Showing posts with label homeland security. Show all posts
Showing posts with label homeland security. Show all posts

Saturday, March 2, 2013

DHS built domestic surveillance tech into Predator drones

 http://news.cnet.com/8301-13578_3-57572207-38/dhs-built-domestic-surveillance-tech-into-predator-drones/

 The U.S. Department of Homeland Security has customized its Predator drones, originally built for overseas military operations, to carry out at-home surveillance tasks that have civil libertarians worried: identifying civilians carrying guns and tracking their cell phones, government documents show.

The documents provide more details about the surveillance capabilities of the department's unmanned Predator B drones, which are primarily used to patrol the United States' northern and southern borders but have been pressed into service on behalf of a growing number of law enforcement agencies including the FBI, the Secret Service, the Texas Rangers, and local police.

Homeland Security's specifications for its drones, built by San Diego-based General Atomics 
Aeronautical Systems, say they "shall be capable of identifying a standing human being at night as likely armed or not," meaning carrying a shotgun or rifle. They also specify "signals interception" technology that can capture communications in the frequency ranges used by mobile phones, and "direction finding" technology that can identify the locations of mobile devices or two-way radios.

The Electronic Privacy Information Center obtained a partially redacted copy of Homeland Security's requirements for its drone fleet through the Freedom of Information Act and published it this week. CNET unearthed an unredacted copy of the requirements that provides additional information about the aircraft's surveillance capabilities.
Homeland Security's Predator B drone can stay aloft conducting surveillance for 20 hours.
Homeland Security's Predator B drone can stay aloft conducting surveillance for 20 hours.
(Credit: U.S. Department of Homeland Security)

Concern about domestic use of drones is growing, with federal legislation introduced last month that would establish legal safeguards, in addition to parallel efforts underway from state and local lawmakers. The Federal Aviation Administration recently said that it will "address privacy-related data collection" by drones.

The prospect of identifying armed Americans concerns Second Amendment advocates, who say that technology billed as securing the United States' land and maritime borders should not be used domestically. Michael Kostelnik, the Homeland Security official who created the program, told Congress that the drone fleet would be available to "respond to emergency missions across the country," and a Predator drone was dispatched to the tiny town of Lakota, N.D., to aid local police in a dispute that began with reimbursement for feeding six cows. The defendant, arrested with the help of Predator surveillance, lost a preliminary bid to dismiss the charges.

"I am very concerned that this technology will be used against law-abiding American firearms owners," says Alan Gottlieb, founder and executive vice president of the Second Amendment Foundation. "This could violate Fourth Amendment rights as well as Second Amendment rights."
Homeland Security's Customs and Border Protection agency declined to answer questions about whether direction-finding technology is currently in use on its drone fleet. A representative provided CNET with a statement about the agency's unmanned aircraft systems (UAS) that said signals interception capability is not currently used:
U.S. Customs and Border Protection is not deploying signals interception capabilities on its UAS fleet. Any potential deployment of such technology in the future would be implemented in full consideration of civil rights, civil liberties, and privacy interests and in a manner consistent with the law and long-standing law enforcement practices. CBP's UAS program is a vital border security asset. Equipped with state-of-the-art sensors and day-and-night cameras, the UAS provides real-time images to frontline agents to more effectively and efficiently secure the nation's borders. As a force multiplier, the UAS operates for extended periods of time and allows CBP to safely conduct missions over tough-to-reach terrain. The UAS also provides agents on the ground with added situational awareness to more safely resolve dangerous situations.

During his appearance before the House Homeland Security committee, Kostelnik, a retired Air Force major general who recently left the agency, testified that the drones' direction-finding ability is part of a set of "DOD capabilities that are being tested or adopted by CBP to enhance UAS performance for homeland security." CBP currently has 10 Predator drones and is considering buying up to 14 more.

If the Predator drones were used only to identify smugglers or illegal immigrants crossing the Mexican and Canadian borders, or for disaster relief, they might not be especially controversial. But their use domestically by other government agencies has become routine enough -- and expensive enough -- that Homeland Security's inspector general said (PDF) last year that CBP needs to sign agreements "for reimbursement of expenses incurred fulfilling mission requests."

"The documents clearly evidence that the Department of Homeland Security is developing drones with signals interception technology and the capability to identify people on the ground," says Ginger
McCall, director of the Open Government Project at the Electronic Privacy Information Center. "This allows for invasive surveillance, including potential communications surveillance, that could run afoul of federal privacy laws."

A Homeland Security official, who did not want to be identified by name, said the drones are able to identify whether movement on the ground comes from a human or an animal, but that they do not perform facial recognition. The official also said that because the unarmed drones have a long anticipated life span, the department tries to plan ahead for future uses to support its border security mission, and that aerial surveillance would comply with the Electronic Communications Privacy Act and other applicable federal laws.

The documents show that CBP specified that the "tracking accuracy should be sufficient to allow target designation," and the agency notes on its Web site that its Predator B series is capable of "targeting and weapons delivery" (the military version carries multiple 100-pound Hellfire missiles). CBP says, however, that its Predator aircraft are unarmed.

Gene Hoffman, a Silicon Valley entrepreneur who's the chairman of the Calguns Foundation, said CBP
"needs to be very careful with attempts to identify armed individuals in the border area" when aerial surveillance touches on a constitutional right.

"In the border area of California and Arizona, it may be actively dangerous for the law-abiding to not carry firearms precisely due to the illegal flow of drugs and immigrants across the border in those areas," Hoffman says.

CBP's specifications say that signals interception and direction-finding technology must work from 30MHz to 3GHz in the radio spectrum. That sweeps in the GSM and CDMA frequencies used by mobile phones, which are in the 300MHz to 2.7GHz range, as well as many two-way radios.

The specifications say: "The system shall provide automatic and manual DF of multiple signals simultaneously. Automatic DF should be able to separate out individual communication links."

Automated direction-finding for cell phones has become an off-the-shelf technology: one company sells a unit that its literature says is "capable of taking the bearing of every mobile phone active in a channel."

Although CBP's unmanned Predator aircraft are commonly called drones, they're remotely piloted by FAA-licensed operators on the ground. They can fly for up to 20 hours and carry a payload of about 500 lbs.

Sunday, November 18, 2012

Mainstream media now openly admits the FBI and CIA are reading all your emails

 http://www.naturalnews.com/038020_FBI_surveillance_emails.html#ixzz2CbpoE46Y

(NaturalNews) For years, those of us who have tried to warn the American public that Big Brother monitors all Internet users were demonized, vilified and ridiculed.

Now, the mainstream media has proven us correct.

"The U.S. government -- and likely your own government, for that matter -- is either watching your online activity every minute of the day through automated methods and non-human eavesdropping techniques, or has the ability to dip in as and when it deems necessary -- sometimes with a warrant, sometimes without," ZDNet reported earlier this month. "That tin-foil hat really isn't going to help. Take it off, you look silly."

The Petraeus case

Where's the proof that the government has this capability?

You might recall a fellow by the name of (retired) Gen. David Petraeus. He's been in the news lately.

This four-star general-turned-CIA chief just resigned his post after news broke that he had engaged in an extra-marital affair with is biographer, herself a West Point graduate and former Army officer.

What led to this shocking discovery was Petraeus' use, of all things, Google's online email service, Gmail.

According to federal law, mind you, authorities are not legally permitted to electronically snoop around in your email box.

"The government can't just wander through your emails just because they'd like to know what you're thinking or doing," Stewart Baker, a former assistant secretary at the Homeland Security Department who's now in private law practice, told The Associated Press. "But if the government is investigating a crime, it has a lot of authority to review people's emails."

Or, in the case of the CIA, if the agency wants to track a suspect ostensibly for "national security" purposes. Ditto the NSA.

The wrangling of Petraeus' email account has certainly landed him in a world of trouble, but his story has also, once again, ignited a new the debate over when, how and why governments and law enforcement agencies alike are able to access the email accounts of ordinary citizens - even if they head up the most powerful spy agency in the world.

Granted, experts say "the little people" needn't worry much about having their online presence tracked. Agencies like the CIA generally tend to have bigger fish to fry, so to speak. But nevertheless, the technology to pilfer email accounts at will obviously exists.

"Forget ECHELON, or signals intelligence, or the interception of communications by black boxes installed covertly in data centers," writes Zack Whittaker for ZDNet. "Intelligence agencies and law enforcement bodies can access - thanks to the shift towards Web-based email services in the cloud - but it's not as exciting or as Jack Bauer-esque as one may think or hope for."

(Editor's Note: ECHELON, for those who are unfamiliar with it, is the name of "a global Communications Interception (COMINT) system created by the United States, the United Kingdom, Canada, Australia and New Zealand to routinely and indiscriminately monitor and record all forms of electronic communications worldwide (both military and civilian) and overseen by the National Security Agency," according to one published description of the program.)

How the top CIA official got busted

When he set up his private Gmail account, Petraeus used a pseudonym and composed email messages but never sent them. They were instead saved as drafts. His lover, Paula Broadwell, would then log in under the same account, read the drafts then reply to them in the same manner - as a draft, without actually sending the message.

The exchanges would not be sent across the networks through Google's data centers, which would make it nearly impossible for the NSA or any other ELINT (electronic intelligence) agency (like Britain's GCHQ or the Israeli Mossad) to "read" the messages while they are in transit between accounts.

Other sinister operators - terrorists, pedophiles and the like - have been known to use the same trick to avoid detection, ZDNet reported.

"But surely IP addresses are logged and noted? When emails are sent and received, yes. But the emails were saved in draft and therefore were not sent. However, Google may still have a record of the IP addresses of those who logged into the account," the report said.

In the end, the FBI used a little-know law called the Stored Communications Act, which is part of the Electronic Communications Privacy Act, as the basis for getting a warrant to view Petraeus' private Gmail account. And that's how agents found the stored messages that were never actually sent.

"Once it knew Ms. Broadwell was the sender of the threatening messages, the FBI got a warrant that gave it covert access to the anonymous email account," the BBC's Mark Ward reported.

Sources:

http://www.zdnet.com

http://finance.yahoo.com

http://actionamerica.org/echelon/echelonwhat.html