FAIR USE NOTICE

FAIR USE NOTICE

A BEAR MARKET ECONOMICS BLOG


This site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in an effort to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. we believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law.

In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml

If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.

FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates
FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates

All Blogs licensed under Creative Commons Attribution 3.0

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.

Tuesday, December 28, 2010

2011: A Brave New Dystopia

Breaking News & Views for the Progressive Community

2011: A Brave New Dystopia

by Chris Hedges

The two greatest visions of a future dystopia were George Orwell’s “1984” and Aldous Huxley’s “Brave New World.” The debate, between those who watched our descent towards corporate totalitarianism, was who was right. Would we be, as Orwell wrote, dominated by a repressive surveillance and security state that used crude and violent forms of control? Or would we be, as Huxley envisioned, entranced by entertainment and spectacle, captivated by technology and seduced by profligate consumption to embrace our own oppression? It turns out Orwell and Huxley were both right. Huxley saw the first stage of our enslavement. Orwell saw the second.

We have been gradually disempowered by a corporate state that, as Huxley foresaw, seduced and manipulated us through sensual gratification, cheap mass-produced goods, boundless credit, political theater and amusement. While we were entertained, the regulations that once kept predatory corporate power in check were dismantled, the laws that once protected us were rewritten and we were impoverished. Now that credit is drying up, good jobs for the working class are gone forever and mass-produced goods are unaffordable, we find ourselves transported from “Brave New World” to “1984.” The state, crippled by massive deficits, endless war and corporate malfeasance, is sliding toward bankruptcy. It is time for Big Brother to take over from Huxley’s feelies, the orgy-porgy and the centrifugal bumble-puppy. We are moving from a society where we are skillfully manipulated by lies and illusions to one where we are overtly controlled.

Orwell warned of a world where books were banned. Huxley warned of a world where no one wanted to read books. Orwell warned of a state of permanent war and fear. Huxley warned of a culture diverted by mindless pleasure. Orwell warned of a state where every conversation and thought was monitored and dissent was brutally punished. Huxley warned of a state where a population, preoccupied by trivia and gossip, no longer cared about truth or information. Orwell saw us frightened into submission. Huxley saw us seduced into submission. But Huxley, we are discovering, was merely the prelude to Orwell. Huxley understood the process by which we would be complicit in our own enslavement. Orwell understood the enslavement. Now that the corporate coup is over, we stand naked and defenseless. We are beginning to understand, as Karl Marx knew, that unfettered and unregulated capitalism is a brutal and revolutionary force that exploits human beings and the natural world until exhaustion or collapse.

“The Party seeks power entirely for its own sake,” Orwell wrote in “1984.” “We are not interested in the good of others; we are interested solely in power. Not wealth or luxury or long life or happiness: only power, pure power. What pure power means you will understand presently. We are different from all the oligarchies of the past, in that we know what we are doing. All the others, even those who resembled ourselves, were cowards and hypocrites. The German Nazis and the Russian Communists came very close to us in their methods, but they never had the courage to recognize their own motives. They pretended, perhaps they even believed, that they had seized power unwillingly and for a limited time, and that just round the corner there lay a paradise where human beings would be free and equal. We are not like that. We know that no one ever seizes power with the intention of relinquishing it. Power is not a means; it is an end. One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship. The object of persecution is persecution. The object of torture is torture. The object of power is power.”

The political philosopher Sheldon Wolin uses the term “inverted totalitarianism” in his book “Democracy Incorporated” to describe our political system. It is a term that would make sense to Huxley. In inverted totalitarianism, the sophisticated technologies of corporate control, intimidation and mass manipulation, which far surpass those employed by previous totalitarian states, are effectively masked by the glitter, noise and abundance of a consumer society. Political participation and civil liberties are gradually surrendered. The corporation state, hiding behind the smokescreen of the public relations industry, the entertainment industry and the tawdry materialism of a consumer society, devours us from the inside out. It owes no allegiance to us or the nation. It feasts upon our carcass.

The corporate state does not find its expression in a demagogue or charismatic leader. It is defined by the anonymity and facelessness of the corporation. Corporations, who hire attractive spokespeople like Barack Obama, control the uses of science, technology, education and mass communication. They control the messages in movies and television. And, as in “Brave New World,” they use these tools of communication to bolster tyranny. Our systems of mass communication, as Wolin writes, “block out, eliminate whatever might introduce qualification, ambiguity, or dialogue, anything that might weaken or complicate the holistic force of their creation, to its total impression.”

The result is a monochromatic system of information. Celebrity courtiers, masquerading as journalists, experts and specialists, identify our problems and patiently explain the parameters. All those who argue outside the imposed parameters are dismissed as irrelevant cranks, extremists or members of a radical left. Prescient social critics, from Ralph Nader to Noam Chomsky, are banished. Acceptable opinions have a range of A to B. The culture, under the tutelage of these corporate courtiers, becomes, as Huxley noted, a world of cheerful conformity, as well as an endless and finally fatal optimism. We busy ourselves buying products that promise to change our lives, make us more beautiful, confident or successful as we are steadily stripped of rights, money and influence. All messages we receive through these systems of communication, whether on the nightly news or talk shows like “Oprah,” promise a brighter, happier tomorrow. And this, as Wolin points out, is “the same ideology that invites corporate executives to exaggerate profits and conceal losses, but always with a sunny face.” We have been entranced, as Wolin writes, by “continuous technological advances” that “encourage elaborate fantasies of individual prowess, eternal youthfulness, beauty through surgery, actions measured in nanoseconds: a dream-laden culture of ever-expanding control and possibility, whose denizens are prone to fantasies because the vast majority have imagination but little scientific knowledge.”

Our manufacturing base has been dismantled. Speculators and swindlers have looted the U.S. Treasury and stolen billions from small shareholders who had set aside money for retirement or college. Civil liberties, including habeas corpus and protection from warrantless wiretapping, have been taken away. Basic services, including public education and health care, have been handed over to the corporations to exploit for profit. The few who raise voices of dissent, who refuse to engage in the corporate happy talk, are derided by the corporate establishment as freaks.

Attitudes and temperament have been cleverly engineered by the corporate state, as with Huxley’s pliant characters in “Brave New World.” The book’s protagonist, Bernard Marx, turns in frustration to his girlfriend Lenina:

“Don’t you wish you were free, Lenina?” he asks.

“I don’t know that you mean. I am free, free to have the most wonderful time. Everybody’s happy nowadays.”

He laughed, “Yes, ‘Everybody’s happy nowadays.’ We have been giving the children that at five. But wouldn’t you like to be free to be happy in some other way, Lenina? In your own way, for example; not in everybody else’s way.”

“I don’t know what you mean,” she repeated.

The façade is crumbling. And as more and more people realize that they have been used and robbed, we will move swiftly from Huxley’s “Brave New World” to Orwell’s “1984.” The public, at some point, will have to face some very unpleasant truths. The good-paying jobs are not coming back. The largest deficits in human history mean that we are trapped in a debt peonage system that will be used by the corporate state to eradicate the last vestiges of social protection for citizens, including Social Security. The state has devolved from a capitalist democracy to neo-feudalism. And when these truths become apparent, anger will replace the corporate-imposed cheerful conformity. The bleakness of our post-industrial pockets, where some 40 million Americans live in a state of poverty and tens of millions in a category called “near poverty,” coupled with the lack of credit to save families from foreclosures, bank repossessions and bankruptcy from medical bills, means that inverted totalitarianism will no longer work.

We increasingly live in Orwell’s Oceania, not Huxley’s The World State. Osama bin Laden plays the role assumed by Emmanuel Goldstein in “1984.” Goldstein, in the novel, is the public face of terror. His evil machinations and clandestine acts of violence dominate the nightly news. Goldstein’s image appears each day on Oceania’s television screens as part of the nation’s “Two Minutes of Hate” daily ritual. And without the intervention of the state, Goldstein, like bin Laden, will kill you. All excesses are justified in the titanic fight against evil personified.

The psychological torture of Pvt. Bradley Manning—who has now been imprisoned for seven months without being convicted of any crime—mirrors the breaking of the dissident Winston Smith at the end of “1984.” Manning is being held as a “maximum custody detainee” in the brig at Marine Corps Base Quantico, in Virginia. He spends 23 of every 24 hours alone. He is denied exercise. He cannot have a pillow or sheets for his bed. Army doctors have been plying him with antidepressants. The cruder forms of torture of the Gestapo have been replaced with refined Orwellian techniques, largely developed by government psychologists, to turn dissidents like Manning into vegetables. We break souls as well as bodies. It is more effective. Now we can all be taken to Orwell’s dreaded Room 101 to become compliant and harmless. These “special administrative measures” are regularly imposed on our dissidents, including Syed Fahad Hashmi, who was imprisoned under similar conditions for three years before going to trial. The techniques have psychologically maimed thousands of detainees in our black sites around the globe. They are the staple form of control in our maximum security prisons where the corporate state makes war on our most politically astute underclass—African-Americans. It all presages the shift from Huxley to Orwell.

“Never again will you be capable of ordinary human feeling,” Winston Smith’s torturer tells him in “1984.” “Everything will be dead inside you. Never again will you be capable of love, or friendship, or joy of living, or laughter, or curiosity, or courage, or integrity. You will be hollow. We shall squeeze you empty and then we shall fill you with ourselves.”

The noose is tightening. The era of amusement is being replaced by the era of repression. Tens of millions of citizens have had their e-mails and phone records turned over to the government. We are the most monitored and spied-on citizenry in human history. Many of us have our daily routine caught on dozens of security cameras. Our proclivities and habits are recorded on the Internet. Our profiles are electronically generated. Our bodies are patted down at airports and filmed by scanners. And public service announcements, car inspection stickers, and public transportation posters constantly urge us to report suspicious activity. The enemy is everywhere.

Those who do not comply with the dictates of the war on terror, a war which, as Orwell noted, is endless, are brutally silenced. The draconian security measures used to cripple protests at the G-20 gatherings in Pittsburgh and Toronto were wildly disproportionate for the level of street activity. But they sent a clear message—DO NOT TRY THIS. The FBI’s targeting of antiwar and Palestinian activists, which in late September saw agents raid homes in Minneapolis and Chicago, is a harbinger of what is to come for all who dare defy the state’s official Newspeak. The agents—our Thought Police—seized phones, computers, documents and other personal belongings. Subpoenas to appear before a grand jury have since been served on 26 people. The subpoenas cite federal law prohibiting “providing material support or resources to designated foreign terrorist organizations.” Terror, even for those who have nothing to do with terror, becomes the blunt instrument used by Big Brother to protect us from ourselves.

“Do you begin to see, then, what kind of world we are creating?” Orwell wrote. “It is the exact opposite of the stupid hedonistic Utopias that the old reformers imagined. A world of fear and treachery and torment, a world of trampling and being trampled upon, a world which will grow not less but more merciless as it refines itself.”

Chris Hedges writes a regular column for Truthdig.com. Hedges graduated from Harvard Divinity School and was for nearly two decades a foreign correspondent for The New York Times. He is the author of many books, including: War Is A Force That Gives Us Meaning, What Every Person Should Know About War, and American Fascists: The Christian Right and the War on America. His most recent book is Empire of Illusion: The End of Literacy and the Triumph of Spectacle.

Saturday, December 25, 2010

What WikiLeaks revealed to the world in 2010




Glenn Greenwald

What WikiLeaks revealed to the world in 2010



Christian Science Monitor, April 5, 2010:


Daily Mail, April 7, 2010:

The Guardian, October 22, 2010:

The Guardian, October 22, 2010:

Foreign Policy, November 29, 2010:

Mother Jones, December 1, 2010:

El Pais, November 30, 2010:

TRANSLATION: U.S. maneuvered to stop High Court cases: American embassy issued threats over the cases of 'Guantanamo', 'Couso' and 'CIA flights' - Politicians and Spanish prosecutors collaborated on the strategy

Will Bunch, The Philadelphia Inquirer, responding to the cables from Spain, December 1, 2010:

ACLU, November 20, 2010:

Der Spiegel, December 9, 2010:

Ellen Knickmeyer, ex-Washington Post Baghdad Bureau Chief, The Daily Beast, October 25, 2010:

Sydney Morning Herald, November 29, 2010:

Salon, December 9, 2010:

BBC, December 17, 2010:

BBC, December 22, 2010:

Reuters, December, 1, 2010:

MSNBC, December 11, 2010:

The Guatemala Times, November 28, 2010:

CBS News, November 29, 2010:

The Guardian, November 30, 2010:

Eugene Robinson, The Washington Post, July 27, 2010:

The Guardian, July 25, 2010:

Those are just some of the truths that led WikiLeaks -- and whoever the leaker(s) is -- to sacrifice their own interests in order to disclose these secrets to the world.

Thursday, December 23, 2010

Obama’s Liberty Problem: Why Indefinite Detention by Executive Order Should Scare the Hell Out of People

Breaking News & Views for the Progressive Community

The right to liberty is one of the foundation rights of a free people. The idea that any US President can bypass Congress and bypass the Courts by issuing an Executive Order setting up a new legal system for indefinite detention of people should rightfully scare the hell out of the American people.

Advisors in the Obama administration have floated the idea of creating a special new legal system to indefinitely detain people by Executive Order. Why? To do something with the people wrongfully imprisoned in Guantanamo. Why not follow the law and try them? The government knows it will not be able to win prosecutions against them because they were tortured by the US.

Guantanamo is coming up on its ninth anniversary – a horrifying stain on the character of the US commitment to justice. President Obama knows well that Guantanamo is the most powerful recruitment tool for those challenging the US. Unfortunately, this proposal for indefinite detention will prolong the corrosive effects of the illegal and immoral detentions at Guantanamo rightly condemned world-wide.

The practical, logical, constitutional and human rights problems with the proposal are uncountable.

Our system provides a simple answer developed over hundreds of years – try them or release them. Any other stop gap measure like the one proposed merely pushes the problem back down the road and back into the courts again. While it may appear to be a popular political response, the public will soon enough see this for what it is – an unconstitutional usurping of power by the Executive branch and a clear and present danger to all Americans

The US government has never publicly said who can be prosecuted and who they have decided to hold indefinitely because they think they cannot successfully charge them. Now, after holding people for years and years, they think they can create a new set of laws by Executive Order which will justify their actions?

Recall that dozens of the very same people who would now be subject to indefinite detention have already been cleared for release by the government. How can indefinite detention of people we already cleared to go home possibly be legal?

The government proposes essentially to detain people for being a potential member or friend of the enemy force – a standard that is too open ended and inconsistent with the US and international laws of war.

Our criminal process, requiring charge, conviction and other safeguards, is the primary means by which the government may deprive a person of liberty, with carefully limited exceptions.

“Freedom from bodily restraint has always been at the core of the liberty protected by the Due Process Clause from arbitrary governmental action.” The Supreme Court has “always been careful not to “minimize the importance and fundamental nature of the individual’s right to liberty.” Foucha v Louisiana, 504 US 71 (1992).

The liberty of all persons is protected by the criminal process guarantees, among other rights: the right to be free from unreasonable searches and seizures; probable cause for arrest; right to counsel, right to indictment by grand jury; right to trial by an impartial jury; the right to a speedy public trial; the presumption of innocence; the right that government must prove beyond a reasonable doubt every fact necessary to make out the charged offense; a privilege against self-incrimination; the right to confront and cross examine witnesses; the right to present witnesses and use compulsory process; the duty on the government to disclose exculpatory evidence; prohibition against double jeopardy; prohibition against bills of attainder and ex post facto laws; and a prohibition against selective prosecution.

For hundreds of years judges and legislatures and advocates for justice have struggled to create protections for our liberty. People who suggest bypassing all of these protections of our liberty in the name of safety or politics do our people and our history a grave disservice.

Some wrongfully suggest that preventive detention by the Executive would be allowed because the law already allows civil confinement. But there are only very narrow circumstances when limited civil confinement is allowed by law. It is clear government cannot use civil detention or anything like it to effect punishment or to escape the comprehensive constraints of the criminal justice system. Kansas v Crane, 534 US 407, 412 (2002) (noting that civil commitment must not “become a mechanism for retribution or general deterrence.

Further, preventive detention also violates international law, specifically the International Covenant on Civil and Political Rights (ICCPR), article 9.

The proposal to create a special new legal system by Executive Order is an end run around Congress and the Judiciary. It will lengthen the illegal detentions in Guantanamo and will force this entire system back into the courts for years. It will further damage US efforts to portray itself as a fair country of laws, and will threaten the liberty of every single US citizen who is not in Guantanamo because it will damage the due process guarantees which have built up over the years to protect each one of us.

Vince is the Executive Director at the Center for Constitutional Rights (CCR). Bill is Legal Director of CCR and law professor at Loyola University New Orleans. You can reach Bill at Quigley77@gmail.com

Wednesday, December 22, 2010

News World Order - The War on Journalism (ft. Julian Assange) [VIDEO]



December 22, 2010 at 12:13:05


News World Order - The War on Journalism (ft. Julian Assange) [VIDEO]

By The Juice Media Posted by Kevin Gosztola (about the submitter)

opednews.com



From a post on RAW STORY:
The creators of Australian Internet hit "Rap News" on Wednesday said they were still "pinching themselves" after controversial and reclusive WikiLeaks founder Julian Assange appeared in a cameo role.

University researcher Giordano Nanni and English teacher Hugo Farrant, whose political satire set to hip hop has achieved cult status on YouTube, said Assange contacted them and invited them to London to film the six-minute skit.

"Rap News" episode five, titled "News World Order: War on Journalism" was made in October, ahead of Assange's leak of almost 400,000 secret logs from the Iraq War, and deals with the implications of the release.

The views expressed in this article are the sole responsibility of the author
and do not necessarily reflect those of this website or its editors.

McCarthyism on Steroids: Monitoring Americans



December 21, 2010 at 12:02:01

McCarthyism on Steroids: Monitoring Americans

By Jesselyn Radack (about the author)

opednews.com

The Washington Post, to its credit, has a new blockbuster article, "Monitoring America," that is part of its larger "Top Secret America" series.

In frightening detail, it dissects the vast domestic localized intelligence apparatus being used to collect, store and analyze information about Americans, most of whom have not been accused of any crime.

In July, the Post described the secrecy state our nation has turned into, which is so large, unwieldly and secretive that no how knows its cost, how many people it employs, or how many programs it has.

Today's revelations are worse. Every state and local law enforcement agency feeds information to a vast, top-secret repository at the FBI, which stores the identities and profiles of those who are not known criminals or terrorists, but appear to have been "acting suspiciously" to a traffic cop or even a neighbor.

The Nationwide Suspicious Activity Reporting Initiative (SAR)--in government-speak, the "Guardian database"--will ideally help the search for terrorists within our country because, as Homeland Security Secretary Janet Napolitano notes:

The old view that "if we fight the terrorists abroad, we won't have to fight then here" is just that--the old view.

My concern, after a stint on the "No-Fly List" during the Bush years for whistleblowing, is that information in the database could be improperly used or released.

Technically, "suspicious activity" is defined as:

observed behavior reasonably indicative of pre-operational planning related to terrorism or other criminal activity [related to terrorism].

But in the hyperventilating terrah-hysteria that our government works so hard to sustain, this includes the neighbor buying fertilizer for his plants, the student studying for a metallurgy test, or (lest you think this is my own hyperbole) the real-life example of a tourist snapping a picture of a ferry in the Newport Beach harbor in Southern California.

Suspicious Activity Report NO3821 says a local law enforcement officer

observed a suspicious subject . . . taking photographs of the Orange County Sheriff Department Fire Boat and the Balboa Ferry with a cellular phone camera. . . [After being met by another person, they] observed the boat traffic in the harbor.

They were then joined by another adult with two small children and they all boarded the ferry and crossed the channel.

This information then was forwarded to the Los Angeles fusion center for further investigation after the local officer ran information about the passengers' car, vehicle, and owner through several crime databases and found NOTHING.

At fusion centers, SARS are then forwarded to the nearest FBI terrorism unit, which would immediately enter it into the "Guardian database." Most often, the FBI makes no specific determination, which means that the SAR sits in the database where other pieces of information about the person--employment, financial and residential histories, phone numbers, and anything else in government or commercial databases "that adds value"--is added to it.

This is the new domestic terrorism prevention. It used to be called McCarthyism.


Or, more accurately, the [East German] Stasi--getting everyone to spy on everyone else. . .

click here:-Monitoring-Americans

http://www.patriotictruthteller.net

My name is Jesselyn Radack and I am the former Justice Department ethics attorney and whistleblower in the case of "American Taliban" John Walker Lindh. In today's issue of The National Law (more...)

The views expressed in this article are the sole responsibility of the author
and do not necessarily reflect those of this website or its editors.

United States of Fear: How Right-Wing Lawmakers Will Use Absurd Terrorism Conspiracy Theories to Curb Your Freedoms

AlterNet.org


NEWS & POLITICS


United States of Fear: How Right-Wing Lawmakers Will Use Absurd Terrorism Conspiracy Theories to Curb Your Freedoms


Republican members of the incoming Congress are looking for terrorism in ever more startling places.

There are some things to be thankful for.

The woman who puzzled over Hispanics in her audience of high-school students and suggested they looked “Asian” was defeated in her run for the Senate in Nevada. The guy who called Islam a cult was knocked out of the Tennessee gubernatorial race. The bizarre candidate who threatened to “take out” a reporter was brushed aside in his bid for the governorship of New York.

Despite the electoral failures of Sharron Angle, Ron Ramsey, Carl Paladino, and a host of others inhabiting what used to be America’s political peripheries, the next Congress will have a decidedly fringy tone. No wonder the wilder types already there are looking forward to the January 2011 legislative session with such relish: so many investigations crying out to be launched; so many dictators and thugs still hanging on in Cuba, Iran, North Korea, and Venezuela; terrorism in the streets of Portland; foreign terrorists flocking to America; secret government documents splayed across the front pages of our newspapers.

They wonder if the U.S. hasn’t simply become a pitiful, helpless giant. But the rest of us ought to wonder just what kind of politics is going to grow in the strange, rich Petri dish of the new Congress.

Consider just one area that will be a major focus of Congressional interest: immigration, an issue that will gain potency as it melds into the rhetoric of terror.

Foreigners and terrorists: Really, what’s the difference? That the nation has grown and prospered precisely because of adaptive immigration is beside the point, an obvious reflection of someone caught in the old mindset of the September 10th world. Interestingly, though, only about 8% of those who cast ballots in the 2010 election cited immigration concerns as their primary motivator. Of those who did, however, nearly 70% were Republicans.

With their new House majority, the Republicans plan to pay some major attention to that 8% of the motivated electorate. Immigration matters will play out largely in two key House committees, Homeland Security and Judiciary, and critical members of each committee told me they intend to investigate past actions of the Obama administration “fully and completely,” block any kind of comprehensive immigration reform, expose supposed lax enforcement of immigration laws and inadequate resources devoted to -- as one Judiciary member put it -- “boots on the ground.” Terrorism will play a key role in hearings on virtually all these topics, most dramatically, no doubt, in focusing attention on what Republicans view as a shadowy Latin network of terrorist infiltrators seeking to exploit the U.S. failure to protect its own southern border.

Most people are probably blissfully unaware of a burgeoning conspiracy in which Cuba and Venezuela are reputedly assisting African and Middle Eastern extremists as they slip into the United States and fan out across the country. That lack of awareness will not last long, however, if the new Republican majority in the House has anything to do with it. Key representatives are already promising to pound the drums ever more loudly and so expose this supposed burst of clandestine activity over the next couple of years. More on that in a moment.

Peter King, vocal New York Republican opponent of the Lower Manhattan Islamic cultural center, aka the mosque at Ground Zero, will soon become chair of the Homeland Security Committee. He has made it all too clear that he intends to “investigate” with abandon and continue to birddog that dreaded Manhattan “mosque.” King’s focus will serve to keep the specter of imminent terrorism directly before the country, infusing all manner of issues with claims and insinuations about bombs, plots, and massive threats.

He has made it no secret that he wants hearings on the administration’s failure to put more money into protecting New York City from the threat of nuclear terrorism, on what kinds of screw-ups led to the Fort Hood shootings last year, and on what King views as the Obama administration’s unconscionable plans to close Guantanamo and the Justice Department’s plans to hold 9/11-related trials in New York civilian courts. (That neither of these “plans” is exactly at the top of the Obama agenda anymore won’t matter a bit.)

King is a firm believer in Fortress America, too: in the creation, above all, of an impregnable fence along the border with Mexico. For want of such a fence, the nation’s “homeland security” will, he insists, be eternally “at risk,” as he wrote Homeland Security Secretary Janet Napolitano in a joint letter with Darrell Issa, the California congressman who will conduct his own set of investigations as new chair of the House Oversight and Government Reform Committee.

King sees Islam as virtually synonymous with violent extremism and, during last summer’s raging controversy over whether Imam Feisal Abdul Rauf’s proposed Manhattan Islamic center should be built, he called for an investigation of its funders. (In fact, there are, as yet, no funders.) Now, developers of the Islamic center -- called Park51 -- are seeking public economic development funds aimed at blighted downtown Manhattan. King doesn’t like that either. “It's an affront to the memory of all those who were murdered on 9/11,” he insists. “This shows a gross insensitivity to the most fundamental feelings of New Yorkers and to those murdered on 9/11 it is a slap in the face that is a terrible insult.”

That Islam can be linked to terrorism is a no-brainer for the congressman and many other conservatives and Republicans. This same thinking has now infected the controversy over WikiLeaks. Why not, King wonders, label the largely volunteer WikiLeaks group a terrorist organization, thus facilitating seizure of its assets and arrests of anyone remotely associated with it, including presumably readers? Tom Flanagan, a former aide to Canadian Prime Minister Stephen Harper, has gone one step further, offering an idea that Republican leaders and conservative commentators appear to find appealing. Flanagan has proposed assassination as the fate for WikiLeaks founder Julian Assange.

Sarah Palin seems to agree. In a note on Facebook, she likened WikiLeaks to al-Qaeda. Of Assange, she wrote, “He is an anti-American operative with blood on his hands. His past posting of classified documents revealed the identity of more than 100 Afghan sources to the Taliban. Why was he not pursued with the same urgency we pursue al-Qaeda and Taliban leaders?” (There is, in fact, no evidence whatsoever that Assange has “blood on his hands.”)

This violent thinking has spread like the Ebola virus through conservative circles. William Kristol, editor of the Weekly Standard, typically wants to know why Assange and his colleagues have not been “neutralized” by the U.S. government. Mike Huckabee, a former governor as well as past and possibly future Republican presidential candidate, suggests those associated with the leaks get the death penalty -- but only after fair trials. “Any lives they endangered, they’re personally responsible for and the blood is on their hands,” he said. (One wonders why there is such a focus on bloody hands in the Republican Party.)

All Issues Are Terrorism Issues

What should be increasingly clear is that Republican members of the incoming Congress are looking for terrorism in ever more startling places. In fact, it seems that, for them, all domestic issues are potentially terrorist issues, perhaps none more so than immigration. Even in the current lame-duck session of Congress, their unsettling rhetoric has enswathed immigration in such claims. Take the debate over the Dream Act, which would provide an avenue to citizenship via military service or college attendance for foreign-born young people brought to this country at a young age by their undocumented immigrant parents.

Steve King, the Iowa Republican who will chair the Judiciary Committee’s immigration subcommittee, has been deriding the DREAM Act as a “special amnesty program [and] affirmative action program for illegals.” Should it become law, he warns of a day when student “illegals” would find themselves “sitting in the classroom next to… a widow or a widower or a son or a daughter of someone who has lost their life in Iraq or Afghanistan defending our liberty and our freedom.” Senator Jeff Sessions, Alabama Republican, goes King one better, suggesting that the DREAM Act could well pave the way for another 9/11 plotted by those "from the dangerous regions of the Middle East."

Former San Diego mayor Roger Hedgecock, now a popular, nationally syndicated conservative talk radio show host, claims the DREAM Act is par for the course “in an era when the Obama regime considers terrorists citizens and citizens suspects -- when Jesus' birth is considered myth, but Obama's birth is gospel.”

Steve King believes up to four million illegal immigrants a year are piling into the United States. These, he told me, add up to a “huge human haystack” composed of “vicious, violent criminals” and an unknown number of bona fide terrorists.

“As a sovereign nation, we must control our borders,” King argues. “We must ensure that terrorists do not infiltrate the United States. We must tighten and strengthen border control efforts so that illegal aliens and drug smugglers do not enter our country.” A building contractor back home in Iowa, King has even designed a border fence to show how easily the country could staunch the tide of “illegals” from Mexico and, of course, the terrorists among them. “We do this with livestock all the time,” he explained, as he described the fence to me.

Terrorists at the Door

The idea that terrorists are probing the southern border in the guise of immigrants has recently become part and parcel of Republican border-policy mythology. Michael McCaul, Texas Republican and current ranking minority member of the homeland security intelligence subcommittee, told me that “the border is going to be a focus” of extensive congressional investigation. “Who is coming into the country?” he wondered rhetorically in our conversation and added, “There is a massive tide of immigration without control.”

Among those furtively crossing the southern border, McCaul believes, are an unknown number of terrorist operatives. This past year, he notes, authorities arrested Anthony Tracy, an American Muslim, and charged him with assisting nearly 300 undocumented Somalis in entering the United States. Tracy told U.S. authorities that a Cuban official in Africa helped provide papers for the immigrants, enabling them to reach Mexico. From there, the Somalis crossed over the southern U.S. border and have now vanished.

Conservative pundits and some media outlets have made much of this, suggesting members of al-Shabaab, the Somali terrorist group, are now roaming the American countryside. But there is no tangible evidence that any member of al-Shabaab entered the country with Tracy’s help, according to an immigration spokeswoman.

McCaul said the Somali case and how the Obama administration let it happen would be a key topic in hearings in which he and other Republicans will demand answers. The real question is: Did it happen at all? Immigration authorities have not only been unable to find members of al-Shabaab who entered the country from the southern border -- with or without Tracy’s help -- they haven’t been able to locate any of them the 300 supposed Somalis at all.

The federal judge trying the case, U.S. District Judge Leonie Brinkema of the Eastern District of Virginia, dubbed it “shaky” at Tracy’s trial. Absent any smuggled Somalis, she pointed out, the government was unable to prove anything. Given the presence of informers at the center of so many terrorism prosecutions since 9/11, it should come as no surprise that Tracy has a long and mysterious past as an informer for the Immigration and Customs Enforcement Agency and possibly the Drug Enforcement Administration as well. What that means in the Somali case remains unclear. It is, however, clear that Tracy served only a four-month federal sentence in the incident and is now chatting up authorities.

Keep in mind that murkiness is a useful political tool. It will certainly be the stuff of upcoming congressional hearings, which will echo the endless rounds of anti-communist hearings that dominated Washington in the heyday of the House Un-American Activities Committee and similar panels in the 1950s. What can’t be seen must be feared, and in the confused darkness, passionate certainty grows.

In that murky vein, Republicans also hope to expose the links they see among Iran, Hezbollah, and Latin American lands, especially Venezuela. Right-wing commentators and military analysts assert Hezbollah is increasingly active in the Colombian drug trade, is working with Mexican drug cartels, and has ties to Venezuelan authorities.

Rep. Sue Myrick of North Carolina, a member of the House Permanent Select Committee on Intelligence, has been increasingly vocal in denouncing Hezbollah’s reputed march toward the Rio Grande. Earlier this year, she shared her concerns with the Department of Homeland Security. Within weeks, Mexico reported that it had broken up Hezbollah operations, although what “Hezbollah” was actually doing, if anything, is difficult to say.

Nevertheless, the talk of Hezbollah on the border has grown crazily since the supposed arrest of Jameel Nasr, described in second- and third-hand news accounts as a “Hezbollah operative” in the border city of Tijuana, Mexico. This arrest, initially reported in July by a Kuwaiti newspaper, has not only not been confirmed, but Homeland Security officials insist that they have no “credible information” of any terror groups on the southern border.

That apparently is not good enough for the American right-wing. They prefer to follow one of the primary laws of the post-9/11 world: whatever can be imagined is in fact true. What “could be” invariably trumps what “is.” Is it possible that supporters of Hezbollah are plotting terror attacks from bases in Tijuana? Of course it is, therefore it must be so.

Could Somalis be lining up to travel to Cuba, Mexico, and Texas? It is possible, as so much is possible, therefore it must be so. A corollary to this law is that if a falsehood or rumor is repeated often enough, it becomes so. Hence, Jameel Nasr, Hezbollah operative, who may not even exist, actually was arrested as he plotted terrorist operations for Hezbollah just south of Texas.

A more realistic appraisal of Muslim activity in Latin America comes from an overlooked WikiLeaks document, a classified cable from the U.S. Consulate in Sao Paulo, Brazil, which describes “the unique possibilities for Muslim engagement” with the U.S. in that country. Writing at the end of 2009, the consul reported that there were some Hezbollah supporters among recent Lebanese immigrants to Brazil. (That in itself is hardly surprising since Hezbollah is a popular, deeply rooted political movement that controls significant parts of southern Lebanon.)

The consul also informed Washington that such immigrants were surprisingly few in number and were completely overshadowed by the country’s mainstream Muslim leaders, who have exhibited a keen interest in and curiosity about the United States, and are opposed to extremist ideologies of any kind. These leaders, he wrote, are eager “to engage, acutely aware of the dangers of radicalism, and had solid achievements in integrating Muslim and Brazilian identities, making them an excellent example of how a unique MMC [Muslim minority community] has, by and large, carved out a positive space within a diverse Latin American country.” In other words, in the real world, the vast majority of Muslims in Latin America are eager for the same kind of stability and engagement as Muslims in the U.S.

But this view -- and the importance it places on dialogue -- does not fit the prevailing nativist mythology in this country or Republican and right-wing efforts to meld terrorism, Islam, and immigration into a single muddy brew (a characteristic of much public debate in the U.S. since 9/11). It appears we have entered a post-analytic world where the point of public discourse is not to make distinctions but to obliterate them.

A tiny group of radical extremists, mostly from Saudi Arabia, have become indistinguishable from a billion and a half Muslims all over the world. A bizarre and convoluted ideology, worked out to justify specific attacks on the U.S. and Egypt, has come to stand in for Islamic sacred texts and holy law. The roughly 50 al-Qaeda fighters remaining in Afghanistan have become a synecdoche for the whole of the Muslim Middle East and South Asia.

Political dissenters in the United States have been absorbed into the terrorism trope as well. Information -- which is, after all, what has been disseminated by WikiLeaks -- is increasingly viewed as a potential terrorist weapon. Absorbing that information (that is, reading the documents) could even amount to material support for terrorism. In such a world, the counter-terrorism efforts of the U.S. government are trained on the entire civilian population, whether through electronic monitoring or fiddling with everyone’s junk.

Former attorney general John Ashcroft noted the importance of blurring all distinctions years ago. “In this new war, our enemy's platoons infiltrate our borders, quietly blending in with visiting tourists, students, and workers,” he proclaimed in June 2002. “They move unnoticed through our cities, neighborhoods, and public spaces. They wear no uniforms. Their camouflage is not forest green, but rather it is the color of common street clothing. Their tactics rely on evading recognition at the border and escaping detection within the United States. Their terrorist mission is to defeat America, destroy our values and kill innocent people.”

It’s all right there, hidden in plain sight. Terrorists are Muslims, Muslims are immigrants, immigrants are residents. Around it goes. Increasingly, immigration enforcement is becoming an anti-terrorism effort. Anyone and everyone is a suspect. That is the reality played out at every airport; it is the narrative touched by every monitored email and tapped telephone call.

We are a fearful nation eating away at itself and the wolves are prowling the southern borders. Welcome to Congress, 2011.

Stephan Salisbury is cultural writer for the Philadelphia Inquirer. His most recent book is Mohamed’s Ghosts: An American Story of Love and Fear in the Homeland.

Monday, December 20, 2010

Wikimania and the First Amendment

Breaking News & Views for the Progressive Community

Wikimania and the First Amendment

by Ralph Nader

Thomas Blanton, the esteemed director of the National Security Archive at George Washington University described Washington's hyper-reaction to Wikileaks' transmission of information to some major media in various countries as "Wikimania."

In testimony before the House Judiciary Committee last Thursday, Blanton urged the Justice Department to cool it. Wikileaks and newspapers like The New Yorks Times and London's Guardian, he said, are publishers protected by the First Amendment. The disclosures are the first small installment of a predicted much larger forthcoming trove of non-public information from both governments and global corporations.

The leakers inside these organizations come under different legal restrictions that those who use their freedom of speech rights to publish the leaked information.

The mad dog, homicidal demands to destroy the leaders of Wikileaks by self-styled liberal Democrat and Fox commentator, Bob Beckel, the radio and cable howlers and some members of Congress, may be creating an atmosphere of panic at the politically sensitive Justice Department. Attorney General Eric Holder has made very prejudicial comments pursuant to his assertion that his lawyers considering how they may prosecute Julian Assange, the Wikileaks leader.

Mr. Holder declared that both "the national security of the United States" and "the American people have been put at risk." This level of alarm was not shared by the public statements of defense Secretary Robert Gates and Secretary of States Hillary Clinton who downplayed the impact of these disclosures.

The Attorney General, who should be directing more of his resources to the corporate crime wave in all its financial, economic and hazardous manifestations, is putting himself in a bind.

If he goes after Wikileaks too broadly using the notorious Espionage Act of 1917 and other vague laws, how is he going to deal with The New York Times and other mass media that reported the disclosures?

Consider what Harvard Law Professor Jack Goldsmith, who was head of the Office of Legal Counsel in George W. Bush's Justice Department just wrote:

"In Obama's Wars, Bob Woodward, with the obvious assistance of many top Obama administration officials, disclosed many details about top secret programs, code names, documents, meetings, and the like. I have a hard time squaring the anger the government is directing towards Wikileaks with its top officials openly violating classification rules and opportunistically revealing without authorization top secret information."

On the other hand, if Mr. Holder goes the narrow route to obtain an indictment of Mr. Assange, he will risk a public relations debacle by vindictively displaying prosecutorial abuse (i.e. fixing the law around the enforcement bias.) Double standards have no place in the Justice Department.

Wikileaks is also creating anxiety in the corporate suites. A cover story in the December 20, 2010 issue of Forbes magazine reports that early next year a large amount of embarrassing material will be sent to the media by Wikileaks about a major U.S. bank, followed by masses of exposé material on other global corporations.

Will these releases inform the people about very bad activities by drug, oil, financial and other companies along with corruption in various countries? If so, people may find this information useful. We can only imagine what sleazy or illegal things our government has been up to that have been covered up. Soon, people may reject the those who would censor Wikileaks. Many people do want to size up what's going on inside their government in their name and with their tax dollars.

Wasn't it Jefferson who said that "information is the currency of democracy" and that, given a choice between government and a free press, he'll take the latter? Secrecy-keeping the people and Congress in the dark-is the cancer eating at the vitals of democracy.

What is remarkable about all the official hullabaloo by government officials, who leak plenty themselves, is that there never is any indictment or prosecution of government big wigs who continually suppress facts and knowledge in order to carry out very devastating actions like invading Iraq under false pretenses and covering up corporate contractors abuses. The morbid and corporate-indentured secrecy of government over the years has cost many American lives, sent Americans to illegal wars, bilked consumers of billions of dollars and harmed the safety and economic well-being of workers.

As Cong. Ron Paul said on the House floor, why is the hostility directed at Assange, the publisher, and not at our government's failure to protect classified information? He asked his colleagues which events caused more deaths, "Lying us into war, or the release of the Wikileaks papers?"

Over-reaction by the Obama administration could lead to censoring the Internet, undermining Secretary Clinton's Internet Freedom initiative, which criticized China's controls and lauded hacktivism in that country, and divert attention from the massive over classification of documents by the Executive Branch.

A full throttle attack on Wikileaks is what the government distracters want in order to take away the spotlight of the disclosures on their misdeeds, their waste and their construction of an authoritarian corporate state.

Professor and ex-Bushite Jack Goldsmith summed up his thoughts this way: "The best thing to do....would be to ignore Assange and fix the secrecy system so this does not happen again."

That presumably is some of what Peter Zatko and his crew are now trying to do at the Pentagon's famed DARPA unit. That secret initiative may ironically undermine the First Amendment should they succeed too much in hamstringing the Internet earlier advanced by that same Pentagon unit.

Ralph Nader is a consumer advocate, lawyer, and author. His most recent book - and first novel - is, Only The Super-Rich Can Save Us. His most recent work of non-fiction is The Seventeen Traditions.

Monitoring America

Breaking News & Views for the Progressive Community

Monitoring America

Your Local Neighborhood's 'Global War on Terror'

by Dana Priest and William M. Arkin

Nine years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators.

[A localized intelligence apparatus is part of a larger Top Secret America created since the attacks. In July, The Washington Post described an alternative geography of the United States, one that has grown so large, unwieldy and secretive that no one knows how much money it costs, how many people it employs or how many programs exist within it.]A localized intelligence apparatus is part of a larger Top Secret America created since the attacks. In July, The Washington Post described an alternative geography of the United States, one that has grown so large, unwieldy and secretive that no one knows how much money it costs, how many people it employs or how many programs exist within it.
The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing.

The government's goal is to have every state and local law enforcement agency in the country feed information to Washington to buttress the work of the FBI, which is in charge of terrorism investigations in the United States.

Other democracies - Britain and Israel, to name two - are well acquainted with such domestic security measures. But for the United States, the sum of these new activities represents a new level of governmental scrutiny.

This localized intelligence apparatus is part of a larger Top Secret America created since the attacks. In July, The Washington Post described an alternative geography of the United States, one that has grown so large, unwieldy and secretive that no one knows how much money it costs, how many people it employs or how many programs exist within it.

Today's story, along with related material on The Post's Web site, examines how Top Secret America plays out at the local level. It describes a web of 4,058 federal, state and local organizations, each with its own counterterrorism responsibilities and jurisdictions. At least 935 of these organizations have been created since the 2001 attacks or became involved in counterterrorism for the first time after 9/11.

The months-long investigation, based on nearly 100 interviews and 1,000 documents, found that:

* Technologies and techniques honed for use on the battlefields of Iraq and Afghanistan have migrated into the hands of law enforcement agencies in America.

* The FBI is building a database with the names and certain personal information, such as employment history, of thousands of U.S. citizens and residents whom a local police officer or a fellow citizen believed to be acting suspiciously. It is accessible to an increasing number of local law enforcement and military criminal investigators, increasing concerns that it could somehow end up in the public domain.

* Seeking to learn more about Islam and terrorism, some law enforcement agencies have hired as trainers self-described experts whose extremist views on Islam and terrorism are considered inaccurate and counterproductive by the FBI and U.S. intelligence agencies.

* The Department of Homeland Security sends its state and local partners intelligence reports with little meaningful guidance, and state reports have sometimes inappropriately reported on lawful meetings.

The need to identify U.S.-born or naturalized citizens who are planning violent attacks is more urgent than ever, U.S. intelligence officials say. This month's FBI sting operation involving a Baltimore construction worker who allegedly planned to bomb a Maryland military recruiting station is the latest example. It followed a similar arrest of a Somali-born naturalized U.S. citizen allegedly seeking to detonate a bomb near a Christmas tree lighting ceremony in Portland, Ore. There have been nearly two dozen other cases just this year.

"The old view that 'if we fight the terrorists abroad, we won't have to fight them here' is just that - the old view," Homeland Security Secretary Janet Napolitano told police and firefighters recently.

The Obama administration heralds this local approach as a much-needed evolution in the way the country confronts terrorism.

However, just as at the federal level, the effectiveness of these programs, as well as their cost, is difficult to determine. The Department of Homeland Security, for example, does not know how much money it spends each year on what are known as state fusion centers, which bring together and analyze information from various agencies within a state.

The total cost of the localized system is also hard to gauge. The DHS has given $31 billion in grants since 2003 to state and local governments for homeland security and to improve their ability to find and protect against terrorists, including $3.8 billion in 2010. At least four other federal departments also contribute to local efforts. But the bulk of the spending every year comes from state and local budgets that are too disparately recorded to aggregate into an overall total.

The Post findings paint a picture of a country at a crossroads, where long-standing privacy principles are under challenge by these new efforts to keep the nation safe.

Top Secret America is a project two years in the making that describes the huge security buildup in the United States after the Sept. 11, 2001, attacks. Today's story is about those efforts at the local level, including law enforcement and homeland security agencies in every state and thousands of communities. View previous stories, explore relationships between government organizations and the types of work being done, and view top-secret geography on an interactive map.

The public face of this pivotal effort is Napolitano, the former governor of Arizona, which years ago built one of the strongest state intelligence organizations outside of New York to try to stop illegal immigration and drug importation.

Napolitano has taken her "See Something, Say Something" campaign far beyond the traffic signs that ask drivers coming into the nation's capital for "Terror Tips" and to "Report Suspicious Activity."

She recently enlisted the help of Wal-Mart, Amtrak, major sports leagues, hotel chains and metro riders. In her speeches, she compares the undertaking to the Cold War fight against communists.

"This represents a shift for our country," she told New York City police officers and firefighters on the eve of the 9/11 anniversary this fall. "In a sense, this harkens back to when we drew on the tradition of civil defense and preparedness that predated today's concerns."

From Afghanistan to Tennessee

On a recent night in Memphis, a patrol car rolled slowly through a parking lot in a run-down section of town. The military-grade infrared camera on its hood moved robotically from left to right, snapping digital images of one license plate after another and analyzing each almost instantly.

Suddenly, a red light flashed on the car's screen along with the word "warrant."

"Got a live one! Let's do it," an officer called out.

The streets of Memphis are a world away from the streets of Kabul, yet these days, the same types of technologies and techniques are being used in both places to identify and collect information about suspected criminals and terrorists.

The examples go far beyond Memphis.

* Hand-held, wireless fingerprint scanners were carried by U.S. troops during the insurgency in Iraq to register residents of entire neighborhoods. L-1 Identity Solutions is selling the same type of equipment to police departments to check motorists' identities.

* In Arizona, the Maricopa County Sheriff's Facial Recognition Unit, using a type of equipment prevalent in war zones, records 9,000 biometric digital mug shots a month.

* U.S. Customs and Border Protection flies General Atomics' Predator drones along the Mexican and Canadian borders - the same kind of aircraft, equipped with real-time, full-motion video cameras, that has been used in wars in Kosovo, Iraq and Afghanistan to track the enemy.

The special operations units deployed overseas to kill the al-Qaeda leadership drove technological advances that are now expanding in use across the United States. On the front lines, those advances allowed the rapid fusing of biometric identification, captured computer records and cellphone numbers so troops could launch the next surprise raid.

Here at home, it's the DHS that is enamored with collecting photos, video images and other personal information about U.S. residents in the hopes of teasing out terrorists.

The DHS helped Memphis buy surveillance cameras that monitor residents near high-crime housing projects, problematic street corners, and bridges and other critical infrastructure. It helped pay for license plate readers and defrayed some of the cost of setting up Memphis's crime-analysis center. All together it has given Memphis $11 million since 2003 in homeland security grants, most of which the city has used to fight crime.

"We have got things now we didn't have before," said Memphis Police Department Director Larry Godwin, who has produced record numbers of arrests using all this new analysis and technology. "Some of them we can talk about. Some of them we can't."

One of the biggest advocates of Memphis's data revolution is John Harvey, the police department's technology specialist, whose computer systems are the civilian equivalent of the fancier special ops equipment used by the military.

Harvey collects any information he can pry out of government and industry. When officers were wasting time knocking on the wrong doors to serve warrants, he persuaded the local utility company to give him a daily update of the names and addresses of customers.

When he wanted more information about phones captured at crime scenes, he programmed a way to store all emergency 911 calls, which often include names and addresses to associate with phone numbers. He created another program to upload new crime reports every five minutes and mine them for the phone numbers of victims, suspects, witnesses and anyone else listed on them.

Now, instead of having to decide which license plate numbers to type into a computer console in the patrol car, an officer can simply drive around, and the automatic license plate reader on his hood captures the numbers on every vehicle nearby. If the officer pulls over a driver, instead of having to wait 20 minutes for someone back at the office to manually check records, he can use a hand-held device to instantly call up a mug shot, a Social Security number, the status of the driver's license and any outstanding warrants.

The computer in the cruiser can tell an officer even more about who owns the vehicle, the owner's name and address and criminal history, and who else with a criminal history might live at the same address.

Take a recent case of two officers with the hood-mounted camera equipment who stopped a man driving on a suspended license. One handcuffed him, and the other checked his own PDA. Based on the information that came up, the man was ordered downtown to pay a fine and released as the officers drove off to stop another car.

That wasn't the end of it, though.

A record of that stop - and the details of every other arrest made that night, and every summons written - was automatically transferred to the Memphis Real Time Crime Center, a command center with three walls of streaming surveillance video and analysis capabilities that rival those of an Army command center.

There, the information would be geocoded on a map to produce a visual rendering of crime patterns. This information would help the crime intelligence analysts predict trends so the department could figure out what neighborhoods to swarm with officers and surveillance cameras.

But that was still not the end of it, because the fingerprints from the crime records would also go to the FBI's data campus in Clarksburg, W.Va. There, fingerprints from across the United States are stored, along with others collected by American authorities from prisoners in Saudi Arabia and Yemen, Iraq and Afghanistan.

There are 96 million sets of fingerprints in Clarksburg, a volume that government officials view not as daunting but as an opportunity.

This year for the first time, the FBI, the DHS and the Defense Department are able to search each other's fingerprint databases, said Myra Gray, head of the Defense Department's Biometrics Identity Management Agency, speaking to an industry group recently. "Hopefully in the not-too-distant future," she said, "our relationship with these federal agencies - along with state and local agencies - will be completely symbiotic."

The FBI's 'suspicious' files

At the same time that the FBI is expanding its West Virginia database, it is building a vast repository controlled by people who work in a top-secret vault on the fourth floor of the J. Edgar Hoover FBI Building in Washington. This one stores the profiles of tens of thousands of Americans and legal residents who are not accused of any crime. What they have done is appear to be acting suspiciously to a town sheriff, a traffic cop or even a neighbor.

If the new Nationwide Suspicious Activity Reporting Initiative, or SAR, works as intended, the Guardian database may someday hold files forwarded by all police departments across the country in America's continuing search for terrorists within its borders.

The effectiveness of this database depends, in fact, on collecting the identities of people who are not known criminals or terrorists - and on being able to quickly compile in-depth profiles of them.

"If we want to get to the point where we connect the dots, the dots have to be there," said Richard A. McFeely, special agent in charge of the FBI's Baltimore office.

In response to concerns that information in the database could be improperly used or released, FBI officials say anyone with access has been trained in privacy rules and the penalties for breaking them.

But not everyone is convinced. "It opens a door for all kinds of abuses," said Michael German, a former FBI agent who now leads the American Civil Liberties Union's campaign on national security and privacy matters. "How do we know there are enough controls?"

The government defines a suspicious activity as "observed behavior reasonably indicative of pre-operational planning related to terrorism or other criminal activity" related to terrorism.

State intelligence analysts and FBI investigators use the reports to determine whether a person is buying fertilizer to make a bomb or to plant tomatoes; whether she is plotting to poison a city's drinking water or studying for a metallurgy test; whether, as happened on a Sunday morning in late September, the man snapping a picture of a ferry in the Newport Beach harbor in Southern California simply liked the way it looked or was plotting to blow it up.

Suspicious Activity Report N03821 says a local law enforcement officer observed "a suspicious subject . . . taking photographs of the Orange County Sheriff Department Fire Boat and the Balboa Ferry with a cellular phone camera." The confidential report, marked "For Official Use Only," noted that the subject next made a phone call, walked to his car and returned five minutes later to take more pictures. He was then met by another person, both of whom stood and "observed the boat traffic in the harbor." Next another adult with two small children joined them, and then they all boarded the ferry and crossed the channel.

All of this information was forwarded to the Los Angeles fusion center for further investigation after the local officer ran information about the vehicle and its owner through several crime databases and found nothing.

Authorities would not say what happened to it from there, but there are several paths a suspicious activity report can take:

At the fusion center, an officer would decide to either dismiss the suspicious activity as harmless or forward the report to the nearest FBI terrorism unit for further investigation.

At that unit, it would immediately be entered into the Guardian database, at which point one of three things could happen:

The FBI could collect more information, find no connection to terrorism and mark the file closed, though leaving it in the database.

It could find a possible connection and turn it into a full-fledged case.

Or, as most often happens, it could make no specific determination, which would mean that Suspicious Activity Report N03821 would sit in limbo for as long as five years, during which time many other pieces of information about the man photographing a boat on a Sunday morning could be added to his file: employment, financial and residential histories; multiple phone numbers; audio files; video from the dashboard-mounted camera in the police cruiser at the harbor where he took pictures; and anything else in government or commercial databases "that adds value," as the FBI agent in charge of the database described it.

That could soon include biometric data, if it existed; the FBI is working on a way to attach such information to files. Meanwhile, the bureau will also soon have software that allows local agencies to map all suspicious incidents in their jurisdiction.

The Defense Department is also interested in the database. It recently transferred 100 reports of suspicious behavior into the Guardian system, and over time it expects to add thousands more as it connects 8,000 military law enforcement personnel to an FBI portal that will allow them to send and review reports about people suspected of casing U.S. bases or targeting American personnel.

And the DHS has created a separate way for state and local authorities, private citizens, and businesses to submit suspicious activity reports to the FBI and to the department for analysis.

As of December, there were 161,948 suspicious activity files in the classified Guardian database, mostly leads from FBI headquarters and state field offices. Two years ago, the bureau set up an unclassified section of the database so state and local agencies could send in suspicious incident reports and review those submitted by their counterparts in other states. Some 890 state and local agencies have sent in 7,197 reports so far.

Of those, 103 have become full investigations that have resulted in at least five arrests, the FBI said. There have been no convictions yet. An additional 365 reports have added information to ongoing cases.

But most remain in the uncertain middle, which is why within the FBI and other intelligence agencies there is much debate about the effectiveness of the bottom-up SAR approach, as well as concern over the privacy implications of retaining so much information on U.S. citizens and residents who have not been charged with anything.

The vast majority of terrorism leads in the United States originate from confidential FBI sources and from the bureau's collaboration with federal intelligence agencies, which mainly work overseas. Occasionally a stop by a local police officer has sparked an investigation. Evidence comes from targeted FBI surveillance and undercover operations, not from information and analysis generated by state fusion centers about people acting suspiciously.

"It's really resource-inefficient," said Philip Mudd, a 20-year CIA counterterrorism expert and a top FBI national security official until he retired nine months ago. "If I were to have a dialogue with the country about this . . . it would be about not only how we chase the unknowns, but do you want to do suspicious activity reports across the country? . . . Anyone who is not at least suspected of doing something criminal should not be in a database."

Charles Allen, a longtime senior CIA official who then led the DHS's intelligence office until 2009, said some senior people in the intelligence community are skeptical that SARs are an effective way to find terrorists. "It's more likely that other kinds of more focused efforts by local police will gain you the information that you need about extremist activities," he said.

The DHS can point to some successes: Last year the Colorado fusion center turned up information on Najibullah Zazi, an Afghan-born U.S. resident planning to bomb the New York subway system. In 2007, a Florida fusion center provided the vehicle ownership history used to identify and arrest an Egyptian student who later pleaded guilty to providing material support to terrorism, in this case transporting explosives.

"Ninety-nine percent doesn't pan out or lead to anything" said Richard Lambert Jr., the special agent in charge of the FBI's Knoxville office. "But we're happy to wade through these things."

Expert training?

Ramon Montijo has taught classes on terrorism and Islam to law enforcement officers all over the country.

"Alabama, Colorado, Vermont," said Montijo, a former Army Special Forces sergeant and Los Angeles Police Department investigator who is now a private security consultant. "California, Texas and Missouri," he continued.

What he tells them is always the same, he said: Most Muslims in the United States want to impose sharia law here.

"They want to make this world Islamic. The Islamic flag will fly over the White House - not on my watch!" he said. "My job is to wake up the public, and first, the first responders."

With so many local agencies around the country being asked to help catch terrorists, it often falls to sheriffs or state troopers to try to understand the world of terrorism. They aren't FBI agents, who have years of on-the-job and classroom training.

Instead, they are often people like Lacy Craig, who was a police dispatcher before she became an intelligence analyst at Idaho's fusion center, or the detectives in Minnesota, Michigan and Arkansas who can talk at length about the lineage of gangs or the signs of a crystal meth addict.

Now each of them is a go-to person on terrorism as well.

"The CIA used to train analysts forever before they graduated to be a real analyst," said Allen, the former top CIA and DHS official. "Today we take former law enforcement officers and we call them intelligence officers, and that's not right, because they have not received any training on intelligence analysis."

State fusion center officials say their analysts are getting better with time. "There was a time when law enforcement didn't know much about drugs. This is no different," said Steven W. Hewitt, who runs the Tennessee fusion center, considered one of the best in the country. "Are we experts at the level of [the National Counterterrorism Center]? No. Are we developing an expertise? Absolutely."

But how they do that is usually left up to the local police departments themselves. In their desire to learn more about terrorism, many departments are hiring their own trainers. Some are self-described experts whose extremist views are considered inaccurate and harmful by the FBI and others in the intelligence community

Like Montijo, Walid Shoebat, a onetime Muslim who converted to Christianity, also lectures to local police. He too believes that most Muslims seek to impose sharia law in the United States. To prevent this, he said in an interview, he warns officers that "you need to look at the entire pool of Muslims in a community."

When Shoebat spoke to the first annual South Dakota Fusion Center Conference in Sioux Falls this June, he told them to monitor Muslim student groups and local mosques and, if possible, tap their phones. "You can find out a lot of information that way," he said.

A book expanding on what Shoebat and Montijo believe has just been published by the Center for Security Policy, a Washington-based neoconservative think tank. "Shariah: The Threat to America" describes what its authors call a "stealth jihad" that must be thwarted before it's too late.

The book's co-authors include such notables as former CIA director R. James Woolsey and former deputy undersecretary of defense for intelligence Lt. Gen. William G. Boykin, along with the center's director, a longtime activist. They write that most mosques in the United States already have been radicalized, that most Muslim social organizations are fronts for violent jihadists and that Muslims who practice sharia law seek to impose it in this country.

Frank Gaffney Jr., director of the center, said his team has spoken widely, including to many law enforcement forums.

"Members of our team have been involved in training programs for several years now, many of which have been focused on local law enforcement intelligence, homeland security, state police, National Guard units and the like," Gaffney said. "We're seeing a considerable ramping-up of interest in getting this kind of training."

Government terrorism experts call the views expressed in the center's book inaccurate and counterproductive. They say the DHS should increase its training of local police, using teachers who have evidence-based viewpoints.

DHS spokeswoman Amy Kudwa said the department does not maintain a list of terrorism experts but is working on guidelines for local authorities wrestling with the topic.

So far, the department has trained 1,391 local law enforcement officers in analyzing public information and 400 in analytic thinking and writing skills. Kudwa said the department also offers counterterrorism training through the Federal Emergency Management Agency, which this year enrolled 94 people in a course called "Advanced Criminal Intelligence Analysis to Prevent Terrorism."

A lack of useful information

The DHS also provides local agencies a daily flow of information bulletins.

These reports are meant to inform agencies about possible terror threats. But some officials say they deliver a never-ending stream of information that is vague, alarmist and often useless. "It's like a garage in your house you keep throwing junk into until you can't park your car in it," says Michael Downing, deputy chief of counterterrorism and special operations for the Los Angeles Police Department.

A review of nearly 1,000 DHS reports dating back to 2003 and labeled "For Official Use Only" underscores Downing's description. Typical is one from May 24, 2010, titled "Infrastructure Protection Note: Evolving Threats to the Homeland."

It tells officials to operate "under the premise that other operatives are in the country and could advance plotting with little or no warning." Its list of vulnerable facilities seems to include just about everything: "Commercial Facilities, Government Facilities, Banking and Financial and Transportation . . ."

Bart R. Johnson, who heads the DHS's intelligence and analysis office, defended such reports, saying that threat reporting has "grown and matured and become more focused." The bulletins can't be more specific, he said, because they must be written at the unclassified level.

Recently, the International Association of Chiefs of Police agreed that the information they were receiving had become "more timely and relevant" over the past year.

Downing, however, said the reports would be more helpful if they at least assessed threats within a specific state's boundaries.

States have tried to do that on their own, but with mixed, and at times problematic, results.

In 2009, for instance, after the DHS and the FBI sent out several ambiguous reports about threats to mass-transit systems and sports and entertainment venues, the New Jersey Regional Operations Intelligence Center's Threat Analysis Program added its own information. "New Jersey has a large mass-transit infrastructure," its report warned, and "an NFL stadium and NHL/NBA arenas, a soccer stadium, and several concert venues that attract large crowds."

In Virginia, the state's fusion center published a terrorism threat assessment in 2009 naming historically black colleges as potential hubs for terrorism.

From 2005 to 2007, the Maryland State Police went even further, infiltrating and labeling as terrorists local groups devoted to human rights, antiwar causes and bike lanes.

And in Pennsylvania this year, a local contractor hired to write intelligence bulletins filled them with information about lawful meetings as varied as Pennsylvania Tea Party Patriots Coalition gatherings, antiwar protests and an event at which environmental activists dressed up as Santa Claus and handed out coal-filled stockings.

'We have our own terrorists'

Even if the information were better, it might not make a difference for the simplest of reasons: In many cities and towns across the country, there is just not enough terrorism-related work to do.

In Utah on one recent day, one of five intelligence analysts in the state's fusion center was writing a report about the rise in teenage overdoses of an over-the-counter drug. Another was making sure the visiting president of Senegal had a safe trip. Another had just helped a small town track down two people who were selling magazine subscriptions and pocketing the money themselves.

In the Colorado Information Analysis Center, some investigators were following terrorism leads. Others were looking into illegal Craigslist postings and online "World of Warcraft" gamers.

The vast majority of fusion centers across the country have transformed themselves into analytical hubs for all crimes and are using federal grants, handed out in the name of homeland security, to combat everyday offenses.

This is happening because, after 9/11, local law enforcement groups did what every agency and private company did in Top Secret America: They followed the money.

The DHS helped the Memphis Police Department, for example, purchase 90 surveillance cameras, including 13 that monitor bridges and a causeway. It helped buy the fancy screens on the walls of the Real Time Crime Center, as well as radios, robotic surveillance equipment, a mobile command center and three bomb-sniffing dogs. All came in the name of port security and protection to critical infrastructure.

Since there hasn't been a solid terrorism case in Memphis yet, the equipment's greatest value has been to help drive down city crime. Where the mobile surveillance cameras are set up, criminals scatter, said Lt. Mark Rewalt, who, on a recent Saturday night, scanned the city from an altitude of 1,000 feet.

Flying in a police helicopter, Rewalt pointed out some of the cameras the DHS has funded. They are all over the city, in mall parking lots, in housing projects, at popular street hang-outs. "Cameras are what's happening now," he marveled.

Meanwhile, another post-9/11 unit in Tennessee has had even less terrorism-related work to do.

The Tennessee National Guard 45th Weapons of Mass Destruction Civil Support Team, one of at least 50 such units around the country, was created to respond to what officials still believe is the inevitable release of chemical, biological or radiological material by terrorists.

The unit's 22 hazardous-materials personnel have the best emergency equipment in the state. A fleet of navy-blue vehicles - command, response, detection and tactical operations trucks - is kept polished and ready to roll in a garage at the armory in Smyrna.

The unit practices WMD scenarios constantly. But in real life, the crew uses the equipment very little: twice a year at NASCAR races in nearby Bristol to patrol for suspicious packages. Other than that, said Capt. Matt Hayes, several times a year they respond to hoaxes.

The fact that there has not been much terrorism to worry about is not evident on the Tennessee fusion center's Web site. Click on the incident map, and the state appears to be under attack.

Red icons of explosions dot Tennessee, along with blinking exclamation marks and flashing skulls. The map is labeled: "Terrorism Events and Other Suspicious Activity.

But if you roll over the icons, the explanations that pop up have nothing to do with major terrorist plots: "Johnson City police are investigating three 'bottle bombs' found at homes over the past three days," one description read recently. ". . . The explosives were made from plastic bottles with something inside that reacted chemically and caused the bottles to burst."

Another told a similar story: "The Scott County Courthouse is currently under evacuation after a bomb threat was called in Friday morning. Update: Authorities completed their sweep . . . and have called off the evacuation."

Nine years after 9/11, this map is part of the alternative geography that is Top Secret America, where millions of people are assigned to help stop terrorism. Memphis Police Director Godwin is one of them, and he has his own version of what that means in a city where there have been 86 murders so far this year.

"We have our own terrorists, and they are taking lives every day," Godwin said. "No, we don't have suicide bombers - not yet. But you need to remain vigilant and realize how vulnerable you can be if you let up."

Staff researcher Julie Tate contributed to this story.

E