Nov 19 2013

Does the TSA have any “precogs”?

The TSA uses appearance profiles to decide whether to search you and/or your luggage, interrogate you, call the police, or allow you to fly. (Diagram from GAO report.)[The TSA uses appearance profiles to decide whether to search you and/or your luggage, interrogate you, call the police, or allow you to fly. (Diagram from GAO report. Click image for larger version.)”]

We’ve likened the TSA’s attempts to predict which travelers are would-be terrorists on the basis of  their identities and profiles to the “pre-crime” police in the fictional film, Minority Report, who use “pre-cogs” with supernatural powers to predict who will commit future crimes.

We’ve also pointed out that in reality, as distinct from Hollywood fantasy, there’s no such thing as a “precog”. The Constitution presumes that we are innocent until proved guilty, and requires probable cause (as determined by a judge, not a self-proclaimed or TSA-certified psychic) to believe that we have already committed a crime before we can lawfully be arrested.

Having said that, we’re pleased to see that members of Congress and government auditors are (finally) beginning to come to their senses — as the characters in “Minority Report” eventually did — and questioning whether the TSA really has any “pre-cogs” on its payroll, or what the TSA has gotten for its $900 million outlay on “Behavior Detection Officers” and “Screening Passengers by Observation Techniques” (SPOT).

At a hearing last week before the Subcommittee on Transportation Security of the House Committee on Homeland Security, Rep. Mark Sanford asked John Pistole, the former FBI agent who is now Administrator of the TSA, whether travelers should “have to go through a screening process based on somebody’s interpretation of what might be in your brain.” Rep. Sanford pointed that a wide variety of factors — including the TSA’s own actions — might lead to stress, fear, and the “behaviors” that the TSA has defined in a (secret) point-scoring system as indicia of terrorist intentions.

In response, Pistole admitted that, “There’s no perfect science, there’s no perfect art of this.”

“Imperfect” isn’t the right word for the SPOT program. In fact, there’s no scientific basis for it at all, according to a report and testimony at the same hearing by the Government Accountability Office.

In addition to a detailed debunking of the lack of scientific evidence to support the TSA’s claims to paranormal ability,  the GAO report gives more information than has previously been made public concerning what the TSA’s “behavior detection officers” (BDOs) actually do.

The TSA’s goal is mind reading. TSA “Behavior Detection Officers” (BDOs) are supposely trained to deduce mental states from external appearances and visible behaviors:

According to TSA’s strategic plan and other program guidance for the BDA [Behavior Detection and Analysis] program released in December 2012, the goal of the agency’s behavior detection activities, including the SPOT program, is to identify high-risk passengers based on behavioral indicators that indicate “mal-intent.”

But can BDOs read our minds?  Presumably, the measure of their success in doing so would be how many (if any) of the travelers they flag as “mal-intentioned” are eventually found guilty of aviation-related terrorist offenses.  Does that ever happen?  The GAO couldn’t tell, because the TSA doesn’t keep records of that:

TSA was unable to provide documentation to support the number of referrals that were forwarded to law enforcement for further investigation for potential ties to terrorism. Further, according to FAMS [Federal Air Marshalls Service] officials, when referrals in TISS [Transportation Information Sharing System] are forwarded to other law enforcement officials for further investigation, the FAMS officials do not necessarily identify why the referral is being forwarded. That is, it would not be possible to identify referrals that were forwarded because of concerns associated with terrorism versus referrals that were forwarded because of other concerns, such as drug smuggling. [emphasis added]

Like most TSA personnel, and despite the job title of “officer”, BDOs and TSOs are not law enforcement officers.  As the diagram above makes clear, they can and do impose “administrative” sanctions including more intrusive searches of travelers and our luggage, interrogation of travelers, and denial of the right to travel. The TSA also claims the right to impose administrative fines for insufficient, or insufficiently groveling, “cooperation” with their search, interrogation, or anything else it decides is part of “screening”.  But beyond that, unless they want to take the risk of liability for making a citizens arrest, TSA employees and contractors depend on local law enforcement officers (LEOs) to provide their muscle.

What happens when the TSA refers travelers picked out by its BDO “pre-cogs” to local police?

99.4 percent of the passengers that were selected for referral screening — that is further questioning and inspection by a BDO — were not arrested. The percentage of passengers referred to LEOs that were arrested was about 4 percent; the other 96 percent of passengers referred to LEOs were not arrested. The SPOT database identifies 6 reasons for arrest, including (1) fraudulent documents, (2) illegal alien, (3) other, (4) outstanding warrants, (5) suspected drugs, and (6) undeclared currency…. According to the validation study, the majority of the arrested passengers were arrested because of possession of a controlled substance. [emphasis added]

“Terrorist” offenses aren’t even a sufficiently large proportion of TSA checkpoint arrests to warrant their own category in the database. If there were any at all, they are merely a subset of the “miscellaneous” category.

Rather than predicting terrorist intent, the TSA is using the “behavior detection” program as a pretext for warrantless searches for general law enforcement purposes, primarily for enforcement of drug laws.  That’s exactly the sort of pretextual use of a special-purpose administrative checkpoint detention and search as a general-purpose law enforcement dragnet which, as numerous courts have recognized, is prohibited by the Fourth Amendment.

Any actual interdiction of would-be terrorists is so infrequent and insignificant (or of so little relevance to the true purposes and criteria for success of the program) as not to be worth bothering to track.

Both the GAO (Congressional auditors) and the DHS’s own Office of Inspector General (OIG), in separate audits and investigations, found evidence that these warrentless searches and other sanctions were being imposed on the basis of “appearance profiles”, including profiles of ethnic and racial appearance:

With regard to information provided related to profiling, DHS stated that DHS’s OIG completed an investigation at the request of TSA into allegations that surfaced at Boston Logan Airport [“These accusations included written complaints from BDOs who claimed other BDOs were selecting passengers for referral screening based on their ethnic or racial appearance.”] and concluded that these allegations could not be substantiated. However,  while the OIG’s July 2013 report of investigation on behavior detection officers in Boston concluded that “there was no indication that BDOs racially profiled passengers in order to meet production quotas,” the OIG’s report also stated that there was evidence of “appearance profiling.”

In other words, the DHS’s own investigators found that the TSA was basing its decisions (searches, interrogations, no-fly orders, referrals to police, etc.) on the basis of racial and ethnic appearance profiles — it just wasn’t using racial and ethnic profiling to meet specific quotas. All profiling by BDOs is, of course, “appearance profiling”, since all that BDOs are able to observe is external appearance. Is the absence of explicit racial or ethnic quotas supposed to make such profiling OK?

GAO auditors also received first-hand complaints of profiling from BDOs at every airport they visited:

During our visits to four airports, we asked a random sample of 25 BDOs at the airports to what extent they had seen BDOs in their airport referring passengers based on race, national origin, or appearance rather than behaviors…. Of the 25 randomly selected BDOs we interviewed, 20 said they had not witnessed profiling, and 5 BDOs (including at least 1 from each of the four airports we visited) said that profiling was occurring at their airports, according to their personal observations. Also, 7 additional BDOs contacted us over the course of our review to express concern about the profiling of passengers that they had witnessed.

If there is any small silver lining in the GAO’s latest report, it’s that despite complete disregard for the Fourth Amendment, the TSA has at least begun to pay lip service to the Fifth Amendment rights of travelers to remain silent when questioned by TSA employees or contractors:

In August 2012, the Secretary of Homeland Security issued a memorandum directing TSA to take a number of actions… These actions include a revision of the SPOT standard operating procedures to, among other things, clarify that passengers who are unwilling or uncomfortable with participating in an interactive discussion and responding to questions will not be pressured by BDOs to do so. [emphasis added]

Oct 22 2013

TSA’s lying “response” to today’s story in the New York Times

We’re quoted on the front page of today’s New York Times in a story by Susan Stellin, “Security Check Now Starts Long Before You Fly”:

The Transportation Security Administration is expanding its screening of passengers before they arrive at the airport by searching a wide array of government and private databases that can include records like car registrations and employment information….

“I think the best way to look at it is as a pre-crime assessment every time you fly,” said Edward Hasbrouck, a consultant to the Identity Project, one of the groups that oppose the prescreening initiatives. “The default will be the highest, most intrusive level of search, and anything less will be conditioned on providing some additional information in some fashion.”

More:

The TSA refused to say anything to the Times on the record, but published a blog post today (with the misleading title “Expediting Screening for the Traveling Public”) responding to the Times’ story with a succession of lies and prevarications.

We call “bullshit” on the TSA:

  • “We are not using “private databases.”” This is an out-and-out lie, as “Blogger Bob” and the TSA surely know. All TSA pre-secreening systems relie primarily on information from private commercial databases of airline reservations (PNRs). Since there is no requirement for a U.S. citizen to notify the government directly before taking a trip by common carrier, “pre-screening” would be impossible without access to, and reliance on, these private commercial databases. The US government has gone to great effort, through the APIS,  PNR, and Secure Flight regulations and through lobbying for changes to Canadian privacy law and exceptions to European privacy law, to implement requirements for DHS access to this data.  If these databases are no longer “private”, that is only because the TSA and other DHS components have compelled airlines and reservation hosting companies to make this data available to government agencies.
  • “TSA does not monitor a passenger’s length of stay in any location.” The TSA doesn’t always retain the travel itinerary information it compels airlines to provide for domestic travel, but it claims the right to do so for anyone deemed (arbitrarily or according to secret criteria) to be “suspicious” or to “match” an entry on any of the government’s (arbitrary, secret) “watchlists”.  And for international travel, CBP (another DHS component agency) does retain complete PNR data, including travel itineraries, and comprehensive border crossing and entry/exit logs, for all travelers, in its Automated Targeting System (ATS) — and claims the right to “share” all this data with the TSA. (And that doesn’t even begin to consider the NSA’s apparently independent hacking of airlines and reservation systems and potential sharing of PNR and other travel data with DHS.)
  • “We are not using car registrations.” Again, it’s CBP rather than the TSA that is logging license plates and vehicle movements (using cameras near borders and optical character recognition software), linking them to individual ATS records, and using them to generate “risk” scores and watchlist messages — which are then passed on to the TSA.  TSA is using this data, just (slightly) indirectly. According to the latest System Of Records Notice for ATS, published in the Federal Register in 2012, “ATS maintains the official record for … the combination of license plate, Department of Motor Vehicle (DMV) registration data and biographical data associated with a border crossing”.
  • “[W]e rely on the same security information passengers have been required to submit at time of booking for many years…. [T]he info we rely on is the same info that passengers have provided for years when they book their flight.” Actually, we didn’t used to have to provide our ID number, date of birth, or gender in order to make an airline (or Amtrak train, or Greyhound bus) reservation. It used to be possible to hold airline reservations in “dummy” names, or with no names at all. The TSA relies on information that has only been required since the creation of the TSA. And in the past, we “provided” that information, if at all, only to airlines and travel companies. Prior to the creation of the TSA, we never had to provide any information to the government to book a flight.  (Unless we were traveling in a foreign country where a foreign government agency like the Stasi required us to show our ID cards or permission papers to book a flight.)
  • “Anyone who has never traveled outside the United States would not have a passport number on file and would therefore not be subject to the rules that the agency uses to determine risk.” Nonsense. Many people have our passport numbers on file with the TSA because we’ve used our passports as ID for domestic flights.  Many people have no government-issued ID except a passport.  Despite the State Department’s moves to make it more difficult to get a passport, the REAL-ID  law sometimes makes it even more difficult to get a drivers license or other state-issued ID than to get a passport.
  • “We are not expanding the type of information we use.” If that were true, why would the TSA have published formal notices in the Federal Register of new systems of records and new uses for existing systems of records?  They don’t publish these legal notices just for fun. Either (a) the TSA has already been illegally collecting and/or using this data without proper notice, in violation of the Privacy Act (as DHS did for years with the Automated Targeting System), (b) the TSA is doing what is says in the notices it is doing, and collecting and using new information in new ways, or (c) the TSA plans to do so in the future, and wants to be able to say, if someone later complains, “But we gave you fair notice that this was what we were going to do. If you wanted to object, you should have done so back in 2013 when we published that notice.”
  • “[W]e are not using any new data to determine low risk passengers.” Applicants for the TSA’s Pre-Check program — i.e. people who want to be relieved of suspicion-by-default and the associated more intrusive search each time they travel — are being required to provide information that the TSA has never before requested, including fingerprints, other biometric information, and authorization for checks of criminal, financial, and other government and commercial records.  If the TSA isn’t using any of this new data, why is it compiling it? More than likely, this new data is being or will soon be used — and retained for possible additional future uses for an unknown range of purposes.

[TSA Pre-Crime graphic from Leaksource]

Oct 10 2013

TSA proposes arbitrarily individualized surveillance-based searches

In the latest version of TSA’s endless series of “trusted traveler” (or “less mistrusted traveler”) schemes, the agency is currently proposing to impose more intrusive searches on any traveler who doesn’t “voluntarily” enroll in the TSA Pre-Check program and authorize the TSA to create a new permanent file with everything from your fingerprints to any “other information provided by … government agencies or other entities”.

These files would be exempted from the normal requirements of the Privacy Act that records used as the basis for decisions about individuals’ exercise of our rights be made available to us and be limited to information that is sufficiently accurate, complete, and relevant to form a legitimate basis for such decisions.

The proposal is contained in a package of three regulatory filings (one new and one revised “System of Records Notice” and a “Notice of Proposed Rulemaking” proposing Privacy Act exemptions) published last month in the Federal Register.  All three have to be read in combination to appreciate their full implications.

The deadline for public comments on two of these proposals is today, and for the third is tomorrow. We filed consolidated comments today objecting to all three of these proposals:

Read in combination, this new and revised SORN and these proposed regulations describe a system in which an essentially unlimited range of personal information collected from an essentially unlimited range of sources, and known to include inaccurate and irrelevant information, would be (or perhaps already is being) compiled into the “TSA Pre-Check Application Program” system of records.

These records would be used – either according to criteria which are illegally being kept secret, or in an entirely arbitrary manner at the “discretion” of the TSA – to determine who is and who is not deemed “eligible” to exercise the right to travel without being subject to unreasonable searches.

The results of that decision-making would be incorporated into the “Secure Flight” system of records, and used as part of the basis (also either pursuant to secret rules or entirely arbitrarily) for deciding to issue or withhold the issuance of individualized “boarding pass printing results”, including instructions to TSA staff and contractors as to the degree of intrusiveness of the search to which each would-be traveler is to be subjected as a condition of exercising our right to travel.

Maintenance and use of these systems of records in the manner contemplated by these SORNs and the proposed exemptions would violate the 1st, 4th, and 5th Amendments to the U.S. Constitution, the presumption of innocence, due process, the Freedom Of Information Act (FOIA), the Privacy Act, and Article 12 (Freedom of Movement) of the International Covenant on Civil and Political Rights (ICCPR.

These records should be expunged, and the proposed regulations should be withdrawn….

We also point out that the TSA is only pretending to give the required consideration to public comments:

According to the “TSA Pre-Check Application Program” SORN published on September 10, 2013, “The Secretary of Homeland Security has exempted certain records from this system from the notification, access, and amendment procedures of the Privacy Act because it may contain records or information related to law enforcement or national security purposes.”

This claim was, and is, false. As of the date of the SORN, no such exemption had even been proposed: the NPRM proposing such an exemption, and requesting public comments (such as this one) concerning that proposed exemption for consideration by the DHS, was not published until a day later, on September 11, 2013. Even now, the Secretary has promulgated no final rule for such an exemption. Nor could he or she promulgate any such final rule, consistent with the Administrative Procedure Act, unless and until the current period for public comment on the proposed exemption rule has concluded and the comments submitted (including these comments) have been considered by the DHS.

The false claim that “The Secretary of Homeland Security has exempted certain records from this system from the notification, access, and amendment procedures of the Privacy Act”, when in fact the Secretary has not done so, appears to be intended to mislead individuals about what rights we have, and to dissuade us from attempting to exercise our rights.  In addition, by stating the outcome of the current exemption rulemaking as a fait accompli, it constitutes prima facie evidence of bad faith in the consideration of public comments. It is not enough for an agency to accept submissions of comments from the public to the circular file, after making a decision. An agency must give genuine consideration to public comments before deciding whether to finalize, modify, or withdraw a proposed rule.

You can read our complete comments here. You can submit comments at Regulations gov (here, here , and here) but your comments won’t be processed or visible online until after the DHS Privacy Office re-opens.

[TSA Pre-Crime graphic from Leaksource]

Sep 29 2013

How the NSA obtains and uses airline reservations

A front-page report in today’s New York Times based on documents leaked by NSA whistleblower Edward Snowden confirms that the NSA, like the DHS, uses airline reservation data as part of its profiling and social network analysis of US citizens and foreigners. Today’s report also raises new questions, and suggests some answers, as to how the NSA obtains and uses this airline data.

The Times’ report today on NSA social network analysis mentions that:

The [NSA] can augment the communications data with material from public, commercial and other sources, including … passenger manifests…,  according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners….

[T]he N.S.A. correlates 164 “relationship types” to build social networks and what the agency calls “community of interest” profiles, using queries like “travelsWith“.

In their most basic form, passenger manifests list each passenger individually and do not indicate which passengers were traveling together.  At a minimum, either “Advance Passenger Information” (API) data, some other source of “enhanced” passenger manifest data, or complete Passenger Name Records (PNRs) would be needed to identify which passengers on a given flight had reservations in the same PNR (a single PNR can contain the reservations for an entire party or group traveling together) and thus who “travelsWith” whom.

We’ve long known that the DHS collects API and PNR data about US citizens and foreigners alike, compiles this data in its Automated Targeting System and Secure Flight databases, and mines this data both to target individuals (including journalists and activists) and for social network analysis (correlating e.g. telephone numbers and airline reservations) to identify and target new suspects on the basis of their association with current suspects (i.e. as a suspicion-generating or guilt-by-association system).

A typical PNR like the one shown above (from a DHS Automated Targeting System dossier; click the thumbnail for a larger image) includes a timestamped IP address (line 5 of the “remarks” in the example above), email address, home address, credit card number, mobile phone number, etc., so it can readily be correlated with Internet, communications, and financial records.

The NSA would presumably have been interested in flights worldwide, including flights within parts of the world far from the USA, while the DHS claims to collect PNR data only for flights to, from, within, or via the US.  But we know that the DHS can, and sometimes does, collect PNR data about flights elsewhere.

As we reported in 2007, and as was mentioned in a front-page story in the Washington Post based on our research, ATS records released by DHS in response to our requests (you can request your own ATS file using the forms here) confirmed that the DHS already had “root” access to the computerized reservation systems (CRSs), so that the DHS could retrieve any PNR in those CRSs, even if it didn’t include any US flights.

The “smoking gun” confirming DHS root access to CRSs was this PNR for someone who traveled from San Francisco to Berlin (TXL) on United Airlines and a United/Lufthansa codeshare flight, stayed in Berlin for six days, continued from Berlin to London (LHR), stayed in London for another six days, and then returned to SFO on United:

The portion of the journey from Berlin to London via Prague was on Czech Airlines (OK), an airline which does not (and did not then) fly to, from, or via any point in the US. Additional details in the PNR showed that a separate ticket was issued for the OK flights, which did not connect to flights to or from the US.  A CRS user with a United Airlines user ID and privileges would not have been able to see these flights. Only a user with an ID from the travel agency that made these reservations, or a user with “root” privileges (such as a user with an ID from the CRS company), would have been able to see all of the data that the DHS was able to see and import into ATS.

So could the NSA have obtained its copies of PNR and/or API data from DHS, or by using the root-user credentials that CRS companies had provided to the DHS?  Maybe.  Since neither DHS nor the CRSs keep logs of who accesses their respective copies of PNR data, there’s no way to know for sure except through leaks or the testimony of whistleblowers.

But we suspect that the NSA has some way to obtain PNR and/or API data independent of the DHS.

Read More

Sep 17 2013

How airline reservations are used to target illegal searches

One of the most detailed pictures to date of how the US government uses airline reservations to target illegal searches is provided by documents released recently by the US government as part of an agreement to settle a lawsuit brought by David House, an activist with the Pvt. Manning Support Network.

Mr. House was detained and searched and had his electronic devices confiscated and copied by DHS personnel at O’Hare Airport as he was re-entering the US after a vacation in Mexico in 2010.

The government learned of Mr. House’s travel plans through their systems for real-time monitoring and mining of airline reservations:

The ACLU analysis of the documents released to Mr. House, and reports by the New York Times and the Associated Press,  focus on the DHS seizure and copying of the data from Mr. House’s electronic devices. An article in Mother Jones highlights the technical ineptness of the government’s attempts to analyze the data seized from Mr. House. (It took DHS “experts” more than a month, for example, to realize that a portion of the data dump from Mr. House’s netbook was a Linux partition.)

But as discussed below, more is revealed by these documents about DHS access to, and use of, airline reservations.

The documents released to Mr. House may also help explain how David Miranda, the domestic partner of journalist Glenn Greenwald, was detained and searched last month while changing planes at Heathrow Airport in London.

And in that context, they may also suggest an explanation for why Mr. Miranda was detained and searched in the UK, and Mr. House in the US, but Mr. Greenwald himself has not been detained or similarly searched when he travels to the US.

Read More

Sep 10 2013

9th Circuit considers Constitutionality of ban on Internet anonymity

Last year, we reported on a Federal district court hearing on the Constitutionality of portions of the law enacted by California’s Proposition 35, which requires California residents who have been convicted of certain sex-related crimes to register with the local police, annually and within 24 hours of any addition or change, for the rest of their lives, “A list of any and all Internet identifiers established or used by the person [and] A list of any and all Internet service providers used by the person… For purposes of this chapter, (a) “Internet service provider” means a business, organization, or other entity providing a computer and communications facility directly to consumers through which a person may obtain access to the Internet…. (b)  “Internet identifier” means an electronic mail address, user name, screen name, or similar identifier used for the purpose of Internet forum discussions, Internet chat room discussions, instant messaging, social networking, or similar Internet communication.”

The challenge to this portion of the law, being argued by Electronic Frontier Foundation and the ACLU of Northern California on behalf of as-yet-anonymous clients who would be subject to this registration requirement, is a crucial test of the right to anonymity on the Internet.

It’s easy to say, “This only affects sex offenders.”

But restrictions on First Amendment rights are always imposed first on the most stigmatized groups of people, whether the villians du jour are serial killers, perverts, Communists, or Jews.  Once they are accepted by the public as applied to those disfavored classes, these measures can gradually be expanded until everyone has to register with the government, carry government-assigned credentials identifying them and/or their group affiliation (Star of David, pink triangle, etc.), or comply with other restrictions that have come to be accepted  as merely “administrative” rules for how they can exercise their rights, and are no longer considered substantive restrictions on rights.

Judge Thelton Henderson of the U.S. District Court for the Northern District of California had issued a temporary restraining order prohibiting the state form enforcing this part of the law. Following the hearing we reported on, Judge Henderson converted that order into a preliminary injunction.  Both the state of California, and the sponsors of the ballot initiative (as “intervenors” in the court case) appealed to the Circuit Court before the District Court could resolve the issue of whether to make the injunction permanent.

Today a three-judge panel of he 9th Circuit Court of Appeals heard arguments on whether to let the preliminary injunction remain in force while the District Court proceedings continue.

Today’s hearing focused on whether the provisions of Prop. 35 requiring registration of Internet service providers and “identifiers” chill the exercise of free speach and are overbroad, i.e are not “narrowly tailored” to restrict no more activity protected by the First Amendment than is necessary. (The vagueness of the terms “Internet service provider” and “Internet identifier” was raised in the briefs, but barely mentioned at argument.)

Early in the hearing, Judge Jay Bybee observed that, “We’re living in a post-Snowden world now, where we all have to wonder whether all of our communications are being monitored by the NSA.” It was an intriguing suggestion of how much judicial attitudes may have been reshaped by the actions of whistleblowers.

The law’s proponents argued that free speech would not be chilled because under the law the police would have only limited authority to make Internet identifiers public.

But Michael Risher of the ACLU pointed out that chilling effects result primarily from fear of official retaliation — such as by the police. Police don’t have to make registration information public to use it themselves against people who say things they don’t like.

“A registrant who wants to criticize the local police department in comments on a local newspaper’s website, but doesn’t want to face retaliation, will be chilled if they know that their identifier is on file with those local police…. Among the reasons for protection of anonymous speech is to protect against this sort of official retaliation.”  It’s easy for the police to make life hard for a registered sex offender, Risher pointed out.

The law’s defenders had a particularly hard time justifying the breadth of the registration requirement, which they conceded applied (at least as the law is written) to screen names or accounts used to post comments on websites from the New York Times to eBay, and to people whose crimes had nothing to do with the Internet.

“If I open an account so I can sell my bicycle on Craigslist, do I have to report that?”, Judge Bybee asked.

When counsel for the intervenors tried to justify the requirement for registration of Internet identifiers (but not pseudonyms used for other sorts of communications) by claiming that “sex crimes are moving to the Internet”, Judge Mary Schroeder shot back, “So is shopping. So what?”

We’re relatively optimistic that this panel of the 9th Circuit will allow the District Court’s preliminary injunction to remain in force. But it’s still up to the District Court to make that injunction permanent.

Sep 06 2013

Why did the NSA hack an airline reservation system (when CBP already has root access)?

The latest revelations about NSA attacks on encrypted electronic communications include this sentence buried in an article in yesterday’s New York Times (first noted today by the travel news website Skift):

But by 2006, an N.S.A. document notes, the agency had broken into communications for three foreign airlines, one travel reservation system, one foreign government’s nuclear department and another’s Internet service by cracking the virtual private networks that protected them.

It’s no surprise that the U.S. government was and is interested in monitoring airline reservations in real time as well as in mining historical airline reservation records.

But why did the NSA feel it was necessary to hack into airline and computerized reservation system (CRS) messaging, when the U.S. Customs and Border Protection division of DHS already had root access to reservations for flights worldwide stored in any of the four largest CRSs (including Amadeus, the only one not based in the USA), and was already extracting copies of all reservations that include flights to, from, via, or over the U.S. and compiling them into tits Automated Targeting System (ATS)?

  • Was the government interested in some airlines (who were these three?) that didn’t use one of the big four CRSs to host their reservations?
  • Was the government afraid that some airline or CRS (which one?) might pull the plug on CBP access, or restrict it to reservations for flights that actually touch the USA?
  • What was it about airline and CRS messaging that interested the NSA?  For what NSA purpose was the content of PNRs insufficient?

Whistleblowers, especially with airlines or CRSs or their contractors and suppliers, we need your help! If you know what was up with the NSA’s hacking of airline and CRS messaging, leave a comment or get in touch.

Aug 22 2013

California considers “enhancing” drivers licenses with radio tracking beacons

California’s legislature is considering a bill to authorize adding radio tracking beacons to drivers licenses and state non-driver ID cards.

Each such card would broadcast a unique tracking number which could legally be intercepted by anyone with a suitable radio transceiver within range, and which would be linked to a national DHS database of drivers license, state ID card, and citizenship information.

The tracking beacons are designed to allow the tracking numbers on ID cards carried by travelers in motor vehicles to be read from outside their vehicles as they approach or pass through checkpoints.

Independent academic studies of actual ID cards issued by other states, using the same standards proposed for use in California, have found that they can sometimes be read from more than 50 yards away.

S.B. 397 has already been approved by the California Senate, and is now under consideration in the Assembly. Because it has been amended by the Assembly, it will need to be reconsidered by the Senate (to decide whether to accept the Assembly amendments) if and when it is approved by the Assembly.

To date, S.B. 397 has been largely unopposed in the California legislature, and it is likely to be approved unless legislators start hearing a groundswell of opposition from their constituents.

What excuse is being offered for this scheme? And what’s its real purpose?

Read More

Jun 18 2013

Our comments on the TSA’s virtual strip-search machines

Today the Identity Project filed our comments on the TSA’s proposed rules to require travelers to submit to “screening” using virtual strip-search machines (“Advanced Imaging Technology” in TSA-speak.

You have until next Monday, June 24, 2013 to submit your own comments.

Here’s the introductory summary of our comments:

Regulations of the Transportation Security Administration (TSA) at 49 CFR § 1540.107 currently require would-be air travelers to “submit to screening”, but neither define nor limit the meaning of “submit” or “screening”. Under this NPRM, the TSA proposes to add a new paragraph (d) to § 1540.107, which would authorize the TSA to include “screening technology used to detect concealed anomalies without requiring physical contact with the individual being screened” as part of the “screening” to which would-be passengers must “submit” (those terms remaining otherwise undefined and unlimited).

The proposed rule would require travelers to submit to virtual strip-searches and/or manual groping of their genitals, as a condition of the exercise of their right to travel by air by common carrier.

The Identity Project objects to the proposed rule on the following grounds:

1. The TSA fails to recognize that travel by air by common carrier is a right, not a privilege to be granted or denied by the government or subjected to arbitrary or unjustified conditions. As a condition on the exercise of a right, a requirement to submit to searches or other aspects of “screening” is subject to strict scrutiny. The burden is on the TSA to show that the current and proposed requirements will actually be effective for a permissible purpose within the jurisdiction of the TSA, and that they are the least restrictive alternative that will serve that purpose. The TSA has not attempted to asses the proposed rule according to this standard, and has not met this burden.

2. The TSA errs in claiming that, “Individuals … are not included in the definition of a small entity” in the Regulatory Flexibility Act (RFA). Nothing in the statutory definition of “small entities” excludes individuals, and in fact many individual travelers affected by the proposed rule are “small entities” as that term is used in the RFA. The TSA must publish and allow comment on a new RFA analysis that takes into consideration the impact of the proposed rule on individuals in their capacity as “small entities”. If the TSA fails to do so, OMB must disapprove the proposed rule, pursuant to the RFA.

3. In the absence of any definitions of “submit” or “screening”, the current and proposed rules are unconstitutionally vague and overbroad. Travelers subject to the rules can’t tell what is prohibited or what is required as a condition of travel by air by common carrier, or which actions at TSA checkpoints are and aren’t subject to TSA civil penalties. The rules reach a significant amount of protected conduct by denying the right to travel to a significant number of individuals who pose no threat to aviation.

The proposed rule should be withdrawn, and the practices it would purport to authorize should be suspended. If the proposed rule is not withdrawn by the TSA, it should be rejected by the Office of Management and Budget (OMB) for failure to include the analysis required by the RFA. The TSA should open a notice-and-comment rulemaking to define “submit” and “screening”, as those terms are used in 49 USC § 44901, 49 CFR § 1540.107, and 49 CFR § 1540.109, with sufficient specificity to enable prospective travelers to know what actions are required and what actions are proscribed.

You can see all 5,000+ comments submitted to the TSA here.

May 28 2013

TSA “Glomar” response to request for Terrorist Screening Database records

An individual who used our forms to ask the DHS for its records about their travel  has received response of a sort that we haven’t previously seen to a request of this sort: a “Glomar” response that the DHS will neither confirm nor deny that there are any records about the requester in the DHS mirror copy of the FBI’s “Terrorist Screening Database” (TSDB).

It has long been the policy of the FBI, which is nominally “responsible” for the TSDB, neither to confirm nor deny the existence of TSDB records about any individual.

In 2011, DHS published a notice that it planned to make its own mirror copy, for which it would be responsible, of the FBI’s database. At the same time, the DHS exempted the DHS copy of the TSDB from the Privacy Act.

This is the first DHS response we have seen to a request for records from the DHS copy of the TSDB. It’s no real surprise, but it’s different from the typical DHS responses to requests for records about individuals, which include ignoring requests, producing obviously incomplete responses with no explanation of the missing records, and producing pages and pages of completely blacked-out records.

So the TSA won’t say if you are listed in its copy of the Terrorist Screening Database, but will use it against you if you are.