Thursday, March 19, 2009

HS Committee Hearing on Bottom-Up Intelligence

What was billed as a hearing on DHS intelligence efforts (“Homeland Security Intelligence: Its Relevance and Limitations”) turned out to be more about local police forces and their place in the counter-terrorism intelligence picture. While only one question was addressed to civilian and private sector input into the process, many of the issues discussed in this forum were of some importance to intelligence activities supporting high-risk chemical facility security. Suspicious Activity Report One of the major focuses of the discussions at this hearing was the Suspicious Activity Report (SAR) intelligence collection tool developed by the Los Angeles Police Department. Joan McNamara from the LAPD described the program she helped develop for the Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment. She described how the program worked and the civil liberties safeguards that were built into the program. The program relies on the observations and reports from patrol officers to help detect the indicators of potential terror attacks or other criminal actions. Officers are trained to look for signs of potential surveillance activities as well as other indicators of preparations for a terrorist attack. These observations are intended to be part of their every day patrol activities not actual counter-terrorism investigations. The SAR is reported on a standard form using pre-set codes to indicate the observed behavior or indicator along with the officer’s notes about the details of the observation. Once the report is reviewed and approved by a supervisor it is entered into an electronic data base that allows for analysis. One of the analysis tools available is the integration of the reports with a GIS that allows for a map display of the different types of activity. If there is a physical concentration of reports around a potential target area, additional investigation efforts are initiated. Civil Liberties Protections The biggest concern with the SAR program is the fact that most of the SAR reports turn out to have nothing to do with terrorism or other criminal activities. What might be a potential indicator of terrorist surveillance activities usually turns out to be innocent or even protected activities. Terrorist are certainly likely to photograph a targeted high-risk chemical facility as part of their planning process, but so are environmental activists gathering evidence of illegal chemical discharges. Gregory T. Nojeim, the Director of the Project on Freedom, Security & Technology of the Center for Democracy & Technology recommended that SARs be limited by the ‘criminal predicate’ standard. This means that unless there was evidence of actual criminal activity, the SAR would not be entered into the intelligence database. This would prevent the legitimate tourist taking pictures of a critical bridge from showing up in the database. The civil liberties advocates in the second panel were not so much concerned with an innocent’s appearance in the database, but with potential actions that could be taken against people found in the database. They noted a number of notorious examples of the abuse of police investigative powers directed against people practicing their protected freedom of speech and association. One of the main problems in this debate is that frequently there is not a clear distinction between protected freedom of speech and ‘terrorist’ activity. There is a continuum of political expression that runs from freedom of speech, thru lawful dissent and civil disobedience to terrorism. Where an action falls within that spectrum is frequently a matter of perspective. Finding the Balance As many post 9/11 reports noted, proper and efficient collection and analysis of information that, in retrospect, was readily available might have allowed authorities to intercept the hijackers before they boarded the planes that were turned into weapons. The SAR process has the potential of collecting the dots necessary to prevent the next major terrorist attack. The difficulty will be in developing a process for collecting and analyzing the necessary data without compromising the legitimate expectation of privacy of the vast number of innocents identified in the collection process. The protection of political expression is every bit as important at preventing terrorist attacks. I wish Chairwoman Harmon and her colleagues the best of luck in crafting rules that will successfully address both issues.

No comments:

 
/* Use this with templates/template-twocol.html */