Pentagon Steps Up Intelligence Efforts Inside U.S. Borders

Wanted to post this last week, but my site was down. Add this disturbing Pentagom program to yesterday's revelation that the NSA is recording every single telephone conversation they can get their hands on, and it is enough to make us really, really perturbed. What sort of nation are we becoming anyway? I thought the Soviet Union was our enemy, not the template for us to follow!

WSJ.com - Pentagon Steps Up Intelligence Efforts Inside U.S. Borders On March 19, 2005, about 200 mainly middle-aged peace marchers made their way through the streets of this city, stopping outside a Marine Corps recruiting center and a Federal Bureau of Investigation office to listen to speeches against the Iraq war. Close behind, police in unmarked cars followed them -- acting on a tip from the Pentagon.

For weeks prior to the demonstration, analysts at the Army's 902nd Military Intelligence Group in Fort Meade, Md., were downloading information from activist Web sites, intercepting emails and cross-referencing this with information in police databases.

The Army's conclusion, contained in an alert to Akron police: “Even though these demonstrations are advertised as 'peaceful,' they are assessed to present a potential force protection threat.”

The Akron protest and seven others monitored by the Army that month turned out to be nonviolent. Pentagon officials later issued an apology, admitting that some of the information in military databases shouldn't have been there. But they called that a minor slip in a critical program to protect Americans.

Army memo (PDF))

...After 9/11, the Bush administration declared the continental U.S. a theater of military operations for the first time since the Civil War, creating a demand to better research potential threats to American forces at home. Now several parts of the vast Pentagon bureaucracy are building large databases of information from sources including local police, military personnel and the Internet. In doing so, the military is edging toward a sensitive area that has been off-limits to it since the 1970s: domestic surveillance and law enforcement.

One widely reported part of the new information battle is the National Security Agency's wiretapping of calls without a warrant between people in the U.S. and suspected terrorists overseas. The agency is part of the Defense Department. That practice is just one piece of a larger, less-discussed effort.

The military justifies the gathering of domestic intelligence in part by relying on a key distinction between “receiving” information and “collecting” it. Military regulations over the past few decades have generally barred using soldiers to gather information on American citizens. Officials have interpreted the rules to mean that receiving information from the police or federal agencies is acceptable.

Because of the secrecy surrounding the programs, the results of the Pentagon's efforts -- including any possible successes in preventing terrorism -- are unknown. President Bush and other officials have said that Americans often don't see such successes because revealing them would help terrorists. Mr. Bush's critics, aside from their civil-liberties concerns, say monitoring antiwar activities may turn out to be a waste of resources by diverting attention from known terrorists.

According to documents seen by The Wall Street Journal, the Pentagon has monitored more than 20 antiwar groups' activities around the country over the past three years. It has reviewed photographs and records of vehicles and protesters at marches to see if different activities were being organized by the same instigators. Cmdr. Hicks says the point of this monitoring is to keep military personnel away from places where they might provoke demonstrators, not to interfere with anyone's right to protest.

The peace activists don't like being watched. About 300 activists gathered at Akron's public library this February to complain to elected representatives at a public hearing. They had watched an NBC News report in December that said the Pentagon included peace group activities in a database of potential terrorist threats. Documents viewed by The Wall Street Journal show that, as the activists suspected, their Quaker-organized rally in March 2005 was on the Pentagon's watch list. Those documents show a broader effort to gather information for databases and analyze it.

...“Contrary to popular belief, there is no absolute ban on intelligence components collecting U.S. person information,” it said. Gen. Noonan noted that while the military was normally barred from using its own assets to collect information about people living in the U.S., military intelligence “may receive information from anyone, anytime...if only to determine its intelligence value.

”Remember,“ the memo stressed, ”merely receiving information does not constitute 'collection' “ under Army regulations.

Michael Varhola, an official in the Army inspector general's office, repeated the message in a January 2002 article in the quarterly Military Intelligence Professional Bulletin. Even though many types of information gathering were perfectly legal, Mr. Varhola wrote, ”unfortunately some individuals find it easier or safer to avoid the issue altogether by simply not collecting the data on citizens they may need to do their complete jobs.“

As such views spread, several parts of the Pentagon empire soon swung into action to formalize information-gathering efforts, though they weren't all necessarily acting in concert. In February 2002, Paul Wolfowitz, then the deputy defense secretary, formed a unit at Pentagon headquarters to manage all military counterintelligence programs. Its name was Counter Intelligence Field Activity. CIFA, whose exact size and budget remain secret, has grown to include nine directorates. Its main focus is on protecting defense facilities and personnel from terrorist attacks.

Some of the raw data feeding into CIFA headquarters comes from a reporting process called Talon (short for ”Threat and Local Observation Notice“). Talon started out as an Air Force reporting form that airmen could fill out and hand in if they noticed anything unusual around the base. In May 2003, the Pentagon made Talon the standard method for service members in all the armed forces to report ”nonvalidated“ information about possible terrorist activity. Talon reports can now be filled out online.

Pentagon officials compare the process to a neighborhood-watch program. Cmdr. Hicks says Talon is the place where the Department of Defense ”initially stores the 'dots' of information, which, if validated, might later be connected before an attack occurs.“

To connect the dots, the Pentagon has turned to data mining, the science of extracting patterns from large volumes of raw information. In theory, reports of unusual incidents such as those collected by Talon could be added to electronic records of business transactions, Internet usage and police activity to deduce where terrorists are gearing up for an attack.

A December 2002 report issued by Sen. Richard Shelby, then vice chairman of the Senate Intelligence Committee, said CIFA was working with the Justice Department to develop ”deep access data-mining techniques“ to discover potential threats to the U.S. from terrorists.

As Mr. Wolfowitz was starting up CIFA, researchers at a separate Pentagon unit, the Defense Advanced Research Projects Agency, began work on a massive data-capturing program known as Total Information Awareness. This program, too, envisioned mining government databases and personal records of individuals for patterns that would predict a terrorist attack. A huge public outcry over the project led Congress to cancel it in October 2003 -- but Congress created a specific exemption for tools that might aid ”counterterrorism foreign intelligence.“

Many computer programs and techniques developed during the Total Information Awareness project quietly survived. Some were taken up by the Army's 902nd Military Intelligence Group. The 902nd, established during World War II and known as the ”Deuce,“ is part of the Army command structure and separate from CIFA at Pentagon headquarters. Nonetheless, the 902nd plays an important military-wide role because it is the military's largest counterintelligence unit and has hundreds of soldiers stationed around the country.

Charles Harlan, who heads the 902nd's analysis center, published an article in the Military Intelligence Professional Bulletin in January 2005 describing how his unit processed information to help the Pentagon predict attacks against the military in the U.S. He described three data-mining and artificial-intelligence programs as key to the effort -- all three of which were components of the defunct Total Information Awareness project.

The 902nd has access to Talon, but it also makes extensive use of another information system created after 9/11. This system, called the Joint Regional Information Exchange System, gathers information collected by civilian law enforcement agencies around the country. The Pentagon and local authorities including the New York Police Department and California's justice department set it up in December 2002. The idea was to give military personnel access to terror-related information on U.S. residents without violating any prohibitions on the military collecting domestic intelligence.

The Pentagon's regional information-exchange system got a boost when the Department of Homeland Security took it over and expanded it to include information from all 50 states and major urban areas.

The system doesn't just serve military personnel. A police department in one place can put a query out to other cities or states seeking information on, say, license plates or phone numbers of terrorist suspects. Many police departments purchase commercially available information about individuals, such as credit data and online viewing habits, as part of investigations. They can post this information on the exchange system.

Military members can also issue a query seeking information on any topic they like, but they can't command any civilian participant to do anything. In theory they could ask for personal data on individuals via the exchange system, but it isn't clear whether they do so and if so under what circumstances.

All of these strands came together to prompt the police's shadowing of peace protesters in the spring of 2005. Defense Secretary Donald Rumsfeld told the Senate last month that the Department of Homeland Security was the source of information in Pentagon databases about at least three antiwar protests at military recruiting centers -- two in Vermont and one in Washington, D.C.

A number of leads also came from the Talon reports. The two-page alert from the 902nd Military Intelligence Group that prompted the Akron police to follow the Quaker-organized rally attaches a nine-digit Army Talon number to that protest. It also gives separate numbers for each of seven other protests organized for the second anniversary of the Iraq war. The memo says officials at the 902nd had used some of their data-analysis techniques to look for signs of hidden coordination between the protests.

Analysts at the 902nd's headquarters in Ft. Meade also scrutinized antiwar Web sites looking for threats, including the possibility that protesters might attack military personnel.

The alert memo, signed by Army official Claude G. Benner Jr., portrayed the imminent demonstrations as ”threats.“ It gave a detailed description of activists' Web sites, noting that some featured a ”help desk“ where would-be protesters could get tips on organizing a demonstration. The memo also raised the possibility that military supporters might assault the protesters. Mr. Benner warned that ”the potential for a spontaneous, unprovoked attack against either the demonstrators or pro-US Military persons is assessed as HIGH.“

In the end the Akron march was peaceful. A report compiled by the Army and presented last May to the U.S. Northern Command, which is in charge of joint military operations in the continental United States, threw cold water on the idea that hidden provocateurs might be organizing multiple protests around the country. ”We have not noted a significant connection between incidents (i.e. reoccurring instigators at protests, vehicle descriptions),“ said the report.

Cmdr. Hicks at the Pentagon says the assessment that the Akron protest posed a threat ”was based on the best information available at the time, which was lawfully received from another federal agency.“ He declines to name the agency. Cmdr. Hicks adds: ”The fact that the marches proceeded peacefully is irrelevant to leveling criticisms against the Army in this instance. Hindsight is always 20/20.“


Tags: , /

About this Entry

This page contains a single entry by Seth A. published on May 11, 2006 11:51 AM.

News-worthy was the previous entry in this blog.

Bush opens mouth, lies is the next entry in this blog.

Find recent content on the main index or look in the archives to find all content.

Pages

Powered by Movable Type 4.37