Aug 12 2011

Grassroots European opposition to US access to airline reservations

An almost-unprecedented campaign of pan-European grassroots lobbying and activism has emerged this summer in opposition to US access to PNR (Passenger Name Record) data from European airline reservations.

During the European Parliament’s summer recess, people from throughout the EU have been sending postcards from their holiday travels to the members of the European Parliament’s LIBE (civil liberties) Committee, urging MEPs to vote against the proposed EU-US agreement that would grant immunity from EU data protection law to both European and US companies that give the US Department of Homeland Security access to PNR data collected in Europe.

It’s a clever way of mobilizing grassroots action and popular pressure on a travel-related issue during the peak summer holiday travel period, when Parliament itself is on holiday along with most of the European travelers concerned about US access to airlines’ records of their travels.

Direct popular lobbying of MEPs is rare at any time of year. Each member of the US Congress receives hundreds or thousands of letters and dozens of constituent visitors in their offices each day, but a visit from a constituent is a once-a-month event, if that, for a typical MEP’s office in Brussels.  Despite widespread dislike of many decisions taken by the EU institutions, and growing power of the EU relative to that of individual EU members, grassroots European campaigning remains almost entirely focused on national issues and national legislatures.

An equally-rare demonstration and other networking and activist events on this and related issues are being planned as part of Freedom Not Fear 2011 in Brussels on September 17-19, 2011.

We congratulate our European colleagues for taking the issue of US travel surveillance to the people and to the streets, and we urge our European supporters to join these campaigns.

Jul 30 2011

Our reply to DHS claims that travel dossiers are exempt from the Privacy Act

Our reply brief and a supporting declaration were filed yesterday in Hasbrouck v. CBP, our Privacy Act and Freedom of Information Act (FOIA) lawsuit seeking records from and about the DHS “Automated Targeting System” of individualized government dossiers about each of the the millions of international travelers to and from the USA, including US citizens.

ATS includes complete copies of airline reservations (“Passenger Name Records” or PNRs), as well as a “risk assessment” for each would-be traveler that is used to decide whether or not to give the airline permission to transport them into, out of, or through the airspace of the USA. As Mr. Hasbrouck’s supplementary declaration supporting our latest reply brief explains:

Tens of thousands of travel agencies, airline offices, and offices of other travel companies around the world, and a million or more individual employees and contractors of these companies, have access through CRSs [Computerized Reservation Systems] or otherwise to PNR databases and the ability to enter data in PNRs. PNRs thus can, and do, contain an unlimited quantity and variety of data originating with numerous third parties around the world, some of it in the form of unstructured free text. CBP requires that, in all cases where a PNR contains a flight between a point in the U.S. and a foreign point, or overflying U.S. airspace, the entirety of the PNR — including the free-text general remarks and whatever other data has been entered by anyone with access to the PNR — must be made available to CBP for import into ATS.

PNRs can contain information about aspects of a journey other than air transportation, such as hotel reservations and other travel services, even in what are considered in travel industry jargon to be “air-only” PNRs. Information about these other travel services can be included in the “OSI” (Other System Information), and “SSR” (Special Service Request) elements of the PNR. For example, in reviewing records from ATS released to another requester by CBP, I have seen a PNR for two people, for whom the airline had reserved a hotel for an involuntary overnight layover, which included an SSR entry with a code showing whether a room with one bed or two had been requested for those two travelers. This is a normal and expected example of standard travel industry practices.

The SORNs [System Of Records Notices, required by the Privacy Act] for ATS specifically mention OSI, SSR, and “General Remarks” 10 among the “Categories of Information in the [ATS] System” and among the types of data derived from PNRs and included in ATS. “OSI” entries can be used by travel agency or airline staff with access to PNRs to enter, and to send to airlines, arbitrary free-text messages. “Remarks” in PNRs are intended to be used for an unlimited range of free-text data entry. This information can — and in some cases does — include remarks about the personal foibles of the traveler (to assist other travel agency or airline staff in dealing with the traveler), and/or derogatory descriptions of interactions with customer service staff. Travelers do not normally see the PNRs that contain information pertaining to them, and do not know or control what information has been entered about them.

Our reply brief also notes that:

Acknowledging the sensitivity of the data in PNRs, Canadian and European Union laws require that private entities that control or host PNRs allow individuals to inspect their own PNRs and obtain information about how they are used. However, U.S. law contains no such requirement.

The focus of our latest arguments is on the government’s claim that — after receiving Mr. Hasbrouck’s Privacy Act request and his appeal of the government’s failure to respond — CBP had the right to issue new regulations retroactively exempting itself from any obligation to respond to the pending request or appeal, to provide Mr. Hasbrouck any of the ATS or other records about him and his travels, to provide him with any accounting of the disclosures of those records to third parties, or to correct inaccurate records or expunge irrelevant ones. As our brief notes:

The retroactive application of the ATS and BCIS exemptions is especially egregious in this case where the processing of Hasbrouck’s Privacy Act requests was completed by CBP’s Office of Intelligence and Operation Coordination on April 2, 2009, but was then sat on for 17 months until after the exemption rules were finalized.

We also contest CBP’s failure to search for Mr. Hasbrouck’s records, in response to his request, in the same way they would if they were searching for records about him as a suspected terrorist. And we contest their refusal to disclose even the records about Mr. Hasbrouck that they admit to having found.

The next step in the case will be oral arguments on the cross-motions for summary judgment on Thursday, August 25, September 15, 2011, 1:30 p.m., before Judge Richard Seeborg (Courtroom 3, 17th Floor), U.S. District Court for the Northern District of California, Phillip Burton Federal Building and U.S. Courthouse, 450 Golden Gate Ave. (between Polk and Larkin, near Civic Center), San Francisco, CA. [Note revised hearing date of September 15th.]

It’s unlikely that any decision will be announced on the spot at the oral argument. Judge Seeborg will most likely take the written submissions and oral arguments under advisement, and issue an initial decision on the motions for summary judgment some weeks or months later. (There is no mandatory deadline for most Federal judicial decisions.)

The public is welcome to attend the oral argument, although the guards at the entrance to the courthouse require visitors to show government-issued ID. See the specific rules for electronic devices in the courthouse and additional rules and information for journalists.

Jul 18 2011

DHS reply to our arguments for release of travel records

Late last Friday night, lawyers for U.S. Customs and Border Protection (one of the divisionS of the DHS) filed their reply to our motion for summary judgment in Hasbrouck v. CBP, our lawsuit under the Privacy Act and Freedom Of Information Act (FOIA) seeking release of PNR data and other information from and about the CBP “Automated Targeting System” (ATS) and other records of the travel of innocent US citizens neither accused nor suspected of any crime.

We’ve added CBP’s latest pleadings and self-serving (and often false) declarations to our posted documents from the case.

Our legal responses are due to be filed with the court by July 29th, followed by oral argument before Judge Seeborg of the U.S. District Court for the Northern District of California in San Francisco on August 25th.

In the meantime, the government’s latest filings raise disturbing new legal and factual claims:

First, CBP’s main response to our Privacy Act arguments is to claim the authority (a) to delay action indefinitely on Privacy Act requests (“The Privacy Act contains no provisions addressing processing procedures or deadlines”, they say), and (b) to promulgate new Privacy Act exemption rules applicable retroactively to pending requests and appeals, even ones made years earlier.

If these arguments are accepted by the courts, the result would be that the Privacy Act cannot be relied on to provide any guarantee of “rights” with respect to future access to personal information. Whenever an agency receives any request it doesn’t want to fulfill — for access to records about an individual, for an accounting of disclosures of those records, or for correction of inaccurate records — the agency could simply delay acting on the request (without even needing any reason or excuse for the delay) while it promulgates a new rule retroactively exempting the system of records from the requirement to act on the request.  Or the agency could simply delay action indefinitely, effectively denying the request without the need for any formal exemption, denial, or statement of reasons.

Anyone considering relying on the Privacy Act, or on the (current) rules for any particular system of records, should be aware that this is now officially the DHS interpretation of the Privacy Act.

Second, CBP claims (paragraph 11) that the “audit logs” of access to ATS records (including PNR data) were not likely to contain any information responsive to our requests because they are “neither intended nor designed to be used to generate reports to memorialize the terms used [to] search for records.”

CBP thus appears to be admitting that — despite the claims in its Privacy Impact Assessment and reports to the European Union that “ATS retains audit logs for all user access”, those audit logs show only who logged in to the ATS system, not what PNR data they retrieved.

Apparently, once an “authorized” user logs in, they can retrieve any PNR — of a politician, of a celebrity, of their personal enemy, or of anyone else — without any record being kept of which PNRs they have retrieved.

The absence of logs showing which PNR data is retrieved, when, and by whom make a mockery of any reliance on these logs as proving or disproving whether CBP misuses its access to PNR data.

We’ve often said in the past that the absence of access logs for access to PNR data held by commercial computerized reservation systems makes it impossible for those CRSs to comply with EU or Canadian privacy law. But we’ve taken at face value CBP’s claim to maintain logs of access to the copies of PNR data in CBP’s ATS database.

Now we know that there are no meaningful access logs — logs showing which PNRs are retrieved when, and by whom — for ATS either.  There is thus no way for anyone to know who has retrieved your PNR data, when, or from what other countries, and no way for anyone to carry out any meaningful audit of compliance with policy restrictions on access.

Jul 14 2011

TSA plans yet another “trusted traveler” scheme

Bowing to ongoing lobbying from the “fascism’s fine with us if it makes the planes run on time” segment of the travel industry, the TSA announced today that it plans a new “trusted traveler” (“less mistrusted traveler”?) pilot program beginning this fall.

The pilot program will be by invitation only, for certain frequent flyers on certain airlines. In exchange for “volunteering” additional, as yet unspecified information about themselves, these travelers “may be eligible for expedited screening” at certain airports.

This pilot program has all the same security defects as the various previous “trusted traveler” schemes. The TSA continues to describe it as “risk-based”, but there’s still no evidence that the TSA has any profile of what the personal data or airline reservations of a “risky” person would look like, or has any authority as a “pre-crime” police agency to substitute its judgment in such matters for that of the courts.

The pilot program will involve a partnership with the DHS Customs and Border Protection division, suggesting that it may involve the use of PNR data and international travel histories from CBP’s Automated Targeting System as part of the basis for decisions about domestic flights.

In addition, there’s no indication in today’s announcement that the selection of those invited to have a chance at less-intrusive search will be based on any publicly-disclosed criteria or due process.

The TSA’s goal, of course, is to make its virtual strip-searches and/or genital groping so invasive that travelers will “volunteer more information about themselves prior to flying” in the words of today’s TSA announcement) for even a chance to be subjected to a slightly less-intrusive warrantless search.

In the end game, the treatment of mistrusted travelers who don’t “volunteer” to submit to additional surveillance and interrogation will get steadily worse, and the lines for their checkpoints longer, while any of us who object will be told that we’ve brought this treatment on ourselves, and that all we have to do to avoid it is to “consent” to lifetime “identity-based” (the TSA’s own term) tracking and logging of our movements.

Jun 30 2011

Our arguments for disclosure of DHS travel surveillance records

Our main briefs were filed last Friday in the Privacy Act and Freedom of Information Act (FOIA) case of Hasbrouck v. CBP.

In this case, we are seeking to compel U.S. Customs and Border Protection (one of the components of the DHS) to disclose:

  1. The CBP/DHS “travel history” dossier  about Mr. Hasbrouck, compiled from airline reservations (PNRs) and other commercial and government data and contained in the (illegal) CBP “Automated Targeting System” (ATS), including “risk assessments” of Mr. Hasbrouck and the rules used to determine those risk assessments;
  2. An “accounting of disclosures”, as required by the Privacy Act, showing which other government agencies or other third parties have been given access to which of this data, and when; and
  3. General information about how ATS data is indexed and retrieved.

Our main argument for summary judgment in our favor (and in opposition to CBP’s cross-motion) is contained in our proposed order, supporting brief, and Mr. Hasbrouck’s supporting declaration. Additional supporting declarations and exhibits are linked here.  Following reply briefs to be filed next month by each side, oral argument is scheduled for August 25th in Federal District Court in San Francisco.

Jun 07 2011

DHS moves to dismiss our Privacy Act lawsuit

Late last Friday, June 3rd, the U.S. government filed a motion for summary judgment against us in our Privacy Act and FOIA lawsuit for records from the government’s files of records of our international travels.  The government’s motion and supporting affidavits and exhibits are posted here.

We won’t try to give a detailed response right now. Our answer to the government’s motion, and our own motion for summary judgment, are due to be filed with the court by June 24th. Reply briefs for each side will follow, and then oral argument is scheduled for August 25, 2011 [note change from originally scheduled date], in San Francisco.

We’ve posted the government’s pleadings for informational purposes, but they should not be accepted as accurately representing either the facts or the law. As we expected, the government’s argument is a mix of lies about the facts and claims that nobody — not even a U.S. citizen — has any rights under the Privacy Act to see what’s in the DHS dossier about their travels, or how it is used.

We look forward to seeing the DHS in court on August 25th.

May 27 2011

European Commission wants to immunize DHS collaborators in travel surveillance and control

A leaked copy of the latest draft of a proposed “Agreement between the United States of America and the European Union on the use and transfer of Passenger Name Record [PNR] data to the United States Department of Homeland Security” has been published by the civil liberties watchdog and investigative reporting group Statewatch.

The leaked draft “agreement” fails to satisfy the criteria set by the European Parliament for its ratification of such an agreement, including that any PNR agreement should:

  1. Take the form of a duly ratified international treaty binding on all parties. (The draft “agreement” is not a treaty, and would not be binding on the U.S., as discussed in more detail below.)
  2. Recognize and respect fundamental rights including the freedom of movement guaranteed by Article 12 of the International Covenant on Civil and Political Rights. (The draft “agreement” does not mention freedom of movement, the ICCPR, or any fundamental rights other than those related to privacy and data protection.)
  3. Require that the use of PNR data for law-enforcement and security purposes must be in line with European data protection standards. (There is no mention of these standards in the draft “agreement”.)
  4. Prohibit the use of PNR data for data mining or profiling. (There is no mention of data mining or profiling in the draft “agreement”.  The draft claims that the U.S. will not make decisions that produce significant adverse actions affecting the legal interests of individuals based solely on automated processing of PNR. But all other data mining and profiling is permitted, as long as there is the slightest element of non-automated human rubber-stamping before adverse actions are taken against an individual.)
  5. Take into consideration “PNR data which may be available from sources not covered by international agreements, such as computer reservation systems located outside the EU.” (There is no mention in the draft “agreement” of computerized reservation systems, indirect transfers of PNR data, or any of the other means by which, as we have testified to members of the European Parliament, the DHS and other U.S. government agencies could bypass the “agreement”.)
  6. Provide for independent review and judicial oversight. (The only review provided for under the draft “agreement” is self-review by the DHS Privacy Office, which is directly controlled by the DHS itself, has no independence, and is the subject of an ongoing scandal and attempted cover-up involving political interference with requests — including ours — for DHS records. The only judicial oversight contemplated in the draft “agreement” is limited to violations of laws that contain no protections for privacy or other substantive fundamental rights.)

The proposed “agreement” has been negotiated in secret between the European Commission (on behalf of the EU) and an interagency Executive Branch working group led by the DHS (on behalf of the USA).

Just as the U.S. Constitution requires that any international treaty negotiated and signed by the President must be ratified by the Senate before it becomes effective, international agreements negotiated by the European Commission and approved by the Council of the European Union must be ratified by the European Parliament.

Some people and groups who ought to know better, including lobbyist and former DHS Assistant Secretary for Policy Stewart Baker — the principal architect of an earlier US-EU “agreement” on PNR data — and the Heritage Foundation, have suggested that for the European Parliament not to ratify whatever the Commission and Council propose would be to “renege” on their agreement with the US. That’s nonsense, obviously. The European Parliament has no more obligation to ratify treaties proposed by the European executive than the U.S. Senate is obligated to ratify every treaty proposed by the President.

(Writing in the Heritage Foundation blog, Baker’s former assistant Paul Rosenzweig also repeats the bogus claim that the Chicago Convention treaty provisions for flights arriving at U.S. airports somehow give the U.S. extra-territorial jurisdiction over foreign citizens boarding foreign-flag aircraft at foreign airports. This clearly false claim by Baker and Rozenzweig was first made by their then boss, Secretary of Homeland Security Chertoff, in a speech to the European Parliament in 2007, and we debunked it in detail at that time. The proposed agreement goes far beyond the explicitly detailed and narrow specifications in the Chicago Convention for what data elements are required to be provided to governments, how, when, and where. )

Both the European Parliament and the U.S. Senate have approved resolutions intended to provide guidance to their respective negotiators as to what sort of agreement they would or would not ratify. Neither legislative body is any more or less out of line in doing so.

The draft “agreement” does not appear to be intended to constitute a treaty, and would not be binding on the U.S., so it would not need to be presented to the U.S. Senate for ratification. The recent Senate resolution, however, makes clear that even if the “agreement” were presented to the Senate, the Senate is unwilling to make any concessions to privacy or human rights, or to enact any new or expanded protections for privacy or for any of the other fundamental rights at stake.

The European Parliament resolution is less intransigent. While it starts from the explicit (and proper) premise that fundamental rights must be respected, and provides details of how that might be done, it still leaves open the possibility of compromise with the U.S. and of modifying existing EU data protection rules.

The key problem is that as long as both the DHS and the U.S. Senate (with, so far as we can tell, the full backing of the Obama Administration, and the concurrence of the U.S. House of Representatives) are completely unwilling to compromise or to provide travelers with any additional rights, any “agreement” will inevitably result only in more infringement of those rights.

No good can come of any such “agreement”. It would serve only to give airlines, Computerized Reservation Systems (CRSs), and other travel companies impunity from EU legal sanctions for ongoing transfers of PNR data to the U.S. that are currently in violation of EU data protection laws, and to remove EU authorities’ current responsibility, which they have been improperly shirking, to enforce those laws against travel companies.

If it is presented to the European Parliament in its present form, the draft “agreement” should be debated, and rejected, not as a “data protection” agreement but as a grant of immunity from EU data protection law to travel companies that are currently making their reservations (PNR) databases accessible to the U.S. government, and the EU authorities who have deliberately refrained from enforcing EU data protection laws against those companies.

The draft “agreement” would not be binding on the U.S., according to the U.S. Constitution, because it would not be a treaty and would not be presented to the U.S. Senate for ratification.  (That’s why we use the term “agreement” in quotation marks.)  By its own explicit terms, the draft “agreement” would not create any enforceable individual rights.  The “agreement” does not purport to contain any enforcement mechanisms or sanctions for breach of the agreement.

But if the “agreement” would not be a binding treaty, and would not provide any enforceable individual rights, what is it? What, if anything, would it accomplish? What purpose, and whose interests, would it serve? Read More

May 24 2011

US “Friends of Privacy” criticize US government efforts to weaken European privacy laws

A group of US-based privacy and civil liberties advocates, including the Identity Project, has issued joint open letters calling on Congress and President Obama “to protect privacy and civil liberties and not to undermine those fundamental rights in high-level negotiations that are underway with the European Union over the sharing of personal information including intimately revealing Passenger Name Records (PNRs) and other travel information. The joint letters also called on libertarians and defenders of privacy in Europe not to capitulate to U.S. pressure to reduce the protection of these fundamental rights of citizens and other travelers:

Read More

May 23 2011

Senator wants more ID-based controls on rail passengers

Earlier this month Sen. Chuck Schumer (D-NY) proposed that the TSA’s “Secure Flight” system be extended to passengers on domestic Amtrak trains. That would mean that Amtrak would be required to send passenger information to the government, and receive a “cleared” message for each passenger before allowing them to board a train.

Summary denial of transport by a common carrier, much less a government-operated carrier like Amtrak, would violate both the First Amendment right to assemble and the right to freedom of movement guaranteed by Article 12 of the International Covenant on Civil and Political Rights.

But extending “Secure Flight” to train travelers would be a stupid idea even if it were legal. Rail sabotage has often been a tactic of war, but it has rarely been carried out by passengers. Sabotage can be carried out anywhere along the tracks, or anywhere saboteurs can get access to rolling stock, including freight cars.

Even the Chicago Tribune, the conservative and usually hawkish newspaper-of-record of Amtrak’s main hub and the hub of America’s freight rail system, immediately responded to Schumer’s proposal with an editorial characterizing it as “security theater for Amtrak.”

Most press reports incorrectly characterized Schumer’s proposal as calling for the “creation” of a no-ride list for Amtrak trains.  That’s indicative of how little awareness there is of the scope of existing systems of ID-based prior restraint on common carrier travel, including international Amtrak trains.

Under the “Advance Passenger Information System” (APIS) used for international flights, passenger trains, and cruise ships, Amtrak already requires passengers on its international trains to and from Canada to provide personal information (beyond anything needed by Amtrak for operational purposes), and passes that information on to U.S. Customs and Border Protection (CBP) for inclusion in the Automated Targeting System (ATS) which is used to decide whether or not to give each passenger government permission to travel. Read More

Apr 22 2011

Travel and surveillance industries join in campaign for traveler profiling

The travel industry — concerned that treating all travelers as suspected terrorists will discourage travel and reduce their business — has joined forces with the homeland-security industrial complex of providers of travel surveillance and control technology in a pseudo-grassroots lobbying and propaganda campaign for more profiling of travelers.

The motives of DHS contractors and their lobbyists are obvious. But we’re disgusted with travel companies, especially “common carriers” required to transport all would-be customers, whose pitch to the public is that it’s OK for the travel industry to collaborate with the government in collecting lifetime travel histories of their customers, and to subject some of them to everything from virtual strip-searches and/or manual groping to standardless secret no-fly orders, as long as those invasions of privacy and the right to travel are imposed selectively.

Making sexual assault, warrantless searches, and denial of transportation discriminatory and selective — where the selection is based on anything other than a search or arrest warrant, injunction, or  other court order — only exacerbates the unfairness and the denial of rights.

The latest euphemistic buzzword for “trusted traveler” and other profiling schemes is “risk-based”. The term “risk-based’ is used to create the mis-impression that profiling actually measures risk. But let’s be clear: whether there is sufficient evidence of “risk” in a particular case to justify search, detention, and/or denial of freedom of movement is a matter to be determined by a judge, not a profiling algorithm. And even if we wanted to ignore the Bill of Rights, there is no reliable algorithm for identifying “risky people”.  Some people do bad things, but trying to identify “bad people” is impossible without trying to read minds. Any trusted traveler program would inevitably be a “Department of Pre-Crime”, and not based on any actual judicial determination of risk — much less of risk sufficient to justify prior restraint on the exercise of First Amendment rights of assembly.

The travel industry and the profiling companies want you to think that you’d never fit the profile, that you’d be considered a “trusted” traveler, and that all the bad things would be reserved for other bad people who, on the basis of their travel history or other (legal) activities, “deserve” to be treated like terrorists. But the reality is that any trusted traveler program is a threat to all our rights.

Just say no to any “trusted traveler” proposal. Just say no to the traveler surveillance and profiling it would require. And just say no to the discrimination it would embody and institutionalize.