A Government of Wolves: The Emerging American Police State

Home > Other > A Government of Wolves: The Emerging American Police State > Page 12
A Government of Wolves: The Emerging American Police State Page 12

by Whitehead, John W.


  Control Center

  TLOs report back to "fusion centers" where information is aggregated into government computers and pieced together to create profiles of citizens. Then information analysts determine if there are any individuals worth tracking down. "Fusion centers," which integrate local police and federal intelligence agencies, are a driving force behind the government's quest to collect, analyze, and disseminate information on American citizens. Fusion centers grew dramatically between the fiscal years of 2004 and 2008 with the help of more than $327 million in taxpayer-provided funding.335

  Virtually every state has a fusion center in operation or formation.336 More than seventy such data collecting agencies are already spread throughout the country,337 constantly monitoring our communications, everything from our Internet activity and web searches to text messages, phone calls, and emails. This data is then fed to government agencies, which are now interconnected: the CIA to the FBI, the FBI to local police.

  Too often, the partnership between law enforcement officials and fusion centers gives rise to procedures lacking in transparency and which skate alarmingly close to the edge of constitutional prohibitions against unreasonable searches, when they're not flouting them altogether.338 Equally problematic is the fact that there is no nationally recognized structure for a fusion center, so each fusion center essentially establishes its own protocol, a shortcoming acknowledged by the Department of Homeland Security (DHS).339

  The information gathered at these fusion centers travels not only up the chain of command, but down as well, and flows throughout the country340 All of this information-sharing from a vast number of sources means that a local police officer in Washington State can tap into the traveling or shopping habits of someone, innocent or not, in Florida.

  On top of the extreme level of information-sharing among government entities, there has been a strong push to get private corporations to work with the government on information gathering. Boeing, the country's largest aircraft manufacturer and second-largest defense contractor, has pushed to take part in intelligence gathering, going so far as to try placing one of their representatives at the Washington Joint Analytical Center (WAJAC), a massive fusion center in Washington State.341 Starbucks, Alaska Airlines, and Amazon have also expressed interest in working with the WAJAC.

  Pools of Ineptitude

  Incredibly, despite the roughly $1.4 billion342 in taxpayer dollars poured into these fusion centers, they have, in the words of investigative journalist Robert O'Harrow, proven to be little more than "pools of ineptitude, waste and civil liberties intrusions."343 This sorry impression is bolstered by a bipartisan report released in 2012 by the Senate Permanent Subcommittee on Investigations alleging that DHS has done very little to aid counterterrorism efforts with its seventy-seven (and growing) fusion centers, which suffer from a lack of oversight344 and wasteful spending of "hundreds of millions of dollars."345 Among the high-dollar purchases attributed to the fusion centers' wasteful spending are flat-screen TVs, a $6,000 laptop, and a $45,000 SUV used for commuting.346

  Some DHS officials at the various fusion centers throughout the country received no more than five days of training in intelligence gathering. Despite this, they were being paid upwards of $80,000 a year. This lack of adequate training may help explain why innocent, constitutionally protected activities have been flagged as potentially terrorist in nature. For example, one intelligence report warned against a "Russian cyberattack," which turned out to be nothing more than an American employee accessing a work computer remotely.347

  Unfortunately, the liberal application of the phrase "suspicious activity" has allowed fusion centers and intelligence agents to label pretty much any activity as a potential terror threat. The idea is to track "suspicious" individuals who are performing innocent activities which may add up to something more sinister. More often than not, however, the result is just a lot of dead ends. For example, of the 386 unclassified fusion center homeland intelligence reports reviewed by the Senate Permanent Subcommittee, "close to 300 of them had no discernible connection to terrorists, terrorist plots, or threats."348

  Then again, you're bound to end up with few legitimate leads on "terrorist" activity if you classify unemployment as a cause for suspicion, which is actually one of the criteria used by TLOs.349 The problem with tracking innocent behavior is that more often than not innocent people will be investigated for heinous crimes. For example, in 2007 a police officer filed a report on a man who had been seen purchasing "large quantities of liquid chlorine bleach and ammonia" on consecutive days. When that information traveled to the fusion center, it was picked out as a "suspicious activity" and the individual was investigated. It turned out that the man was a golf course owner attempting to circumvent a ban on gopher traps by killing the rodents with chlorine gas.350

  Among the many groups of innocent people labeled suspicious and targeted for surveillance are pro-choice advocates, pro-life advocates, environmental activists, Tea Party members, Second Amendment rally attendees, third-party voters, Ron Paul supporters, anti-death penalty advocates, and antiwar activists.351 According to a fusion center in Virginia, universities and religious institutions are potential hubs of extremism and terrorist activity. Another fusion center specifically cited historically black and Christian evangelical colleges as cause for concern.352

  NSA Data Center in Bluffdale

  America's Crown Jewel

  Even with the preponderance of fusion centers and their poor track records, the government continues to push for more access, more control, and more surveillance of American citizens. The Utah Data Center (UDC), a $2 billion behemoth that houses a network of computers, satellites, and phone lines that stretches across the world,353 serves as the crown jewel of the federal government's surveillance empire.

  Situated in the small desert town of Bluffdale, Utah, not far from bustling Salt Lake City, the UDC is the central hub of the National Security Agency's (NSA) vast spying infrastructure. At five times the size of the U.S. Capitol,354 the UDC is a clearinghouse and a depository for every imaginable kind of information355 to be tracked, collected, catalogued, and analyzed by the UDC's supercomputers and its teams of government agents. In this way, by sifting through the detritus of your once-private life, the government will come to its own conclusions about who you are, where you fit in, and how best to deal with you should the need arise.356

  What little we know about this highly classified spy center and its parent agency, the NSA, comes from James Bamford, a former intelligence analyst and an expert on the highly secretive government agency. Bamford provides a chilling glimpse into the government's plans for total control, a.k.a., total information awareness. As Bamford notes, the NSA "has transformed itself into the largest, most covert, and potentially most intrusive intelligence agency ever created. In the process–and for the first time since Watergate and the other scandals of the Nixon administration–the NSA has turned its surveillance apparatus on the United States and its citizens."357

  Supposedly created by the NSA in order to track foreign threats to America, as well as to shore up cybersecurity and battle hackers,358 the UDC's technological capabilities are astounding. As the central depository for all of the information gathered by the NSAs vast spy centers, the UDC's supercomputers can download data amounting to the entire contents of the Library of Congress every six hours. However, the data targeted goes far beyond the scope of terrorist threats. In fact, as Bamford points out, the NSA is interested in nothing less than the "so-called invisible web, also known as the deep web or deepnet–data beyond the reach of the public. This includes password-protected data, U.S. and foreign government communications, and noncommercial file-sharing between trusted peers."359

  Everybody's a Target

  That the NSA, which has shown itself to care little for constitutional limits or privacy, is the driving force behind this spy center is no surprise. The agency–which is three times the size of the CIA, consumes one third of the intell
igence budget and has a global spy network360–has a long history of spying on Americans, whether or not it has always had the authorization to do so. Take, for instance, the warrantless wiretapping program conducted during the George W. Bush years,361 which resulted in the NSA monitoring the private communications of millions of Americans–a program that continues unabated today–with help from private telecommunications companies such as AT&T. The program recorded 320 million phone calls a day when it first started.362 It is estimated that the NSA has intercepted at least 20 trillion communications by American citizens since 9/11.363

  Clearly, the age of privacy in America is coming to a close. We have moved into a new paradigm in which surveillance technology that renders everyone a suspect is driving the bureaucratic ship that once was our democratic republic. We are all becoming data collected in government files. As a senior intelligence official previously involved with the National Security Agency's Utah Data Center remarked, "Everybody's a target; everybody with communication is a target."364

  The author and dissident Aleksandr Solzhenitsyn, who suffered under the secret police in the Soviet Union, wrote about this process some years ago:

  As every man goes through life he fills in a number of forms for the record, each containing a number of questions... There are thus hundreds of little threads radiating from every man, millions of threads in all. If these threads were suddenly to become visible, the whole sky would look like a spider's web, and if they materialized like rubber bands, buses and trams and even people would lose the ability to move and the wind would be unable to carry torn-up newspapers or autumn leaves along the streets of the city.365

  CHAPTER 16

  A Total Control Society

  The privacy and dignity of our citizens [are] being whittled away by sometimes imperceptible steps. Taken individually, each step may be of little consequence. But when viewed as a whole, there begins to emerge a society quite unlike any we have seen –a society in which government may intrude into the secret regions of a [person's] life."366

  –Former U.S. Supreme Courtjustice WILLIAM O. DOUGLAS

  The obvious goal of the corporate state, of course, is to create a total control society–one in which the government is able to track the movements of people in real time and control who does what, when, and where. This is accomplished through mass surveillance, sold to the American people by way of the two highly manipulative, siren-song catchwords of our modern age–security and convenience.

  Surveillance once relied primarily on government or corporate agents peering through binoculars, listening to conversations through a bugged telephone, or actively monitoring a camera. However, the government's mass surveillance tools are many and growing. This includes, at a bare minimum, surveillance cameras, electronic eavesdropping devices, traffic cameras, biometrics, radio-frequency identification cards, and satellites, all of which persistently monitor the behaviors and actions of the public while intruding on one's privacy.

  Technology is on the march and there are virtually no limitations to its uses against American citizens. The U.S. government and its corporate allies are looking out for you–literally–with surveillance tools intended to identify you, track your whereabouts, monitor your activities and allow or restrict your access to people, places, or things deemed suitable by the government.

  Surveillance Cameras

  As of 2007 there were approximately 30 million surveillance cameras located throughout the United States. At that time, the average American was captured on film by a surveillance camera more than 200 times a day.367 Thus, surrounded at every turn by surveillance cameras in one form or another on street corners, at the ATM, at convenience stores, and even in public restrooms, Americans have proven to be relatively adaptable to life in a goldfish bowl.

  Indeed, surveillance cameras, which operate in real time, and can be seen perched on traffic lights, alongside highways and roads, on bridges, expressways, and even on school buses, are perhaps the perfect example of how easy it was for the government to lead us down that slippery slope into a surveillance state. Sold to the public as safety devices to monitor traffic jams, catch drivers who break the law by speeding or perhaps running a red light, these cameras–often operated by private corporations–are little more than surveillance and revenue-raising devices for corporations, states, and municipalities, which use them to levy fines against alleged lawbreakers.368 Yet when coupled with license-plate readers, mobile scanners, and iris scanners to full-body scanners in airports, biometrie ID cards, etc., they become yet another layer in our surveillance society.

  Mobile Scanners

  There is no limit to what these technological gadgets can do in the so-called name of efficiency, expediency, economy, and security. For example, law enforcement agencies now have license-plate recognition scanners that can sweep a parking lot full of cars in under a minute and check them against police databases. "Police like the devices for their speed and efficiency but mostly for their ability to record thousands of plates and their locations each day," writes journalist Christine Vendei. "The information is loaded wirelessly into a police database and archived for possible searches later."369

  With such a tool at its disposal, the government can retroactively pinpoint exactly where you were on any given day. And if you have the bad luck of being in the wrong place at the wrong time, the burden of proving your innocence will rest with you.

  For some years now, Americans have been conditioned to full-body scans and invasive pat downs at airports. Now a mobile version of an airport full-body scanner is already roaming some of America's streets and neighborhoods. Mounted in nondescript delivery vehicles that enable police or other government agents to blend into urban and other landscapes, these roving x-ray scanners "bounce a narrow stream of x-rays off and through nearby objects, and read which ones come back," thereby producing instantaneous photo-like images of whatever the van passes– whether cars, trucks, containers, homes, or people.370

  In other words, the government can now do drive-by strip searches of your person and your home, including monitoring what you are doing in the privacy of your home. Even though you may be innocent of any wrongdoing whatsoever, every aspect of your life, as well as every room of your house and everything you do in your house, will be under scrutiny by government agents–and can and will be recorded and used against you at a later date.

  Biometrics

  Biometrics, a method of identifying someone based upon their individual biological traits, has enabled the government to go far beyond fingerprinting to pinpoint a person based on his most unique characteristics, whether it is the shape of his face, iris patterns, gait, or veins.371 Thanks to the corporate world's eagerness to jump on the biometrie bandwagon by requesting people's fingerprints rather than a password, for example, or an iris scan in lieu of a key, the government (its partner in crime, so to speak) now has an infinite number of ways in which to track each individual citizen.

  With biometrics promising to be an $11 billion industry by 2017, the demand by government and corporate entities for these disguised data collection systems will only accelerate, as will the accuracy of the programs.372 For example, facial recognition, once thwarted by basic methods of evasion, can now identify "people obscured by sunglasses, hats, and windshields." Soon, it is expected that basic consumer items like cell phones will have the ability to carry out iris scans and fingerprint recognition.373 "In 10 years," predicts Joseph Atick, co-founder of the International Biometrics and Identification Association, "[facial recognition] technology is going to be so good you can identify people in public places very easily"374

  Facial and iris recognition machines have come into greater use in recent years, ostensibly to detect criminals, streamline security checkpoints processes, and facilitate everyday activities. However, their uses are becoming more routine every day. For example, ticket holders at Walt Disney World must use their fingerprints to access the park. Some fitness centers, like 24 Hour Fitness, rely on finger
print scans to give customers access to their facilities.375 In the summer of 2011, Facebook implemented a new facial recognition feature which automatically tagged individuals in photos uploaded by their friends.376

  Iris Scanners

  Iris scanning works by reading the unique pattern found on the iris, the colored part of the eyeball. This pattern is unique even among individuals with the exact same DNA.

  The perceived benefits of iris scan technology, we are told, include a high level of accuracy, protection against identity theft, and the ability to quickly search through a database of the digitized iris information. It also provides corporations and the government–that is, the corporate state–with a streamlined, uniform way to track and access all of the information amassed about us, from our financial and merchant records, to our medical history, activities, interests, travels, and so on.

  In this way, iris scans become de facto national ID cards, which can be implemented without our knowledge or consent. In fact, the latest generation of iris scanners can even capture scans on individuals in motion who are six feet away. And as these devices become more sophisticated, they will only become more powerfully invasive. As Jeff Carter, CDO of Global Rainmakers, stated, "In the future, whether it's entering your home, opening your car, entering your workspace, getting a pharmacy prescription refilled, or having your medical records pulled up, everything will come off that unique key that is your iris. Every person, place, and thing on this planet will be connected [to the iris system] within the next 10 years."377

  As Fast Company reports:

  For such a Big Brother-esque system, why would any law-abiding resident ever volunteer to scan their irises into a public database, and sacrifice their privacy? GRI hopes that the immediate value the system creates will alleviate any concern. "There's a lot of convenience to this–you'll have nothing to carry except your eyes," says Carter, claiming that consumers will no longer

 

‹ Prev