions, inter agency, interstate, international, public-private.  This goal is not limited to Fusion Centers or policing, it is ALL information.

Welcome to the ISE!


ISE stands for “Information Sharing Environment”

“The mission of the ISE is to improve the management, discovery, fusing, sharing, delivery of, and collaboration around terrorism-related information to enhance national security. . .”

Partners in the ISE

“The ISE is a partnership of five primary communities—Defense, Intelligence, Homeland Security, Foreign Affairs, and Law Enforcement”. . .These communities, moreover, cut across all levels of government in our federal system, involving state, local, and tribal partners as well as the private sector and international partners. . .”

The Program Manager of the ISE says;

“The scope of the ISE is best described in terms of end-to-end counterterrorism and homeland security mission processes—such as watchlisting, screening, and suspicious activity reporting—along with supporting core capabilities and enablers.”

Of course a partnership like this is too good to limit to simply terrorism.

“Key to progress in building the ISE, has been a relentless focus on identifying, integrating, and sharing best practices. Broad adoption of best practices raises confidence, lowers risk, and accelerates adoption, use, and reuse resulting in a strong return on investment by mission partners. In particular, the adoption of best practices has utility beyond the terrorism information sharing mission, extending both across complementary missions and into new mission areas unrelated to terrorism.” (Emphasis mine) LINK

America, we are now operating under a New Paradigm.


Here is another peep into the “New Paradigm”


Vision 2015

The Vision is “A Globally Networked and Integrated Intelligence Enterprise”

Enterprise is a buzzword being used throughout government these days. I don’t know about you, but the word “enterprise” brings to mind business and profit for me, not government.

Now the UK got the jump on plastering creepy Orwellian eyes posters all over their public transit centers.  In 2002 UK travelers got treated to these uber-spooky ads


Our government has many new policies that few are aware of but campaigns like “If You See Something, Say Something” have many wondering just what the heck is going on.

SAR (Suspicious Activity Reporting) is a pervasive, nationwide snitching program modeled on LAPD’s Special Order #11.

LAPD Special Order #11 was a Los Angeles Police Department order that compels LAPD officers to begin reporting “suspicious behaviors” to create a stream of “intelligence” about a host of everyday activities that will be fed to the local fusion center.

LAPD Special Order #11, dated March 5, 2008, states that it is the policy of the LAPD to “gather, record, and analyze information of a criminal or non-criminal nature, that could indicate activity or intentions related to either foreign or domestic terrorism,” and includes a list of 65 behaviors LAPD officers “shall” report.

The list includes such innocuous, legal activities as:

– taking measurements

– using binoculars

–  taking pictures or video footage “with no apparent esthetic value”

– abandoning vehicle

– drawing diagrams

– taking notes

– espousing extremist views

Read More about the SARs initiative

But what is responsible for this upending of the presumption of innocence in our country?

There is a connection between the creepy “UK Secure Beneath the Watchful Eyes” and the US’s new snitch mandates.

Intelligence Led Policing or ILP

The ILP strategy was first developed in the United Kingdom and then flourished in Australia. . .  (What do those two countries have in common?)

What or Who has been the driver behind COPS and Intelligence Led Policing?


WHEREAS, the IACP recognizes that in the aftermath of the September 11th atrocities, there is a need to address the deficiencies that exist in this country in the collection, analysis and dissemination of Criminal Intelligence; and

WHEREAS, the Executive Committee of the IACP recognized the need to address these deficiencies and to ensure that state and local law enforcement is involved in the Intelligence process; and

WHEREAS, at the direction of the IACP Executive Board, the Police Investigative Operations Committee convened the IACP Criminal Intelligence Sharing Summit in March of 2002; and

WHEREAS, the findings of that Summit, issued in a report in August of 2002, led to the creation of the Global Intelligence Working Group, which is a Federal Advisory Committee as defined under the Federal Advisory Committee Act (FACA); and

WHEREAS, the Global Intelligence Working Group has created the National Criminal Intelligence Sharing Plan, a plan which is consistent with the IACP Summit Report; now, therefore, be it

RESOLVED, that the IACP will strongly support the National Criminal Intelligence Sharing Plan as a valuable tool to remedy the deficiencies in the existing methods of collecting, analyzing and disseminating criminal intelligence, that the IACP encourages all law enforcement to utilize this tool in creating and/or bettering its efforts in the area of Criminal Intelligence, and that the Federal Government also support these efforts.
LINK

IACP Resolutions 2002 – 2010

Others have noted the conspicuous placing of new policy that is contrary to our American form of government that was charged with protecting our legal and natural rights first and foremost.

From 2003;

Big Brother Gets Bigger: Domestic Spying & the Global Intelligence Working Group

by Michelle J. Kinnucan

With virtually no media coverage or public scrutiny, a major reorganization of the US domestic law enforcement intelligence apparatus is well underway and, in fact, is partially completed.

. . . A month after September 11, 2001, the Investigative Operations Committee of the International Association of Chiefs of Police recommended that its leadership convene an Intelligence Sharing Summit in March 2002, described above. Summit participants examined closely the 2002 United Kingdom’s National Intelligence Model. (Intelligence Led Policing)
(Emphasis mine)

The primary outcome of the Summit was creation of the Global Intelligence Working Group, which comprised approximately 30 intelligence professionals. This group developed the National Criminal Intelligence Sharing Plan.

. . .The Summit proceedings were compiled by the IACP in a report entitled, Criminal Intelligence Sharing: A National Plan for Intelligence-Led Policing at the Local, State and Federal Levels Recommendations from the IACP Intelligence Summit (IACP Report). The Summit and IACP Report were both partially funded by the DOJ.

. . .The GIWGs intelligence reorganization effort is linked to the Homeland Security Act, but extends far beyond concerns about terrorism. (Emphasis mine)

A main selling point for the greater use of local police in domestic intelligence is the omnivorous spying potential of the widely adopted Community Oriented Policing Services or COPS model. The IACP Report asserts, It is time to maximize the potential for community policing efforts to serve as a gateway of locally based information to prevent terrorism, and all other crimes, through the timely transfer of critical information from citizens to their local police agency and then across the intelligence continuum.

Read the entire article

The 2001 IACP Report states that;

“that the real need is to share all – not just terrorism-related – criminal intelligence”

The Office of Community Oriented Policing Services (COPS) was established in 1994. You may remember the COPS program was supposed to hire 100,000 new police officers around the country. The COPS program has received incredible support and funding from the Obama administration.

Niki Raapana gives us this interesting bit of COPS history;

In the spring of 1999, the City of Seattle began working with COPS to write sustainable development visions for all 37 neighborhoods.

Planning groups followed the guidelines laid out in the WA State Growth Management Act of 1990 combined with suggestions recommended at the 1992 Earth Summit and advisors from COPS.

COMPASS was a COPS creation that expanded the GIS (Geographic Information System) database.

Niki Raapana writes;

One of the core elements of the COMPASS initiative is the creation of a data infrastructure which contains information from a variety of sources. These data will include extant social indicator data (e.g., employment statistics; housing information; land use data; school data; hospital records; asset mapping) and a host of safety information (e.g., incident-based crime data; arrest statistics; calls for service; court and corrections data; victimization surveys; and fear of crime data).”

Read More-“Join the Quiet Revolution” by Niki Raapana

In a 2008 interview then COPS director, Carl Peed talks about the expansion of Community Oriented Policing after 9-11;

“A few months after September 11, the COPS Office funded the International Association of Chiefs of Police to hold a Criminal Intelligence Sharing Summit which led to the National Criminal Intelligence Sharing Plan. Five years later, we held another summit to discuss the progress made and to set the course for the future.”

The International Association of Chiefs of Police with their distinctly utilitarian bent as detestable as it is should not be the focus of outrage though. (Utilitarianism embodies the “the ends justify the means” school of thought) There are an untold number of organizations operating all across our country and meeting with great success in their goals of subverting our Constitution. That they would try is no surprise to anyone. What is astounding is that we have permitted and even embraced their aims.

If we want to restore our country it will be up to us to demand that our representatives stop delegating the authority granted by us over to unaccountable, unelected bureaucrats.

We will have to teach ourselves what is not being taught in our schools and universities-The US Constitution and our Bill of Rights.

We have to know both our legal
and natural rights so that we can demand the appropriate restraint.

Fusion Centers, the IACP, Gun Control and HUBZones A4L Show Notes

OK-SAFE


Sign up for OK-Safe’s Action Alert Newsletter
_____________________________________________________

Listen to the show

audio



Governor Jesse Ventura Talks About The Police State. 3 Videos


OKOHS (Oklahoma Office of Homeland Security) is directed to continue their efforts in combating terrorism, and shall continue to oversee the implementation of any and all initiatives or efforts mandated by the United States Department of Homeland Security, including the development of a state information fusion center.

Background
In August 2002, the International Association of Chiefs of Police released the recommendations of its Criminal Intelligence Summit held March 7-8, 2002, with the final document coming from the DOJ’s office of Community Oriented Policing Services (COPS). The report acknowledged that the problems identified following the September 11, 2001 terrorist attacks were found to be with “intelligence exchange between national agencies…” Then the report quickly endorsed the creation of a Criminal Intelligence Coordinating Council to implement the National Intelligence Plan that would engage local, state, and federal law enforcement agencies in a database sharing environment. The plan addressed the legal impediments to the effective transfer of criminal intelligence between authorized local, state, and federal law enforcement agencies. This plan became the superstructure for the next domestic Fusion Center effort by advocating for the creation of the Criminal Intelligence Coordinating Council and charged it with accomplishing a number of goals:

Read More

The Rise of the Fusion-Intelligence Complex: A critique of political surveillance after 9/11

Where did Fusion Centers Come From???

Immediately following the tragic events of 9/11, the IACP moved quickly to hold a national policy summit on terrorism and intelligence. The summit, sponsored by the Community Oriented Policing Services (COPS) Office and the IACP, was held in March of 2002. More than 120 law enforcement, justice, terrorism, and intelligence experts gathered in Alexandria, Virginia to create a national strategy to improve American law enforcement’s capacity to recognize, gather, analyze, share, and utilize criminal intelligence. Read More

Recent story on the IACP;

Obama Nominates Rabid Anti-gunner to Head the ATF


In March 2002, a year before DHS’ creation, the International Association of Chiefs of Police called for a national plan for sharing intelligence.

That recommendation led Justice’s Global Justice Information Sharing Initiative (Global) consortium to draft a National Criminal Intelligence Sharing Plan in October 2003.

The IACP also recommended against limiting intelligence sharing to terrorism-related data, suggesting instead that all “criminal intelligence” data be shared.  SOURCE EPIC

The IACP set 2 goals

#1 the establishment of “a coordinating council comprised of local, state, Tribal and Federal law enforcement executives … to oversee and implement the National Intelligence Plan.”

#2 is to “Address the legal impediments to the effective transfer of criminal intelligence between enforcement agencies.”

Those  “legal impediments” are the Bill of Rights and specifically the laws that were implemented in order to protect us from government spying as in COINTELPRO

The IACP and Intelligence Led Policing Post 911 Big Brother Gets Bigger

In the fall of 2001, the International Association of Chiefs of Police (IACP) held its annual conference in Toronto. Considering the events of September 11th, it was decided to organize an International Criminal Intelligence Sharing Summit in Alexandria, VA, March 7-8, 2002; the topic was Criminal Intelligence Sharing: Overcoming Barriers to Enhance Domestic Security.


2004

“. . .unprecedented initiatives have been undertaken to reengineer the law enforcement intelligence function.”

The Criminal Intelligence Systems Operating Policies, 28 CFR 23  mandates that

“criminal intelligence systems … are utilized in conformance with the privacy and constitutional rights of individuals.”

The IACP National Law Enforcement Policy Center’s “Criminal Intelligence Model Policy,” in an appendix to the GIWG (Global Intelligence Working Group) Report, was revised in 2003 to incorporate the anticipated change to 28 CFR 23.

The anticipated change?  Replace “reasonable suspicion” with “reasonable indication” (From Big Brother Gets Bigger)

R.I.P.  28 C.F.R. part 23

2008. . .the Department of Justice has relaxed restrictions on when the Federal Bureau of Investigation can begin investigations, and worked to increase intelligence-sharing among local, state, and federal law enforcement agencies as well as with federal (intelligence) agencies in ways that will compromise civil liberties (through a change in federal regulation 28 C.F.R. part 23).

Read more FBI Guidelines 28 C.F.R. part 23

Fusion Center Document Collection

The IACP- Gun Grabbers


The Constitution preserves “the advantage of being armed which Americans possess over the people of almost every other nation. . . (where) the governments are afraid to trust the people with arms.” — James Madison, The Federalist, No. 46


the Joyce Foundation, UN and the IACP disarming the world…

Brady President Praises Police Chiefs After Release of New Report

Sep 19, 2007

Washington, D.C. – Paul Helmke, President of the Brady Campaign to Prevent Gun Violence, called today’s report by the International Association of Chiefs of Police, Taking a Stand: Reducing Gun Violence in Our Communities, a “clear road map from the nation’s police chiefs of steps we can take now to combat gun violence.”

“Our nation’s police are on the front lines in the fight for public safety. In this landmark report, police leaders are saying they are tired of the nation’s gun policies being held hostage by the special interest gun lobby,” Helmke said.

http://www.bradycampaign.org/media/press/view/929

International Association of Chiefs of Police and The Joyce Foundation Great Lakes Gun Summit 2007

America has accepted the communitarian premise of the “good of the community” over individual rights as evidenced throughout law and policy, especially since 9 11.  This is where that line of thinking leads us and it is antithetical to the philosophy of individual rights that this nation was founded upon.  If we do not insist on upholding this revolutionary precept of our nation, then we ought to not be surprised when we begin to resemble every other milksop so-called Democracy in the world.

**Special note to 2A people in Oklahoma.** Read “Janet Reno addresses the IACP”

1995-This is a internal International Association of Chiefs of Police (IACP) document that obtained by NRA.  It discusses in detail IACP plans to weaken or eliminate right-to-carry legislation in state legislatures.

Do Gun Shows Have Loopholes?

“The public has a right to know the contents of this report, which was revealed to the International Association of Chiefs of Police last year,” said CCRKBA Executive Director Joe Waldron. “According to the Force Science News, research focused on 40 incidents involving assaults or deadly attacks on police officers, in which all but one of the guns involved had been obtained illegally, and none were obtained from gun shows.”

The study is called “Violent Encounters: A Study of Felonious Assaults on Our Nation’s Law Enforcement Officers.” Waldron called it a “smoking gun” in terms of revelations about the sources of crime guns. Anti-gun politicians and police chiefs do not want the public to know as they campaign against the so-called “gun show loophole,” he said.

Read more

Gun Violence Reduction

I’m going to describe a group that recently demanded enactment of a sweeping federal gun control agenda.

Let’s see if you can guess who it is.

The group has 22,000 members in more than 100 countries. Membership categories include “city managers, highway safety specialists, psychologists, attorneys, coroners and management analysts,” among others. The group has offices in Europe and the Caribbean, and the group’s website describes its governing board in your choice of English, Spanish, Portuguese and French.

Is it a new United Nations disarmament agency? No, the group is the International Association of Chiefs of Police (IACP), headquartered in the nation’s capital.

Chris Cox “Follow The Money”

WyGO says



IACP Document Collection

http://www.scribd.com/document_collections/2332792

•Questions to Ask about Fusion Centers

SB 483 Background *REFUSE the FUSION!*

Domestic Spying & the Global Intelligence Working Group

Big Brother Gets Bigger

by Michelle J. Kinnucan
October 14, 2003

With virtually no media coverage or public scrutiny, a major reorganization of the US domestic law enforcement intelligence apparatus is well underway and, in fact, is partially completed. The effort to create a new national intelligence collection, analysis, and sharing system has frightening implications for privacy and other civil liberties. Operating under the umbrella of John Ashcroft’s Department of Justice (DOJ), this monster-in- the-making is now the work of the intergovernmental Global Intelligence Working Group (GIWG) [it.ojp.gov/topic.jsp?topic_id=56].

ORIGINS

In the fall of 2001, the International Association of Chiefs of Police (IACP)

(I despise these UN partnered, gun grabbing globalists posing as our peace officers)

held its annual conference in Toronto. Considering the events of September 11th, it was decided to organize an International Criminal Intelligence Sharing Summit in Alexandria, VA, March 7-8, 2002; the topic was “Criminal Intelligence Sharing: Overcoming Barriers to Enhance Domestic Security.”

The 100 Summit attendees comprised a select group of “criminal intelligence experts from local, state, Tribal and Federal law enforcement agencies, international law enforcement bodies, national and regional intelligence gathering and analysis organizations and academia.”

Participants included Attorney General John Ashcroft and representatives from the DOJ, INS, DEA, FBI, Office of Homeland Security, National Reconnaissance Office, Secret Service, and the US military.

The Summit proceedings were compiled by the IACP in a report entitled, Criminal Intelligence Sharing: A National Plan for Intelligence-Led Policing at the Local, State and Federal Levels — Recommendations from the IACP Intelligence Summit (“IACP Report”). The Summit and IACP Report were both partially funded by the DOJ…

VISION

The GIWG’s intelligence reorganization effort is linked to the Homeland Security Act, but extends far beyond concerns about terrorism. Early on, the IACP Report quotes a White House statement: “The Department of Homeland Security would coordinate, simplify and, where appropriate, consolidate government relations on issues for America’s state and local agencies. It would coordinate federal homeland security programs and information with state and local officials.”

The IACP Report then observes: “This element of the President’s plan is significant: non-federal agencies (local law enforcement, state police and regional law enforcement task forces) have both a great need for intelligence data and a great capacity to contribute to the process of intelligence generation.” The envisioned reorganization is one of not only enhanced federal-state/ local integration for two-way intelligence sharing but also a fundamental restructuring. Thus, according to the IACP Report the “Participants called for a strengthening of the local component — so that information flows along a flattened continuum of all types of law enforcement agencies, versus the traditional hierarchical flow.” State and local agencies are to be “founding partners of and driving participants in any organization that helps coordinate the collection, analysis, dissemination and use of criminal intelligence data in the U.S.”

A case might well be made that the terrorist atrocities of September 11, 2001, were, in part, the result of a failure in intelligence sharing between the FBI and the CIA. Beyond bare assertions, however, no persuasive argument that better sharing between federal and state/local law enforcement agencies could have prevented 9/11 has been offered. Rather, one of the organizers and leaders of the IACP Summit, former New York City police intelligence division commander Daniel J. Oates, has undercut any such argument.

On September 20, 2001, the Ann Arbor News quoted him as follows: “‘Local law enforcement can do little to prevent an attack in the air,’ Oates said, adding that would fall under the jurisdiction of federal authorities.” (Oates became the Ann Arbor, MI police chief less than a month before 9/11.) Oates is later quoted as having “specific suggestions on how local law enforcement can work with federal government” on intelligence, but he offered no details. He did however note that the “first obvious measure” in response to 9/11 “is to make certain airplanes can’t be hijacked.”

In another related non sequitur, the IACP Report explicitly asserts “While September 11 highlighted urgency in improving the capacity of law enforcement agencies … to share terrorism-relevant intelligence data… [Summit participants] stressed that the real need is to share all – not just terrorism-related – criminal intelligence.”

A main selling point for the greater use of local police in domestic intelligence is the omnivorous spying potential of the widely adopted Community Oriented Policing Services or “COPS” model. (this is  “Community Oriented Policing” based on communitarian law principles )The IACP Report asserts, “It is time to maximize the potential for community policing efforts to serve as a gateway of locally based information to prevent terrorism, and all other crimes, through the timely transfer of critical information from citizens to their local police agency and then across the intelligence continuum.” However, the IACP Report offers little or no justification for enhanced collection or sharing of any type of intelligence, let alone of non-terrorism intelligence.

As an aside, neither the Terrorism Information and Prevention System (TIPS) nor the Neighborhood Watch Programs (NWP) is mentioned in the IACP Report. Still, it is noteworthy that months before Congress blocked funding for TIPS in late 2002, John Ashcroft announced a closely related initiative to be managed by the same organization–Citizen Corps–that would have run TIPS. The plan is to double the number of NWPs by 2004 and, according to the DOJ, expand their mission to make participants “a critical element in the detection, prevention and disruption of terrorism.” While TIPS has been derailed, perhaps temporarily, the Neighborhood Watch expansion has proceeded apace–there are now 10,000 programs nationwide.

DANGER

The GIWG vision — all US law enforcement agencies freely and systematically sharing all intelligence — is virtually unprecedented and poses a great danger for civil liberties. Another time that the federal government cooperated on an extensive basis with state and local police for intelligence purposes was in the era of the FBI’s notorious Counterintelligence Programs (COINTELPRO) and COINTELPRO-style operations.

These operations are mostly known for the activities — assassination, false imprisonment, forgery, perjury, infiltration, etc. — undertaken by the FBI and police to neutralize dissident religious and political activists and organizations. However, collecting and sharing intelligence was essential and, in fact, “standard operating procedure” as Frank J. Donner noted in The Age of Surveillance.

The 2003 Consolidated Appropriations Resolution (H.J. Res. 2) included an increase of $181 million “to bolster counterterrorism and counterintelligence activities of the FBI” and the IACP Report asserts a state-local claim to information derived from COINTELPRO-type operations. While noting elsewhere that “counterintelligence … is not motivated by the occurrence of criminal activity,” the IACP Report nevertheless declares “federal parties ought (to be able) to pass criminal intelligence information that surfaces during counter-intelligence activities … to state, local and tribal police.” This is significant because it is tacit acknowledgement of current or anticipated domestic federal counterintelligence operations investigating legal activity.

The current US domestic intelligence apparatus already greatly exceeds COINTELPRO in its capacity to collect, analyze, and share intelligence and, thus, potentially to conduct counterintelligence. One important reason for this is the further breaking down of the division between levels of government.

The number of state and local police, put last summer at 650,000 by John Ashcroft, dwarfs the number of federal law enforcement agents. As the Supreme Court observed in Printz v. US, 521 U.S. 898 (1997), “The power of the Federal Government would be augmented immeasurably if it were able to impress into its service — and at no cost to itself — the police officers of the 50 States.” The separation of government power into “two spheres”–one national and one state-local — is one of the least recognized Constitutional “checks and balances.” The Printz Court noted:

This separation of the two spheres is one of the Constitution’s structural protections of liberty. “Just as the separation and independence of the [three] coordinate branches of the Federal Government serve to prevent the accumulation of excessive power in any one branch, a healthy balance of power between the States and the Federal Government will reduce the risk of tyranny and abuse from either front.”

Yet, on several fronts federal, state, and local law enforcement agencies are bringing about exactly what the Court warned against — “the police officers of the 50 States” functioning in the service of the federal government, albeit voluntarily and with funding from the DOJ. The method may be different from that considered in Printz but the danger remains the same or, probably, greater.

(This is the significance of SB 483)

Laws and policies that the IACP Report and GIWG meeting minutes refer to as “barriers” and “impediments” were adopted in response to a well-documented history of egregious and systematic violations of the Constitutional rights of law-abiding Americans by local, state, and federal law enforcement officers, often working together. Despite these reforms, enacted mostly in the 1970s, widespread and serious abuses have continued to the present day.

For example, documents obtained by the ACLU of Colorado [www.aclu-co.org/spyfiles/fbifiles.htm] demonstrate that, as recently as 2002, the Denver police repeatedly collected intelligence on peaceful protesters with no connection to terrorism or any other criminal activity and passed it on to an FBI Joint Terrorism Task Force. This collection and dissemination occurred in apparent violation of the federal the Criminal Intelligence Systems Operating Policies (28 CFR 23), which prohibit the collection of “criminal intelligence information about … political, religious or social views, associations, … unless such information directly relates to criminal conduct or activity.”

Subjects included the American Friends Service Committee, Colorado Campaign for Middle East Peace, and a man engaging in the “anti-government” activity of “handing out literature in front of the Federal building … promoting the movie Waco Rules of Engagement which depicts the FBI murdering over 80 individuals in Waco.”

IMPLEMENTATION

To fully comprehend the danger posed by the reorganization discussed here, it helps to understand the details of the implementation of the vision described above. The IACP Report sets two goals. The first is the establishment of “a coordinating council comprised of local, state, Tribal and Federal law enforcement executives … to oversee and implement the National Intelligence Plan.” The second goal is to “Address the legal impediments to the effective transfer of criminal intelligence between enforcement agencies.”

The Global Intelligence Working Group

The first goal has already been partially achieved as an interim coordinating council became operational last fall. The December 2002 minutes of the first meeting of the Global Intelligence Working Group confirm that it was “formed to serve as the Criminal Intelligence Coordinating Council” described in the IACP Report.

The GIWG’s Interim Report: Development of the National Criminal Intelligence Sharing Plan (“GIWG Report”) released in May of this year, in describing the GIWG, paraphrased the IACP Report: “the Council’s mandate would be to establish, promote, and ensure effective intelligence sharing and to address and solve, in an ongoing fashion, the problems that inhibit it.” The IACP Report continued, “In order to accomplish these tasks, the Council must be central, permanent, powerful and inclusive.”

The GIWG is now poised to become the “most central and enduring element of the National Intelligence Plan,” to quote the IACP Report. Indeed, the GIWG Report recommends that GIWG “evolve” into the coordinating council at the heart of the reorganization effort.

Legal Impediments To The Effective Transfer Of Criminal Intelligence

The second goal of the IACP Report’s national intelligence plan is to “Address the legal impediments to the effective transfer of criminal intelligence.” The February 2003 GIWG minutes and the GIWG Report take note of proposals by the Bush administration to weaken one key federal standard — Criminal Intelligence Systems Operating Policies (28 CFR 23).

The express purpose of 28 CFR 23 is to assure that “criminal intelligence systems … are utilized in conformance with the privacy and constitutional rights of individuals.” The IACP National Law Enforcement Policy Center’s “Criminal Intelligence Model Policy,” which appears as an appendix to the GIWG Report, was revised in June 2003 to incorporate an anticipated change in 28 CFR 23. The relevant portion of the policy now says: “It is the policy of this agency to gather information directed toward specific individuals or organizations where there is a reasonable indication that said individuals or organization may be planning or engaging in criminal activities.”

28 CFR 23 currently requires a “reasonable suspicion of criminal activity.” Public notice of the proposed change is apparently scheduled for this August (see 68 FR 30545). If this change from “reasonable suspicion” to “reasonable indication” is adopted then the standard will be significantly weakened. The GIWG Report says, “The reasonable indication threshold for collecting criminal intelligence is substantially lower than probable cause. A reasonable indication may exist where there is not yet a current substantive or preparatory crime, but where facts or circumstances reasonably indicate that such a crime will occur in the future.” To understand the “reasonable indication” standard, then, think about the recent film adaptation of Philip K. Dick’s The Minority Report because this is all about anticipated crimes that may (or may not) occur in the future.

The April 2003 GIWG meeting minutes record approval for the weakening of 28 CFR 23 and note that GIWG member Daniel J. Oates “indicated he was excited about the proposed changes to 28 CFR Part 23, specifically the area dealing with changing the reasonable suspicion collection criteria to reasonable indication. If the rule is passed, (it was)officers on the street can gather small bits of information that can be entered into an intelligence database. Under the old standard, this could not be done.”

Regarding other legal “impediments” to intelligence sharing, an FBI “War on Terrorism” web page [www.fbi.gov/terrorinfo/counterrorism/analysis.htm] observes, “The PATRIOT Act and a federal court decision in November 2002 have broken down what has been known as ‘the Wall’ that legally separated law enforcement and intelligence functions”. The federal court decision reference is, apparently, to the opinion of the secretive Foreign Intelligence Surveillance Court of Review that weakened Fourth Amendment protections against wiretapping and intrusive surveillance.

TWO TRACKS CONVERGE

The terrorist atrocities committed on September 11, 2001, greatly accelerated the creation of a single electronic information network that links every law enforcement agency in the country. However, as of March 26, 2002, according to Kathleen L. McChesney, the FBI’s Executive Assistant Director for Law Enforcement Services, in a Washington Post online discussion, there was still “no one, universal means of sharing information between federal, state and local law enforcement agencies.” This is no longer quite true.

(not true at all now, in 2009)

The Regional Information Sharing Systems (RISS) were created by Congress in 1974 to aid law enforcement agencies with multi-jurisdictional investigations. RISS members include over 6,000 federal, state, and local agencies in all 50 states. Although RISS is administered regionally, the information is shared nationally. In 1995, the FBI started Law Enforcement Online (LEO) to provide a secure, “interactive communications mechanism to link all levels of Law Enforcement throughout the United States by supporting broad, immediate dissemination of information.” In 2002, LEO had 32,500 members, about two- thirds were state and local law enforcement and the rest federal and foreign users.

On August 20, 2002, Federal Computer Week (FCW) reported on the linking of RISS and LEO, “Federal, state and local law enforcement agencies soon will have a single Web interface linking separate collaborative networks already in place to increase information sharing across all levels of government.” The GIWG Report notes that RISS and LEO were “connected September 1, 2002, as a virtual system” and its first recommendation is that they “should serve as the … communications backbone for implementation of a nationwide intelligence sharing capability.”

Oklahoma is part of this now functioning network)

rocic

According to the FCW article “One of LEO’s biggest advantages is the ability to offer a secure online space for specific interest groups to work and share information. On the other hand, RISS excels in providing Web access to multiple databases in local jurisdictions across the country, [George] March, [director of the RISS Office of Information Technology] said.” In fact, according to a RISS report, the RISSIntel/RISSNET II intelligence databases had 2.4 million records and fielded 1.6 million inquiries in 2001; this, before a $150 million funding boost in the USA PATRIOT Act.

The GIWG is set to become the organization that oversees the further integration and expansion of RISS and LEO. H.J. Res. 2 also funded a $459 million equipment budget for the DOJ’s Office of Domestic Preparedness (ODP). The Conference Report directed ODP to use money the “to enhance State and local agencies’ ability to share intelligence information with each other and with the Department of Homeland Security and the Department of Justice” with the expectation that the Bureau of Justice Assistance and ODP will “continue to work with State, local, and Federal agencies through the Global Intelligence Working Group.” The Conferees also specifically noted their approval of the RISS-LEO linkage.

CONCLUSION

No doubt, GIWG members and their colleagues in other agencies believe their efforts are in the public interest, but they aren’t. Their efforts may not immediately result in increased COINTELPRO-like abuses but the risks to liberty are simply too great.

(Scratch that. See MIAC strategic report)

Law enforcement officials have repeatedly shown themselves unable to abide by laws and policies designed to prevent them from acting like political or thought police. These abuses detract from their ability to combat real terrorist threats and further weaken the freedom of every American and other residents.

The risks to liberty are also unnecessary. If the goal really is security, then we must realize there are fundamental limits to a law enforcement strategy. For instance, the US has the world’s largest prison population, in both absolute and per capita terms; yet, we also have many of the world’s highest crime rates. If we seek safety, then, the US must significantly shift resources so that we can address the fundamental causes of crime and terrorism.

The USA PATRIOT Act, together with the Homeland Security Act, recent Executive Branch decisions, and the often overlooked Antiterrorism and Effective Death Penalty Act of 1996, have already unduly expanded federal power and undermined essential American freedoms under the 1st, 4th, 5th, 6th, and 8th Amendments to the Constitution. These assaults on liberty must be rolled back but to that list the GIWG and its work must be added.

Copyright © 2003 by Michelle J. Kinnucan. All Rights Reserved.

About the author: Michelle J. Kinnucan is an independent scholar who served honorably in the US armed forces. Her work has previously been published in Agenda, CommonDreams.org, the Nonviolent Resister, PS: Political Science and Politics, and The Record. She is now a Veteran for Peace and a co-coordinator of the Ann Arbor Bill of Rights Defense Committee. She can be contacted at: nopatriotact@agenda2.org