In the ongoing effort to keep public places clear of intoxicated citizens and drunk drivers, some police agencies are using a controversial tactic – going directly into bars and restaurants in order to make arrests.
Such is the situation in northern Virginia, where Fairfax County Police are targeting patrons suspected of having one too many.
"[Officers] were talking to one of the guests, then physically pulled him off the barstool," Richie Prisco, general manager at Champps bar told the Reston Times. "They were really aggressive and nasty."
According to the report, police are hauling customers outside of establishments to conduct sobriety tests, then arresting them for public drunkenness should they fail.
Tavern owner Jimmy Cirrito says it was intimidating and unnecessary to have some ten officers show up in SWAT-like attire. He notes police seemed to be tagging people at random, despite their telling bar owners they had undercover agents inside, calling in to provide specific descriptions of certain individuals.
"They tapped one lady on the shoulder – who was on her first drink and had just eaten dinner – to take her out on the sidewalk and give her a sobriety test," Cirrito told the paper. "They told her she fit the description of a woman they had complaints about, and that they heard she was dancing topless."
Cirrito said the woman passed the test and was allowed back in, but soon after, police pulled another woman outside who had arrived shortly before officers did.
"They made her count backward, say the alphabet, tell them where she lived, how she got there, how she was getting home," he said. "She had just gotten there five minutes ago in a cab."
Authorities say such methods are not new, despite protests from bar owners that they've never heard of police coming inside their establishments to enforce drinking laws.
"I've been an officer for over 17 years, and we've been doing it
on and off over my entire career,"
police spokeswoman Sophia Grinnan told the Times. "As much
as officers hate to spoil a good time, they hate even more to go out at
2 a.m. and work a death of anybody that is alcohol-related."
Virginia statutes say any business with a liquor license is considered a public place; therefore, police are allowed free access. If they find someone over the legal alcohol limit of .08, or suspect a customer of being intoxicated while still being served or present in an establishment, police can issue a ticket for public intoxication.
In response to complaints the raids were overly aggressive, Grinnan said, "I've had bar owners come up to me [and] ask what is going on, but I've also had some approach me aggressively, telling me I couldn't be there and I was violating their constitutional rights. We love to give explanations of what we're doing because it has an impact, but officers don't have to give up their game plan. That is just a courtesy."
In the wake of the published report, citizens appear to be siding with the bar owners and patrons, gauging from posts in an online messageboard.
"The way police are handling the drink situation is the biggest B.S. I have ever heard of," wrote Ray Williams.
"I lost a son (at age 16) a few years ago, and I most certainly support
stopping anyone from drinking and driving. However, this police raid
that seems to take place at some local bars is just totally crazy.
...
Are we now living in a communist environment where we are not allowed
to do anything without being harassed by the military/police?"
Russ Heisinger of Northport, N.Y., asked: "What is next, the alcohol police entering your home on Super Bowl Sunday, and inviting you outside to take a breath test? A solution would be for all the bar and restaurant owners to become 'private clubs,' and charge a very nominal fee for membership. However, the true solution is for the 'Barney Fifes' there to uphold the part of the Constitution about unlawful search, and to remember that we are after all, a free society, unless the cops think this is Baghdad!"
Others, like Don Armstrong, urged people to reject field sobriety tests, and request a blood-alcohol test at a local hospital.
"I have a form of arthritis that often affects my speech patterns
and walking abilities," he wrote.
"Under their standards of an acceptable set of motor functions,
I would fail even if I never had an alcoholic drink."
The scope of this Protocol is twofold :
- to harmonise substantive criminal law in the fight against racism
and xenophobia on the Internet,
- to improve international co-operation in this area, while respecting
the right to freedom of expression enshrined, more than 50 years ago, in
the European Convention on Human Rights.
All the offences recognised by the Protocol must be committed "intentionally" for criminal liability to apply. For example, under this provision a service-provider will not be held criminally liable for having served as a conduit for, or having hosted, a website or newsroom containing such material, unless the intentional nature of the dissemination of racist and xenophobic material can be established under domestic law in each given case.
Global threats and challenges needing global responses, the negotiation process of this Protocol, as for the Convention on Cybercime, also involved Council of Europe non-member States: the USA, Canada, Japan, Mexico and South Africa - the Protocol is also open to signature by them.
The Committee of Ministers decided to open the Additional Protocol
for signature on the occasion of the next Parliamentary Assembly session
(27-31 January
2003).
Further information on the Council of Europe's fight against cybercrime can be found in our special file.
Press Contact Council of Europe Spokesperson and Press Division Tel.
+33 3 88 41 25 60 - Fax. +33 3 88 41 39 11 E-mail: PressUnit@coe.int
The Observer UK
Sun's rays to roast Earth as poles flip Robin McKie, science editor Sunday November 10, 2002 The Observer Earth's magnetic field - the force that protects us from deadly radiation bursts from outer space - is weakening dramatically.
Scientists have discovered that its strength has dropped precipitously over the past two centuries and could disappear over the next 1,000 years.
The effects could be catastrophic. Powerful radiation bursts, which normally never touch the atmosphere, would heat up its upper layers, triggering climatic disruption. Navigation and communication satellites, Earth's eyes and ears, would be destroyed and migrating animals left unable to navigate.
'Earth's magnetic field has disappeared many times before - as a prelude to our magnetic poles flipping over, when north becomes south and vice versa,' said Dr Alan Thomson of the British Geological Survey in Edinburgh.
'Reversals happen every 250,000 years or so, and as there has not been one for almost a million years, we are due one soon.' For more than 100 years, scientists have noted the strength of Earth's magnetic field has been declining, but have disagreed about interpretations. Some said its drop was a precursor to reversal, others argued it merely indicated some temporary variation in field strength has been occurring.
But now Gauthier Hulot of the Paris Geophysical Institute has discovered Earth's magnetic field seems to be disappearing most alarmingly near the poles, a clear sign that a flip may soon take place.
Using satellite measurements of field variations over the past 20 years, Hulot plotted the currents of molten iron that generate Earth's magnetism deep underground and spotted huge whorls near the poles.
Hulot believes these vortices rotate in a direction that reinforces a reverse magnetic field, and as they grow and proliferate these eddies will weaken the dominant field: the first steps toward a new polarity, he says.
And as Scientific American reports this week, this interpretation has now been backed up by computer simulation studies.
How long a reversal might last is a matter of scientific controversy, however. Records of past events, embedded in iron minerals in ancient lava beds, show some can last for thousands of years - during which time the planet will have been exposed to batterings from solar radiation. On the other hand, other researchers say some flips may have lasted only a few weeks.
Exactly what will happen when Earth's magnetic field disappears prior to its re-emergence in a reversed orientation is also difficult to assess. Compasses would point to the wrong pole - a minor inconvenience. More importantly, low-orbiting satellites would be exposed to electromagnetic batterings, wrecking them.
In addition, many species of migrating animals and birds - from swallows to wildebeests - rely on innate abilities to track Earth's magnetic field. Their fates are impossible to gauge.
As to humans, our greatest risk would come from intense solar radiation bursts. Normally these are contained by the planet's magnetic field in space. However, if it disappears, particle storms will start to batter the atmosphere.
'These solar particles can have profound effects,' said Dr Paul Murdin,
of the Institute of Astronomy, Cambridge. 'On Mars, when its magnetic
field failed permanently billions of years ago, it led to its atmosphere
being boiled off. On Earth, it will heat up the upper atmosphere
and send ripples round the world with enormous, unpredictable effects on
the climate.' It is unlikely that humans could do much. Burrowing
thousands of miles into solid rock to set things right would stretch the
technological prowess of our descendants to bursting point, though such
limitations do not worry film scriptwriters.
Paramount's latest sci-fi thriller, The Core - directed by Englishman
Jon Amiel, and starring Hilary Swank and Aaron Eckhart - depicts a world
beset by just such a polar reversal, with radiation sweeping the planet.
The solution, according to the film, to be released next year, involves scientists drilling into Earth's mantle to set off a nuclear blast that will halt the reversal.
Given that temperatures at such depths rival those of the Sun's surface,
such a task would seem impossible - except, of course, in Hollywood.
http://www.observer.co.uk/international/story/0,6903,837058,00.html
THE WASHINGTON POST WASHINGTON, Dec. 1 — The Bush administration is developing a parallel legal system in which terrorism suspects — U.S. citizens and noncitizens alike — may be investigated, jailed, interrogated, tried and punished without legal protections guaranteed by the ordinary system, lawyers inside and outside the government say.
THE ELEMENTS of this new system are already familiar from President Bush’s orders and his aides’ policy statements and legal briefs: indefinite military detention for those designated “enemy combatants,” liberal use of “material witness” warrants, counterintelligence-style wiretaps and searches led by law enforcement officials and, for noncitizens, trial by military commissions or deportation after strictly closed hearings.
Only now, however, is it becoming clear how these elements could
ultimately interact.
For example, under authority it already has or is asserting in court
cases, the administration, with approval of the special Foreign Intelligence
Surveillance Court, could order a clandestine search of a U.S. citizen’s
home and, based on the information gathered, secretly declare the citizen
an enemy combatant, to be held indefinitely at a U.S. military base.
Courts would have very limited authority to second-guess the detention,
to the extent that they were aware of it.
Administration officials, noting that they have chosen to prosecute suspected Taliban member John Walker Lindh, “shoe bomber” Richard Reid and alleged Sept. 11 conspirator Zacarias Moussaoui in ordinary federal courts, say the parallel system is meant to be used selectively, as a complement to conventional processes, not as a substitute.
But, they say, the parallel system is necessary because terrorism is a form of war as well as a form of crime, and it must not only be punished after incidents occur, but also prevented and disrupted through the gathering of timely intelligence. “I wouldn’t call it an alternative system,” said an administration official who has helped devise the legal response to the terrorist attacks of Sept. 11, 2001. “But it is different than the criminal procedure system we all know and love. It’s a separate track for people we catch in the war.” U.S. CITIZEN ALREADY AFFECTED At least one American has been shifted from the ordinary legal system into the parallel one: alleged al Qaeda “dirty bomb” plotter Jose Padilla, who is being held at a Navy brig, without the right to communicate with a lawyer or anyone else. U.S. officials have told the courts that they can detain and interrogate him until the executive branch declares an end to the war against terrorism.
The final outlines of this parallel system will be known only after
the courts, including probably the Supreme Court, have settled a variety
of issues being litigated. But the prospect of such a system has
triggered a fierce debate.
Advertisement Civil libertarians accuse the Bush administration
of an executive-branch power grab that will erode the rights and freedoms
that terrorists are trying to destroy — and that were enhanced only recently
in response to abuses during the civil rights era, Vietnam and Watergate.
They are trying to embed in law a vast expansion of executive authority with no judicial oversight in the name of national security,” said Kate Martin, director of the Center for National Security Studies, a Washington-based nonprofit group that has challenged the administration approach in court. “This is more tied to statutory legal authority than J. Edgar Hoover’s political spying, but that may make it more dangerous. You could have the law serving as a vehicle for all kinds of abuses.” Administration officials say that they are acting under ample legal authority derived from statutes, court decisions and wartime powers that the president possesses as commander in chief under the Constitution.
When you have a long period of time when you’re not engaged in a war, people tend to forget, or put in back of their minds, the necessity for certain types of government action used when we are in danger, when we are facing eyeball to eyeball a serious threat,” Solicitor General Theodore B. Olson, who leads the administration’s anti-terrorism legal team in the federal courts, said in an interview.
Broadly speaking, the debate between the administration and its critics is not so much about the methods the government seeks to employ as it is about who should act as a check against potential abuses.
EXECUTIVE DECISIONS Civil libertarians insist that the courts should searchingly review Bush’s actions, so that he is always held accountable to an independent branch of government. Administration officials, however, imply that the main check on the president’s performance in wartime is political — that if the public perceives his approach to terrorism is excessive or ineffective, it will vote him out of office. ‘I wouldn’t call it an alternative system. But it is different than the criminal procedure system we all know and love.’ Bush administration official “At the end of the day in our constitutional system, someone will have to decide whether that [decision to designate someone an enemy combatant] is a right or just decision,” Olson said. “Who will finally decide that? Will it be a judge, or will it be the president of the United States, elected by the people, specifically to perform that function, with the capacity to have the information at his disposal with the assistance of those who work for him?” Probably the most hotly disputed element of the administration’s approach is its contention that the president alone can designate individuals, including U.S. citizens, as enemy combatants, who can be detained with no access to lawyers or family members unless and until the president determines, in effect, that hostilities between the United States and that individual have ended.
Padilla was held as a material witness for a month after his May
8 arrest in Chicago before he was designated an enemy combatant.
He is one of two U.S. citizens being held as enemy combatants at
the Navy brig in Charleston, S.C. The other is Yaser Esam Hamdi, a Saudi
Taliban fighter who was captured by American troops in Afghanistan and
sent to the U.S. prison at Guantanamo Bay, Cuba, until it was discovered
that he was born in Louisiana.
Attorneys are challenging their detentions in federal court.
While civil libertarians concede that the executive branch has well-established
authority to name and confine members of enemy forces during wartime, they
maintain that it is unconstitutional to subject U.S. citizens to
indefinite confinement on little more than the president’s declaration,
especially given the inherently open-ended nature of an unconventional
war against terrorism.
The notion that the executive branch can decide by itself that an American citizen can be put in a military camp, incommunicado, is frightening,” said Morton H. Halperin, director of the Washington office of the Open Society Institute. “They’re entitled to hold him on the grounds that he is in fact at war with the U.S., but there has to be an opportunity for him to contest those facts.” However, the Bush administration, citing two World War II-era cases — the Supreme Court’s ruling upholding a military commission trial for a captured American-citizen Nazi saboteur, and a later federal appeals court decision upholding the imprisonment of an Italian American caught as a member of Italian forces in Europe — says there is ample precedent for what it is doing. ‘They are trying to embed in law a vast expansion of executive authority with no judicial oversight in the name of national security.’ — KATE MARTIN Center for National Security Studies Courts traditionally understand that they must defer to the executive’s greater expertise and capability when it comes to looking at such facts and making such judgments in time of war, Bush officials said. At most, courts have only the power to review legal claims brought on behalf of detainees, such as whether there is indeed a state of conflict between the United States and the detainee.
In a recent legal brief, Olson argued that the detention of people
such as Hamdi or Padilla as enemy combatants is “critical to gathering
intelligence in connection with the overall war effort.” Nor is there any
requirement that the executive branch spell out its criteria for determining
who qualifies as an enemy combatant, Olson argues.
“There won’t be 10 rules that trigger this or 10 rules that end
this,” Olson said in the interview. “There will be judgments and
instincts and evaluations and implementations that have to be made by the
executive that are probably going to be different from day to day, depending
on the circumstances.” The federal courts have yet to deliver a definitive
judgment on the question. A federal district judge in Virginia, Robert
G. Doumar, was sharply critical of the administration, insisting
that Hamdi be permitted to consult an attorney. But he was partially
overruled by the U.S. Court of Appeals for the 4th Circuit, based in Richmond.
The 4th Circuit, however, said the administration’s assertion that courts
should have absolutely no role in examining the facts leading to an enemy
combatant designation was “sweeping.” A decision from that court is pending
as to how much of a role a court could claim, if any. The matter
could well have to be settled in the Supreme Court.
SECRET SURVEILLANCE The administration scored a victory recently
when the U.S. Foreign Intelligence Surveillance Court of Review ruled
3 to 0 that the USA Patriot Act, passed by Congress shortly after the Sept.
11 terrorist attacks, gives the Justice Department authority to break down
what had come to be known as “the wall” separating criminal investigations
from investigations of foreign agents.
‘The notion that the executive branch can decide by itself that
an American citizen can be put in a military camp, incommunicado, is frightening.’
— MORTON H. HALPERIN Open Society Institute The ruling endorsed the
administration’s view that law enforcement goals should be allowed to drive
Justice Department requests for special eavesdropping and search warrants
that had been thought to be reserved for counterintelligence operations.
But the court went further, agreeing with the administration that “the
wall” itself had no real basis in pre-Patriot Act law. Instead, the
court ruled, “the wall” was a product of internal Justice Department guidelines
that were, in turn, based partly on erroneous interpretations of the law
by some courts.
There is no clear line between intelligence and crime in any case,
the court said, because any investigation of a spy ring could ultimately
lead to charging U.S. citizens with crimes such as espionage.
The decision overruled an earlier one by the lower-level Foreign
Intelligence Surveillance Court, in which seven judges sharply criticized
past Justice Department misstatements in applications for permission to
do secret surveillance.
Administration officials say that the ruling permits what is only
sensible — greater sharing of information between federal prosecutors and
federal counterintelligence officials.
Thanks to enforcement of “the wall” by FBI lawyers, they note, pre-Sept. 11 permission to search Moussaoui’s computer was not sought, a crucial missed opportunity to prevent the attacks.
In practical terms, the ruling means that the attorney general would
still have to convince the Foreign Intelligence Surveillance Court that
he has probable cause to believe that a given subject of a wiretap or search
is an agent of a foreign terrorist group, a standard that is not dissimilar
to the one required for warrants in ordinary criminal cases.
Yet civil libertarians say that targets of such investigations who
end up being ordered out of the country or prosecuted would lose a crucial
right that they would have in the ordinary criminal justice system — the
right to examine the government’s evidence justifying the initial warrant.
“So the government starts off using secret surveillance information not to gather information upon which to make policy, but to imprison or deport an individual, and then it never gives the individual a fair chance to see if the surveillance was lawful,” Martin said.
© 2002 The Washington Post Company
A physicians' group is among a growing number of critics imploring the Senate to scrap portions of a proposed homeland security bill they say will seriously undermine civil liberties and grant the federal government unprecedented – and unconstitutional – power.
The American Association of Physicians and Surgeons said yesterday that one section of the legislation would allow the head of the Health and Human Services department to order Americans to receive potentially deadly smallpox vaccines against their will.
The bill gives "the HHS secretary virtually unlimited powers to declare an emergency and order smallpox treatment that could include forced immunizations, detainment and quarantines," said AAPS.
The 480-page bill passed the House Wednesday night on a 299-121 vote and is currently on the fast track to Senate passage. But as more details of the bill become known, the number of critics who oppose all or part of it also increase, including members of both parties as well as liberal and conservative analysts.
New York Times columnist William Safire, in an editorial Thursday
entitled, "You Are a Suspect,"
attacked the entire measure, claiming a provision in the bill that
establishes a broad Defense Department-administered database of information
on every American is akin to author George Orwell's book "1984."
"To this computerized dossier on your private life from commercial
sources, add every piece of information that government has about you –
passport application, driver's license and bridge toll records, judicial
and divorce records, complaints from nosy neighbors to the FBI, your lifetime
paper trail plus the latest hidden camera surveillance – and you have the
supersnoop's dream: a 'Total Information Awareness' about every U.S.
citizen,"
Safire wrote.
Called the Defense Department's Total Information Awareness program, it would be administered by a totally new department called the Security Advanced Research Projects Agency.
AAPS said the dubious medical emergency language is contained in Section 304, titled, "Administration of Counter Measures Against Smallpox."
The bill gives HHS authority to declare an actual or potential bio-terrorist
incident while giving the secretary the power to "administer 'countermeasures'"
– like forced immunizations – to "a category of individuals or everyone."
Also, the bill gives HHS the power to "continually extend"
the emergency declaration indefinitely, without Congress' consent.
"Also, if you are harmed" by the countermeasures, "you cannot sue
or take any other civil remedy,"
AAPS said.
"This section will give the [HHS] secretary unlimited power to define a real or potential threat, to take any measures he decides and to do it for as long as he wants," said Kathryn Serkes, a spokeswoman for the group. "It's 'Alice in Wonderland' time again – an emergency is just what [the secretary] says it is."
Some lawmakers are also alarmed at the scope of the bill.
The legislation "gives the federal government new powers and increases
federal expenditures, completely contradicting what members were told about
the bill," said Rep.
Ron Paul, R-Texas, on the House floor before the vote Wednesday.
"Furthermore," he continued, "these new power grabs are being rushed through Congress without giving members the ability to debate, or even properly study, this proposal.
"I must oppose this bill and urge my colleagues to do the same," he said.
Sen. Robert Byrd, D-W.Va., also opposes the legislation.
"We're making a huge mistake passing the bill at this time," he said Thursday. "There has not been a single hearing" on its contents.
Expressing concern about the manner in which the bill was being fast-tracked, Byrd added: "If necessity is the mother of invention, then politics is the mother of bureaucracy."
Other problems with the bill, AAPS says, "include centralized database provisions, airport security, unchecked power to Cabinet officials, extent of the new bureaucracy, concentration of power in the Executive Branch, suspension of the rule that prohibits secret advisory committee meetings, limited public access to information and failure to address border security and immigration issues, such as [the] tracking of foreign students."
Serkes said the provision dealing with HHS reminds her of similar emergency legislation directed at empowering governors.
The Model State Emergency Health Powers Act, WorldNetDaily reported
in January, gives governors the power to order the collection of all data
and records on citizens, ban firearms, take control of private property
and quarantine entire cities, under the auspices of protecting "the health
and safety of citizens from epidemics and bioterrorism,"
according to one analysis.
The version of the bill either under consideration or adopted by the majority of states thus far was drafted in October 2001, just a month after the Sept. 11 terrorist attacks, by The Center for Law and the Public's Health at Georgetown and Johns Hopkins Universities, in collaboration with several other organizations.
"Just remove 'governor' from the old bill and insert 'secretary' and magically you have a federal bill that was firmly rejected by voters across the country," said Serkes.
Of the homeland security measure, Serkes added:
"We need an honest accounting of how this will work. It's
too frightening to allow it to be rammed through."
In response to some of the concerns, Senate Democrats are proposing amendments to the bill that would eliminate the liability protections in the House version for vaccine makers. The White House says it supports the amendments to an extent.
White House spokesman Scott McClellan said yesterday there are provisions in the bill that "still allow people the right to compensation or the right to sue if they believe they've been harmed by the use of a particular vaccine." But, he said, the provisions "only require that individuals seeking compensation begin by seeking resolution through the Vaccine Injury and Compensation Program."
"If an individual is not satisfied with the award that is offered through that system, then they always have the right to proceed and sue the manufacturer," he said. "But, in short, the vaccine manufacturers will still be subject to liability. We just want to close loopholes, where people can circumvent that process."
Executive Orders
NATIONAL DEFENSE INDUSTRIAL RESOURCES PREPAREDNESS
THE WHITE HOUSE
Office of the Press Secretary
For Immediate Release
June 6, 1994
EXECUTIVE ORDER
#12919
- - - - - - -
NATIONAL DEFENSE INDUSTRIAL RESOURCES PREPAREDNESS
By the authority vested in me as President by the Constitution and
the laws of the United States of America, including the Defense Production
Act of 1950, as amended (64 Stat. 798; 50 U.S.C. App. 2061, et seq.),
and section 301 of title 3, United States Code, and as Commander in Chief
of the Armed Forces of the United States, it is hereby ordered as follows:
PART I - PURPOSE, POLICY AND IMPLEMENTATION
Section 101. Purpose. This order delegates authorities
and addresses national defense industrial resource policies and programs
under the Defense Production Act of 1950, as amended (“the Act”), except
for the amendments to Title III of the Act in the Energy Security Act of
1980 and telecommunication authorities under Executive Order No. 12472.
Sec. 102. Policy. The United States must have an industrial
and technology base capable of meeting national defense requirements, and
capable of contributing to the technological superiority of its defense
equipment in peacetime and in times of national emergency. The domestic
industrial and technological base is the foundation for national defense
preparedness. The authorities provided in the Act shall be used to
strengthen this base and to ensure it is capable of responding to all threats
to the national security of the United States.
Sec. 103. General Functions. Federal departments and
agencies responsible for defense acquisition (or for industrial resources
needed to support defense acquisition) shall:
(a) Identify requirements for the full spectrum of national security
emergencies, including military, industrial, and essential civilian demand;
(b) Assess continually the capability of the domestic industrial
and technological base to satisfy requirements in peacetime and times of
national emergency, specifically evaluating the availability of adequate
industrial resource and production sources, including subcontractors and
suppliers, materials, skilled labor, and professional and technical personnel;
(c) Be prepared, in the event of a potential threat to the security of the United States, to take actions necessary to ensure the availability of adequate industrial resources and production capability, including services and critical technology for national defense requirements;
(d) Improve the efficiency and responsiveness, to defense requirements,
of the domestic industrial base; and
(e) Foster cooperation between the defense and commercial sectors
for research and development and for acquisition of materials, components,
and equipment to enhance industrial base efficiency and responsiveness.
Sec. 104. Implementation. (a)
The National Security Council is the principal forum for consideration
and resolution of national security resource preparedness policy.
(b) The Director, Federal Emergency Management Agency
(“Director, FEMA”) shall:
(1) Serve as an advisor to the National Security Council on issues
of national security resource preparedness and on the use of the authorities
and functions delegated by this order;
(2) Provide for the central coordination of the plans and programs
incident to authorities and functions delegated under this order, and provide
guidance and procedures approved by the Assistant to the President for
National Security Affairs to the Federal departments and agencies under
this order;
(3) Establish procedures, in consultation with Federal departments
and agencies assigned functions under this order, to resolve in a timely
and effective manner conflicts and issues that may arise in implementing
the authorities and functions delegated under this order; and
(4) Report to the President periodically concerning all program
activities conducted pursuant to this order.
(c) The head of every Federal department and agency assigned functions under this order shall ensure that the performance of these functions is consistent with National Security Council policy and guidelines.
PART II - PRIORITIES AND ALLOCATIONS
Sec. 201. Delegations of Priorities and Allocations.
(a) The authority of the President conferred by section 101 of the
Act to require acceptance and priority performance of contracts or orders
(other than contracts of employment) to promote the national defense over
performance of any other contracts or orders, and to allocate materials,
services, and facilities as deemed necessary or appropriate to promote
the national defense, is delegated to the following agency heads:
(1) The Secretary of Agriculture with respect to food resources,
food resource facilities, and the domestic distribution of farm equipment
and commercial fertilizer;
(2) The Secretary of Energy with respect to all forms of energy;
(3) The Secretary of Health and Human Services with respect to health
resources;
(4) The Secretary of Transportation with respect to all forms of
civil transportation;
(5) The Secretary of Defense with respect to water resources; and
(6) The Secretary of Commerce for all other materials, services,
and facilities, including construction materials.
(b) The Secretary of Commerce, in consultation with the heads of
those departments and agencies specified in subsection 201(a) of this order,
shall administer the Defense Priorities and Allocations System (“DPAS”)
regulations that will be used to implement the authority of the President
conferred by section 101 of the Act as delegated to the Secretary of Commerce
in subsection 201(a)(6) of this order. The Secretary of Commerce
will redelegate to the Secretary of Defense, and the heads of other departments
and agencies as appropriate, authority for the priority rating of contracts
and orders for all materials, services, and facilities needed in support
of programs approved under section 202 of this order. The Secretary
of Commerce shall act as appropriate upon Special Priorities Assistance
requests in a time frame consistent with the urgency of the need at hand.
(c) The Director, FEMA, shall attempt to resolve issues or disagreements
on priorities or allocations between Federal departments or agencies in
a time frame consistent with the urgency of the issue at hand and, if not
resolved, such issues will be referred to the Assistant to the President
for National Security Affairs for final determination.
(d) The head of each Federal department or agency assigned functions
under subsection 201(a) of this order, when necessary, shall make the finding
required under subsection 101(b) of the Act. This finding shall be
submitted for the President’s approval through the Assistant to the President
for National Security Affairs. Upon such approval the head of the
Federal department or agency that made the finding may use the authority
of subsection 101(a) of the Act to control the general distribution of
any material (including applicable services) in the civilian market.
(e) The Assistant to the President for National Security
Affairs is hereby delegated the authority under subsection 101©(3)
of the Act, and will be assisted by the Director, FEMA, in ensuring the
coordinated administration of the Act.
Sec. 202. Determinations. The authority delegated by
section 201 of this order may be used only to support programs that have
been determined in writing as necessary or appropriate to promote the national
defense:
(a) By the Secretary of Defense with respect to military production
and construction, military assistance to foreign nations, stockpiling,
outer space, and directly related activities;
(b) By the Secretary of Energy with respect to energy production
and construction, distribution and use, and directly related activities;
and
(c) By the Director, FEMA, with respect to essential civilian needs
supporting national defense, including civil defense and continuity of
government and directly related activities.
Sec. 203. Maximizing Domestic Energy Supplies.
The authority of the President to perform the functions provided by subsection
101© of the Act is delegated to the Secretary of Commerce, who shall
redelegate to the Secretary of Energy the authority to make the findings
described in subsection 101©(2)(A) that the materials (including equipment),
services, and facilities are critical and essential. The Secretary
of Commerce shall make the finding described in subsection 101©(2)(A)
of the Act that the materials (including equipment), services, or facilities
are scarce, and the finding described in subsection 101©(2)(B) that
it is necessary to use the authority provided by subsection 101©(1).
Sec. 204. Chemical and Biological Warfare. The authority
of the President conferred by subsection 104(b) of the Act is delegated
to the Secretary of Defense. This authority may not be further delegated
by the Secretary.
PART III - EXPANSION OF PRODUCTIVE CAPACITY AND
SUPPLY
Sec. 301. (a) Financing Institution Guarantees.
To expedite or expand production and deliveries or services under government
contracts for the procurement of industrial resources or critical technology
items essential to the national defense, the head of each Federal department
or agency engaged in procurement for the national defense (referred to
as “agency head” in this part) and the President and Chairman of the Export-Import
Bank of the United States (in cases involving capacity expansion, technological
development, or production in foreign countries) are authorized to guarantee
in whole or in part any public or private financing institution, subject
to provisions of section 301 of the Act. Guarantees shall be made
in consultation with the Department of the Treasury as to the terms and
conditions thereof. The Director of the Office of Management and
Budget (“OMB”) shall be informed when such guarantees are to be made.
(b) Direct Loan Guarantees. To expedite or expand production
and deliveries or services under government contracts for the procurement
of industrial resources or critical technology items essential to the national
defense, each agency head is authorized to make direct loan guarantees
from funds appropriated to their agency for Title III.
(c) Fiscal Agent. Each Federal Reserve Bank is designated
and authorized to act, on behalf of any guaranteeing agency, as fiscal
agent in the making of guarantee contracts and in otherwise carrying out
the purposes of section 301 of the Act.
Sec. 303. Purchase Commitments. (a) In order to
carry out the objectives of the Act, and subject to the provisions of section
303 thereof, an agency head is authorized to make provision for purchases
of, or commitments to purchase, an industrial resource or a critical technology
item for government use or resale.
(b) Materials acquired under section 303 of the Act that exceed
the needs of the programs under the Act may be transferred to the National
Defense Stockpile, if such transfer is determined by the Secretary of Defense
as the National Defense Stockpile Manager to be in the public interest.
Sec. 304. Subsidy Payments. In order to ensure the supply
of raw or non-processed materials from high-cost sources, an agency head
is authorized to make subsidy payments, after consultation with the Secretary
of the Treasury and the Director OMB, and subject to the provisions of
section 303© of the Act.
Sec. 305. Determinations and Findings. When carrying
out the authorities in sections 301 through 303 of this order, an agency
head is authorized to make the required determinations, judgments, statements,
certifications, and findings, in consultation with the Secretary of Defense,
Secretary of Energy or Director, FEMA, as appropriate. The agency
head shall provide a copy of the determination, judgment, statement, certification,
or finding to the Director, OMB, to the Director, FEMA, and, when appropriate,
to the Secretary of the Treasury.
Sec. 306. Strategic and Critical Materials. (a)
The Secretary of the Interior, in consultation with the Secretary of Defense
as the National Defense Stockpile Manager and subject to the provisions
of section 303 of the Act, is authorized to encourage the exploration,
development, and mining of critical and strategic materials and other materials.
(b) An agency head is authorized, pursuant to section 303(g) of
the Act, to make provision for the development of substitutes for strategic
and critical materials, critical components, critical technology items,
and other industrial resources to aid the national defense.
(c) An agency head is authorized, pursuant to section
303(a)(1)(B) of the Act, to make provisions to encourage the exploration,
development, and mining of critical and strategic materials and other materials.
Sec. 307. Government-owned Equipment. An agency head
is authorized, pursuant to section 303(e) of the Act, to install additional
equipment, facilities, processes, or improvements to facilities owned by
the government and to install goverment-owned equipment in industrial facilities
owned by private persons.
Sec. 308. Identification of Shortfalls. Except during
periods of national emergency or after a Presidential determination in
accordance with sections 301(e)(1)(D)(ii), 302©(4)(B), or 303(a)(7)(B)
of the Act, no guarantee, loan or other action pursuant to sections 301,
302, and 303 of the Act to correct an industrial shortfall shall be taken
unless the shortfall has been identified in the Budget of the United States
or amendments thereto.
Sec. 309. Defense Production Act Fund Manager. The Secretary
of Defense is designated the Defense Production Act Fund Manager, in accordance
with section 304(f) of the Act, and shall carry out the duties specified
in that section, in consultation with the agency heads having approved
Title III projects and appropriated Title III funds.
Sec. 310. Critical Items List. (a) Pursuant to
section 107(b)(1)(A) of the Act, the Secretary of Defense shall identify
critical components and critical technology items for each item on the
Critical Items List of the Commanders-in-Chief of the Unified and Specified
Commands and other items within the inventory of weapon systems and defense
equipment.
(b) Each agency head shall take appropriate action to ensure that
critical components or critical technology items are available from reliable
sources when needed to meet defense requirements during peacetime, graduated
mobilization, and national emergency. “Appropriate action” may include
restricting contract solicitations to reliable sources, restricting contract
solicitations to domestic sources (pursuant to statutory authority), stockpiling
critical components, and developing substitutes for critical components
or critical technology items.
Sec. 311. Strengthening Domestic Capability. An agency
head, in accordance with section 107(a) of the Act, may utilize the authority
of Title III of the Act or any other provision of law, in consultation
with the Secretary of Defense, to provide appropriate incentives to develop,
maintain, modernize, and expand the productive capacities of domestic sources
for critical components, critical technology items, and industrial resources
essential for the execution of the national security strategy of the United
States.
Sec. 312. Modernization of Equipment. An agency head,
in accordance with section 108(b) of the Act, may utilize the authority
of Title III of the Act to guarantee the purchase or lease of advance manufacturing
equipment and any related services with respect to any such equipment for
purposes of the Act.
PART IV - IMPACT OF OFFSETS
Sec. 401. Offsets. (a) The responsibilities and authority
conferred upon the President by section 309 of the Act with respect to
offsets are delegated to the Secretary of Commerce, who shall function
as the President’s Executive Agent for carrying out this authority.
(b) The Secretary of Commerce shall prepare the annual report required
by section 309(a) of the Act in consultation with the Secretaries of Defense,
Treasury, Labor, State, the United States Trade Representative, the Arms
Control and Disarmament Agency, the Director of Central Intelligence, and
the heads of other departments and agencies as required. The heads
of Federal departments and agencies shall provide the Secretary of Commerce
with such information as may be necessary for the effective performance
of this function.
(c) The offset report shall be subject to the normal interagency
clearance process conducted by the Director, OMB, prior to the report’s
submission by the President to Congress.
PART V - VOLUNTARY AGREEMENTS AND ADVISORY COMMITTEES
Sec. 501. Appointments. The authority of the President
under sections 708© and (d) of the Act is delegated to the heads of
each Federal department or agency, except that, insofar as that authority
relates to section 101 of the Act, it is delegated only to the heads of
each Federal department or agency assigned functions under section 201(a)
of this order. The authority delegated under this section shall be
exercised pursuant to the provisions of section 708 of the Act, and copies
and the status of the use of such delegations shall be furnished to the
Director, FEMA.
Sec. 502. Advisory Committees. The authority of the
President under section 708(d) of the Act and delegated in section 501
of this order (relating to establishment of advisory committees) shall
be exercised only after consultation with, and in accordance with, guidelines
and procedures established by the Administrator of General Services.
PART VI - EMPLOYMENT OF PERSONNEL
Sec. 601. National Defense Executive Reserve. (a) In
accordance with section 710(e) of the Act, there is established in the
Executive Branch a National Defense Executive Reserve (“NDER”) composed
of persons of recognized expertise from various segments of the private
sector and from government (except full-time federal employees) for training
for employment in executive positions in the Federal Government in the
event of an emergency that requires such employment.
(b) The head of any department or agency may establish a unit
of the NDER in the department or agency and train members of that unit.
(c) The head of each department or agency with an NDER unit is authorized
to exercise the President’s authority to employ civilian personnel in accordance
with section 703(a) of the Act when activating all or a part of its NDER
unit. The exercise of this authority shall be subject to the provisions
of subsections 601(d) and (e) of this order and shall not be redelegated.
(d) The head of a department or agency may activate an NDER unit,
in whole or in part, upon the written determination that an emergency affecting
the national security or defense preparedness of the United States exists
and that the activation of the unit is necessary to carry out the emergency
program functions of the department or agency.
(e) At least 72 hours prior to activating the NDER unit, the head
of the department or agency shall notify, in writing, the Assistant to
the President for National Security Affairs of the impending activation
and provide a copy of the determination required under subsection 601(d)
of this order.
(f) The Director, FEMA, shall coordinate the NDER program activities
of departments and agencies in establishing units of the Reserve; provide
for appropriate guidance for recruitment, training, and activation; and
issue necessary rules and guidance in connection with the program.
(g) This order suspends any delegated authority, regulation, or
other requirement or condition with respect to the activation of any NDER
unit, in whole or in part, or appointment of any NDER member that is inconsistent
with the authorities delegated herein, provided that the aforesaid suspension
applies only as long as sections 703(a) and 710(e) of the Act are in effect.
Sec. 602. Consultants. The head of each department or
agency assigned functions under this order is delegated authority
under sections 710(b) and (c) of the Act to employ persons of outstanding
experience and ability without compensation and to employ experts, consultants,
or organizations. The authority delegated by this section shall not
be redelegated.
PART VII - LABOR SUPPLY
Sec. 701. Secretary of Labor. The Secretary of Labor,
identified in this section as the Secretary, shall:
(a) Collect, analyze, and maintain data needed to make a continuing
appraisal of the nation’s labor requirements and the supply of workers
for purposes of national defense. All agencies of the government
shall cooperate with the Secretary in furnishing information necessary
for this purpose, to the extent permitted by law;
(b) In response to requests from the head of a Federal department
or agency engaged in the procurement for national defense, consult with
and advise that department or agency with respect to (1) the effect of
contemplated actions on labor supply and utilization, (2) the relation
of labor supply to materials and facilities requirements, and (3) such
other matters as will assist in making the exercise of priority and allocations
functions consistent with effective utilization and distribution of labor;
(c) Formulate plans, programs, and policies for meeting defense
and essential civilian labor requirements;
(d) Project skill shortages to facilitate meeting defense and essential
civilian needs and establish training programs;
(e) Determine the occupations and skills critical to meeting the
labor requirements of defense and essential civilian activities and, with
the assistance of the Secretary of Defense, the Director of Selective Service,
and such other persons as the Director, FEMA, may designate, develop policies
regulating the induction and deferment of personnel for the armed services,
except for civilian personnel in the reserves; and
(f) Administer an effective labor-management relations policy to
support the activities and programs under this order with the cooperation
of other Federal agencies, including the National Labor Relations Board
and the Federal Mediation and Conciliation Service.
PART VIII - DEFENSE INDUSTRIAL BASE INFORMATION AND REPORTS
Sec. 801. Foreign Acquisition of Companies. The Secretary
of the Treasury, in cooperation with the Department of State, the Department
of Defense, the Department of Commerce, the Department of Energy, the Department
of Agriculture, the Attorney General, and the Director of Central Intelligence,
shall complete and furnish a report to the President and then to Congress
in accordance with the requirements of section 721(k) of the Act concerning
foreign efforts to acquire United States companies involved in research,
development, or production of critical technologies and industrial espionage
activities directed by foreign governments against private U.S. companies.
Sec. 802. Defense Industrial Base Information System.
(a) The Secretary of Defense and the heads of other appropriate
Federal departments and agencies, as determined by the Secretary of Defense,
shall establish an information system on the domestic defense industrial
base in accordance with the requirements of section 722 of the Act.
(b) In establishing the information system required by subsection
(a) of this order, the Secretary of Defense, the Secretary of Commerce,
and the heads of other appropriate Federal departments and agencies, as
determined by the Secretary of Defense in consultation with the Secretary
of Commerce, shall consult with each other for the purposes of performing
the duties listed in section 722(d)(1) of the Act.
(c) The Secretary of Defense shall convene a task force consisting
of the Secretary of Commerce and the Secretary of each military department
and the heads of other appropriate Federal departments and agencies, as
determined by the Secretary of Defense in consultation with the Secretary
of Commerce, to carry out the duties under section 722(d)(2) of the Act.
(d) The Secretary of Defense shall report to Congress on a strategic
plan for developing a cost-effective, comprehensive information system
capable of identifying on a timely, ongoing basis vulnerability in critical
components and critical technology items. The plans shall include
an assessment of the performance and cost-effectiveness of procedures specified
in section 722(b) of the Act.
(e) The Secretary of Commerce, acting through the Bureau of the
Census, shall consult with the Secretary of Defense and the Director, FEMA,
to improve the usefulness of information derived from the Census of Manufacturers
in carrying out section 722 of the Act.
(f) The Secretary of Defense shall perform an analysis of the production
base for not more than two major weapons systems of each military department
in establishing the information system under section 722 of the Act.
Each analysis shall identify the critical components of each system.
(g) The Secretary of Defense, in consultation with the Secretary
of Commerce, and the heads of other Federal departments and agencies as
appropriate, shall issue a biennial report on critical components and technology
in accordance with section 722(e) of the Act.
PART IX - GENERAL PROVISIONS
Sec. 901. Definitions. In addition to the definitions
in section 702 of the Act, the following definitions apply throughout this
order:
(a) “Civil transportation” includes movement of persons and property
by all modes of transportation in interstate, intrastate, or foreign commerce
within the United States, its territories and possessions, and the District
of Columbia, and, without limitation, related public storage and warehousing,
ports, services, equipment and facilities, such as transportation carrier
shop and repair facilities. However, “civil transportation” shall
not include transportation owned or controlled by the Department of Defense,
use of petroleum and gas pipelines, and coal slurry pipelines used only
to supply energy production facilities directly. As applied herein,
“civil transportation” shall include direction, control, and coordination
of civil transportation capacity regardless of ownership.
(b) “Energy” means all forms of energy including petroleum, gas (both
natural and manufactured), electricity, solid fuels (including all forms
of coal, coke, coal chemicals, coal liquification, and coal gasification),
and atomic energy, and the production, conservation, use, control, and
distribution (including pipelines) of all of these forms of energy.
(c) “Farm equipment” means equipment, machinery, and repair parts
manufactured for use on farms in connection with the production or preparation
for market use of food resources.
(d) “Fertilizer” means any product or combination of products that
contain one or more of the elements—nitrogen, phosphorus, and potassium—for
use as a plant nutrient.
(e) “Food resources” means all commodities and products, simple,
mixed, or compound, or complements to such commodities or products, that
are capable of being ingested by either human beings or animals, irrespective
of other uses to which such commodities or products may be put, at all
stages of processing from the raw commodity to the products thereof in
vendible form for human or animal consumption. “Food resources” also
means all starches, sugars, vegetable and animal or marine fats and oils,
cotton, tobacco, wool, mohair, hemp, flax fiber, and naval stores, but
does not mean any such material after it loses its identity as an agricultural
commodity or agricultural product.
(f) “Food resource facilities” means plants, machinery, vehicles
(including on-farm), and other facilities required for the production,
processing, distribution, and storage (including cold storage) of food
resources, livestock and poultry feed and seed, and for the domestic distribution
of farm equipment and fertilizer (excluding transportation thereof).
(g) “Functions” include powers, duties, authority, responsibilities,
and discretion.
(h) “Head of each Federal department or agency engaged in procurement
for the national defense” means the heads of the Departments of Defense,
Energy, and Commerce, as well as those departments and agencies listed
in Executive Order No. 10789.
(i) “Heads of other appropriate Federal departments and agencies”
as used in part VIII of this order means the heads of such other Federal
agencies and departments that acquire information or need information with
respect to making any determination to exercise any authority under the
Act.
(j) “Health resources” means materials, facilities, health supplies,
and equipment (including pharmaceutical, blood collecting and dispensing
supplies, biological, surgical textiles, and emergency surgical instruments
and supplies) required to prevent the impairment of, improve, or restore
the physical and mental health conditions of the population.
(k) “Metals and minerals” means all raw materials of mineral origin
(excluding energy) including their refining, smelting, or processing, but
excluding their fabrication.
(l) “Strategic and Critical Materials” means materials
(including energy) that (1) would be needed to supply the military,
industrial, and essential civilian needs of the United States during a
national security emergency, and (2) are not found or produced in the United
States in sufficient quantities to meet such need and are vulnerable to
the termination or reduction of the availability of the material.
(m) “Water resources” means all usable water, from all sources,
within the jurisdiction of the United States, which can be managed, controlled,
and allocated to meet emergency requirements.
Sec. 902. General. (a) Except as otherwise provided in
subsection 902© of this order, the authorities vested in the President
by title VII of the Act may be exercised and performed by the head of each
department and agency in carrying out the delegated authorities under the
Act and this order.
(b) The authorities which may be exercised and performed pursuant
to subsection 902(a) of this order shall include (1) the power to redelegate
authorities, and to authorize the successive redelegation of authorities,
to departments and agencies, officers, and employees of the government,
and (2) the power of subpoena with respect to authorities delegated in
parts II, III, and IV of this order, provided that the subpoena power shall
be utilized only after the scope and purpose of the investigation, inspection,
or inquiry to which the subpoena relates have been defined either by the
appropriate officer identified in subsection 902(a) of this order or by
such other person or persons as the officer shall designate.
(c) Excluded from the authorities delegated by subsection 902(a)
of this order are authorities delegated by parts V, VI, and VIII of this
order and the authority with respect to fixing compensation under section
703(a) of the Act.
Sec. 903. Authority. All previously issued orders, regulations,
rulings, certificates, directives, and other actions relating to any function
affected by this order shall remain in effect except as they are inconsistent
with this order or are subsequently amended or revoked under proper authority.
Nothing in this order shall affect the validity or force of anything done
under previous delegations or other assignment of authority under the Act.
Sec. 904. Effect on other Orders. (a) The following
are superseded or revoked:
(1) Section 3, Executive Order No. 8248 of September 8,
1939, (4 FR 3864).
(2) Executive Order No. 10222 of March 8, 1951 (16 FR 2247).
(3) Executive Order No. 10480 of August 14, 1953
(18 FR 4939).
(4) Executive Order No. 10647 of November 28, 1955
(20 FR 8769).
(5) Executive Order No. 11179 of September 22, 1964
(29 FR 13239).
(6) Executive Order No. 11355 of May 26, 1967 (32 FR 7803).
(7) Sections 7 and 8, Executive Order No. 11912 of
April 13, 1976 (41 FR 15825, 15826-27).
(8) Section 3, Executive Order No. 12148 of July 20,
1979 (44 FR 43239, 43241).
(9) Executive Order No. 12521 of June 24, 1985
(50 FR 26335).
(10) Executive Order No. 12649 of August 11, 1988
(53 FR 30639).
(11) Executive Order No. 12773 of September 26, 1991
(56 FR 49387), except that part of the order that amends section
604 of Executive Order 10480.
(b) Executive Order No. 10789 of November 14, 1958, is amended by
deleting “and in view of the existing national emergency declared by Proclamation
No. 2914 of December 16, 1950,” as it appears in the first sentence.
(c) Executive Order No. 11790, as amended, relating to the Federal
Energy Administration Act of 1974, is amended by deleting “Executive Order
No. 10480” where it appears in section 4 and substituting this order’s
number.
(d) Subject to subsection 904© of this order, to the extent
that any provision of any prior Executive order is inconsistent with the
provisions of this order, this order shall control and such prior provision
is amended accordingly.
Sec. 905. Judicial Review. This order is not intended
to create any right or benefit, substantive or procedural, enforceable
at law by a party against the United States, its agencies, its officers,
or any person.
WILLIAM J. CLINTON
THE WHITE HOUSE,
June 3, 1994.
Police are sweeping poor, mostly African American neighborhoods, jumping from unmarked vans to stop people caught in infractions like loitering or drinking in public.
They don't charge many of the violators. Instead, they snap offenders' pictures and collect their personal information for placement in the database.
"They were warned," said Sgt. Kyle Rogers, a team leader at the site of a recent "jump out" who identified several violators, as well as one person who was arrested on an outstanding police warrant. "That's the reason why we took their information down and took their photographs."
Since police created the database in June, they have taken more than 600 photos, adding 40 to 50 new ones each week. The idea is to prevent crime by predicting who might commit it, a concept not far from the premise of the recent movie Minority Report. In the film, psychics see into the future and identify who is planning to commit a crime.
Deterring Crime In this real-world attempt at crime-fighting, the jump-out technique is a strong deterrent for criminals and potential criminals because they never know when a van might pull up next to them, police say, and are thus less likely to risk getting caught in an illegal act.
John Rago, director of communications for Wilmington Mayor James
M.
Baker, says reported incidents of serious crime - murder, rape,
burglary, robbery, arson, and drugs - dropped 16 percent in 2001 and is
down another 8 percent in the first six months of 2002. But that
was largely before the photo intelligence system was created. Rago
says the city will have additional statistics in about six months to ascertain
whether the photograph and information files have had an affect on crime.
But absent any hard statistics, does collecting photographs of suspected criminals on neighborhood corners help reduce crime?
"We think it does," Rago said. "We think it makes a person think twice before coming back to that corner to involve themselves in criminal activity in a neighborhood."
Going Too Far?
Critics of the Delaware program are outraged, saying the stops and database take the concept of crime prevention too far.
"Hitler did this stuff, too," said Theopalis Gregory, a city councilman and a former federal prosecutor. "The [stopping of an individual by the police] of itself is unconstitutional. You cannot stop and put your hands on them, give them a command, and then take their photograph - you can't do that."
He adds, "What are they doing? They want to intimidate and harass people to stay out of those neighborhoods."
Still, he and many residents acknowledge the program is working.
"I've said on national television that it's effective and it works,"
Gregory said.
"But we don't justify the constitutionality of something because
it's effective and it works."
Calvin Butler, a resident of one neighborhood targeted for a "jump out," said, "Yeah, I'm seeing a whole lot less crime." Still, like some residents, he worries the practice could degenerate into harassment if not monitored.
Police insist they are not harassing anyone, or targeting anyone illegally.
"The open container, the loitering, the open-air drug sales - that's the stuff that we target," Rogers said. "As far as we're concerned, it's a zero tolerance - so if we see people, we're stopping them."
Gregory says he predicts the practice will be declared unconstitutional
soon in a future court case. He plans to call for oversight hearings
on the system in city council.
Copyright 2002 TechTV, Inc. All rights reserved.
Police have waited nearly three years to begin the collection process because under previous legislation criminals who had served their sentence or were not jailed could refuse to provide a sample.
But under the new act, arrest warrants will be issued if the convicted criminals fail to meet the four-week deadline. Those arrested will be given a second chance to provide a sample.
If the offender again refuses, a specially trained police unit - the cell extraction team - can physically restrain the subject while a nurse takes a blood sample.
Under the new laws, efforts to extract a sample forcibly must be videotaped. All police are banned from forcibly taking mouth swabs.
Those subjected to the orders are people convicted of any of 36 serious offences, including murder, arson, burglary, serious assault, rape and drug offences.
The collected samples will be crosschecked against records of Victorian and national unsolved crimes.
While the new DNA law was passed in May, police have spent the past three months training uniformed officers in the collection procedure and distributing forensic kits to stations.
Those providing a sample will be given a wooden spatula with a cotton bud to scrape the inside of their mouths in the presence of police.
The sample will then be placed on blotting paper in a tamper-proof container and sent to the Victorian Forensic Science Centre.
Head of state intelligence operations, Detective Inspector Doug Cowlishaw, said that "due to the large numbers of orders it will take six months to process the backlog".
Law Institute of Victoria chief executive John Cain said he was disturbed by the police mass mail-out. "I am concerned that 3800 letters will be sent out," he said. "Police may have the power but it would appear that they are being particularly strident at the first opportunity."
Police Minister Andre Haermeyer said the strengthened law would assist police investigations.
"DNA is a revolution in fighting crime," he said. "It stacks the odds against the criminals. It also helps clear people who may have been under suspicion of committing offences."
He said the DNA laws would catch habitual criminals. "About 85 per cent of crime is committed by between 5 and 10 per cent of offenders," he said.
The samples will be tested against the Victorian DNA database of unsolved crimes and then provided to the Federal Government's CrimTrac system.
The federal project is designed to provide a national database of fingerprints, DNA, intervention orders and child sex offenders.
Police have already gathered samples from 3775 prisoners in Victoria's jails and have linked 178 inmates with 431 unsolved crimes including murders, rapes and abductions.
Another 465 matches on the database are being investigated.
There are 5400 samples from crimes and more than 5000 tests from suspects and convicted criminals on the Victorian DNA database computer.
By Clint Parker The Asheville Tribune “We get an administrative search warrant, and then they have to let us in…” A move by two area municipalities to inspect the inside of residents' homes has opened Constitutional questions about how much authority local governments have to enforce zoning and building codes.
The town of Montreat, NC is considering "periodic safety inspections"
of "all homes"
along with a long list of other requirements for residences.
At the same time, the Hickory Daily Record reported, the city of Hickory, NC will soon be sending inspectors to more than 300 homes and businesses with broken windows, ripped awnings, battered fences or other maintenance code violations The inspections come as a result of a land-use plan adopted by Hickory in May 2001 which included the new rules on property maintenance.
City officials in Hickory held off on any immediate crack down on violations to give homeowners a chance to make repairs. A citywide survey began last August using a college student intern from Lenoir-Rhyne College who drove street by street through Hickory and noted potential problems. The survey was completed earlier this month.
Armin Wallner, Hickory's building inspections director, said the ordinance mainly covers the exterior of the home. "If your buffer area died . . . we'd say you’ve got to fix those buffers. Or if your sidewalk was breaking up or if your driveway was breaking up or your fences are looking in disrepair or the outside of your building needs a little paint or you’ve got broken windows, we would be notifying owners of those conditions and asking if they would voluntarily fix those," said Wallner.
While the ordinance deals mainly with outside appearances, Wallner said that they have had the right since the 1960s to inspect the inside of the home if they had a petition that was signed by five neighbors.
"The only time we go in the inside of a house is when we get a petition filed by five residences," said Wallner. According to Wallner, city building inspectors would then inspect the inside of the house in question.
Asked if a warrant was needed by the inspectors to enter the house, Wallner first said, "No. We've been doing that since the 1960s." Asked what would happen if a homeowner refused to allow inspectors into the house without a warrant, Wallner replied, "We get an administrative search warrant. Then they have to let us in, but that never happens."
Wallner used a broken window as an example of the new property maintenance ordinance. "If we see a broken window, we're going send you a letter asking you to fix it."
Fines for violations are $50 per day until the problem is fixed. Wallner added that "at some point" if the problem were not fixed, a violator would have to go in to see a magistrate.
Asked what would happen if a person didn't have the money to fix something such as an elderly woman on a fixed income. "Well, we have neighborhood associations. So we would probably go to the neighborhood association and see if there's any help." Asked what would happen if there were no help available from the association, Wallner said, "Then we would ask then to get in touch with... We would do what we could, but at some point someone's got to fix the broken window."
After a pause, Wallner said, "You'll always have those situations
that are tough, you know, and we realize that too." He then sighed and
said, "Ordinances were made to be followed. They're not all good."
He then immediately corrected himself and said, "I mean they're
not all bad."
In Montreat, the planning and zoning board is conducting three hearings on new regulations the board wants to impose on homeowners. The list of regulations includes:
* Mandating that "every homeowner be required to provide an off-street parking space for every bedroom in the house."
* "...periodic safety inspections of all [privately owned] homes by the Black Mountain Fire Dept., especially those which are rented."
* Requiring all "property owners who rent housing to obtain a rental privilege license from the Town of Montreat, and that provision of such license be worked out..."
* Requiring the use of only natural materials for homes and structures, to include "wood, stone and natural materials."
* Regulating what "proper landscaping" on private property would be; to include what type of bushes, trees and plants are appropriate in a personal flower bed or private garden.
* Using the Land of Sky Regional Council as a resource to help develop "alternatives to paved parking... to minimize storm water run-off."
* Limit the amount of vehicles traveling through the valley "thus decreasing the dangers of air pollution damage to humans, animals and plants."
* Incorporating shuttle buses to run people into Montreat from external parking facilities.
* Regulating noise from automobiles, summer conferences and heating and cooling equipment.
* Obtaining "a minimum of 3,000 acres (to be preserved) in order to provide a large enough un-fragmented preserve to maintain biodiversity and to off diversity of wilderness recreational experiences."
* Conducting a "full inventory of plant and animal species" in Montreat to see if there are any species that would need to be titled as "threatened" or "endangered" within the "Montreat Wilderness" area.
* Placing "platted lots which are adjacent to the Montreat Wilderness boundary, into the Montreat Wilderness, thus adding additional wilderness acreage closer and more accessible."
* Closing any additional hiking trails or hiking shelters within the Montreat Wilderness "in order to protect and preserve the wilderness environment from user impact."
* Requiring any "large groups" holding public events to "provide a plan for traffic control and parking and demonstrate means of implementation to the Town for approval."
Montreat Town Administrator Pam Snypes said she doesn't know exactly
what the zoning board is proposing because she is not involved in the meetings.
"That's not anything I attend, and I'm not sure what their agenda is for
each meeting,"
said Snypes.
Asked who could answer some questions on the new regulations, Snypes told the Tribune to call the Mayor of Montreat, Letta Jean Taylor. Asked if she was on the zoning board, Snypes said, "No." Asked if it would be better to call someone on the zoning board, Snypes replied, "Well, I think first of all, you need to speak, like I said, with the mayor. According to our personnel policy, when it's a media contact it's usually the mayor or the town administrator or the department head who speaks with the media."
The Tribune tried to reach Mayor Taylor, but she did not return our call by deadline.
Anna Cannon, a Montreat resident, has been to one of the meetings and plans to attend the other two. She told the Tribune after hearing the proposals she got up at the first meeting and said, "I don't understand why you all are not outraged at some of those proposals because they're draconian in their nature and they're unconstitutional."
Cannon said the problem the town is trying to fix is not with the homeowners, but with the conferees at Montreat College, "but they want to punish the homeowners... It's the conference that brings in the majority of people."
Cannon said that the town already tries to manage homeowners down to the most minute detail explaining that when she needed to repair the roof on her 100-year-old home the construction company had to obtain a $30 permit from the town and approve the plans for repair. The approval took two weeks. During which time it rained. The rain caused water damage to the inside of her home.
When asked why she had to get approval from the town to fix her roof, Cannon said she was told that the town has to maintain the "character" of the community. However, Cannon explained, the town approved a variance for an Asheville doctor who moved to Montreat and asked for a 2000 square foot addition to the home he bought. "The additions came within inches of the property line," said Cannon.
It seems no town is immune to the micro-management from town and city.
Hendersonville has ordinances requiring that "every habitable room shall have at least one window or skylight facing directly toward to the outdoors," "all exterior openable windows and doors" will have screens, and even that hot water heaters have "a temperature of not less than 120 degrees."
Asheville is noted for its strict zoning regulations, even Hickory's building inspections director Wallner made mention of it in his conversation with the Tribune. Asked if he was envious of the Asheville regulations, Wallner said, "No, too much work."
The Houston Chronicle reports: "At Kroger stores here customers are
getting their groceries without cash, check or credit card. No, they're
not using the five-finger discount.
One finger will do.
They rely on a new little machine called SecureTouch-n-Pay which enables a finger to bring home the bacon and give cash back. In the Bryan-College Station area, Kroger is trying out the new retail point-of-sale system in its three stores.
Shoppers who enroll free of charge to use the finger image machine
-- officially known as a biometric electroonic financial transaction processing
system -- simply walk up to a cashier, say, 'I'm going to pay with my fingerprint'
and voilá. Many customers are initially leery. They
associate fingerprinting with getting hauled to jail -- not picking up
milk.
But once they get over their fears and try it, they like it, said
Sam Powel, co-manager of one of the three Kroger stores in the Bryan-College
Station area.
At first, Powel said, 'it was a Big Brother scenario. But that seems to have died down.' Women in particular appreciate SecureTouch, he said, because they don't have to bring in their purses.
The pilot program began three months ago. The three Bryan-College Station locations are the only Kroger stores in the nation experimenting with SecureTouch. About 10 to 15 people per store sign up each week, a very small percentage of Kroger's customers.
To enroll in the fingerprint identity verification system, customers
show a Kroger representative their driver's license and a credit card,
and have their fingerprints recorded.
Typically their phone number becomes their PIN.
SecureTouch software and hardware were developed by Austin-based Biometric Access Corp. Other companies have created similar fingerprint identity verification technology.
Customer feedback has been 'very positive,' said Gary Huddleston,
Kroger's consumer affairs manager, who noted that the company is still
evaluating the program. If it is deemed successful, he said, it may
one day be implemented in Houston and other cities…"
“Applied Digital Solutions, Inc., an advanced digital technology development company, announced today that it has developed a miniaturized, implantable identification chip -- called VeriChip(TM) -- that can be used in a variety of medical, security and emergency applications.
VeriChip is an implantable, 12mm by 2.1mm radio frequency device
about the size of the point of a typical ballpoint pen. Each VeriChip
will contain a unique identification number and other critical data.
Utilizing an external scanner, radio frequency energy passes through the
skin energizing the dormant VeriChip, which then emits a radio frequency
signal transmitting the identification number and other data contained
in the VeriChip. The scanner will display the identification number,
but the VeriChip data can also be transmitted, via telephone or the Internet,
to an FDA compliant, secure data-storage site. It will then be accessible
by authorized personnel. Inserting the VeriChip device is a simple
procedure performed in an outpatient, office setting. It requires
only local anesthesia, a tiny incision and perhaps a small adhesive bandage.
Sutures are not necessary..."
New DNA testing law raises privacy issues By MARY FLOOD Copyright 2001 Houston Chronicle
Sexual offense suspects in Texas will soon be the first in the nation forced to give DNA samples to authorities before they are convicted and without a court order.
Some law enforcement officials are giddy with the prospect of catching sexual offenders in more cases by retrieving genetic material from a greater pool of suspects and comparing it to DNA found at other crime scenes.
But criminal defense lawyers and even conservative jurists are alarmed by what may be serious constitutional problems with the new law.
Police now have to show probable cause and get a warrant to extract a suspect's DNA.
The new law would make the collection of a mouth swabs a routine event once someone suspected of certain sexual offenses or burglaries with a prior conviction is arrested, or suspects in such crimes without a record are indicted.
This statute, sponsored by Austin legislators and championed by the Austin Police Department, passed through the Legislature this year without much fanfare. But it is guaranteed to create extensive legal battles once it takes effect Feb. 2.
"It's Orwellian. It infringes on the assumption of innocence,"
Houston criminal defense lawyer Stanley Schneider said. He
expects a constitutional challenge soon after police start following the
new law.
Great Britain collects DNA from suspects, and in the United States, Louisiana has passed such a law but never fully implemented it because of funding problems.
The law requires that mouth swabs be taken and tested for a DNA profile, something like a sophisticated fingerprint, that will be entered into a national database.
"It's very important to try to find a way to stop the cycle of sexual assault," said state Rep. Ann Kitchen, D-Austin, who co-sponsored the bill with state Sen. Gonzalo Barrientos, also an Austin Democrat.
"I'm a pretty strong privacy advocate, too. I think we struck
a good balance. There's a cost to every kind of law enforcement,"
Kitchen said.
The DNA sample will be taken upon arrest for people accused of one of a series of sex offenses who also have a prior conviction or deferred adjudication for sex-related crimes or for burglary of a home.
The DNA sample will be taken after grand jury indictment for people accused of one of the sexual offenses but who have no sex-related prior convictions.
The sexual offenses targeted include sexual assault, possession of child pornography and aggravated kidnapping with intent to sexually assault.
"Every city has the same plague of a serial rapist at some time or another," said Mark Gillespie, director of forensic science at the Austin Police Department and a strong backer of the pre-conviction testing. "If we test only those convicted, we solve some cold cases but we don't go as far as we'd like to go."
Only sexual offenses were targeted in this bill in part because citizens already tolerate fewer civil rights for these criminals, who already must register with local law enforcement upon conviction, and because there is often more DNA evidence in sex cases.
Gillespie said burglary is included in the targeted crimes because statistics show burglars often graduate to sexual crimes.
The Texas law allows someone exonerated by dismissal or acquittal to seek a court order to have the DNA sample, the resulting DNA file and their entry in the national database destroyed.
There is no penalty in this law if police fail to do so. It is a felony for police to misuse the DNA sample, however.
The law was toned down from an original version that would have required blood samples from people arrested for a broader list of felonies.
But even Harris County state District Judge Ted Poe, a Republican jurist with a decidedly conservative reputation, said he finds the law troublesome.
It may conflict, he said, with constitutional guarantees of the presumption of innocence and due process in searches and seizures.
"We have to be careful in our zeal to convict and bring sex offenders to justice that we don't stuff the Constitution down an abandoned oil well in West Texas," Poe said.
Keith Hampton, legislative director for the Texas Criminal Defense Lawyers Association, said it is not yet clear how the government could use a person's genetic information.
"It was hard to make arguments against this bill, because you sounded
like Chicken Little saying the sky was falling and looked like you didn't
care about rape victims and opposed womanhood,"
Hampton said.
He said he is concerned with the lack of time limits on the government holding this information and that innocent people wind up in a national database.
"I predict that prosecutors in the future will make the argument that presence in a database could be the basis of probable cause to detain and arrest someone," Hampton said.
The Texas Department of Public Safety is charged in the law with collecting and testing the DNA samples.
The DPS also can give local police agencies a list of approved labs where samples can be tested at the cost of the local police if they want speedier service.
BUENOS AIRES, Argentina - Saddled with massive debt and widespread tax cheating, Argentina is about to go where no other modern nation has gone: It is trying to eliminate cash from its economy.
After a run on banks Friday by Argentines fearing a currency devaluation,
Economy Minister Domingo Cavallo responded over the weekend with harsh
measures that froze most bank accounts and made it a crime for Argentines
to enter or leave the country with more than $1,000.
But the most far-reaching step was a requirement that Argentines
get bank debit cards to transact most of their business, even small business
such as buying a newspaper or a bunch of flowers.
The plastic cards have two purposes.
They should prevent future runs on banks by making it impossible to hoard cash. And, by creating a paper trail of business transactions, they make it much more difficult for Argentines to cheat on sales, business and income taxes.
In just a few days shock has given way to anger and resignation as crisis-weary citizens scramble to get the new cards.
By Wednesday, banks reported tens of thousands of new accounts.
"It is a trampling on our liberties. The government has gone too far promoting the benefits of the free market, of supply and demand, of deregulation, and now they are taking it out on the poorest and the weakest," complained Federico Winter, 48, a businessman. "I feel my civic rights, my private rights, have been violated."
On Tuesday, a federal judge ruled the new banking restrictions illegal. The government will appeal.
Argentina announced late Tuesday a package of measures to widen the tax net even more. Employers who hired illegal immigrants or workers they did not claim on taxes, for example, are to be forgiven. That could catch an estimated 4 million people working in Argentina's informal economy, where taxes are not collected and wages are never reported.
Consumers aren't the only ones adjusting. Because cash transactions are discouraged, small businesses are scrambling to rent debit card processing machines and complain they cost up to $100 a month. They also fear that older Argentines are afraid of technology and will simply spend less rather than buy with debit cards.
"Our politicians, especially Cavallo and company, apply First World policies. But this is not the First World, it is the Third World and then some," said Pedro Jaworksy, a neighborhood grocer in Buenos Aires.
Argentina's most immediate challenge is securing an additional $1.3 billion this month from the International Monetary Fund so it can exchange short-term debt for long-term instruments.
Copyright 2001, The Arizona Republic. All rights reserved.
In the aftermath of the tragic September 11 attacks on our nation, many organizations and levels of government are developing plans to address future threats, particularly biological and chemical attacks against our public health.
It has come to ALEC’s attention that The Centers for Disease Control and Prevention (CDC), in conjunction with the CDC-funded Center for Law and the Public Health, has drafted model legislation to provide a framework for addressing future attacks. This model legislation, on which CDC collaborated with the National Conference of State Legislatures (NCSL), the National Governors Association (NGA), the National Association of Attorneys General (NAAG), the Association of State and Territorial Health Officials, and the National Association of City and County Health Offices, has a number of provisions which raise some concern. Below is a brief synopsis of the Model State Emergency Health Powers Act (MEHPA)
Synopsis of the Model State Emergency Health Powers Act (MEHPA):
Grants governors broad authority to declare a state of emergency given an occurrence or imminent threat of an illness or health condition caused by bioterrrorism, epidemic, or biological toxins Allows public health officials, among others, broad, unfettered access to personal health information without patient consent Requires pharmacists and physicians to report “unusual” health patterns, including personal information about persons exhibiting “unusual” patterns Grants public health officials broad quarantine powers and allows public health officials to require medical examinations or vaccinations, under penalty of committing a misdemeanor offense Allows public health officials to seize and control personal property and access to communications, and to engage in any necessary rationing, quota-setting, or price-fixing Grants governors exclusive power over the expenditure of funds appropriated for emergencies Requires the development of a comprehensive plan to coordinate attack response
ALEC Concerns about the MEHPA:
1. Strips individuals and families of their rights and liberties
at the expense of government
2. Represents unnecessary and duplicative legislation given existing
state natural disaster statutes
3. Provides a number of potential legal loopholes for trial lawyers
to extort
4. Grants overly sweeping takings rights to the government Fails
to consider individual state needs
5. Consolidates broad power to Public Health Officials, most of
whom are unelected Erects barriers to states’ ability to respond, slowing
down response times
6. Utilizes vague language to define key concepts, including when
an emergency can be declared
7. Grants additional, duplicative due process rights for quarantined
persons
8. Allows public health authorities to ration drugs and other items,
but does not specify the manner in which these items would be rationed
9. Ignores potential costs, both dollar and human.
Please contact Sandy Bourne at (202) 466-3800 ext. 245 or Jennifer King at (202) 466-3800 ext. 229 for additional information.
The White House Virtual Library
Executive Orders
NATIONAL DEFENSE INDUSTRIAL RESOURCES PREPAREDNESS
THE WHITE HOUSE
Office of the Press Secretary
For Immediate Release
June 6, 1994
EXECUTIVE ORDER
#12919
NATIONAL DEFENSE INDUSTRIAL RESOURCES PREPAREDNESS
By the authority vested in me as President by the Constitution and
the laws of the United States of America, including the Defense Production
Act of 1950, as amended (64 Stat. 798; 50 U.S.C. App. 2061, et seq.),
and section 301 of title 3, United States Code, and as Commander in Chief
of the Armed Forces of the United States, it is hereby ordered as follows:
PART I - PURPOSE, POLICY AND IMPLEMENTATION
Section 101. Purpose. This order delegates authorities
and addresses national defense industrial resource policies and programs
under the Defense Production Act of 1950, as amended (“the Act”), except
for the amendments to Title III of the Act in the Energy Security Act of
1980 and telecommunication authorities under Executive Order No. 12472.
Sec. 102. Policy. The United States must have an industrial
and technology base capable of meeting national defense requirements, and
capable of contributing to the technological superiority of its defense
equipment in peacetime and in times of national emergency. The domestic
industrial and technological base is the foundation for national defense
preparedness. The authorities provided in the Act shall be used to
strengthen this base and to ensure it is capable of responding to all threats
to the national security of the United States.
Sec. 103. General Functions. Federal departments and
agencies responsible for defense acquisition (or for industrial resources
needed to support defense acquisition) shall:
(a) Identify requirements for the full spectrum of national security
emergencies, including military, industrial, and essential civilian demand;
(b) Assess continually the capability of the domestic industrial
and technological base to satisfy requirements in peacetime and times of
national emergency, specifically evaluating the availability of adequate
industrial resource and production sources, including subcontractors and
suppliers, materials, skilled labor, and professional and technical personnel;
(c) Be prepared, in the event of a potential threat to the security
of the United States, to take actions necessary to ensure the availability
of adequate industrial resources and production capability, including services
and critical technology for national defense requirements;
more
(OVER)
2
(d) Improve the efficiency and responsiveness, to defense requirements,
of the domestic industrial base; and
(e) Foster cooperation between the defense and commercial sectors
for research and development and for acquisition of materials, components,
and equipment to enhance industrial base efficiency and responsiveness.
Sec. 104. Implementation. (a)
The National Security Council is the principal forum for consideration
and resolution of national security resource preparedness policy.
(b) The Director, Federal Emergency Management Agency
(“Director, FEMA”) shall:
(1) Serve as an advisor to the National Security Council on issues
of national security resource preparedness and on the use of the authorities
and functions delegated by this order;
(2) Provide for the central coordination of the plans and programs
incident to authorities and functions delegated under this order, and provide
guidance and procedures approved by the Assistant to the President for
National Security Affairs to the Federal departments and agencies under
this order;
(3) Establish procedures, in consultation with Federal departments
and agencies assigned functions under this order, to resolve in a timely
and effective manner conflicts and issues that may arise in implementing
the authorities and functions delegated under this order; and
(4) Report to the President periodically concerning all program
activities conducted pursuant to this order.
(c) The head of every Federal department and agency assigned functions under this order shall ensure that the performance of these functions is consistent with National Security Council policy and guidelines.
PART II - PRIORITIES AND ALLOCATIONS
Sec. 201. Delegations of Priorities and Allocations.
(a) The authority of the President conferred by section 101 of the
Act to require acceptance and priority performance of contracts or orders
(other than contracts of employment) to promote the national defense over
performance of any other contracts or orders, and to allocate materials,
services, and facilities as deemed necessary or appropriate to promote
the national defense, is delegated to the following agency heads:
(1) The Secretary of Agriculture with respect to food resources,
food resource facilities, and the domestic distribution of farm equipment
and commercial fertilizer;
(2) The Secretary of Energy with respect to all forms of energy;
(3) The Secretary of Health and Human Services with respect to health
resources;
(4) The Secretary of Transportation with respect to all forms of
civil transportation;
more
3
(5) The Secretary of Defense with respect to water resources; and
(6) The Secretary of Commerce for all other materials, services,
and facilities, including construction materials.
(b) The Secretary of Commerce, in consultation with the heads of
those departments and agencies specified in subsection 201(a) of this order,
shall administer the Defense Priorities and Allocations System (“DPAS”)
regulations that will be used to implement the authority of the President
conferred by section 101 of the Act as delegated to the Secretary of Commerce
in subsection 201(a)(6) of this order. The Secretary of Commerce
will redelegate to the Secretary of Defense, and the heads of other departments
and agencies as appropriate, authority for the priority rating of contracts
and orders for all materials, services, and facilities needed in support
of programs approved under section 202 of this order. The Secretary
of Commerce shall act as appropriate upon Special Priorities Assistance
requests in a time frame consistent with the urgency of the need at hand.
(c) The Director, FEMA, shall attempt to resolve issues or disagreements
on priorities or allocations between Federal departments or agencies in
a time frame consistent with the urgency of the issue at hand and, if not
resolved, such issues will be referred to the Assistant to the President
for National Security Affairs for final determination.
(d) The head of each Federal department or agency assigned functions
under subsection 201(a) of this order, when necessary, shall make the finding
required under subsection 101(b) of the Act. This finding shall be
submitted for the President’s approval through the Assistant to the President
for National Security Affairs. Upon such approval the head of the
Federal department or agency that made the finding may use the authority
of subsection 101(a) of the Act to control the general distribution of
any material (including applicable services) in the civilian market.
(e) The Assistant to the President for National Security
Affairs is hereby delegated the authority under subsection 101©(3)
of the Act, and will be assisted by the Director, FEMA, in ensuring the
coordinated administration of the Act.
Sec. 202. Determinations. The authority delegated by
section 201 of this order may be used only to support programs that have
been determined in writing as necessary or appropriate to promote the national
defense:
(a) By the Secretary of Defense with respect to military production
and construction, military assistance to foreign nations, stockpiling,
outer space, and directly related activities;
(b) By the Secretary of Energy with respect to energy production
and construction, distribution and use, and directly related activities;
and
(c) By the Director, FEMA, with respect to essential civilian needs
supporting national defense, including civil defense and continuity of
government and directly related activities.
more
(OVER)
4
Sec. 203. Maximizing Domestic Energy Supplies.
The authority of the President to perform the functions provided by subsection
101© of the Act is delegated to the Secretary of Commerce, who shall
redelegate to the Secretary of Energy the authority to make the findings
described in subsection 101©(2)(A) that the materials (including equipment),
services, and facilities are critical and essential. The Secretary
of Commerce shall make the finding described in subsection 101©(2)(A)
of the Act that the materials (including equipment), services, or facilities
are scarce, and the finding described in subsection 101©(2)(B) that
it is necessary to use the authority provided by subsection 101©(1).
Sec. 204. Chemical and Biological Warfare. The authority
of the President conferred by subsection 104(b) of the Act is delegated
to the Secretary of Defense. This authority may not be further delegated
by the Secretary.
PART III - EXPANSION OF PRODUCTIVE CAPACITY AND
SUPPLY
Sec. 301. (a) Financing Institution Guarantees.
To expedite or expand production and deliveries or services under government
contracts for the procurement of industrial resources or critical technology
items essential to the national defense, the head of each Federal department
or agency engaged in procurement for the national defense (referred to
as “agency head” in this part) and the President and Chairman of the Export-Import
Bank of the United States (in cases involving capacity expansion, technological
development, or production in foreign countries) are authorized to guarantee
in whole or in part any public or private financing institution, subject
to provisions of section 301 of the Act. Guarantees shall be made
in consultation with the Department of the Treasury as to the terms and
conditions thereof. The Director of the Office of Management and
Budget (“OMB”) shall be informed when such guarantees are to be made.
(b) Direct Loan Guarantees. To expedite or expand production
and deliveries or services under government contracts for the procurement
of industrial resources or critical technology items essential to the national
defense, each agency head is authorized to make direct loan guarantees
from funds appropriated to their agency for Title III.
(c) Fiscal Agent. Each Federal Reserve Bank is designated
and authorized to act, on behalf of any guaranteeing agency, as fiscal
agent in the making of guarantee contracts and in otherwise carrying out
the purposes of section 301 of the Act.
(d) Regulations. The Board of Governors of the Federal
Reserve System is authorized, after consultation with heads of guaranteeing
departments and agencies, the Secretary of the Treasury, and the Director,
OMB, to prescribe regulations governing procedures, forms, rates of interest,
and fees for such guarantee contracts.
Sec. 302. Loans. (a) To expedite production and
deliveries or services to aid in carrying out government contracts for
the procurement of industrial resources or a critical technology item for
the national defense, an agency head is authorized, subject to the provisions
of section 302 of the Act, to submit to the Secretary of the Treasury or
the President and Chairman of the Export-Import Bank of the United States
(in cases involving capacity expansion, technological development, or production
in foreign countries) applications for loans.
more
5
(b) To expedite or expand production and deliveries or services
under government contracts for the procurement of industrial resources
or critical technology items essential to the national defense, each agency
head may make direct loans from funds appropriated to their agency for
Title III.
(c) After receiving a loan application and determining that financial
assistance is not otherwise available on reasonable terms, the Secretary
of the Treasury or the President and Chairman of the Export-Import Bank
of the United States (in cases involving capacity expansion, technological
development, or production in foreign countries) may make loans, subject
to provisions of section 302 of the Act.
Sec. 303. Purchase Commitments. (a) In order to
carry out the objectives of the Act, and subject to the provisions of section
303 thereof, an agency head is authorized to make provision for purchases
of, or commitments to purchase, an industrial resource or a critical technology
item for government use or resale.
(b) Materials acquired under section 303 of the Act that exceed
the needs of the programs under the Act may be transferred to the National
Defense Stockpile, if such transfer is determined by the Secretary of Defense
as the National Defense Stockpile Manager to be in the public interest.
Sec. 304. Subsidy Payments. In order to ensure the supply
of raw or non-processed materials from high-cost sources, an agency head
is authorized to make subsidy payments, after consultation with the Secretary
of the Treasury and the Director OMB, and subject to the provisions of
section 303© of the Act.
Sec. 305. Determinations and Findings. When carrying
out the authorities in sections 301 through 303 of this order, an agency
head is authorized to make the required determinations, judgments, statements,
certifications, and findings, in consultation with the Secretary of Defense,
Secretary of Energy or Director, FEMA, as appropriate. The agency
head shall provide a copy of the determination, judgment, statement, certification,
or finding to the Director, OMB, to the Director, FEMA, and, when appropriate,
to the Secretary of the Treasury.
Sec. 306. Strategic and Critical Materials. (a)
The Secretary of the Interior, in consultation with the Secretary of Defense
as the National Defense Stockpile Manager and subject to the provisions
of section 303 of the Act, is authorized to encourage the exploration,
development, and mining of critical and strategic materials and other materials.
(b) An agency head is authorized, pursuant to section 303(g) of
the Act, to make provision for the development of substitutes for strategic
and critical materials, critical components, critical technology items,
and other industrial resources to aid the national defense.
(c) An agency head is authorized, pursuant to section
303(a)(1)(B) of the Act, to make provisions to encourage the exploration,
development, and mining of critical and strategic materials and other materials.
more
(OVER)
6
Sec. 307. Government-owned Equipment. An agency head
is authorized, pursuant to section 303(e) of the Act, to install additional
equipment, facilities, processes, or improvements to facilities owned by
the government and to install goverment-owned equipment in industrial facilities
owned by private persons.
Sec. 308. Identification of Shortfalls. Except during
periods of national emergency or after a Presidential determination in
accordance with sections 301(e)(1)(D)(ii), 302©(4)(B), or 303(a)(7)(B)
of the Act, no guarantee, loan or other action pursuant to sections 301,
302, and 303 of the Act to correct an industrial shortfall shall be taken
unless the shortfall has been identified in the Budget of the United States
or amendments thereto.
Sec. 309. Defense Production Act Fund Manager. The Secretary
of Defense is designated the Defense Production Act Fund Manager, in accordance
with section 304(f) of the Act, and shall carry out the duties specified
in that section, in consultation with the agency heads having approved
Title III projects and appropriated Title III funds.
Sec. 310. Critical Items List. (a) Pursuant to
section 107(b)(1)(A) of the Act, the Secretary of Defense shall identify
critical components and critical technology items for each item on the
Critical Items List of the Commanders-in-Chief of the Unified and Specified
Commands and other items within the inventory of weapon systems and defense
equipment.
(b) Each agency head shall take appropriate action to ensure that
critical components or critical technology items are available from reliable
sources when needed to meet defense requirements during peacetime, graduated
mobilization, and national emergency. “Appropriate action” may include
restricting contract solicitations to reliable sources, restricting contract
solicitations to domestic sources (pursuant to statutory authority), stockpiling
critical components, and developing substitutes for critical components
or critical technology items.
Sec. 311. Strengthening Domestic Capability. An agency
head, in accordance with section 107(a) of the Act, may utilize the authority
of Title III of the Act or any other provision of law, in consultation
with the Secretary of Defense, to provide appropriate incentives to develop,
maintain, modernize, and expand the productive capacities of domestic sources
for critical components, critical technology items, and industrial resources
essential for the execution of the national security strategy of the United
States.
Sec. 312. Modernization of Equipment. An agency head,
in accordance with section 108(b) of the Act, may utilize the authority
of Title III of the Act to guarantee the purchase or lease of advance manufacturing
equipment and any related services with respect to any such equipment for
purposes of the Act.
PART IV - IMPACT OF OFFSETS
Sec. 401. Offsets. (a) The responsibilities and authority
conferred upon the President by section 309 of the Act with respect to
offsets are delegated to the Secretary of Commerce, who shall function
as the President’s Executive Agent for carrying out this authority.
more
7
(b) The Secretary of Commerce shall prepare the annual report required
by section 309(a) of the Act in consultation with the Secretaries of Defense,
Treasury, Labor, State, the United States Trade Representative, the Arms
Control and Disarmament Agency, the Director of Central Intelligence, and
the heads of other departments and agencies as required. The heads
of Federal departments and agencies shall provide the Secretary of Commerce
with such information as may be necessary for the effective performance
of this function.
(c) The offset report shall be subject to the normal interagency
clearance process conducted by the Director, OMB, prior to the report’s
submission by the President to Congress.
PART V - VOLUNTARY AGREEMENTS AND ADVISORY COMMITTEES
Sec. 501. Appointments. The authority of the President
under sections 708© and (d) of the Act is delegated to the heads of
each Federal department or agency, except that, insofar as that authority
relates to section 101 of the Act, it is delegated only to the heads of
each Federal department or agency assigned functions under section 201(a)
of this order. The authority delegated under this section shall be
exercised pursuant to the provisions of section 708 of the Act, and copies
and the status of the use of such delegations shall be furnished to the
Director, FEMA.
Sec. 502. Advisory Committees. The authority of the
President under section 708(d) of the Act and delegated in section 501
of this order (relating to establishment of advisory committees) shall
be exercised only after consultation with, and in accordance with, guidelines
and procedures established by the Administrator of General Services.
PART VI - EMPLOYMENT OF PERSONNEL
Sec. 601. National Defense Executive Reserve. (a) In
accordance with section 710(e) of the Act, there is established in the
Executive Branch a National Defense Executive Reserve (“NDER”) composed
of persons of recognized expertise from various segments of the private
sector and from government (except full-time federal employees) for training
for employment in executive positions in the Federal Government in the
event of an emergency that requires such employment.
(b) The head of any department or agency may establish a unit
of the NDER in the department or agency and train members of that unit.
(c) The head of each department or agency with an NDER unit is authorized
to exercise the President’s authority to employ civilian personnel in accordance
with section 703(a) of the Act when activating all or a part of its NDER
unit. The exercise of this authority shall be subject to the provisions
of subsections 601(d) and (e) of this order and shall not be redelegated.
(d) The head of a department or agency may activate an NDER unit,
in whole or in part, upon the written determination that an emergency affecting
the national security or defense preparedness of the United States exists
and that the activation of the unit is necessary to carry out the emergency
program functions of the department or agency.
more
(OVER)
8
(e) At least 72 hours prior to activating the NDER unit, the head
of the department or agency shall notify, in writing, the Assistant to
the President for National Security Affairs of the impending activation
and provide a copy of the determination required under subsection 601(d)
of this order.
(f) The Director, FEMA, shall coordinate the NDER program activities
of departments and agencies in establishing units of the Reserve; provide
for appropriate guidance for recruitment, training, and activation; and
issue necessary rules and guidance in connection with the program.
(g) This order suspends any delegated authority, regulation, or
other requirement or condition with respect to the activation of any NDER
unit, in whole or in part, or appointment of any NDER member that is inconsistent
with the authorities delegated herein, provided that the aforesaid suspension
applies only as long as sections 703(a) and 710(e) of the Act are in effect.
Sec. 602. Consultants. The head of each department or
agency assigned functions under this order is delegated authority
under sections 710(b) and (c) of the Act to employ persons of outstanding
experience and ability without compensation and to employ experts, consultants,
or organizations. The authority delegated by this section shall not
be redelegated.
PART VII - LABOR SUPPLY
Sec. 701. Secretary of Labor. The Secretary of Labor,
identified in this section as the Secretary, shall:
(a) Collect, analyze, and maintain data needed to make a continuing
appraisal of the nation’s labor requirements and the supply of workers
for purposes of national defense. All agencies of the government
shall cooperate with the Secretary in furnishing information necessary
for this purpose, to the extent permitted by law;
(b) In response to requests from the head of a Federal department
or agency engaged in the procurement for national defense, consult with
and advise that department or agency with respect to (1) the effect of
contemplated actions on labor supply and utilization, (2) the relation
of labor supply to materials and facilities requirements, and (3) such
other matters as will assist in making the exercise of priority and allocations
functions consistent with effective utilization and distribution of labor;
(c) Formulate plans, programs, and policies for meeting defense
and essential civilian labor requirements;
(d) Project skill shortages to facilitate meeting defense and essential
civilian needs and establish training programs;
(e) Determine the occupations and skills critical to meeting the
labor requirements of defense and essential civilian activities and, with
the assistance of the Secretary of Defense, more
9
the Director of Selective Service, and such other persons as the
Director, FEMA, may designate, develop policies regulating the
induction and deferment of personnel for the armed services,
except for civilian personnel in the reserves; and
(f) Administer an effective labor-management relations policy to
support the activities and programs under this order with the cooperation
of other Federal agencies, including the National Labor Relations Board
and the Federal Mediation and Conciliation Service.
PART VIII - DEFENSE INDUSTRIAL BASE INFORMATION AND REPORTS
Sec. 801. Foreign Acquisition of Companies. The Secretary
of the Treasury, in cooperation with the Department of State, the Department
of Defense, the Department of Commerce, the Department of Energy, the Department
of Agriculture, the Attorney General, and the Director of Central Intelligence,
shall complete and furnish a report to the President and then to Congress
in accordance with the requirements of section 721(k) of the Act concerning
foreign efforts to acquire United States companies involved in research,
development, or production of critical technologies and industrial espionage
activities directed by foreign governments against private U.S. companies.
Sec. 802. Defense Industrial Base Information System.
(a) The Secretary of Defense and the heads of other appropriate
Federal departments and agencies, as determined by the Secretary of Defense,
shall establish an information system on the domestic defense industrial
base in accordance with the requirements of section 722 of the Act.
(b) In establishing the information system required by subsection
(a) of this order, the Secretary of Defense, the Secretary of Commerce,
and the heads of other appropriate Federal departments and agencies, as
determined by the Secretary of Defense in consultation with the Secretary
of Commerce, shall consult with each other for the purposes of performing
the duties listed in section 722(d)(1) of the Act.
(c) The Secretary of Defense shall convene a task force consisting
of the Secretary of Commerce and the Secretary of each military department
and the heads of other appropriate Federal departments and agencies, as
determined by the Secretary of Defense in consultation with the Secretary
of Commerce, to carry out the duties under section 722(d)(2) of the Act.
(d) The Secretary of Defense shall report to Congress on a strategic
plan for developing a cost-effective, comprehensive information system
capable of identifying on a timely, ongoing basis vulnerability in critical
components and critical technology items. The plans shall include
an assessment of the performance and cost-effectiveness of procedures specified
in section 722(b) of the Act.
(e) The Secretary of Commerce, acting through the Bureau of the
Census, shall consult with the Secretary of Defense and the Director, FEMA,
to improve the usefulness of information derived from the Census of Manufacturers
in carrying out section 722 of the Act.
more
(OVER)
10
(f) The Secretary of Defense shall perform an analysis of the production
base for not more than two major weapons systems of each military department
in establishing the information system under section 722 of the Act.
Each analysis shall identify the critical components of each system.
(g) The Secretary of Defense, in consultation with the Secretary
of Commerce, and the heads of other Federal departments and agencies as
appropriate, shall issue a biennial report on critical components and technology
in accordance with section 722(e) of the Act.
PART IX - GENERAL PROVISIONS
Sec. 901. Definitions. In addition to the definitions
in section 702 of the Act, the following definitions apply throughout this
order:
(a) “Civil transportation” includes movement of persons and property
by all modes of transportation in interstate, intrastate, or foreign commerce
within the United States, its territories and possessions, and the District
of Columbia, and, without limitation, related public storage and warehousing,
ports, services, equipment and facilities, such as transportation carrier
shop and repair facilities. However, “civil transportation” shall
not include transportation owned or controlled by the Department of Defense,
use of petroleum and gas pipelines, and coal slurry pipelines used only
to supply energy production facilities directly. As applied herein,
“civil transportation” shall include direction, control, and coordination
of civil transportation capacity regardless of ownership.
(b) “Energy” means all forms of energy including petroleum, gas
(both natural and manufactured), electricity, solid fuels (including all
forms of coal, coke, coal chemicals, coal liquification, and coal gasification),
and atomic energy, and the production, conservation, use, control, and
distribution (including pipelines) of all of these forms of energy.
(c) “Farm equipment” means equipment, machinery, and repair parts
manufactured for use on farms in connection with the production or preparation
for market use of food resources.
(d) “Fertilizer” means any product or combination of products that
contain one or more of the elements—nitrogen, phosphorus, and potassium—for
use as a plant nutrient.
(e) “Food resources” means all commodities and products, simple,
mixed, or compound, or complements to such commodities or products, that
are capable of being ingested by either human beings or animals, irrespective
of other uses to which such commodities or products may be put, at all
stages of processing from the raw commodity to the products thereof in
vendible form for human or animal consumption. “Food resources” also
means all starches, sugars, vegetable and animal or marine fats and oils,
cotton, tobacco, wool, mohair, hemp, flax fiber, and naval stores, but
does not mean any such material after it loses its identity as an agricultural
commodity or agricultural product.
(f) “Food resource facilities” means plants, machinery, vehicles
(including on-farm), and other facilities required for the production,
processing, distribution, and storage (including more
11
cold storage) of food resources, livestock and poultry feed and
seed, and for the domestic distribution of farm equipment and fertilizer
(excluding transportation thereof).
(g) “Functions” include powers, duties, authority, responsibilities,
and discretion.
(h) “Head of each Federal department or agency engaged in procurement
for the national defense” means the heads of the Departments of Defense,
Energy, and Commerce, as well as those departments and agencies listed
in Executive Order No. 10789.
(i) “Heads of other appropriate Federal departments and agencies”
as used in part VIII of this order means the heads of such other Federal
agencies and departments that acquire information or need information with
respect to making any determination to exercise any authority under the
Act.
(j) “Health resources” means materials, facilities, health supplies,
and equipment (including pharmaceutical, blood collecting and dispensing
supplies, biological, surgical textiles, and emergency surgical instruments
and supplies) required to prevent the impairment of, improve, or restore
the physical and mental health conditions of the population.
(k) “Metals and minerals” means all raw materials of mineral origin
(excluding energy) including their refining, smelting, or processing, but
excluding their fabrication.
(l) “Strategic and Critical Materials” means materials
(including energy) that (1) would be needed to supply the military,
industrial, and essential civilian needs of the United States during a
national security emergency, and (2) are not found or produced in the United
States in sufficient quantities to meet such need and are vulnerable to
the termination or reduction of the availability of the material.
(m) “Water resources” means all usable water, from all sources,
within the jurisdiction of the United States, which can be managed, controlled,
and allocated to meet emergency requirements.
Sec. 902. General. (a) Except as otherwise provided in
subsection 902© of this order, the authorities vested in the President
by title VII of the Act may be exercised and performed by the head of each
department and agency in carrying out the delegated authorities under the
Act and this order.
(b) The authorities which may be exercised and performed pursuant
to subsection 902(a) of this order shall include (1) the power to redelegate
authorities, and to authorize the successive redelegation of authorities,
to departments and agencies, officers, and employees of the government,
and (2) the power of subpoena with respect to authorities delegated in
parts II, III, and IV of this order, provided that the subpoena power shall
be utilized only after the scope and purpose of the investigation, inspection,
or inquiry to which the subpoena relates have been defined either by the
appropriate officer identified in subsection 902(a) of this order or by
such other person or persons as the officer shall designate.
more
(OVER)
12
(c) Excluded from the authorities delegated by subsection
902(a) of this order are authorities delegated by parts V, VI, and
VIII of this order and the authority with respect to fixing compensation
under section 703(a) of the Act.
Sec. 903. Authority. All previously issued orders, regulations,
rulings, certificates, directives, and other actions relating to any function
affected by this order shall remain in effect except as they are inconsistent
with this order or are subsequently amended or revoked under proper authority.
Nothing in this order shall affect the validity or force of anything done
under previous delegations or other assignment of authority under the Act.
Sec. 904. Effect on other Orders. (a) The following
are superseded or revoked:
(1) Section 3, Executive Order No. 8248 of September 8,
1939, (4 FR 3864).
(2) Executive Order No. 10222 of March 8, 1951 (16 FR 2247).
(3) Executive Order No. 10480 of August 14, 1953
(18 FR 4939).
(4) Executive Order No. 10647 of November 28, 1955
(20 FR 8769).
(5) Executive Order No. 11179 of September 22, 1964
(29 FR 13239).
(6) Executive Order No. 11355 of May 26, 1967 (32 FR 7803).
(7) Sections 7 and 8, Executive Order No. 11912 of
April 13, 1976 (41 FR 15825, 15826-27).
(8) Section 3, Executive Order No. 12148 of July 20,
1979 (44 FR 43239, 43241).
(9) Executive Order No. 12521 of June 24, 1985
(50 FR 26335).
(10) Executive Order No. 12649 of August 11, 1988
(53 FR 30639).
(11) Executive Order No. 12773 of September 26, 1991
(56 FR 49387), except that part of the order that amends section
604 of Executive Order 10480.
(b) Executive Order No. 10789 of November 14, 1958, is amended by
deleting “and in view of the existing national emergency declared by Proclamation
No. 2914 of December 16, 1950,” as it appears in the first sentence.
(c) Executive Order No. 11790, as amended, relating to the Federal
Energy Administration Act of 1974, is amended by deleting “Executive Order
No. 10480” where it appears in section 4 and substituting this order’s
number.
more
13
(d) Subject to subsection 904© of this order, to the extent
that any provision of any prior Executive order is inconsistent with the
provisions of this order, this order shall control and such prior provision
is amended accordingly.
Sec. 905. Judicial Review. This order is not intended
to create any right or benefit, substantive or procedural, enforceable
at law by a party against the United States, its agencies, its officers,
or any person.
WILLIAM J. CLINTON
THE WHITE HOUSE,
June 3, 1994.
# # #
Are we to remain a nation convenient to our politicians? Are
we to remain a nation that, according to Bob Dole is "The Land of the Provincial
and Home of the Naïve…Thank God"?
In the rush for political expediency, the first two things that
are always sacrificed are the hard-won rights and liberties of the people
and any notion of fiscal accountability by their government.
It's official. Tom Ridge has been sworn in as the director
of the Office of Homeland Security, as of October 8, 2001. In his
acceptance speech, he said, "Although some sacrifices will have to be made,
the essential freedoms of the American people will be protected." And this
is a very sinister message. What he's saying is that there obviously
will be "sacrifices" in the civil rights of the people. And then
he's saying the "essential"
civil rights of the people will be maintained. But who determines
what the word "essential" means? Who determines what "rights" are
essential? Certainly the people are not going to determine that.
And Ridge didn't say who it was who would be doing the determining.
Then Bush spoke for a few more minutes and said that who would be doing
the determining would be the "Supreme National Security Council." It will
exist above the Homeland Security Directorate, and will be chaired by George
Bush, various cabinet members and "certain others who have had long-term
political allegiances to my father."
What they're saying is that since this is a super-agency, which is immune from congressional oversight or judicial review, there has to be some regulatory body above it. That will make this Council extra-legal, extra-constitutional, extra-judicial, and extra-legislative. And it's even extra-executive. Bush then is essentially assuming supreme power as Chairman of the Supreme National Security Council.
It's becoming clear how extraordinary the authority that this new agency, the Office of Homeland Security, along with its little brother, the Office of Cyberspace Security, really has. It means that this agency's authority effectively guts the Whistleblower Act of 1986 and the subsequent Whistleblower Protection Act of 1991.
Government whistleblowers are no longer afforded the same measure of protection that they were before. Whistleblowers could actually go into court and request federal protection from US Marshals. They can't do that anymore.
Also the creation of this agency with its vast new powers effectively guts the Freedom of Information Act. Since this agency is operating under essentially National Security law, as amended 1949-1950, and not regular Title Code 18 law, it can classify all of its operations and documents. It would be immune from any public request for information. Virtually all its budget is classified. It does not have to submit any public accounting for the money it spends - not even to the General Accounting Office. This is part of the power it will have as a super extra-legal extra-constitutional body. The only submission to GAO that is required will be total receipts and total expenditures -- what all agencies have to give the GAO even under classified spending, but they don't have to break that spending down at all.
Furthermore (they are preparing the public for this), Bush knows there will be many Supreme Court challenges when we are past this "first blush of patriotism." When the American people have taken off their rose-colored glasses and only have their normal blinders on, there will be many proceedings in the Supreme Court over the authority being given this agency. That's why Bush is saying that this ruling council, this Supreme National Security Council, has decided that its only judicial accountability will be with the National Security Court in Washington DC, a court which the administration controls.
What does this do? It not only suspends habeas corpus, but it does so on a virtually unlimited basis. Even during the Civil War, when Lincoln suspended habeas corpus, there were still some rules. For example, you could not hold somebody for more than 90 days without charge. With this new agency, not only do they act ex post facto vis-a-vis habeas corpus, but there aren't any limits being imposed. They could literally detain people for years - for as long as they wanted. There is no limitation. When people talk about the suspension of habeas corpus, they talk about when Lincoln did it during the Civil War, or when Franklin Roosevelt did it on a limited basis during the Second World War.
Ridge has already said that they have the authority to hold people indefinitely. In wartime suspension of habeas corpus, there are still rules. This is not a simple suspension of habeas corpus, but it is in effect an elimination of it. The power is granted to the Office of Homeland Security by default because it is immune from judicial review.
Likewise, there is a complete suspension of Fourth Amendment privilege
of unwarranted search and seizure. For the first time ever, a US
agency is given the power to seize assets without judicial proceeding or
review. In other words, the people whose assets are seized have no
recourse. They are being given no recourses under the law.
This agency doesn't have to claim anything. Since they are
immune from judicial review, they don't even have to come up with a reason.
All they have to say is that, "pursuant to the security of the State, we
believe these assets may be used by those who would represent a threat
to the security of the State or the domestic tranquility of the people."
Technically the assets of any person or news agency which would attempt to disseminate the truth to the people could be seized --- since under the National Security Act, the truth about government operations can be withheld from the people if the dissemination of said truths is deemed to be injurious to the security of the State or the domestic tranquility of the people.
In other words, if you don't tell the truth to the people, their tranquility will be assured.
Detainees or targets of the new State Security bureau (Office of
Homeland Security)
will no longer have the right of Fifth Amendment protection against
self-incrimination.
In other words, they can be compelled to talk by "any means necessary," i.e., torture, interrogation, etc. Section 409C of the National Security Act, pursuant to the political and state security acts thereunto, states that a person whom the government believes is involved in an act contrary to the security of the State can be compelled by whatever measures necessary to reveal information.
Furthermore this State Security agency will be given the old FBI
power under the
1942 Seditious Publication Act. This power, formally given
to the FBI in the past, was done away with in 1972, when J. Edgar
Hoover died -- because he so abused this power.
The power of this Act will be given to this new State Security.
It will give this agency the ability to label publications as "seditious"
and to prevent their publication and transmission thereunto by both print
and electronic means.
Previously there was the United States Title Code Statutes 792/793,
otherwise known as the "Sedition Acts of 1798," which came right after
the Logan Amendments of 1794.
Since the times of George Washington, "sedition acts" have not been
used. And now we are talking about the revival of the Seditious Publication
Acts of 1942, which I find particularly sinister, because it gives our
new super State Security agency the power to label publications seditious
to prevent their transmission and to prevent their printing.
That means they can be prevented from being mailed or being disseminated
electronically or otherwise, a power which will undoubtedly be used by
the new Office of Cyber Space Security. In fact, even the truth regarding
government activities or operation can be deemed seditious and its dissemination
to the public prevented.
In the past, when the government went on a tear to deny the people's rights, even Life Magazine from 1968 to 1972 was formally declared a "seditious publication" by the FBI because of its photo expose' of the horrors of Vietnam. They were showing a lot of dead and twisted American bodies. The FBI considered this "anti-patriotic" and "seditious" because it was fomenting unrest and thus aiding those who didn't want to see US involvement in the war.
So far there has been absolutely no congressional or judicial opposition
to this.
Public opinion polls state that the American people are willing
to sacrifice whatever is necessary in the so-called "New War Against Terrorism."
Of course, what they're not saying is that the Bush Administration very
craftily says to the people that we need this power to detain terrorists,
to freeze assets of terrorists, and to hold terrorists ex post facto of
habeas corpus. What they're not seeing is that in the actual authorization
bills, obviously the word "terrorist" is not used. The word "suspect"
or "detainee" is used. Of course, it's very doubtful that all suspects
or detainees will be limited to those who wear turbans. A "suspect"
or a "detainee" can mean anything.
This means that there will be unlimited and virtually unfettered electronic surveillance and eavesdropping. This will include the unfettered ability to surveil on American people and to intercept communications. The only lip service paid to this is that finally George Bush made the comment that " we will not diminish the hard-won rights and liberties of the American people" which, of course is precisely what he is setting about doing.
If all bills and measures currently proposed pass, the financial cost to the American people (an increase in federal spending) will be $343 billion over the next three-year period. The airline bailout measure. Increases in direct foreign grants. Increase in rescheduling Russian debt again. Enormous increases in domestic building programs.
And where is the money coming from? There are no "surpluses." The "surpluses" are gone. All of this money will be 100% deficit financed and because the Bush Administration has abandoned its traditional strong dollar policy, this will build a powerful inflationary whammy into our economy. We will feel the effects of this down the road.
These two measures - a massive increase in deficit financing along with abandoning a strong dollar policy, which contains inflation - will produce a huge inflationary wallop in a few years.
There are many appropriation bills now in Congress, and everybody is tacking on something because this is pork-barrel heaven. Because the public doesn't care, everybody in Congress and their brother is tacking on an extra $10 million for some little pet project.
Note the foolishness of the liberal Democrats, who, in an effort to get brownie points in the "first blush of patriotism," are jumping on the band wagon of restricting Americans' civil liberties - a la Senator John Kerry's bill for interstate transportation security. If that bill passes, we will, for the very first time in this country, have interstate checkpoints for public transportation. We didn't even have that during the war.
There may be many a "conspiracy theorist" that has been a lone voice in the wilderness who may be vindicated. Although it has not been announced yet, a further diminishment of Americans' rights to keep and bear arms is certainly coming. The Bush Administration hasn't gone that far yet because it would virtually be a killer for them to say that now. As long as Bush has an 80% approval rating and as long as 80% of the American people approve these so-called "security" measures, Bush, who has a large gun-owning constituency, will be able to get away with it - further restrictions on civilian ownership of firearms.
There's something called the "Old 80-80." If you're a president of the United States and you have an 80% approval rating, and you have initiated a policy under a crisis (even if it is your administration which has maintained the level of fear) that has an 80% approval rating, then you can propose legislation that is directly contrary to the belief of your constituency and yet it won't hurt you politically - or it won't hurt you enough to make any difference when you run for reelection.
A historical precedent was the time when Nixon imposed wage and price controls in 1971. Nixon's constituency, primarily the wealthy, Big Business, and major corporations, were vehemently opposed to price controls, yet he imposed them anyway under the "fight to contain the collapse of the American dollar" after he closed the gold window. Then they came up with the policy of dramatically increasing the price of crude oil and the US dollar just fell out of bed. The 1971 dollar crisis reached its peak when the French central bank refused to accept US dollars. If you create enough of a crisis situation, even the people who will be hurt by a change in the law will support it.
Now we need to ask -- do we want to travel down the "Canadian Road"? Are we so certain we want to support National Identification Cards? Are we so certain that, like our Canadian cousins, we are prepared to become a homogenized, pasteurized, wimpified, and neuterized society?
Do we want to become like Canada, the original home of sado-masochism, where the clarion call of the neutered and impotent Canadian people to their government is -- "Whip me. Beat me. Tax me some more. Because I just love paying five dollars for a package of cigarettes, or $68 for a $28 bottle of Canadian Club whiskey. And while you're at it -- take away my right to own a firearm"?
If we, as the quintessential American couch potatoes with our rose-colored glasses, eyes glazed over from hour after hour of mind-numbing sitcoms, whose only awareness of the news comes from compressed sound bites and encapsulated print bullets, succumb to this, then we will most certainly find ourselves robbed of our hard won rights and liberties.
All of the legislation proposed since September 12 -- if it is to pass -- will constitute the largest transfer of the rights and liberties of the American people back to the government in the history of the Republic.
What of all the wars that we have fought -- the millions of us who have shed our blood to maintain our rights and liberties as American citizens?
What do we say - that these sacrifices were in vain?
For that is precisely what we will be saying -- if we continue to keep our heads stuck in the sand and say nothing in this hour of when our rights and liberties are in the greatest peril… AL MARTIN is America's foremost whistleblower on government fraud and corruption.
A retired US Navy Lt. Commander and former officer in the Office
of Naval Intelligence, he has testified before Congress (the Kerry Committee
and the Alexander Committee) regarding Iran-Contra. Al Martin is
the author of "The Conspirators: Secrets of an Iran Contra Insider" (2001,
National Liberty Press, $19.95; Toll FREE order line:
1-866-317-1390) He lives at an undisclosed location, since the criminals
named in his book have been returned to national power and prominence.
His column "Behind the Scenes in the Beltway" is published regularly on
Al Martin Raw: Criminal Govt Conspiracy (http://www.almartinraw.com/)
Congressman signs on to sue government Rep. Ron Paul joins
physicians in suit over privacy regulations
--------------------------------------------------------------------------------
By Jon Dougherty © 2001 WorldNetDaily.com
A Republican congressman has joined a respected physicians group in a lawsuit against the Department of Health and Human Resources for issuing regulations plaintiffs say violate constitutional privacy protections.
"Rep. Ron Paul, R-Texas, has joined the Association of American Physicians and Surgeons as a plaintiff in a lawsuit filed today in Houston against HHS and Secretary Tommy Thompson to overturn new federal medical privacy regulations as unconstitutional," said Kathryn Serkes, a spokeswoman for the AAPS.
The libertarian-minded Paul – a surgeon by profession – has long opposed the HHS regulations because they allegedly open up a patient's medical records to unreasonable invasions of privacy by government and private entities.
"Far from protecting privacy, these rules give government officials and certain private interests a new federal right to access medical records without consent," Paul said in a statement released by the organization.
"AAPS deserves the gratitude of every American for fighting to stop these regulations, and I am pleased to support their efforts," he added.
In its suit, the organization claims the rules – written under the authority of the Health Insurance Portability and Accountability Act of 1996, or HIPPA – violate the First, Fourth and 10th Amendments to the U.S. Constitution, as well as the Paperwork Reduction and Regulatory Flexibility Acts.
The agency's privacy regulations "expressly reiterate the traditional expectation of privacy by patients in their medical records," said the complaint. But they also "simultaneously allow government virtually unrestricted access to those same records without a warrant."
Furthermore, the suit claims that HHS failed to promulgate the final regulations within the time period specified under HIPAA.
The lawsuit seeks declaratory judgments that the regulations:
Violate the Fourth Amendment by requiring physicians to allow government access to personal medical records without a warrant or patient consent, and authorizing the government construction of a centralized database of personal medical records with personal health identifiers;
Violate the First Amendment to the extent they chill patient-physician communications "by requiring them to be subject to warrantless review by government";
Violate the Tenth Amendment to the extent they govern purely intrastate activities by physicians in using and maintaining medical records for patients;
Violate HIPAA and lack statutory authorization to the extent they regulate medical records other than electronic transmissions, were not promulgated within the time period expressly required by Congress, and increase administrative costs.
The suit also describes how the regulations violate a number of state laws and constitutional protections that "grant a specific right to privacy."
"Law enforcement agencies will have unrestricted access to all records – including notes about drug use, family interactions and other confessions. But it gets even worse," said the statement. "Not only can doctors be fined or imprisoned – up to $50,000 and one year – for withholding records, patients can be denied treatment if they refuse to sign the consent form."
"We've tried everything else. We've appealed to Congress; we've testified at HHS; we've generated tens of thousands of public comments and frozen up the HHS e-mail server with public response. None of it has done any good," said the group's executive director, Dr. Jane Orient, in explaining why AAPS resorted to a lawsuit.
"We had nothing left to do short of leaving our patients to the mercy of government spies or resorting to civil disobedience by refusing to violate our ethical code and our patients' privacy, or file a lawsuit. We choose to work through the courts," she added.
Joining in the suit are Dawn Richardson, Rebecca Rex and Darrell McCormick.
Richardson, a patient from Austin, Texas, is president of a group known as Parents Requesting Open Vaccine Education, or PROVE, a non-profit association. Rex is a patient from Houston, Texas, and is vice president of PROVE. McCormick is a patient who resides in Gainesville, Fla., and a former billing manager for about 500 physicians at the Shands Healthcare System at the University of Florida, also in Gainesville.
Serkes said even Paul was showing signs of desperation.
"Sometimes, even a member of Congress has to sue the government to get anything done," she said.
She added that some analysts have said they believe the suit may succeed.
"They say the Tenth Amendment issue is probably the strongest," she told WND.
AAPS is a non-partisan association of physicians in all specialties. Established in 1943, the group says it exists "to protect the sanctity of the patient-physician relationship from third-party intrusion" and accepts no "government grants or contracts."
"Our organization doesn't extort our member physicians to the tune
of tens of millions of dollars a year in membership fees," Serkes said,
"so we don't do lawsuits for the 'public relations' benefit of it.
The leadership just didn't feel there was any other choice."
If this is not teaching are children to be passive model inmates, then you're all nuts and belong in prison yourself!!!
The new faces in schools may be armed officers
Many are "resource officers" - peacekeepers who may also counsel or coach students.
By Amy Worden INQUIRER STAFF WRITER MECHANICSBURG, Pa. - When Pennsylvania schools open this fall, a growing number will have armed officers present.
The William Penn school board in Delaware County this week became the latest to react to fears of school violence following the 1999 Columbine shootings, voting to put armed officers at some schools because of rampant problems.
Other districts have turned to "resource officers,"
the term for a relatively new position that has surged in popularity nationwide
since the school shootings of the late 1990s.
The resource officers are local police officers
who are expected to become part of the school community. They serve
as informal counselors, coaches, advisers to the administration, and liaisons
to local police departments. They are armed but do not carry weapons
at all times, for instance, when they are coaching a game.
Since its inception in 1997, Pennsylvania's school resource-officer program has grown to include 120 state-certified officers in middle schools and high schools. A recent state survey showed a majority of students, teachers and parents believe having officers in schools deters violence and creates a better learning environment.
"The idea of putting an officer in the school was never punitive, and perhaps for that reason it has become well-accepted by. . . parents, teachers and students," Upper Chichester Police Chief William Robinson said.
He said his district's program has been so successful that a second officer is being added. Cheltenham is also adding a second resource officer, and at least seven other area districts - Abington, Coatesville Area, Pottstown, MMarple Newtown, Bristol Township, East Brandywine and Bensalem - have such officers.
Other school districts hire independent security agents who work solely as guards. There are no armed officers in Philadelphia city schools. A spokesman said yesterday that there were no plans to implement such a policy. Security personnel in city schools do not carry guns, and there are metal detectors at entrances.
Armed officers also are appearing in more New Jersey schools - and outside of their traditional use in urban areas, said Maria Nuccetelli, acting assistant commissioner of field services for the New Jersey Department of Education.
"[Using police officers] is more widespread and prevalent today than it was five years ago," Nuccetelli said. "The violence in our society has spilled over into our schools, and it is the responsibility of the school district, state Board of Education, and the administration to provide a healthy and safe environment."
Violent incidents have led districts such as William Penn to station officers at schools merely to patrol, rather than act as resource officers.
"There is a vast difference between armed security
patrol and what we do in terms of school resource officers," said Curtis
Lavarello, executive director of the National Association of School Resource
Officers, which has almost 8,000 members, up from
5,000 in 1998. "They are part of the
faculty. It is the best example of a community-policing initiative
I can think of. It's not a cookie-cutter approach to school violence."
This week, three dozen police officers were in this Cumberland County town to undergo training on how to recognize child abuse, understand adolescent emotional issues, and counsel students.
David Sparango, 30, who will become Cheltenham's second school resource officer, was among those attending.
He said he was looking forward to "breaking down barriers" between young people and police. "This position is so much more than a physical deterrent."
Some resource-officer positions are funded through a federal community-policing program. Others are paid for through local school and police budgets.
A recent survey conducted by the Pennsylvania Commission on Crime and Delinquency at six school districts, including Bensalem and Abington, during the 1999-2000 school year found a majority of parents, teachers and students believed the level of violence had decreased since the appointment of a school resource officer. Most students and teachers reported feeling safer in schools, and most teachers said having an officer in the school improved the learning environment.
Denise Conrey, whose daughter, Lisa, 14, will be a sophomore at Harry S Truman High School in Bristol Township, said the school resource officer makes students more comfortable.
"The mere presence . . .
reminds [students] that there is law and order in the school,"
she said.
Officer Joe Goralczyk of the Baltimore County (Md.) Police Department, a school resource officer and program instructor, told the new officers yesterday that they cannot underestimate their impact on young people, especially those who may be troubled.
"You have an incredible amount of influence on these lives," he told the group. "The student thinks, 'Officer Dave sat down and talked to me. I can turn to him. I know he cares.' "
Tuesday, May 1, 2001
Forcing doctors to ask kids about guns
Pending bill requires pediatricians to query
patients on state program
By Julie Foster
© 2001 WorldNetDaily.com
The high cost of a controversial bill in the
California State Senate that would require pediatricians, in thousands
of health screenings per year, to question
kids on family gun ownership landed the measure yesterday in what is
euphemistically called the "bone yard" of
the state legislature, giving it one more hurdle to clear before heading
to
the full Senate.
Californians balked last year when Assemblyman
Darrell Steinberg, D-Sacramento, proposed a substantially
similar bill to Senate Bill 765 by Sen. Wesley
Chesbro, D-Santa Rosa. Sent to the "suspense file" in the Senate
Appropriations Committee yesterday, SB 765
resurrects a concept eventually removed from the vetoed Steinberg
bill -- codification of the American Academy
of Pediatrics publication "Recommendations for preventive pediatric
health care." That report specifically includes
recommendations made in the AAP's 1999 publication, "The Role of
the Pediatrician in Youth Violence Prevention
in Clinical Practice," which outlines measures to be taken by
pediatricians in violence prevention, including
advocacy of gun-control proposals.
Since the bill incurs an estimated annual cost
of $8.6 million, it was automatically sent to the suspense file, as are
all bills proposing costs of $150,000 or more.
According to the AAP, the violence-prevention
publication "establishes an agenda for making this a routine part
of pediatric practice in four major areas:
clinical services, community advocacy, research and education. This
broad agenda builds on a still-evolving body
of knowledge, but the urgency of youth violence prevention requires
further and immediate action by pediatricians."
"Because many pediatricians encounter children
and youth who are experiencing or are at risk for violence,
pediatricians are well situated to intervene,"
states the document. "Prevention of youth violence requires that
pediatricians recognize violence-related risk
factors and diagnose and treat violence-related problems at all stages
of child development."
Among the screening criteria listed in the report to identify "risk factors for violence among their patients" are:
"family stresses that
could lead to violence (e.g., unemployment, divorce or death);
appropriate supervision
and care and support systems (e.g., child care arrangements, the family
and
social network);
disciplinary attitudes
and practices of the parents or caregivers (particularly about corporal
punishment and physical/emotional
abuse);
exposure to violence
in the home (domestic violence or child abuse), school or community;
degree of exposure
to media violence;
access to firearms
(especially handguns) in their or a neighbor's home, or the community."
The Chesbro bill is intended to allay the concerns
of the federal Health Care Financing Administration, according
to the assemblyman's staff. Currently, some
participants in the state's health-care program, Medi-Cal, are treated
according to the AAP guidelines, but others
are not. The agency sent a letter saying treatment for Medi-Cal
beneficiaries should be the same across the
board. Such a change would result in 248,000 more health screens for
children ages 0-12, and 17,000 more for children
ages 13-20, who use the state's low-income health-care program,
staff said.
While acknowledging the importance of health
care and safety for children, a public-policy group believes the bill
sets a "dangerous precedent." SB 765 requires
the AAP recommendations to be used when setting state
health-care standards and that those standards
"shall be updated as necessary to be consistent with any changes
made by the American Academy of Pediatrics."
"It asks state legislators to abdicate their
right to set state policy," said Karen Holgate of Capitol Resource Institute.
According to the bill, the AAP recommendations
would be included only after review by the state board that
approves the health standards.
"While the [violence-prevention recommendations]
may be legitimate areas of concern, one wonders about the
appropriateness of requiring all pediatricians
to grill their patients about their homes and families without due
cause," Holgate continued.
The AAP report begins by stating, "Each child
and family is unique; therefore, these Recommendations for
Preventive Pediatric Health Care are designed
for the care of children who are receiving competent parenting,
have no manifestations of any important health
problems, and are growing and developing in satisfactory
fashion. Additional visits may become necessary
if circumstances suggest variations from normal."
Consistent with its health-screening requirements
referred to by the Chesbro bill, the AAP also includes a
sweeping gun-control proposal in its list
of model legislation. Titled the "Protection of Children from Handguns
Act," one measure states that, "except in
the hands of law enforcement officers or others specifically authorized
by law, handguns serve no legitimate or lawful
purpose, and constitute a hazard to the public health and welfare
of the people, and especially of the children,
of this State. [O]nly the prohibition of the manufacture, sale, and
possession of handguns will remove handguns
from the homes and streets of this State, thereby reducing the risks
of injury and death to children from handguns."
The proposal would impose felony criminal penalties
amounting up to $10,000 and/or two years in prison for
manufacturing handguns and up to $2,500 and/or
two years in prison for people who "enter into commerce,
ship, transport, transfer, sell, sell at a
gunshow, lease, or distribute" handguns. Possession of a handgun would
qualify as a misdemeanor and result in up
to a $1,000 fine and/or one year in prison for each offense.
Like its predecessor, SB 765 is expected to
be approved by the Senate and will likely move from the
Appropriations Committee to the full Senate
in late May.
Calif. Court Upholds Strict Forfeiture Law Cops Can Keep Vehicles Without Suspect's Conviction Oct. 19, 2000 By Randy Dotinga OAKLAND, Calif. (APBnews.com)
The state's highest court has upheld a city law that allows police to seize and sell the cars of suspected drug buyers and solicitors of prostitution, even if they have not been convicted.
An association of defense lawyers and the American Civil Liberties Union fought the Oakland ordinance, saying it violates state law.
The city leaders of Oakland, which is notorious for its high crime rate, approved the car forfeiture law in 1997. The ordinance goes further than California state law, which allows police to seize cars only after a suspect has been convicted.
Cars put on trial Oakland's law also gives police the right to seize a car even if its owner was unaware that it was used for criminal activity.
"We don't look necessarily at the intent" of the owner, said Pelayo Llamas, a deputy city attorney.
If a suspect is acquitted, he or she can challenge the seizure in court, Llamas said. Prosecutors must prove that the vehicle was used in the commission of a crime, essentially putting the car on trial.
A judge makes the final decision as to whether the cars should be returned to their owners.
Public complained The city created the law after residents complained about drug buys and prostitution in their neighborhoods, Llamas said. Police evoke the law only about a dozen times a year. So far this year, the law has been used only three or four times, he said.
"It depends on complaints or requests we get from various communities or blocks when traffic is really picking up," he said. "We inform the police, and they do something about it. It's not a regular income stream or anything that we depend on."
The money from the sale of cars is divided between the police department and the city attorney's office, he said.
Other cities interested Critics challenged the law on the grounds that it conflicts with state law. But an appeals court disagreed, and the California Supreme Court on Wednesday upheld the lower court's ruling without comment.
Representatives for the ACLU and California Attorneys for Criminal Justice, which challenged the ordinance, could not immediately be reached for comment.
Llamas said he has heard from about a dozen other California cities that are considering new car-forfeiture laws of their own.
Randy Dotinga is an APBnews.com West Coast correspondent (randy.dotinga@apbnews.com).
The CBO proposal seeks the data, which is currently kept strictly confidential under federal law, in order to make long-term projections about the viability of the Social Security and Medicare programs. The initiative is being opposed and publicized by Rep. Carolyn Maloney (D-NY), who has accused the CBO of trying to sneak its proposal through the complex appropriations process currently ongoing as Congress rushes toward adjournment.
In a letter sent to leaders of the House Appropriations Committee on October 11, Rep. Maloney said that "changing the law that protects the confidentiality of census data in the middle of the 2000 Census, behind closed doors and with no public debate, sends the wrong signal to the American public." She cited widespread privacy concerns that were expressed earlier this year after the Census Bureau's long-form questionnaire sought answers to a number of intrusive personal questions (see EPIC Alert 7.06).
The attempted disclosure is also opposed by Commerce Secretary Norman Mineta, who told Congressional leaders that the proposal would weaken "the most important legal structure protecting the privacy and confidentiality of all Americans, with regard to the private information they provide the Census Bureau." Saying that he is "adamantly opposed" to the proposal, Mineta noted that CBO's initiative "would threaten public confidence in the confidentiality of all information collected by the Census Bureau and other data collecting agencies."
According to a coalition of consumer and privacy groups, another last-minute amendment could detrimentally affect personal privacy. Sen. Judd Gregg (R-NH) has attached his Social Security number proposal, S. 2554, to the Commerce-Justice-State Appropriations Bill. The amendment would not effectively increase protections over Social Security numbers, but would pre-empt the ability of states to provide stronger protections on their own.
A letter from consumer and privacy groups opposing the amendment to the Commerce-Justice-State appropriations bill is available at:
http://www.pirg.org/consumer/greggssn.htm
EUROPEAN UNION EXPANDS ITS INFLUENCE ON LIFE
IN EUROPE
August 8, 2000
The Washington Post reported: “...the bureaucrats of the European Union, the super-national entity that from its Brussels headquarters… is changing the daily lives of millions of the continent's inhabitants. As the EU matures and the 15 member governments expand its authority, Europeans from Stockholm to Udine…have been surprised and at times upset to find its officials nosing into what they can eat, how they travel, even how they incinerate their trash. Founded more than four decades ago to foster trade and build cooperation between historic enemies, the EU has increasingly become a force for social regulation. It is now trying to find the common ground in its 15 societies and develop rules for behavior that cross ethnic and national boundaries...”
Feds Want To Probe Mails for Drugs
Associated Press Online - May 26, 2000 16:00
By JANELLE CARTER
Associated Press Writer
WASHINGTON (AP) - With drug traffickers becoming more savvy in the
use of the post office to smuggle drugs, the U.S. Customs Service is asking
Congress for permission to search mail leaving the United States.
The proposal, included in a crime bill in the House, has hit opposition
from the U.S. Postal Service which believes such mail is protected by the
Fourth Amendment’s provisions against unlawful searches and seizures.
Lawmakers heard from both sides Friday at a hearing of a House government
reform subcommittee.
“For over two centuries, the American public has had an expectation
of privacy in their mail,” Kenneth Newman, the Postal Service’s deputy
chief inspector for criminal investigations, said in explaining the agency’s
views.
The Supreme Court, Newman said, has stated that “when considering
Fourth Amendment protections against warrantless searches, mail is in a
special category of effects and is entitled to the same protection accorded
a person’s home.”
“This requires probable cause and a federal search warrant to seize
and open mail,” Newman said.
Customs officials said the authority is necessary to help curb an
increase in the use of mail as a way to smuggle drugs. Private industry
companies, such as United Parcel Service and FedEx, already allow Customs
to search mail leaving the United States, authorities said.
“Drug traffickers and money launderers are not stupid,” said Betsy Durant, director of trade operations for the U.S. Customs Service. “They know we do not search outbound mail now.”
“We believe what is necessary is express authority from Congress,”
Durant said.
Searching is not a problem in the private mail industry, Durant
said. “We have tighter controls over the express consignment industry,”
he said. “The cooperation with the private
Barr pleads the Fourth Representative fights proposed search-and-seizure provisions By Patrick Poole © 2000 WorldNetDaily.com Members of Congress are expressing outrage after Department of Justice and FBI lobbyists tucked an unseen provision into an anti-drug bill that expands their power to conduct "black bag" jobs, allowing them to enter homes, conduct searches and seize certain items without telling anyone.
Congressional critics and civil liberty advocates are charging that the measure, part of the Methamphetamine Anti-Proliferation Act ( HR 2987, S. 486), would be in direct violation of the Fourth Amendment.
The bill, which was approved by the Senate on Nov. 19 by unanimous consent, is scheduled to be considered by the full House Judiciary Committee this morning. One committee member, Rep. Bob Barr, R-Ga., told WorldNetDaily that he intends to offer an amendment to remove the offending sections of the bill.
According to Barr, even though the changes would come from an anti-drug bill, the provisions in question would apply to virtually any search conducted by the federal government.
"This isn't dealing with just drug investigations; it changes the section in the U.S. Code that deals with federal warrant notice and inventory requirements," he said. "That's the primary reason I object to it, because it affects all criminal law."
Current law requires federal agents to announce their presence before entering a premise and to provide an inventory of confiscated items at the time that they are seized. But buried at the end of the "Defeat Meth Act" lies Section 6, entitled "Notice Clarification," which would allow searches of homes, vehicles and workplaces without any notice. The provision would also allow federal law enforcement officials to make copies of "intangible" items, such as computer drives and financial documents, for future examination without ever informing the person subject to the search that the items had been seized.
Another section of the bill would relieve agents from giving property owners subject to the secret searches an inventory of seized items -- leaving citizens completely blind to the government's actions.
"This bill would gut the Fourth Amendment, because how can a person challenge a warrant if they never find out about it until after the harm has been done?" questioned David Kopel, research director for the Independence Institute and a leading constitutional scholar.
Barr said he became aware of the bill's provisions late last week and began to contact other congressional members to organize an effort to strip out the offending portions when the bill comes before the Judiciary Committee for mark-up today. His efforts face an uphill battle because Rep. Chris Cannon, R-Utah, the bill's House sponsor, and Sen. Orrin Hatch, R-Utah, the chairman of the powerful Senate Judiciary Committee, are defending the provisions as necessary for law enforcement officials to conduct their duties.
He also said that he was surprised to learn that the exact same provisions were included in a bankruptcy reform bill, HR 833, that passed both houses earlier this year and is currently being considered by a conference committee.
"We're talking with the conference committee members to get it removed from the bankruptcy bill. They met on Thursday evening and discussed it," he said. "We're remaining hopeful, but nothing has been finalized yet."
Barr, a former federal prosecutor, also sharply criticized the Justice Department and FBI for burying the far-reaching measures in an unrelated bill.
"This is typical behavior from the DOJ and the FBI on these types of issues. Rather than having a fair and open hearing where members can weigh the proposal on its merits, they go to one of their allies in either house and have it slipped in a bill," he said. "That's certainly not the way to conduct business when you're dealing with people's civil liberties."
Kopel echoed those sentiments, saying that the FBI has difficulty trying to pass liberty-eroding legislation.
"They're sneaking it into a bill because they know it can't stand the scrutiny of public inquiry," said Kopel. "They understand the American public would not be happy if they found out that their civil liberties are under assault from the very people charged with defending the Constitution."
This is not the first time that the Justice Department has resorted to covert tactics to implement unpopular measures. In the last few hours of the 1994 session, for instance, Congress enacted the Communications Assistance for Law Enforcement Act, which required telephone firms to configure their equipment to make it easier to wiretap the nation's communication systems. The law passed over strong opposition from civil liberties organizations after the FBI promised telephone companies $500 million to help pay for the equipment upgrades.
The FBI used a similar tactic in the last days of the 1998 session, when it was able to drop roving wiretap language into the Intelligence Authorization Act of 1999, authorizing law enforcement agencies to tap telephones used by or near targeted individuals rather than requiring authorization to tap specific phones.
The insertion, made by Rep. Bill McCollum, R-Fla., happened during a conference committee after both houses had already voted on the bill, despite the fact that the very same measure had been rejected by both houses when it was offered as an amendment to the 1996 Anti-Terrorism bill.
Despite these setbacks, Kopel remains hopeful, yet cautious, as he sees an increasing awareness by citizens of the attacks on their constitutional rights.
"The defenders of civil liberties are more numerous and energetic than ever before, with the ability to reach out in broad coalitions across the conservative-liberal spectrum," he said, noting that the ACLU had joined in the fight against the "Defeat Met Act" provisions.
"If a man's home is his castle, this secret search provision is a tunnel under the moat," said Marv Johnson, legislative counsel for the ACLU's Washington, D.C., office.
Last week the ACLU and the National Association of Criminal Defense Attorneys sent a joint letter to members of the House Judiciary Committee requesting that the secret search provision be removed from the bill.
"It's a good thing that we're starting to see this groundswell," said Kopel, "because no president since Woodrow Wilson has been so hostile to civil liberties and the Constitution as Bill Clinton
TAKING CASH INTO CUSTODY:
Across U.S., police dodge state seizure laws Related Sites:
• To Protect and Collect: A special report on state seizure laws
By KAREN DILLON - The Kansas City Star Date: 05/20/00 22:15 Police and
highway patrols across the country are evading state laws to improperly
keep millions of dollars in cash and property seized in drug busts and
traffic stops.
Most states don't want law enforcement agencies to profit so easily from such confiscation's -- they see it as a dangerous conflict of interest. For that reason, they have passed laws blocking seized property from going directly back to police, and many states designate seizures to be used for other purposes, such as education.
But a yearlong examination by The Kansas City Star reveals that police agencies in every one of more than two dozen states checked by the newspaper have used federal law enforcement to circumvent their own laws and keep most of that money for themselves.
It works this way: When police seize money, they call a federal agency instead of going to state court to confiscate it. An agency such as the Drug Enforcement Administration accepts the seizure, making it a federal case. The DEA keeps a cut of the money and returns the rest to police. State courts -- and their generally more-restrictive forfeiture laws -- are bypassed altogether.
Law enforcement says that's not illegal and that without the money, police would be handcuffed in fighting crime. But millions of dollars that lawmakers in some states have designated for education, drug treatment programs and other purposes instead end up back in the hands of police.
For example:
A North Carolina State Highway Patrol trooper stopped a driver last year on Interstate 95 for tailgating. A police dog signaled drugs were in the Toyota, where troopers found $105,700 and two grams of marijuana. The driver denied owning either the drugs or the money. The highway patrol gave the money to the DEA, which returned more than $80,000 to the state patrol, even though North Carolina law generally requires sending seized money to education.
In June a Georgia trooper stopped a 1996 Monte Carlo for speeding on I-95. After the driver and passengers gave conflicting stories, the trooper searched the car and found a hidden compartment containing $7,000, which the driver said was from savings.
The patrol turned over the money to the DEA, which in January returned $5,440 to the patrol. Under Georgia law forfeited money should go to the state's general fund.
In 1996, the Missouri Highway Patrol stopped a Volkswagen Golf for speeding, searched it because the occupants seemed suspicious and found $24,000. No drugs were found and no one claimed the money. The patrol gave it to the DEA to be forfeited, the legal term for confiscation.
(The case took a bizarre turn last year when a family that bought the car at auction discovered an additional $82,000 in the gas tank. The DEA took that money, too.)
Missouri law sends forfeiture money to a public school fund.
Beyond the money diverted from public funds, critics are just as troubled by the weakening of a basic American civil liberty -- the Bill of Rights protection against improper search and seizure.
Owners who want to recover seized property usually face a much tougher road in federal court than they would under their own state laws. That continues despite a new federal law passed last month that will place some limits on forfeiture.
The federal hand-offs, critics say, also create an opportunity for police to profit from their own actions. Indeed, they trace an increasing outcry over aggressive or illegal searches by police nationwide back to the profit motive.
"If you think that by conducting an illegal search and seizing people on the highway you can increase the number of times where you can take assets, it is going to become a big motivating force," said Ira Glasser, executive director of the American Civil Liberties Union.
This may be one of those rare issues that elicits protests across the political spectrum -- from the ACLU to the National Rifle Association.
Americans don't realize that forfeitures often occur to "ordinary people who happen to find themselves in a situation in which they are simply suspected of having been somehow involved in criminal activity, whether those suspicions ever prove out or not," said Roger Pilon, a vice president at the Cato Institute, a Libertarian think tank.
"The line between a free society and a police state is usually broached in small steps."
But many police complain that state laws are too restrictive, sometimes preventing them from taking the money that fuels drug operations.
Others readily admit they avoid state laws because they need to use seized money to fight the war on drugs -- their own cities and states may not provide the funding otherwise.
"A lot of state agencies, like the GBI, prefer to work federal cases because we know it will go directly into our asset forfeiture bank," said Mark Jackson, director of legal services for the Georgia Bureau of Investigation.
Some federal officials contend the cases collected by the newspaper prove nothing.
"In a country this big, you can find cases all over the lot," said Jerry McDowell, director of the Justice Department's asset forfeiture and money laundering division. "I don't think police agencies are in the business of profiting."
Besides, he said, it's legal for police to send seizures to federal agencies because most state laws do not specifically prohibit that.
"We certainly don't want to subvert state law, and we don't want states to subvert our law," McDowell said.
But most states do prohibit simply handing off seizures -- their laws give jurisdiction over seizures to state courts, The Star has found.
What that means, say legal experts and judges who have examined the little-known state provisions, is that police cannot simply hand off seizures to federal agents to avoid state requirements. They need a court order first.
One federal court in a Louisiana case even derisively likened the evasion maneuver to a trick football play. The court wrote:
"NFL sportscasters might call the handoff from the Sheriff's Office to the DEA, followed by the lateral back from the DEA to the Sheriff's Office, a `flea-flicker.' "
Safeguard erodes Forfeiture itself is not new -- many colonists fled England in part because the king's law allowed forfeiture, but it followed them to America.
John Hancock, the first signer of the Declaration of Independence, was defended by John Adams when the Crown seized his ship for failure to pay a despised tax on its cargo of Madeira wine.
James Madison, Thomas Jefferson and other founding fathers determined forfeiture would be used only on a limited basis -- to seize foreign ships for failure to pay customs duties, for example.
As a result, the Bill of Rights protects Americans from illegal searches and seizures: No person shall "be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation."
Two hundred years later, much has changed with the advent of the war on drugs.
In passing a 1984 law, Congress thought that if federal and local law enforcement agencies cooperated more closely, they could shut down drug operations by confiscating dealers' money.
Federal agencies would share assets they seized in drug busts with local police who helped them. That would reimburse police for the cost of helping to fight the war on drugs.
"The intent was to permit the feds to share with state and local law enforcement when there were truly federal cases," former U.S. Rep. William J. Hughes, the chief sponsor of the bill and a New Jersey Democrat, said in a recent interview.
But it was up to the Justice Department to write the guidelines to implement the law -- and that's where critics say the intent of the law was twisted.
In addition to addressing joint investigations led by federal agencies, the Justice guidelines created a process called "adoption."
Under adoption, state and local police could give their seizures to the federal government -- even if a federal agency had not been involved.
The Justice Department "turned around and permitted the forfeiture laws to be used basically to circumvent state law," Hughes said.
As a result, private citizens are now more vulnerable to forfeiture because circumvented state laws often provide more protections than federal forfeiture laws.
For example, some state laws protect people from having property forfeited by police unless they're charged with a felony.
But under federal law, authorities don't even need a criminal charge to forfeit property.
In fact, experts estimate that the great majority of forfeitures occur without a criminal charge.
Most state laws require that forfeitures be ordered by a judge. Federal law enforcement has the power to order forfeitures without a judge -- and does in most cases.
And it's costly to contest a federal forfeiture. Defense attorneys estimate it costs at least $10,000, so many won't even accept a case unless the value of the seizure is large.
Although many people whose property is seized are no doubt guilty of a crime, that doesn't mean all are.
Charlotte Carroll, a disabled, 64-year-old Maryland woman, could lose her house because police found a third of an ounce of cocaine and other drugs that some of her children left there.
Under Maryland law, a house usually can't be forfeited without a criminal conviction. Police tapped the federal government to forfeit the three-acre property, which has been in Carroll's family for a century.
"I got sick, so sick in my stomach and started crying," Carroll said. "I'm just praying."
Carroll, who has osteoarthritis and receives $500 a month from Social Security disability, has never been convicted of a crime, her attorney said.
"The state can't take her house, so they run to the feds," said the attorney, Stephen F. Allen.
Carroll continues to live in the home while Allen fights the forfeiture.
David Salem, Assistant U.S. Attorney, described the forfeiture as a "hybrid adoption" because federal agents were aware of the police investigation but were not involved in the searches.
Salem also said the forfeiture would be justified because Carroll didn't take enough steps to protect her property, even though she says she evicted her children and changed a lock before proceedings began.
"She claims she changed a lock on a door though I'm unclear which door it is," Salem said. "She claims she took steps that even if I would credit them as true, the government believes them to be insufficient to justify innocent ownership. There was no effect. That didn't keep the children out of the house."
It's no accident that many state laws have tougher forfeiture standards than federal law, legislators say.
"We have tried to make sure that people who are subject to forfeitures have some basic rights," said Georgia Rep. Jim Martin, a Democrat and chairman of the Judiciary Committee.
And some of those protections are erased when police give the money to federal law enforcement.
Using the feds Not all police departments send forfeitures to federal agencies, but many that do candidly acknowledge it.
"Everybody uses the federal system," said Lt. Harry Kearley of the Alabama Bureau of Investigations.
Sometimes, police explain, they believe money they seize is linked to drugs, but they can't prove it under state standards, and they don't want to give the money back to a suspected drug dealer. Federal law lets them take the money out of the owner's hands.
For example, police in Azusa, Calif., used easier federal requirements to take at least one forfeiture worth more than $450,000 to them.
In 1998, an officer stopped a driver for improper use of his turn signal and searched the vehicle when the driver said it didn't belong to him. The officer found $611,500 in a hidden compartment. A dog signaled the presence of drug residue on the cash.
To forfeit the money under state law, police usually need a felony conviction.
But police found no drugs and sent the driver on his way.
Soon after, the department gave the money to a federal agent.
"The reality is there are situations under which California law will not permit forfeiture, and federal law will," said Andy Cuellar, a deputy district attorney in Alameda County, Calif.
"There is very little California can do about it."
An Alaska case shows just how strong federal powers are.
Fairbanks police had seized $44,850 in cash from Perry Johnson after finding cocaine in his home. But charges were dismissed because of an illegal search. Police knew they couldn't keep the money under state law, so they gave it to the DEA for adoption.
The state Supreme Court ruled in 1993 that police had no right under state law to give the money to the DEA. Under federal law, though, police could keep the money, so the city wrote a cashier's check to Johnson for $58,654, which included interest, according to court records.
But the DEA seized that money, too, saying it could be traced to drug transactions. The federal government returned 40 percent to 60 percent to Fairbanks police, a police official said.
High stakes Forfeitures can mean a lot of money for police.
The Justice Department says that from October 1996 through March 1999 it accepted $208,454,000 in seizures from state and local police.
But that figure is still being audited because the Justice Department has not published an annual forfeiture report since 1996, although the law requires the report to be produced each year.
In fact, the $208 million figure is almost certainly low.
Over one period, the Justice Department reported that Missouri police gave federal agencies only half as much as the state auditor found in just a sampling of cases.
Whatever the nationwide total, forfeitures can quickly add up for individual departments.
In 1997 and 1998, the St. Louis Metropolitan Police Department received back more than $2.5 million.
In 1998 alone, the Georgia Bureau of Investigation took back $1.7 million.
(Both those figures include proceeds from joint investigations.)
And in a single case in Indiana, a state trooper stopped a truck for speeding on Interstate 70. Troopers found $811,470 and turned it over to the DEA, which this year returned almost $500,000 to the state police and $121,000 to a sheriff's department that helped.
Indeed, enough is at stake that police work with federal agencies no matter what their state law may be.
For example, police in some states that award forfeiture money to special funds purposefully divert the money so it can end up in their coffers.
Wisconsin law mandates that forfeiture money goes to public schools, but only $16,906 went into Wisconsin's education fund during the year ending in June 1999, according to the state treasury department. During just six months of the same period, local law enforcement gave the federal government $1.5 million in seizures.
In Kentucky, no forfeited money has gone into a substance abuse fund for at least four years, even though some should under state law.
In fact, The Star found that police circumvented their laws even in states that would have given them back much of their seizures had they gone through state court.
Maj. Gale T. Griess of the Nebraska State Patrol said the patrol hands off most seizures to federal agencies so it doesn't have to split the money with education, as state law requires.
In Kansas, police are allowed most of the money back under state law. Nonetheless, the Kansas Highway Patrol admits handing off money to federal agencies.
And surprisingly, even in states such as Alabama that let law enforcement keep all the forfeiture money after costs, police still can be found giving their seizures to federal agencies. The reason: Forfeitures are easier under federal law.
Law enforcement officials say police are justified when they make that choice.
"If they are out enforcing the law and they are seizing property from criminals, and they are doing it in conjunction with the federal government, they are not getting around (state) law, they are helping enforce federal law," said McDowell of the Justice Department.
State roadblocks But The Star found that more than two-thirds of all states appear to prohibit handing off money to federal agencies without permission of a state court.
Those states have requirements that courts have called "turnover orders." Many of the provisions read like the one in Illinois:
"Property taken or detained under this section ... is deemed to be in the custody of the law enforcement department or agency employing the seizing officer subject only to the orders and judgments of the circuit court having jurisdiction over the forfeiture proceedings."
That means only a state judge can transfer a seizure to a federal agency, legal experts say.
"This statute is not difficult at all," said David Harris, a University of Toledo law professor and constitutional expert. "The state court has jurisdiction."
A half-dozen state and federal court decisions have backed that interpretation.
"A local police department may not take seized property and just pass it on as it pleases to the FBI in flagrant disregard of state laws," according to a federal circuit court opinion in an Illinois case.
Gene Zoegtlin, legislative counsel for the International Association of Chiefs of Police, said he was aware of the turnover provisions but was unfamiliar with how they worked. He referred questions to the Justice Department, which did not respond.
But even some prosecutors concede police can't just hand off forfeitures.
Under Alabama law, a court must decide when to transfer seizures to a federal agency, not police, said Yvonne Saxon, Alabama assistant attorney general.
"If you read the statute literally, there is no choice," Saxon said.
When questioned, police offer a number of reasons for not following turnover orders:
They did not know the law existed.
They did not really seize the money -- they were only holding it until a federal agency could officially seize it for forfeiture.
Money seized on an interstate highway may be involved in interstate drug trafficking, and therefore is a federal matter.
Police officers sometimes are not really acting as local police -- they've been deputized to be federal agents, even though they are still paid by local or state governments. And cash becomes federal property when a deputized officer picks it up, they say.
For its part, the DEA says a state case becomes federal if police investigating the case ask a DEA agent to come to the scene of the crime. "That agent can seize the asset on behalf of the DEA and initiate a federal forfeiture proceeding," the DEA wrote in response to questions from The Star.
Critics say such reasoning is legally dubious and seems an attempt to obscure the real issue -- police want the money, and that generally requires evading their state laws.
Indeed, police say they need the money if they are to continue the war on drugs. If they lose forfeiture money, they say, local governments are unlikely to replace it.
For example, Capt. Ruben Davalos, head of the special investigations unit for Albuquerque, N.M., police, pointed out that his unit costs about $1 million a year, of which the city only funds about $250,000.
Joseph McNamara, former San Jose and Kansas City police chief, said city officials can take some of the blame for the federal hand-offs.
He recalls one year in San Jose his department's tentative budget had no money for equipment, so McNamara asked the city manager why.
"He kind of waved his hand dismissively and said, `Well, you guys
seized $4 million last year, I expect you to do better this year,' "
McNamara said.
State law doesn't account for the cost of doing drug investigations, so police are justified in bypassing it, said Missouri Highway Patrol Sgt. Tim Rousset, who heads a task force in southwest Missouri.
"There was once a state law that said black people and white people would go to different schools," Rousset said. "Just because there is a state law doesn't necessarily mean that that state law is correct."
But the end never justifies the means, especially in law enforcement, said Eric Sterling, president of the Criminal Justice Policy Foundation, a Washington think tank.
"When a police officer on patrol understands the chief is saying it's OK for us to keep property that is not ours, the chief is sending a very bright, neonlike message," Sterling said.
"The rules don't matter."
Besides, others say, police who use forfeits to fund themselves end up on a treadmill.
"The real narcotic here is the money," said Glasser of the ACLU. "It becomes a stream of income that they learn not to do without and then they have to generate more of it."
All content © 2000 The Kansas City Star
Wired News reported: “Kids at Philadelphia's George Washington High School don't cut many classes these days. Bar-coded identification cards that monitor who comes into the building each morning and track the classes a student attends are making it pretty difficult to skip out. Students who do it anyway are greeted the next morning at school with the shriek of a siren that alerts the school principal and lets him know who was naughty. The software that works with the cards, called the Comprehensive Attendance Administration and Security System, is manufactured by Laurel, Maryland-based School Technology Management. CAASS works by scanning each student's ID card upon entry to the school, then sends the student's name and picture to the CAASS screen, enabling the staff member to confirm the student's identity. Students who don't have their IDs enter a second area where they are entered in the system manually. George Washington principal Sam Karlin said the program has done wonders for the high school, a middle-class, racially mixed school of 2,750 known for its embrace of technology. Since his school began using the software in October 1999, he says class cutting is down by 75 percent. He used to get a 14-page stack of papers showing up to 3,000 reported cuts, he said. Now he gets a few pages worth of skipped classes by about 80 students. ‘I'm down to my hardcore cutters right now,’ he said. ‘Eighty is a manageable number.’ He said the software has scared most of the kids away from their deviant ways. ‘In the beginning they were sort of chuckling about it. Now they realize we are tracking them through the day. It's much more serious,’ he said...”
Background
----------
As part of its program aimed at assisting state and local law enforcement
agencies with the safe and effective
immobilization of vehicles, NIJ is continuing its evaluation of
electromagnetic technologies. In these Phase
III field tests, NIJ will examine the effectiveness of two electrostatic
discharge devices - the Road Sentry and the
Auto Arrestor - in immobilizing cars moving along a roadway under
their own power.
Federal, state, and local law enforcement personnel are welcome to
observe the testing. Please notify NIJ of your
intention to visit the driver training facility, including the specific
day(s) that you anticipate visiting. NIJ
intends to obtain video and still photo coverage of the test trials,
and will distribute them via the Internet and
video cassette for persons who are unable to visit the test site.
When
----
The dates and hours when visitors may observe test trials and view the test apparatus, will be as follows:
Test Trial 1
Non-Lethal Technologies'
Road Sentry Device
Tuesday, May 23, 12:00-4:00 p.m.
Wednesday, May 24, 8:00-12:00 p.m.
Test Trial 2
JAYCOR's Auto Arrestor Device
Tuesday, June 20, 12:00-4:00 p.m.
Wednesday, June 21, 8:00-12:00 p.m.
Where
-----
Maryland Police and Correctional Driver Training Facility 7310 Slacks Road, Sykesville, MD, 21784
Points of Contact
-----------------
To inquire about these tests, contact Mr. Amon Young, NIJ, at: (202)
514-4338; FAX (202) 307-9907;
younga@ojp.usdoj.gov
To visit the test site and for lodging information in the test site
area, contact Jennifer Telander, NIJ, at: (202)
514-3341; FAX (202) 307-9907; telander@ojp.usdoj.gov
Please refer to the following web page for more information:
http://www.nlectc.org/specialannouncements/esdtesting.html
The London Telegraph reported: "Ministers are to allow insurance companies to use genetic testing to assess a person's risk of inheriting serious illness. People with a genetic tendency to chronic conditions will face significantly higher premiums for medical, life and travel insurance. In the past, ministers have considered banning genetic testing because of fears that it would create an under-class unable to obtain insurance cover. But after a consultation completed last week, the Government is to sanction a series of reliable genetic tests that insurance firms can use. It plans to allow the companies to use single gene tests, which show whether a person with a family history of an illness such as Huntington's disease - jerky, involuntary movements accompanied by progressive dementia - is likely to develop it later in life. Worried consumer and civil liberties groups say that sections of society with serious medical complaints may be left without cover. Anna Bradley, director of the National Consumer Council, said: 'We would be very concerned about measures that could stop people getting insurance.' Dr Evan Harris, Liberal Democrat MP for Oxford West and Abingdon, said that genetic testing should be carried out for medical purposes only. 'By allowing insurers to test for even single gene disorders you are going to get a genetic under-class. There will be enormous public opposition to this. People should not take these tests without adequate counselling.'...'
Children as young as 10 may be fingerprinted if a new bill proposed by the Minister of Police, George Hawkins, becomes law.
The initiative is one of several targeting crimes, which were outlined by the Minister in a speech to Auckland”s Asian community.
Hawkins says youth crime is a growing problem, and he wants to introduce a law later this year, or early next year, which allows the fingerprinting of young people aged 10 years or more.
He says the proposed law would affect those caught breaking the law, and while he accepts the plan will be controversial, its aim is to help young people break the crime cycle.
He says where fingerprinting links a young person with a crime, early intervention programmes will be used to help that person turn his or her life around.
But a member of Children”s Agenda, Maureen Southwick, says it could have the effect of branding children as criminals at a very young age, even if they are not charged with a crime.
And the chairwoman of the Council for Civil Liberties, Margaret Lewis, says such a law would probably breach the Bill of Rights, and might do more harm than good.
Published Saturday, March 04, 2000
Identification device works in a flash
The handheld gadget takes fingerprints and photos, then instantly transmits them for on-the-spot data
Thursday, February 17, 2000
By Maxine Bernstein of The Oregonian staff
Police in several U.S. cities soon may ask drunken driving suspects
not only to touch their fingers to their noses but
also to press their thumbs against a handheld device to determine
their identity and more -- instantly.
Six agencies in Minnesota and Southern California have been awarded federal grant money to become the first in the nation to test the new fingerprinting technology, which will go on sale nationwide in July.
The designers and manufacturers were in Portland this week to demonstrate
it to area agencies considering buying it, including the Portland Police
Bureau, Multnomah County Sheriff's Office, Clackamas County Sheriff's Office,
Gresham Police, Clark County Sheriff's Office and the Federal Protective
Service.
"We're all looking at ways in which we can become more efficient
and effective out on the street," said Capt. Mike
Garvey, who heads the Portland police identification division. "I
don't know if we're going to buy this
fingerprinting system or not, but it looks like something that would
help an officer out in the field."
The terminals, patented by Digital Biometrics Inc., a Minnesota-based
company, can capture fingerprints at the
scene and transmit them to a database. If there is a match, the
system returns the person's name and date of birth
directly to the officer's handheld terminal. Then the officer can
check the person's criminal history and search
for any outstanding warrants.
Transmitting photos, too
The devices also can take photographs and transmit them immediately
to an office computer or to laptops in police
cruisers.
If police are investigating a case of a missing child, for example,
an officer could transmit the child's photo to the
data terminals in other patrol cars aiding in the search.
Other applications include photographing crime-scene evidence, including
latent fingerprints, and recording
witness statements.
Earlier this month, the U.S. Department of Justice's Office of Community Oriented Policing Service, or COPS, awarded a one-year, $1.5 million grant to allow six agencies to test the technology this spring.
"We're hoping this becomes like the cop's portable radio, and officers
say, 'Geez, I can't be without this,' " said
Lt. Bruce Lennox of the Hennepin County Sheriff's Office in Minnesota,
one of the agencies testing the device.
Its manufacturers tout the time it could save police, keeping them
from needlessly transporting suspects to a
police precinct or booking division to fingerprint them.
"That eats up our time," said Darrell Souza of the Federal Protective
Service in Portland, which is responsible for
the security of federal properties. "This would certainly help."
Other agencies interested
Other agencies, such as border patrols and campus and airport security forces, also have expressed interest.
Because the technology has not yet been used, officers don't know
how well suspects will comply with the field
fingerprinting. And the price might be prohibitive for some forces;
the system ranges from $3 million for a small
police department to $8 million for an urban force.
"The whole idea is to just provide information as quickly as possible,
so police can make a good decision at the
scene," said Jim Granger, chief executive officer of Digital Biometrics.
"It's a tool for decision-making."
You can reach Maxine Bernstein at 503-221-8212 or by e-mail
at Maxinebernstein@news.oregonian.com.
QUEENSLAND police will have the power to forcibly take DNA samples from suspects under proposed laws announced by the State Government yesterday.
Under the legislation, to be introduced to parliament this year, the police will be permitted to take a sample from anyone suspected of an indictable offence, all prisoners in Queensland jails and those who volunteer to accept the procedure.
The samples will be taken using mouth swabs, but if consent is not given police can use "reasonable force" to obtain a sample, such as plucking head hair.
Children under 14 would be excluded from the provisions. The initiative is part of the nationwide effort to build a DNA and fingerprint database under the $50 million CrimTrac program.
The Northern Territory has already expanded police DNA sampling powers.
Under current Queensland law, samples can only be taken by a medical practitioner
with the consent of the subject or by order of a magistrate.
Justifying the expansion of police powers, the State Government
cited statistics showing the solving of property crimes in the UK had increased
from 12 per cent to 40 per cent after large-scale DNA sampling was introduced
there five years ago.
Police Minister Tom Barton said police would use the new procedures to target common offences such as car theft and serious crimes like murder and rape. "This will solve old crimes, this will solve crimes in a way that will be unprecedented," Mr Barton said yesterday.
But Queensland Council for Civil Liberties vice-president Terry O'Gorman
said the legislation was draconian.
"To give police the power to swab mouths simply because a police
officer asserts someone might be a suspect is a huge leap in police power
with significant diminished safeguards," he said.
But Mr Barton said the increase in police powers would be accompanied
by the necessary safeguards.
DNA samples and profiles would be destroyed if the person was acquitted
or their case was dropped, and the permission of a commissioned police
officer would be needed if a sample was to be taken without consent, he
said.
"The only people who have anything to fear from the use of DNA technology
are the guilty," he said.
By Richard Willing, USA TODAY
WASHINGTON - Great Britain's national DNA database, the world's largest crime-solving computer system, has mistakenly matched an innocent man to a burglary - a one-in-37 million possibility that American experts call "mind-blowing."
The mismatch, thought to be the first major mistake produced by a national DNA database, has sent shock waves through law enforcement communities not only in Great Britain but also in the United States, where DNA databases are based on the British model.
British authorities fear that the error might prompt thousands of people convicted through DNA testing to appeal their convictions.
U.S. officials say similar mismatches could occur here as DNA testing of convicts becomes more widespread. "This is mind-blowing," says the FBI's Stephen Niezgoda, manager of the American national database program. "Everyone will be watching to see how this plays out."
The mistaken identification was disclosed by British authorities last month during a meeting with members of the National Commission on the Future of DNA Evidence, the Justice Department's DNA task force.
Notes of the meeting were examined by USA TODAY and confirmed by Britain's Forensic Science Service, which maintains that nation's DNA database.
Last year, police in the British city of Manchester lifted DNA, an individual's unique genetic code, from evidence left at the scene of a burglary.
The DNA profile was submitted to the national database, where a computer matched it to one of 660,000 previous arrestees whose DNA was on file.
The DNA profiles matched at six points of identification, or loci, along the DNA molecule.
British authorities estimated that the likelihood of that match occurring at random was one in 37 million.
But after the suspect provided an alibi, police asked for a retest.
This time, a new technique, which examines 10 loci and has a one-in-1 billion likelihood of mismatch, was used.
The suspect's DNA did not match at all the additional loci and he was released.
British authorities say the mismatch probably was caused by the rapidly increasing size of their database, which has grown from 470,000 potential suspects to 660,000 in the past year.
As more profiles are added, the possibility of suspects with very similar DNA increases, the British say.
"It isn't a mistake in the laboratory; this was something to be expected," database spokesman Rob Smith said. "There's no cause for alarm."
But Angela Flower, who investigates possible wrongful convictions for a British government appeals board, called the mistaken identification a "quite worrying phenomenon."
"Everybody in the U.K. who has ever been convicted on six-point (DNA) profiling will want to apply to us to have their convictions reviewed," she said.
American experts say a similar mismatch could occur here as the U.S. national DNA database adds profiles.
The U.S. database, which was begun in 1998, is about half the size of its British counterpart.
The FBI currently tests DNA at 13 points of identification.
Is drug use by school kids really all that big a problem in a town with a total of 2,200 people and a "rush hour" that lasts only 29 minutes?
The encouraging news is that a "parent" intends to protest.
---
Drug testing to begin at Lockney schools; parent plans protest
http://lubbockonline.com/stories/012900/loc_0129000011.shtml
Saturday, January 29, 2000
By LINDA KANE
The Lubbock Avalanche-Journal
LOCKNEY [TEXAS] When students head back to class next week in Lockney, they'll be asked to do something they've never been asked to do before:submit to a drug test.
Beginning Tuesday, students in grades six through 12 will be required to provide a urine sample to the district for a drug screening. It's a requirement of all students, not just those who wish to participate in extracurricular activities.
The district debated and began researching a drug testing policy in 1997. Though the district has been reluctant to implement such a program, Supt. Raymond Lusk said the district can no longer avoid it.
"It's a long story, but society has just brought us to this point," Lusk said. "We do a lot of things (now) that at one time we would say was not the school's job to do. Schools have kind of become all things and our job description has expanded."
Under the new policy, parents are required to sign a consent form prior to student testing, Lusk said. If parents refuse, the tests are considered positive, and students are subject to repercussions.
At least one parent has said he will not sign the consent form. Under the terms of the policy, his son could face a 21-day suspension from extracurricular activities, three days of in-school suspension and three sessions of drug counseling.
"What scares me the most, if I do not sign it, they are going to punish my child for what I do, and I definitely do not think that's right," Larry Tannahill said. "I'm not going to sign it. If it comes down to where they can put my child in ISS, I'll pull him out of school. And go to the grade school and pull (my second child) out, and then we'll go talk to my lawyer. And if it has to be taken to court, then I guess that's what I'm going to have to do."
Lusk said he's willing to talk with reluctant parents privately to try and resolve any conflicts.
"The last thing I would want to do is punish a child because of what
a parent did," he said. "Somebody might accuse infringement on personal
rights ... but if you have a child and they participate in Little League,
you have
to sign a form that says he can participate. ... If they go on a
field trip in school, you have to sign consent. That's part of life and
the reason for the parental consent form is because we want the parents
involved."
Lusk named several positive aspects to the drug testing policy, such as preventing health <http://lubbockonline.com/health> problems and ensuring that students are at their best when in school. The No. 1 reason, he said, was to help deter kids from peer pressure.
"It's a reason to say no. If they have the threat of a drug test, on Saturday night if they're in a group and someone tries to pressure them to use it, this is a reason for them to say no," he said. "I think we're helping the parents too if we alert them to something they weren't aware of." The tests will be confidential and kept private, Lusk said. During testing, students will be taken to a segregated area on the school's campus. Faculty and staff also will be tested. Should a faculty member test positive, he or she could be fired, Lusk said.
For students who test positive a second or third time, the terms of the punishment increase. Lusk said a student wouldn't be ordered to leave school for testing positive.
Lockney ISD is not the first South Plains school to implement such a policy. School officials in Post and Sundown have said their policies are effective and supported in their communities.
In Tulia a former student sued the school district, claiming the testing violated his rights. That case is still pending in Amarillo's federal court.
"Every school has insurance if that happens," Lusk said. "Obviously we don't want that."
But for Tannahill, he has only until Tuesday to change his mind about signing the consent form.
"Every person has got a right to their own opinion, and I do not
think they can enforce this," Tannahill said. "It's just a principle thing
to me. ... I cannot let the school say, 'I know how to raise your child
better than you.'
They do not have that right."
Linda Kane <mailto:lkane@lubbockonline.com>
can be contacted at 766-8754 or
lkane@lubbockonline.com
Back in the early 1960's in preparation to serve on President John
F. Kennedy's personal Battle Staff, this writer was subjected to some highly
classified and technical training that addressed the imbedded "philosophical
and psychological doctrine of communism" and it's threat to our Constitutional
Republic form of government and our American way of life. The title of
the DOD [Department of Defense] training manual used in that training was
"Two Ways of Life, The Communist Challenge to Democracy" (DoD DEN-9),(DA
Pam 360-510), (NAVPER S 15204), (AFP 190-1-1)
The Merrian Webster Collegiate Dictionary defines "The Totalitarian
Form of Government." as: "1-b: of or relating to a political regime based
on subordination of the individual to the state and strict control of all
aspects of the life and productive capability of the nation esp. by coercive
measures (as censorship and terrorism)." Given that definition please
read, very carefully, the following quotations taken from the DOD Training
Manual noted
above.
Quote # 1, "DoD Introduction, page 3, par 3: "In the totalitarian
way of life, there are no "inalienable rights" of man which the state is
not allowed to touch. Totalitarianism wants all of man, his body and soul,
and there is no human activity - political, economic, social, religious,
or educational - that is allowed to escape government control. In addition
to not recognizing any limits to its goals, it recognizes no limits to
the means it is prepared to use to
attain them: Propaganda, imprisonment, terror, slave labor, brainwashing,
and even the destruction of entire nations
(genocide)."
Quote # 2, page 69, par 4: "The totalitarian society seeks to destroy
whatever individuality exists in man by transforming him into an insignificant
atom of the mass. Totalitarianism is therefore hostile to individuals pursuing
their own private and personal goals. It reduces man to a member of one
vast whole - the "Nordic master
race" under Nazism, the "glorious proletariat under communism. Whereas
democratic civilization seeks progress through individuality, totalitarianism
seeks to accomplish its ends through conformity."
Quote # 3, page 164, par 3: " Communist regimes assume that if people
are not permitted to receive religious instruction or even hear views that
are favorable to religion, and if only a few churches are allowed, then
the ceaseless anti-religious propaganda of government and the party in
the school, factory and press will
eventually eliminate religion as a living force in the [nation].
Now that you have been made aware of the origin and ultimate goal of the "philosophy" imbedded in the FCC action noted in the following AFA Action Alert, we urge you to take immediate action and respond as requested by AFA.
PASTORS: Please share this information with the members of your congegation.
By HIS Grace we live to serve
Rev. "Curt" Tomlin
Major USA Ret
President TCAN Inc.
POB 11746
Killeen, Tx 76547-1746
Ph: 254-628-7043
Fax: 254-628-7894
EMail: ctomlin@vvm.com
Web Site: http://www.vvm.com/~ctomlin
****************************************************
AFA ACTION ALERT - 1/7/2000
American Family Association
Center for Law & Policy
P.O. Drawer 2440
FOR IMMEDIATE RELEASE: January 7, 2000
Contact: Patrick J. Vaughn: Staff Attorney: 662/680-3886
FCC RULING RESTRICTS CHRISTIAN BROADCASTING
Clinton Democrat appointees cast deciding votes
Online Version of this Alert (http://www.afa.net/alert/aa000107.htm
)
Concerned citizens are being urged by the American Family Association and the National Religious Broadcasters to contact their congressmen about a recent FCC ruling that violates the First Amendment rights of Christian broadcasters.
In its December 15, 1999, ruling in the WQED case (released on December,
29), the Federal Communications Commission (FCC) issued educational television
restrictions that limit the programming freedom of religious broadcasters,
but leave secular broadcasters with programming discretion. The FCC disqualified
church
services, religious exhortation, proselytizing and statements of
personally held religious views from being treated as "educational."
"In other words, the FCC could now revoke a Christian ministry's
noncommercial television license if over half its programming consists
of church services, calls to repent and follow Biblical teaching, witnessing,
testimonies, and invitations to accept Christ as Savior and Lord," said
AFA President Don Wildmon. "According to the FCC, church services serve
neither the educational, instructional nor cultural needs of the American
people - the church
is useless to society."
The FCC has traditionally left the decision of what to broadcast and the determination of what is educational up to individual broadcasters. In their dissent to the WQED decision, FCC Commissioners Michael Powell and Harold Furchtgott-Roth questioned the constitutionality of the government's religion-based intrusion into programming decisions. They asked why church services would not qualify as "cultural" programming just as an opera might.
AFA learned that the three votes in favor of the restriction on Christian broadcasting all came from Democrats appointed by President Clinton. Those FCC Commissioners are Chairman William Kennard, Susan Ness and Gloria Tristani.
Although the FCC's current ruling is limited to noncommercial television stations, it states a government policy that can be applied to radio broadcasting as well. The FCC's WQED ruling has caused uproar among Christians and conservatives because it represents a governmental restriction targeted specifically at religious speech.
"This ruling evinces an acute hostility to religion, hopelessly entangles government bureaucrats in religious questions, and erects an impermissibly vague and ambiguous standard," said Stephen M. Crampton, Chief Counsel for the AFA Center For Law and Policy.
If All the World's a Computer...
Privacy: When technology hooks us up in one enormous network, will we have any secrets left?
By Peter McGrath
Newsweek, January 1, 2000
Any time, anywhere: that is the promise the captains of technology make us, even as we struggle with our existing machines, our cranky software and our creaky Internet. They mean it too. Imagine this: computers that enfold you, like a second skin. Rooms that come alive with sensors, cameras and embedded chips, allowing them to "know" you and adjust to your preferences when you arrive. Cars that monitor not only traffic but also your vital signs, and tell you when you're not fit to be on the road.
These all belong to a family of devices on the drawing board at places like IBM, Xerox's Palo Alto Research Center (PARC) and the Media Lab at the Massachusetts Institute for Technology. Some are in advanced stages of prototyping. They include such things as microchips farmers till into the soil to measure moisture and acidity; building materials that adjust resistance to wind and earthquake; insulation that changes according to weather conditions. The idea is simple: computing must become ubiquitous, pervasive. And nowhere will it be more pervasive than when it is closest to us. As Michael Hawley put it in the mission statement for his Things That Think project at the MIT Media Lab, "We wear clothes, put on jewelry, sit on chairs and walk on carpets that all share the same profound failing: they are blind, deaf and very dumb. Cuff links don't, in fact, link with anything else... Glasses help sight, but they don't see."
They will if the engineers have their way. Eyeglasses are the medium of choice for an idea variously called BodyNet and the Personal Area Network, or PAN. You would wear glasses with a camera in the frame, a photodiode sensor to monitor your eye movements, a voice transmitter in the earpiece and a short-range radio connection to a pagerlike device worn on a belt or in a handbag. That device would contain whole libraries of personal information, about both you and everyone you've ever met while wearing the BodyNet.
One effect would be to displace at a smaller size the multiple electronic devices we carry today, such as laptops, mobile phones and personal digital assistants. But BodyNet goes further. Thus equipped, you could be prompted with the name and business of an acquaintance approaching on the street. (The device would compare the image with its database, and your glasses would whisper the result in your ear.) You could, with the help of a phased array of microphones embedded in the fabric of your jacketwhat Hawley calls "underware" respond knowingly to conversations: if your acquaintance mentions an investment opportunity, your device could connect to the Internet and call up all relevant information about the company in question, using your glasses as a display screen. Dinner parties would never be the same.
Sound good? It certainly does to the digerati. They are prone to such statements as "If computers are everywhere, they better stay out of the way" (Mark Weiser and John Seely Brown, senior scientists at Xerox PARC), and "The idea is nothing less than to make the world itself programmable" (Alan Daniels, then of Georgia Tech).
In their view, computing will, by the year 2005, shift
decisively from domination by the personal computer to reliance on a variety
of "information appliances." At first most of these devices will be handheld:
Web-ready telephones and palmtops, for example. Increasingly, though, they
will be embedded in the background in ways
almost invisible to us. Wearable computers will arrive soon after,
though it will take some time to make them small and light enough to actually
embed them in clothing. Cameras will be everywhere, feeding visual data
to the Internet, and some researchers believe that by 2020
we will be on camera nearly nonstop.
The world of ubiquitous computing raises a number of questions. High among them is the issue of inescapability. "In practice," says Ann Livermore, president of enterprise computing at Hewlett-Packard, "the slogan 'Any time, anywhere' means 'All the time, everywhere'." Even greater, though, is the problem of privacy, when pervasive in fact means invasive. There is no precedent for the idea of self-executing devices that are ubiquitous, networked and always on. If your car knows when you're intoxicated, why can't it also inform a police car? If a communicating pacemaker can tell your doctor that you're on the verge of a cardiac event, why can't it also tell your insurance company?
All such devices will, of course, be presented as having benefits so obvious as to pre-empt objection. It's hard to quarrel with a car that deters drunk driving, even at the cost of a little self-incrimination. It's even harder to argue against a networked pacemaker, if it saves lives. But, says Coralee Whitcomb, president of Computer Professionals for Social Responsibility, it never stops there: "All these things develop other uses... Any time you create a technology that is inherently invasive, it'll get used that way. And there's always a million good reasons for it."
Technologists do expect resistance to such devices, at least at first. "We are naturally squeamish about ideas like electronics that are worn, ingested, implanted," says Hawley. "Maybe it's rooted in our deep fear [of] being eaten, or disgust at being the host for a parasite. But once we cross these bridges they seem to become second nature." Health care is only the most immediate use of ubiquitous computing, he says. He envisions a world in which the ability to put entire systems on a single chip, creating such devices as voice-activated "metaphones" the size of a lapel pin, effectively abolishes distance as a barrier to human interaction.
Some high hurdles remain. Power supplies must be miniaturized. Current network-management tools are wholly inadequate to ubiquitous computing. Nor will there be enough network capacity for another 10 years. But these are susceptible to engineering attack. The same might be said of privacy: protection will come from some combination of encryption and digital fingerprinting, in which people who gain access to your personal data leave electronic traces of their presence, allowing you to hold them accountable. These technical fixes aren't durable, though. As David Brin, a scientist and author of "The Transparent Society," notes, "Each year's 'unbreakable' encryption standard is broken within less than three years by groups of amateurs." A new and stronger standard then emerges, only to be itself broken, in a permanent game of digital leapfrog.
In any case, privacy is not just a condition. It's also
a state of mind, a feeling of security that owes more to the possibility
of anonymity than anything else. And anonymity
is one thing that the next wave of computing will abolish.
© 2000 Newsweek, Inc.
BodySearch system new technology for customs services
[29 Jul '99] - US
Customs Service
US Customs Service
AN X-ray scanner that shows airport customs officers the naked bodies of passengers has been greeted with outrage by American civil liberties watchdogs.
The BodySearch machine has been in place in New York and five other American cities for several months. Security officers can look at pictures of the human body in outline regardless of how much clothing passengers are wearing.
According to a spokesman for the manufacturers, the images of the body are not clear, although genitals and breasts are clearly distinguishable. "It is not like you are getting a photograph of a naked person," the spokesman said.
Anyone seeking to smuggle drugs or weapons was most likely to hide them in areas untouched by body searches, such as the groin and, in women, the chest. Raymond Kelley, commissioner for the Customs service, said the machine was introduced in response to passengers' concerns about intimate searches.
"People object to being physically touched and in response to that we brought in the scanners," Mr Kelley said. The Customs service is facing several lawsuits, mainly from women and members of ethnic minorities, claiming discrimination in singling out passengers for body searches.
The American Civil Liberties Union said it was considering legal action to prohibit use of the X-ray machine. "If there is ever a place where a person has a reasonable expectation of privacy, it is under their clothing," Gregory Nojeim, an ACLU lawyer, said yesterday.
The Customs service has refused to say where and how the machines are being used, but confirmed that it was planned to install them at all international airports in America by next June. The machines are expected to scan only passengers selected by Customs officers for special attention.
Associated Press reported: “The last
thing people want to face when entering the United States after a cramped
overseas flight is a long wait to clear passport control. More and more
business travelers - Americans and foreigners alike - press a hand to a
computer screen and are on their way. In an experimental program, more
than 45,000 travelers are using an Immigration and Naturalization Service
Passenger Accelerated Service System card, or INSPASS, to get through the
process quickly. That is twice as many as last year, according to agency
spokeswoman Eileen Schmid. ‘The process takes about 15 to 20 seconds,’
compared with a 20-minute average wait at regular immigration control,
she said. The traveler runs a card through a machine in the airport and
places a hand in a ‘hand geometry reader.’ The computer compares the live
scan of the bone structure in the hand to an image that was taken when
the traveler applied for the pass…Terrorism expert William Daly is not
surprised. The biometric image of the hand's bone structure and configuration
is an extremely reliable way of determining the identity of a person -
much more so than the picture in a passport, he said. ‘It's becoming more
of an industry standard, because biometric standard is much more difficult
to forge,’ said Daly, managing director of a security consulting firm...The
goal is to make the pass available to frequent business travelers from
nearly all nations, but not to anyone else. But Daly couldn't see any security
reason why students, visitors and other frequent travelers to the United
States couldn't be included in the system..."
The London Telegraph reported
today: “Tony Blair [British Prime Minister] will urge police forces today
to take DNA samples from all suspects arrested [not convicted] for offences
carrying a prison sentence. It would mean that anyone arrested for shoplifting
or drink driving could end up on the national DNA data base….Mr Blair will
encourage them to follow the example of the Metropolitan Police, which
has started taking DNA samples from everyone arrested for offences carrying
a prison term. At present, the practice is to take samples from those arrested
for violent crime, burglary or sexual offences. The Government is spending
£34 million on establishing a DNA data base, which will carry details
of an individual's genetic profile. Mr Blair will say: ‘More testing will
help solve more crimes and catch more criminals, and not just more sexual
offenders. It will help cut car crime. A single hair left in a stolen car
is enough to identify the thief. Last year, 14,000 matches were made.’..."
Wired News reported: “You’re driving home from a party on a chill
weekend night and encounter your first unpleasant surprise of the evening:
A police car behind you with its lights ablaze. Turns out you didn’t halt
entirely for that last stop sign, or so the friendly policeman says. But
he doesn’t seem nearly as congenial as he hands you a cotton swab and tells
you to touch it to the inside of your cheek for a DNA sample. The second
unhappy surprise: You’re under arrest. Your DNA matched a hair sample police
think came from someone who slaughtered three people at a restaurant last
month. It doesn’t matter right now that you’re innocent, although you used
to dine there frequently. You’re still being handcuffed. Unlikely?
Given current technology, perhaps. But police in Scotland are already
taking DNA from people stopped for any crime, even traffic offenses. London
police say they hope to be using handheld DNA scanners within 10 years.
The privacy implications are staggering...” Continued on next post
“...Unlike ‘mug shot’ photos and ink-and-paper fingerprinting, DNA identification involves taking human tissue. But few safeguards for it exist: Of the 50 US states that demand DNA from criminals, only three prohibit the unauthorized release of that genetic material. Some medical ethicists say that DNA samples are more intrusive than photos or fingerprints because human genomes reveal information about health risks, race, and paternity...If race is included in the database, Juengst says it could lead to a new form of genetic racism and away from a colorblind society…DNA taken from a crime scene can reveal physical characteristics about a person: Blood or hair follicles could indicate the suspect is a white man with blue eyes and blond hair who’s probably short and left-handed. It can also reveal information about your family. Most labs use nucleic analysis, which uses DNA taken from the cell nucleus. But in 1996 the FBI set up a forensic lab to do mitochondrial analysis using the more plentiful DNA found outside the nucleus...”
SCAN THIS NEWS
11.12.99
California Assembly member Mike Leads Anti-Crime Demonstration-Getaway Cars Halted by High Tech Laser Device
This morning, Assembly member Mike Honda (D-San
Jose), Chair of the Assembly Committee on Public Safety, lead a fact-finding
demonstration that may forever alter the manner in which police officers
pursue suspects on
California's streets and highways.
Assembly member Honda assisted in the testing
of the H.A.L.T. (High Speed Avoidance Using Laser Technology) system, a
device intended to end the notorious high speed pursuits that have become
all too common to a
terrified public. The H.A.L.T. system works
from a small micro-chip embedded in a motor vehicle that responds to a
laser beam fired from a hand-held device. Once the microchip is activated,
the vehicle will gradually reduce speed
-safely and without injury to the driver,
passengers, or innocent by-standers.
"If this device can be successfully implemented
throughout the state, it promises to be a god-send for police officers.
It may save countless lives, eliminate costly litigation against the state
and local governments, and
send a message to criminals that we are taking
back our streets. We may be witnessing the end of perilous police chases
in California," explained Assembly member Honda.
After witnessing the demonstration, veteran police officer Denny Jenner of the Irvine Police Department stated "this is the most pro-active device I have ever seen to stop criminals through the use of technology!"
For further information consult C.H.G. Safety
Technologies at
(888).422.2901 or http://www.HALT2000.com.
==============================================================
Volume 6.19
November 11, 1999
--------------------------------------------------------------
Published by the Electronic Privacy Information Center (EPIC) Washington, D.C.
=======================================================================
Table of Contents
=======================================================================
[1] Drivers' Privacy Protection Case Heard
by Supreme Court
[2] Privacy Advocates Call on FTC to Halt
Online Profiling
[3] Appellate Judges Slam Internet Censorship
Law
[4] Intelligence Funding Bill Requires Report
on ECHELON
[5] IETF Rejects Proposal on Internet Wiretaps
[6] TRUSTe Fails to Launch Investigation into
RealNetworks
[7] EPIC Bookstore -- Genetic Secrets
[8] Upcoming Conferences and Events
=======================================================================
[1] Drivers' Privacy Protection Case Heard
by Supreme Court
=======================================================================
On November 10, the Supreme Court heard oral
arguments in Reno v. Condon. The case involves the constitutionality
of the 1994 Driver's Privacy Protection Act (DPPA), which prohibited the
dissemination of
information contained in state driving records.
In the lower courts, the state of South Carolina
had argued that the DPPA unconstitutionally infringed on state powers,
in particular the Tenth Amendment right of states to regulate commerce
within their own
borders. The Government had argued that
the DPPA was a valid exercise of the 14th Amendment, which has been interpreted
as providing some privacy protections.
In oral argument before the Supreme Court,
both sides focused on the constitutionality of federal efforts to regulate
the procedures of a state agency. Seth Waxman, Solicitor General
of the United States, argued that Congress can legislate on drivers' records
since the federal government has the authority to regulate interstate commerce
as
implicated in the selling of drivers' records
to private entities. Charles Condon, Attorney General of South Carolina,
repeatedly asserted that the law places an undue burden on state agencies
and employees.
A recent bill, the Department of Transportation
and Related Agencies Appropriations Act for Fiscal Year 2000, will likely
protect the privacy of state driving records regardless of the Court decides
Reno v. Condon. The new legislation denies transportation funding
to states that do not obtain explicit opt-in consent before selling or
distributing information contained in driving
records.
EPIC submitted a friend-of-the-court brief in the Condon case, arguing in support of the DPPA. The brief is available at:
http://www.epic.org/privacy/drivers/epic_dppa_brief.pdf
For more information about Reno v. Condon, see:
http://www4.law.cornell.edu/php/orderinquiry2.php3?caseid=2903
=======================================================================
[2] Privacy Advocates Call on FTC to Halt
Online Profiling
=======================================================================
At a workshop on "online profiling," panelists
from EPIC, Junkbusters, the Center for Media Education, Privacy Times,
and Privacy Journal called for the Federal Trade Commission (FTC) to immediately
halt the
practice of online profiling, launch an investigation
into the privacy and consumer implications of the practice, and provide
recommendations for proper privacy legislation. The workshop, held
jointly by the FTC
and the National Telecommunications and Information
Administration (NTIA) of the Department of Commerce, took place on November
8.
Online profiling is the collection of detailed online behavior from uniquely identified Internet users. Online behavior generally refers to records about pages that were viewed and products or services purchased. Many online advertisers use online profiling in order to target advertisements according this past behavior.
The privacy concerns arise because this information is not collected with the knowledge or consent of the consumer and is often connected to personally identifiable information like a name or address. Online behavior can potentially reveal information not only about interests or hobbies, but also medical conditions, sexual preferences, and political or religious beliefs. The collection of such information also gives many businesses an unfair advantage in encouraging customers to buy products.
At the workshop, a consortium of online advertisers
known as the Network Advertising Initiative (NAI) presented a self-regulatory
proposal to stave off regulation of data collected over the Internet. The
proposal includes notice of what information is collected and how it is
used and an opt-out so that consumers can request to not have
their information collected from them.
EPIC finds the proposal insufficient due to the lack of enforcement by
other similar self-regulating agencies like TRUSTe (see item 6, below)
and the undue burden that opt-out places on individuals to stop information
collection that often occurs without their awareness.
A joint press release issued by the privacy groups to halt online profiling is at:
http://www.epic.org/privacy/internet/profiling_press_release.html
Details about the Public Workshop on "On-line Profiling" are available:
http://www.ftc.gov/bcp/profiling/index.htm
=======================================================================
[3] Appellate Judges Slam Internet Censorship
Law
=======================================================================
Two federal appellate judges harshly questioned
the constitutionality of the Child Online Protection Act (COPA) on November
4. COPA would prohibit commercial Web site operators from exposing
children under 17
to sexually explicit material that is deemed
"harmful to minors." The judges suggested that COPA may violate the
First Amendment by not specifying which community's standards would apply
when assessing content on the Internet.
Soon after President Clinton signed COPA into
law last year, it was challenged by a coalition of cyber-rights groups
and Web publishers, including EPIC and the ACLU. In February, U.S.
District Judge Reed issued a preliminary injunction blocking enforcement
of COPA, stating that the law would likely fail to survive judicial scrutiny.
The
government appealed the decision to the U.S.
Court of Appeals for the Third Circuit in Philadelphia.
In court last Thursday, Senior U.S. Circuit
Judge Leonard I. Garth asked the Justice Department's lawyer how the phrase
"contemporary community standards" can be defined, given that the Internet
is a global communications medium. "It seems to me that in terms
of the World Wide Web, what that statute contemplates is that we would
be
remitted to the most severe community standards
-- perhaps those in Iran or Iraq -- where the exposure of a woman's face
is deemed to be improper," Garth said.
Judge Theodore A. McKee expressed concern with the law's provision that Web site operators could avoid criminal sanctions by instituting age verification mechanisms, such as credit-card numbers, to restrict access by minors. McKee noted that such a screening process could have a chilling effect on adults who would be forced to reveal personal information in order to access material on sensitive subjects, such as homosexuality.
Both McKee and Garth openly questioned whether it is possible to create legislation that satisfies the First Amendment and controls children's access to harmful content. Garth said, "I'm not at all sure that, in light of the Web, one can structure legislation which can control" access to online content.
For more information on COPA and the full text of Judge Reed's district court ruling, see:
http://www.epic.org/free_speech/copa/
=======================================================================
[4] Intelligence Funding Bill Requires Report
on ECHELON
=======================================================================
The House of Representatives has approved a
provision that would require the intelligence agencies to jointly provide
Congress with a detailed analysis of the legal standards they apply when
conducting signals intelligence, including electronic surveillance.
The requirement grows out of the controversy surrounding Project ECHELON,
a
global surveillance network coordinated by
the National Security Agency.
The reporting requirement is contained in the
final version of the Intelligence Authorization Act for Fiscal Year 2000,
which is expected to be approved by the Senate. The report must be
submitted in both classified and unclassified form to the Intelligence
and Judiciary committees of the House and Senate within 60 days of final
passage. It must disclose the legal standards for interception of communications
when such interception may result in the acquisition of information from
a communication to or from United States persons; for intentional
targeting of the communications to or from
United States persons; for receipt from non-United States sources of information
pertaining to communications to or from United States persons; and for
dissemination
of information acquired through the interception
of the communications to or from United States persons.
The reporting requirement was added to the appropriations bill at the insistence of Rep. Bob Barr (R-GA). In a statement released after the House passage of the bill, Barr said, "If American intelligence agencies are intercepting, receiving or distributing communications involving our citizens without court orders, or legal authority, they are doing so outside the bounds of the Constitution. If Project ECHELON exists as reported, all Americans who care about the integrity of our Constitution should be concerned."
Last spring, Rep. Porter Goss (R-FL), chairman of the House Intelligence Committee, requested access to legal memoranda on surveillance authority prepared by NSA's General Counsel, but the agency rebuffed the request citing "attorney-client privilege." (See EPIC Alert 6.08).
=======================================================================
[5] IETF Rejects Proposal on Internet Wiretaps
=======================================================================
In a public, plenary session on November 10,
members of the Internet Engineering Task Force (IETF) decided overwhelmingly
not to develop technical standards that would facilitate wiretapping of
Internet
communications. After an hour-long debate,
the IETF members resolved the question of whether the standards group should
build the kind of surveillance capabilities that are mandated for telephone
systems by
the controversial Communications Assistance
to Law Enforcement Act (CALEA). The Internet Engineering Steering
Group and the Internet Architecture Board will soon publish a formal IETF
position paper based
on the consensus of the membership.
Prior to the debate, a group of computer security,
cryptography, law, and policy experts sent an open letter to the IETF urging
rejection of wiretap standards. They said that "such a development
would harm
network security, result in more illegal activities,
diminish users' privacy, stifle innovation, and impose significant costs
on developers of communications."
The rejected proposal arose when some IETF
members asserted that CALEA required such Internet standards. With
the emergence of Internet telephony, some have argued that the law should
now be read to cover
the Internet. That view, however, is
countered by the legislative history of the 1994 law, which clearly stated
that CALEA "does not require reengineering of the Internet, nor does it
impose prospectively functional requirements on the Internet."
The text of the open letter to the IETF is available at:
http://www.epic.org/privacy/internet/letter_to_ietf.html
The legislative history of CALEA is available at:
http://www.epic.org/privacy/wiretap/calea/H_Rpt_103_827.txt
=======================================================================
[6] TRUSTe Fails to Launch Investigation into
RealNetworks
=======================================================================
On November 1, the New York Times reported on the discovery made by independent security consultant Richard Smith that online software distributor RealNetworks was collecting information about the music tastes of 13.5 million Real product users without their knowledge. Despite initially indicating that it would launch an investigation into its licensee RealNetworks, the TRUSTe privacy certification organization has chosen not to pursue an inquiry, citing a loophole in the existing license agreement. TRUSTe claims to provide adequate privacy guidelines and oversight of privacy violations for companies that it certifies.
RealJukebox (software downloaded through the
site of RealNetworks) was surreptitiously scanning computer hard drives
for music files and transmitting information about the genre of music,
the format of the music files, and the type of connected music player used
back to RealNetworks. This information was also tied to personal
information
previously collected through registration
forms. After the activities of the RealJukebox software became public,
RealNetworks provided a software "patch" that would prevent the further
transmission of information.
TRUSTe refused to launch an investigation since
RealNetworks did not technically violate any part of its license agreement.
The TRUSTe license agreement only covers information collected from individuals
over a website. TRUSTe claimed that
since the information collection and transmission occurred through software
downloaded at a site, there was in fact no violation of the license agreement.
TRUSTe did announce
plans to change its license agreement to include
software downloaded through a website.
This is not the first time that TRUSTe has
failed to launch an investigation into an apparent violation of one of
its licensees. In March, Microsoft was found to be including Globally
Unique Identifiers (GUIDs) within Microsoft Office 1998 that would allow
all documents and visits to Microsoft operated websites to be tied with
personal
information provided through earlier software
registrations. As in the case of RealNetworks, TRUSTe found that
Microsoft did not violate the TRUSTe license agreement and refused to perform
an investigation.
Remedies for Real users may still be available; several class action lawsuits have been filed alleging that RealNetworks violated various federal and state laws by secretly collecting data.
For more information on the RealNetworks and Microsoft privacy Incidents, see:
=======================================================================
SCAN THIS NEWS
11.10.99
Forwarded from:
COALITION OF POLITICALLY ACTIVE
CHRISTIANS, INC. PAC
601 PENNSYLVANIA AVE. S BLDG. SUITE 9000
WASHINGTON D.C. 20004
copac@ifriendly.com
http://www.copac.org
CONTACT MARCIE SHUSS FOR INTERVIEWS WITH CHARLES
PHILLIPS CALL 800-474-5268
YOU MIGHT BE A REDNECK IF?.
NO? NO THIS ISN'T FOXWORTHY; IT'S YOUR FBI'S VERSION?
Re:
Project Megiddo (32 pages Acrobat Reader needed)
http://www.fbi.gov/library/megiddo/publicmegiddo.pdf
You Might be a Domestic terrorist if:
- You suddenly change activity; for example, less time spent on bible
study and more time on physical
training. page 6
- You believe in the battle against Satan, as prophesied in the Book of Revelation. Page 7
- You believe in time prophecy. page 8
- You believe God will overcome Christianity's enemies and the persecuted
communities should
persevere. Page 9
- You believe property rights and private gun ownership will be abolished. Page 11
- You believe in the New World Order. page 11
- You accept the theory that on January 1, 2000, many computers will
misinterpret this date as January
1, 1900 and malfunction and/or shut down completely. Page 11
No! I am not making this up? and it's not the joke it seems to be. This is directly from the pages of the FBI PROJECT MEGIDDO report, released confidentially to the Chiefs of Police at their national convention Nov. 3rd.
This report does not distinguish a James Dobson, Billy Graham or
the Pope from the likes of Timothy McVeigh,
Buford O. Furrow and other mass murderers that also believe in Bible
prophecy.
Simply put, it vilifies all Bible believers, home schoolers, 2nd Amendment rights advocates, freedom-loving Americans as domestic terrorists.
These are the same people that brought you:
"We didn't set that fire that killed twenty four children. (John,
did you get that pyrotechnic
canister? Oh shoot?)"
"We didn't fire a shot at those people. (Oh Bill? Did you pick up those shells? Oh shoot?)"
"We definitely didn't have sex. (She said what? Oh give me a break?)"
You know? This would be hilarious if it weren't so serious. How can our government define us God-fearing Americans as domestic terrorists?
Charles Phillips
National Chairman
COPAC, INC. PAC
http://www.proactivenews.com
CHARLOTTE, North Carolina (AP) -- The International Association of Police Chiefs says it will urge Congress to require that DNA samples be taken from every person arrested in connection with a crime. Civil rights advocates say that could violate the privacy of innocent people.
Typically, DNA samples are taken only from felons convicted of violent crimes. But the chiefs on Wednesday proposed that arrested suspects—whether linked to petty theft or murder—also should be required to give DNA samples, which would go into a nationwide FBI database and be made available to law enforcement agencies across the country. “It’s indeed a brave new world,” Barry Steinhardt, associate director of the American Civil Liberties Union, said Thursday. “We’re talking about people who are accused of a crime, but they have not yet had their day in court. A sizable number of them will never be convicted.”
In July, the Justice Department’s National Commission on the Future
of DNA Evidence decided to oppose mandatory DNA testing for anyone charged
with a crime. However it urged federal and state prosecutors to use DNA
evidence that could exonerate convicts. DNA, an acid that contains
an individual’s genetic makeup, is found in almost every cell in the body.
Except for identical twins, each person’s DNA
is unique.
The chiefs did not say what their proposal would cost, but they called
it another step forward in DNA technology, which has been credited with
clearing dozens of people convicted of murder and rape in recent years.
“With modern technology, we can do a much better job of protecting
our citizens and exonerating the innocent,” said Michael Robinson, director
of the Michigan Department of State Police and incoming association president.
Charlotte-Mecklenburg Police Chief Darrel Stephens said he agreed
that the FBI’s DNA database of convicted violent felons has been invaluable,
but he said the idea of sampling suspects could intrude on the privacy
of people who might never be convicted of a crime. He said DNA collection
should be limited “to specific kinds of arrests, such as for violent crimes
or breaking into someone’s home.”
Copyright 1999 The Associated Press. All rights reserved
3:00 a.m. 27.Oct.99.PDT
WASHINGTON -- US currency should include tracking devices
that let the government tax private possession of dollar bills, a Federal
Reserve official says.
The longer you hold currency without depositing it in a bank account,
the less that cash will be worth, according to a proposal from Marvin Goodfriend,
a senior vice president at the Federal Reserve Bank of Richmond.
In other words, greenbacks will get automatic expiration dates.
"The magnetic strip could visibly record when a bill was last withdrawn
from the banking system. A carry tax could be deducted from each bill upon
deposit according to how long the bill was in circulation," Goodfriend
wrote in a recent presentation to a Federal Reserve System conference in
Woodstock, Vermont.
The 34-page paper argues a carry tax will discourage "hoarding" currency,
deter black market and criminal activities, and boost economic stability
during deflationary periods when interest rates hover near zero.
It says new technology finally makes such a scheme feasible. "Systems
would have to be put in place at banks and automatic teller machines to
read bills, assess the carry tax, and stamp the bills 'current,'" the report
recommends.
Goodfriend said in an interview that banks might place a kind of
visible "date issued" stamp on each note they distributed. "The thing could
actually stamp the date when the bill comes out of the ATM," he said. Congressional
critics say they would oppose any such move.
"The whole idea is preposterous. The notion that we're going to tax somebody because they decide to be frugal and hold a couple of dollars is economic planning at its worst," said Representative Ron Paul (R-Texas), a free-market proponent who serves on the House Banking committee.
"This idea that you can correct some of the evil they've already
created with another tax is just ridiculous," Paul said. Other economists
say a carry tax is not a wise plan.
"This is going beyond taxing banks for holding reserves. It's taxing
the public for holding currency too long. That's even more wild an idea,"
says George Selgin, a University of Georgia economics professor who specializes
in monetary policy.
"There are sweeping implications of these suggestions beyond whatever role they might play in thwarting a deflationary crisis... I think it's a very dangerous solution to what may be a purely hypothetical problem," Selgin said.
Goodfriend discusses an alternative: The Fed should at times prevent Americans from withdrawing cash from their bank accounts. "Suspending the payment of currency for deposits would avoid the cost of imposing a carry tax on currency."
But he concludes that such a move would have "destabilizing" effects,
and recommends that the Federal Reserve instead "put in place systems to
raise the cost of storing money by imposing a carry tax."
The idea has been discussed before. Economist John Keynes mentioned
the possibility, but dismissed it because of the administrative hassles
involved. Silvio Gesell, a Keynes contemporary and like-minded thinker,
also suggested taxing money to allow lower interest rates.
But Goodfriend says that technology has advanced since then. "In light of recent advances in payments technology and the less-than-satisfactory alternatives, imposing a carry tax on money seems an eminently practical and reasonable way [to proceed]," he writes.
He said the Federal Reserve has technology that would make it "feasible,"
but refused to give details.
One reason for a carry tax, he says, is the reduced influence of
the US central bank when prices are not increasing and inflation is close
to zero. During such a period, banks are less likely to make loans--- even
if the Fed tries to spur an economic expansion through open market operations.
But if the government taxes the currency holdings of individuals and banks through an occasional carry tax, they may be inclined to lend money even at a negative interest rate in order to avoid holding on to it. "This proposal is made well in advance of any problem we have in the US. It's not an emergency proposal at this point," he said. The report says Congress would have to pass legislation allowing such a tax.
Oct. 27, 1999
By David Noack
NEW YORK (APBnews.com) -- Be careful what you type on your computer—someone may be watching, and it just might be the government.
The release of two documents from the National Security Agency (NSA) shows that the government has long had the ability, going back at least a decade if not more, to clandestinely eavesdrop on what people type on their computer. The findings were revealed when the NSA recently released sanitized versions of the documents to John Young, a New York City architect and cyber-activist, who filed a Freedom of Information Act (FOIA) request May 14, 1998.
In all, Young asked for a total of 22 various publications and papers
dealing with TEMPEST, a code name for electronic listening devices that
can read and record the electromagnetic signals that come from computers.
TEMPEST, which stands for Transient Electromagnetic Pulse Emanation
Standard, is a technology that allows for this kind of electronic eavesdropping.
Young received a 172-page document, in which about half was redacted,
called “Compromising
Emanations Laboratory Test Requirements Electromagnetic.” The other
document, which was 12
pages long, is called “NSA/CSS Technical Security Program,” and
only a few sections have been
hidden from public view.
The NSA released the documents Oct. 7. However, in a letter to Young from the NSA, the agency stated that the rest of the “publications, manuals and guidelines” related to TEMPEST were being denied for national security reasons.
“The documents are classified because their disclosure could reasonably
be expected to cause serious damage to the national security,” wrote Sally
V. Seward, deputy director of policy at the NSA.
TEMPEST documents posted online
Young has already filed an appeal to get the remainder of the TEMPEST publications and has posted the FOIA letters, along with the two documents, on his Web site. He should know within a couple of weeks if he will get access to the rest of the documents.
In his appeal, Young argues that release of the TEMPEST documents is needed to help counterbalance the personal privacy threats developed for national security purposes. An NSA spokeswoman said Young could do whatever he wants with the documents.
“Mr. Young, having obtained these documents through the FOIA process, is free to do with them whatever he wishes,” said the spokeswoman. Public unaware of spy technique Up until now, the public has been largely unaware of this technology. But Young hopes to spark a debate about its use.
For the most part, the military and intelligence communities, along with a growing industry created to combat the prying spy technology, have been privy to the capabilities of the technology.
With the right equipment, the electromagnetic radiation given off
from computers can be intercepted from a remote location, and then redisplayed
in the case of a monitor screen or recorded and replayed with a printer
or keyboard.
“I first learned about it a couple of years ago. ... TEMPEST is
a terrific threat to privacy,” Young said. “With standoff technology there
is no need for physical access to buildings or equipment, and no law forbids
its use. ... The only limitation is the technological reach of the
snooping equipment, which is one of the secrets closely guarded.”
Useful for corporate espionage?
He said that while the intelligence community may be using this technology to spy on foreign governments, TEMPEST can also be used by companies to spy on the competition and by domestic law enforcement agencies to spy and gather information on citizens.
FBI spokesman David Miller said the agency could not comment on Young’s allegations of domestic surveillance using TEMPEST technology.
Computer security consultant Joel McNamara, who runs a Web site dedicated to public information about TEMPEST, said that both foreign governments and the United States are using this technology to electronically eavesdrop, and a large industry has been created to thwart the snooping devices.
“Emanation interception is not something anyone can do. You’re talking about relatively expensive and sophisticated equipment as well as a fair amount of training. Someone engaging in an intercept is going to be well-funded and not able to get information from conventional surveillance techniques. The threat to the average person is very minimal,” said McNamara.
He said personal privacy plays a small role in using this technology. The real goals, he said, are political and economic espionage issues.
McNamara said that since computer monitors, hard drives and modems all give off electromagnetic radiation, the right equipment could reconstruct the data from these devices. McNamara said that displays on computer monitors have been spied on nearly a mile away. He said that spying from a satellite is impractical because there would be too much electromagnetic interference.
Bonfire for the Constitution
On June 3, 1994, President Clinton signed Executive Order #12919 gathering together into a single document all the power and authority of a multitude of Executive Orders issued by preceding presidents from John Kennedy on. Recent examination of this Executive Order has brought to light that the consolidation of previous presidential orders deliver unprecedented authority into the hands of the Chief Executive that exceed those powers granted him under the U.S. Constitution.
Incorporated under the aegis of President Clinton's EO #12919 are powers originally claimed by President Kennedy in a series of Executive Orders signed into "law" in February of 1962 which, if invoked, would virtually suspend the greater portion of liberties guaranteed by the United States Constitution.
In Section 3 of Kennedy's original EO #10995 entitled, "ASSIGNING TELECOMMUNICATIONS MANAGEMENT FUNCTIONS" there is the vague statement, "Such authority shall include the power to amend modify, or revoke frequency assignments." Innocuous as this sounds, it embodies the power of the Chief Executive, in time of "national emergency", to seize control of all radio and other telecommunications.
On the same day that President Kennedy signed EO #10995, he also gave birth to four successive Orders that Clinton included in his EO containing provisions to disable constitutional rights. Executive Order #10997 empowers the Secretary of the Interior to seize all energy production facilities--specifically, "electrical power", "petroleum", "gas", "solid fuels", and "minerals". Section 3, subsection (d) of that order, entitled " Claimancy" states:
Prepare plans to claim materials, manpower,
equipment, supplies and services needed in support of assigned
responsibilities and other essential functions
of the Department...to insure availability of such resources in an
emergency. [emphasis and supplied]
Note the word "claim" in reference to "materials, manpower, equipment, supplies and services". The legal definition, as supplied by Black's Law Dictionary is, "To demand as one's own or as one's right...means by or through which claimant obtains possession or enjoyment of a privilege or thing. Demand for money or property as of a right...." This means that the government may, upon declaration of a state of local or national emergency, seize any of the above, private or otherwise, including "manpower".
As to what constitutes a national emergency again Black's definition is quite revealing:
"A state of national crisis; a situation demanding immediate and extraordinary national or federal action. Congress has made little or no distinction between a "state of national emergency" and a "state of war." Brown v. Bernstein, D.C.Pa., 49 F.Supp. 728, 732. [emphasis supplied]
EO #10998 places all food resources under authority of the Secretary of Agriculture.
EO #10999 invests the Secretary of Commerce with control over all means of transportation, public and private.
EO #11000 provides for the establishment of manpower resources at the discretion of the Secretary of Labor, with the authority to "claim" services (labor) and involuntary relocation of workers. Collateral authority for this conscription of labor is given in Title 50 app. United States Code, Section 2153 "WAR AND NATIONAL DEFENCE" under the section addressing civilian disposition entitled, "DEFENSE PRODUCTION ACT OF 1950" in which is set forth that civilian personnel may be assigned work without regard to payment or reimbursement.
It is important to note that according to the "War and Emergency Powers Act" the United States has legally been under a state of national emergency since its enactment in 1933. It has never been repealed, thus leaving the president with instant powers to suspend the constitution. Most legal scholars and legislators who have studied the matter concur that the War and Emergency Powers Act has, in reality, already suspended the Constitution since the moment the act was signed into law by President Roosevelt. The actual suspension of those consitutional rights awaits only the impetus of a national emergency requiring it.
In 1933 a U.S. Congressman entered the following statement into the Congressional Record:
"I think of all the damnable heresies that have ever been suggested in connection with the Constitution, the doctrine of emergency is the worst. It means that when Congress declares an emergency, there is no Constitution. This means its death. It is the very doctrine that the German chancellor is invoking today in the dying hours of the parliamentary body of the German republic, namely, that because of an emergency, it should grant to the German chancellor absolute power to pass any law, even though the law contradicts the Constitution of the German republic. Chancellor Hitler is at least frank about it. We pay the Constitution lipservice, but the result is the same....the Constitution of the United States, as a restraining influence in keeping the federal government within the carefully prescribed channels of power, is moribund, if not dead."
The introduction to Senate Report 93-549, entered into the Congressional Record forty years later in 1973 states:
"A majority of the people of the United States have lived all their lives under emergency rule....For 40 years, freedoms and governmental procedures guaranteed by the Constitution have, in varying degrees, been abridged by laws brought into force by states of national emergency....And, in the United States, actions taken by the government in times of great crisis have from, at least, the Civil War, in important ways shaped the present phenomenon of a permanent state of national emergency."
Following the introduction the report's opening statement goes on to say:
"Since March the 9th, 1933, the United States has been in a state of declared national emergency....This vast range of powers, taken together, confer enough authority to rule the country without reference to normal constitutional processes. Under the powers delegated by these statutes, the President may: seize property; organize and control the means of production; seize commodities; assign military forces abroad; institute martial law; seize and control all transportation and communication; regulate the operation of private enterprise; restrict travel; and, in a plethora of particular ways, control the lives of all American citizens."
Not overlooked by those drafting the Constitution was the possible need to address national emergencies. The document contains certain provisions indicating that its signatories conceived of the possibility that some guarantees of personal liberties may, in the national interest, require suspension.
Article 1, Section 9 states: "The privilege of the writ of habeas corpus shall not be suspended, unless when in cases of rebellion [an internal occurrence] or invasion [external] the public safety require it." This grants the citizen the freedom from imprisonment or detention without due process. The proviso "unless when in cases of rebellion or invasion the public safety require it" indicates the necessity to provide for some contingencies that may also carry with them the possibility for abuse. No document of liberty, however, could possibly proscribe all potential for misuse of those liberties without actually eliminating them in the process. It has been said that communism is nothing more than democracy with all potential for abuse legislated out.
As a result of the Executive Orders listed above, in concert with the War and Emergency Powers Act, there exists within the United States a government within a government. It is hidden, semi-covert in nature, and does not recognize the U.S. Constitution or its constraints. It functions autonomously as a form of totalitarian regime in suspended animation, awaiting its time of activation. It is a government driven by presidential Executive Orders to be executed by federal agencies run by non-elected officials.
Executive Orders amount to ready-wired buttons by which the president can suspend constitutional rights at any moment he determines that a "national emergency" exists. The great problem inherent is that no binding legal definition exists as to what constitutes a "national emergency". That definition lies entirely with the Chief Executive. When he declares a state of emergency, the aforementioned documents can be used to activate whatever federal agency is most suited to address the emergency. Those agencies include, but are not limited to, the Bureau of Alcohol Tobacco and Firearms (BATF), the FBI and the Federal Emergency Management Administration (FEMA).
Because this nation is under a continual state of emergency due to the War and Emergency Powers Act, and the Constitution granting somewhat elastic powers of emergency in "cases of rebellion or invasion", the president can circumvent such fundamental protections as the Posse Comatatus Act which forbids the use of the military against U.S. citizens.
This slow motion decay of constitutional rights was not unforeseen by the Founding Fathers. In a letter to Thomas Jefferson, James Madison once wrote, "I believe there are more instances of abridgment of freedom of the people by gradual and silent encroachments of those in power than by violent and sudden usurpations...."
The Constitution of the United States of America, once the hub of American law and freedoms, has been moved to the position of the hub cap. It has become merely an ornamental relic that serves no real function other than that of making the American people feel as if the document still matters to those who govern.
It appears that the modern electorate chooses their leaders for the same purpose that they attend a magic show. Their actual desire seems to be that the performer deceive them.
"The prophets prophesy falsely, and the priests bear rule by their money; and my people love to have it so: and what will ye do in the end thereof?" Jer 5:31
Wired News reported: "...the Internet
Engineering Task Force has had one guiding principle: To solve the problems
of moving digital information around the world. As attendance at meetings
swelled and the Internet became a vital portion of national economies,
the standards-setting body has become increasingly important, but the engineers
and programmers who are members remained focused on that common goal. No
longer. Now the IETF is debating whether to wire government surveillance
into the next generation of Internet protocols…To reach even a preliminary
decision in a special plenary session of the IETF meeting in Washington
next month, attendees must weigh whether
law enforcement demands are more important than communications security
and personal privacy -- a process that places technology professionals
in the unusual position of taking a prominent political stand...’As Internet
voice becomes a wider deployed reality, it is only logical that the subject
has to come up,’ IETF chairman and Cisco engineer
Fred Baker said. ‘We are deciding to bring it up proactively rather than
reacting to something later in the game.’…Many governments, including the
United States, require telephone companies to configure their networks
so police can easily wiretap calls. As more phone calls flow through the
Internet, some experts predict that the FBI and similar agencies will demand
additional surveillance powers..."
MALAYSIA
Government stretching faith in ID card system
IAN STEWART in Kuala Lumpur
A Malaysian government decision to include religion on identity cards
has drawn strong criticism from religious groups and a leader of one of
its own parties, who described it as an “undesirable exercise”.
The plan was announced on Friday by the Deputy Prime Minister, Abdullah
Badawi, who said the added feature would help authorities in cases where
members of a family disagreed over the religion of a person who had died.
It would also help them expose Muslims masquerading as non-Muslims
in order to patronise the Genting Highlands casino or to avoid fasting
during Ramadan, he claimed.
Followers of Islam are barred from gambling and, during the fasting
month, are required to abstain from food or drink during daylight hours.
The Malaysian Consultative Council of Buddhism, Christianity, Hinduism
and Sikhism immediately called on the Government to reconsider its decision.
The council president, A. Vaithilingam, said the inclusion of religion
on identity cards could lead to bias and discrimination.
A non-government Muslim group said the move could disrupt religious
harmony.
S. Vijayaratnam, vice-president of Gerakan, one of the smaller parties
in the ruling National Front Coalition, said the plan was a step backwards
in light of Prime Minister Mahathir Mohamad’s desire for national unity.
As far as distinguishing Muslim from non-Muslim, the name on the
card alone would suffice to show religion. The country’s Malay majority
are almost all Muslim.
“It is unfair to subject the whole nation to this undesirable exercise
just for such sporadic cases like tackling fasting month offences, the
claiming of bodies or entering casinos,” he said.
Mr Vijayaratnam added that in the authorities’ quest for a united
Malaysia, they should be perceived to be placing less emphasis on religion
and race.
Responding to the criticism, Mr Badawi said the Government was not trying to discriminate against any group. He said all members of the cabinet, which comprised ministers of various religions and races, had agreed to the plan and it was better that the decision be accepted.
Newly discovered documents reveal the prominent financial and supervisory role of the U.S. Secret Service in the Image Data pilot programs. EPIC recently obtained these documents through Freedom of Information Act requests.
Image Data LLC seeks to establish a national database of photographs
and personal information - including social security numbers to prevent
credit card and check fraud. The system proposed by Image Data, TrueID,
would allow for instantaneous identification checks at the point of purchase
by displaying photographs of the customer. ( Could
this be the start of ID'ing everyone that makes a cash transaction?) These
pictures, already used by Image Data in its pilot program in South Carolina,
were bought from state DMVs without notification of the photographed individuals.
Soon after the activities of Image Data were made public, the Attorney
General of South Carolina filed a suit
seeking an injunction against Image Data's use of the images.
The new documents reveal the extent to which the U.S. Secret Service
is involved in Image Data's pilot programs. In the past, Image Data
has attempted to downplay the role of the federal government in what is
proposed to be a national identity database. A document titled "Identity
Crime Prevention Pilot Program - Digitization Process Development Justification"
contends that through the pilot program of digitizing driver's licenses
in Colorado "we ensure the viability of deploying such service throughout
the United States." Another memo -- with the heading "Application
of Identity Verification and Privacy Enhancement To Treasury Transactions"
-- states as the first project
task to "work with Secret Service to define list of proposed applications
of the technology for the pilot." Also included in these initial
proposals are timelines for monthly reports and meetings with the U.S.
Secret Service in Washington, D.C.
The role of the government in what has been a startling and secretive
attempt to collect DMV records and personal data is still not entirely
clear. While the Secret Service does regularly investigate credit card
and check fraud cases, the questionable need for a national identity database
does not outweigh the privacy violations that have already
taken place.
Some of the FOIA documents obtained by EPIC are at:
http://www.epic.org/privacy/imagedata/image_data_scan.html
An Image Data presentation to the government—marked confidential—
stressed that pilot projects in three states would “ensure the viability
of deploying such service throughout the United States,” according to about
300 pages of files EPIC (www.epic.org) obtained under the Freedom of Information
Act.
In a February 1999 report, Image Data CEO Robert Houvener ridiculed
the idea that there were any legitimate privacy issues at stake, including
those raised by civil libertarians when the project was first disclosed.
“Many other newspapers, television programs, magazines also did
news stories on Image Data LLC and its system [that] in some cases... focused
on the ‘Privacy’ concerns and presented an inaccurate presentation,” Houvener
wrote.
But privacy groups aren’t wavering.
“We think that their proposal for a national database of photographs
runs directly contrary to the types of privacy safeguards that should be
developed,” says EPIC director Marc Rotenberg, who met with Houvener last
week. “This is not a database that people can easily opt out of. You have
to give up your photograph when you get a driver’s license.”
Houvener, who says he has been a “victim of identity fraud,” says
his national photo file will be targeted at “identity criminals” that he
estimates cost businesses billions of dollars a year.
US legislators who funded the project believed the database would
be used to stop illegal immigrants and terrorists.
“The TrueID technology has widespread potential to reduce crime
in the credit and checking fields, in airports to reduce the chances of
terrorism, and in immigration and naturalization to verify proper identity,”
said a September 1997 letter from eight members of Congress to Image Data.
Image Data’s “True ID” technology currently feeds photos into its
database in one of two ways. The company has contracts with state motor
vehicle departments that supply the analog negatives or the digital images
on magnetic tape. It also persuades shoppers to scan their IDs into the
database by inserting them into devices at specially equipped stores.
After news reports appeared focusing on the project, the governors
of Colorado and Florida halted the transfer of images to Image Data, and
South Carolina filed suit asking for the return of millions of images already
in the company’s possession.
How did Image Data feel about South Carolina’s actions? “The PR,
legal, and legislative situation in the pilot State will continue to be
evaluated and dealt with,” a January 1999 company report says.
Image Data has publicly downplayed the Secret Service’s involvement,
but the documents show that the agency decided which states would be part
of the initial pilot project and directed the timing of the effort.
According to one of Image Data’s monthly reports sent to Special
Agent Cary Rosoff of the Secret Service’s financial crimes division, company
representatives were negotiating a contract with Missouri officials, too.
“Missouri [is] in the final stages of implementing a digital driver license
system. Most issues are resolved, and we expect closure within 4-6 weeks,”
the document says.
The Secret Service deleted some information from the documents before
releasing them, and only a few pages prepared by the government are included.
But it seems that discussions of the project began in early 1997. The government
signed an agreement with Image Data in late 1997 and the contract took
effect on 15 December of that year.
Soon after, the company began to work closely with Telecheck, a
subsidiary of First Data Corporation. By mid-June 1998, the computer interface
between Image Data and Telecheck was complete and images could readily
be exchanged.
One frequent problem: Scanning millions of existing 35 mm photos
into the database. “The digitizing machine is behind schedule.... There
has also been some slippage due to the custom machining of the components
for the scanner itself,” the documents reported about Colorado DMV photos.
Another headache for Image Data executives was Florida’s policy
of allowing drivers to renew their licenses twice by mail. That means people
are less likely to come in and be photographed by digital cameras, which
can automatically forward the photo to Image Data.
“For a state like Florida, [up] to 45 million negatives would have
to be digitized to get an online image of all current licenses,” a November
1998 report says.
The documents show how Image Data planned to sell the idea not just
to the federal government, but also to state officials.
“This program will demonstrate a highly effective way of ... increasing
tax revenue. The positive impact of this demonstration cannot be ignored.
Once government agencies and businesses see the effectiveness of this technology
and implement it for their own programs, the positive impact to state and
federal budgets will be in the billions of dollars per year,” says one
Image Data proposal that is marked “proprietary.”
Duncan Graham-Rowe
CLEANLINESS FREAKS have a new rationale for their pathological hatred of dust--it could soon be spying on them.
Packed full of sensors, lasers and communications transceivers, particles of "smart dust" are being designed to communicate with one another. They could be used for a range of applications from weather monitoring to spying.
The tiny "motes" are being developed at the University of California, Berkeley, as part of a programme to produce the smallest possible devices that have a viable way of communicating with each other.
Each mote is made up of a number of microelectromechanical systems, or MEMS, wired up to form a very simple computer. At present each mote is 5 millimetres long, but Kris Pister, one of the developers, says that in future they could be small enough to remain suspended in air, buoyed by the currents, sensing and communicating for hours.
The latest version (see Diagram) not only has a thick-film battery
powering it but also a solar cell to recharge it. "This remarkable package
has the ability to sense and communicate, and is self-powered," says Randy
Katz, a communications engineer on the
project. He presented the latest work at last week's Mobicom99 mobile
computing meeting in Seattle.
MEMS are made using the same photolithographic techniques as integrated circuits, so once perfected they should be easy to mass-produce. Patterns are etched out of a silicon wafer to create structures such as optical mirrors or tiny engines.
Each mote in a smart-dust system will need to survive on extremely low power, while being able to communicate kilobits of data per second. To this end, says Katz, the team has designed motes that shut down parts of themselves when they are not being used.
The latest challenge has been to devise a system that enables the motes to communicate. Katz and his colleagues decided to use optical transceivers because of their low energy demand compared with radio communications. According to Pister they have already shown that they can monitor the dust 21 kilometres across San Francisco Bay. "There's no way you're going to get that kind of range except with optical devices," he says.
"The base station may actually reside in a hand-held unit, much like a pair of binoculars," says Katz. This would allow for simultaneous viewing of the scene from afar while superimposing any measured data on the image. He adds that this approach could be especially useful for hazardous applications such as detecting chemical weapons or sending the dust into space.
The next task is to build distributed intelligence into the dust
to produce "swarm behaviour"
From New Scientist, 28 August 1999
By The Associated Press
7.14.99
People who carry signs with that message and stand along roadways in Oklahoma City will
The City Council passed an ordinance yesterday that prohibits people
who wish to barter
goods and services from doing so on public streets. It requires
anyone engaging in such
activities within city limits to obtain a license,
which will cost $30 plus $17.50 to cover
administrative
overhead and the cost of a criminal background check.
[ Gee, I can't help but wonder at this point about what options are
available to the hapless
peasant who fails the background check? "Sorry man,
you can't legally 'work for food' here. Hey, maybe you'll be able to think
of some 'other way' to get food. ... No, no I'm sorry, I'm
Under terms of the ordinance, people who barter must display
the license at all times.
Bartering without a license could result in a fine up to $750.
"We're not trying to prevent, necessarily, this activity, but we do want to make sure the
West said the ordinance is tailored after one in Cleveland, Ohio, which was upheld by the 6th U.S. Circuit Court of Appeals.
Joann Bell, executive director of the American Civil Liberties Union affiliate in Oklahoma
"It stands to reason that if a person doesn't have the money to buy a hamburger and Coke,
"How much does free speech cost in Oklahoma? That's the question."
The ordinance went into effect today.
Police to send '999' calls to homes
By David Bamber and Ken Hyder (Electronic Telegraph UK/8-15-99)
Press releases -Metropolitan Police
Police Federation
POLICE are to introduce a new emergency warning system which allows them to send telephone messages simultaneously to entire neighbourhoods.
As well as warning people about conmen and thieves operating in the area, the system can alert householders to dangers such as floods or impending power cuts. Police will be able to target messages to individual streets, vulnerable people or organisations such as schools or businesses.
The scheme has been tested with 12,000 homes in Lewisham, one of the worst crime areas in London. Police were surprised when a third of the people approached signed up immediately, but in the year since the system was introduced, burglaries have gone down by 15 per cent and street robberies by 20 per cent, while crime in other areas of London has risen.
Chief Supt Mike Humphrey said: "There is no doubt that it is playing a major part in reducing crime here." He said the system was particularly useful when appealing for information from people who would normally not come forward. He said: "Some people won't join Neighbourhood Watch for fear of intimidation. This scheme can help people be involved without anyone knowing. We can effectively go into people's homes and ask if they've seen a particular crime taking place."
He added: "It's an amazing tool and it's so flexible and quick. How else could you get a message, perhaps warning parents and schools about a paedophile, almost instantly and directly to those who need to hear it?"
Det Sgt John Sutherland explained that the system could be used to ask businesses with security surveillance to keep video tapes following specific incidents and it can be a cheap and quick way of carrying out house-to-house inquiries.
He said: "It would cost maybe £3 in calls to talk to 100 people in a street. You can make urban policing like village policing, you can reach more people." The scheme is being taken up by police in the Thames Valley, Devon and Cornwall.
APB On-line
Aug. 10, 1999
By Hans H. Chen
CLARKSBURG, W.Va. (APBNews.com) -- Since the FBI began collecting fingerprints 75 years ago, the agency has amassed the daubs of a whopping 34 million criminals.
But despite this massive cache, delays for fingerprint checks have made the database virtually useless to local law enforcement agencies.
Today, in response to a process long run at a snail's pace, FBI Director Louis Freeh unveiled a massive new computer system that will enable agents to conduct 62,000 fingerprint checks a day and return completed searches to local police departments in less than two hours.
The new system, called the Integrated Automated Fingerprint Identification System, or IAFIS, will also be able to process fingerprint checks for job applicants and security clearances in about 24 hours. That process now takes three to four months.
Criminals made out in deal
For years, police departments who sent fingerprints to the FBI complained they had to wait upward of two weeks for a reply. While police departments waited, suspects who gave the police false identities could have made bail or even finished their trials without anyone learning of their criminal pasts.
"We send prints electronically to the FBI, but it takes eight days to get it back from the FBI," said John Bankhead, a spokesman for the Georgia Bureau of Investigation. "But by that time, that suspect's gone."
But the FBI says the new system will cut the processing time from months to hours.
"It takes two hours from the time it hits our system to the time we send it back," said Lawrence Jolma, an IAFIS official overseeing the program's development. "Add on an hour in the state system. That's a hell of an improvement."
Non-matches get new data entry
IAFIS actually consists of three separate components. The first component includes a national computer network for state crime labs to transmit fingerprint images to the FBI.
The second component, which makes up the heart of IAFIS, actually analyzes the prints and looks for a match in the FBI's fingerprint library.
If no match is found, the third component of IAFIS creates a new fingerprint entry for the suspect. Right now, the FBI receives about 5,000 fingerprints a day that are not found in the database.
Building IAFIS has not been easy or cheap. Originally budgeted at
$520 million, the project ballooned to $640 million when the FBI expanded
the project in 1993 and then hired the technology company Lockheed to integrate
IAFIS' three components. The FBI stretched out the project even more by
introducing IAFIS in six segments so designers could find
and correct bugs in the system.
"If the FBI had bought something years ago off the shelf, you would
have had a much speedier procurement," said William Casey, a deputy superintendent
in the Boston Police Department and a member of a nationwide IAFIS advisory
board. "But they wanted to expand the technology to more than what they
needed at the time. On the bad-news
side, it did take more time than if they had bought an off-the-shelf
system."
'Best crooks' have no ID
During those 10 years, the inability of the FBI to return fingerprint checks grew worse. From 1995 to 1997, a 3 million-fingerprint backlog slowed response time to four to six months.
"The best crooks don't carry photo identification," said Chief Frank Sleeter of the Sun Prairie Police Department in Sun Prairie, a town of 20,000 people in Wisconsin. "With a six-month turnaround on fingerprints, it's almost a nonexistent service."
Meanwhile, more than 50,000 new fingerprint requests a day kept pouring into the FBI's fingerprint office in West Virginia.
The situation became so extreme that in 1995 the FBI opened a new
fingerprint office in Clarksburg and hired 1,100 local residents to clear
up the backlog. Most did clerical work, but the FBI put 200 of these locals
through a 12-week training course to become fingerprint
analysts.
3 1/2 years to clear backlog
Working 24 hours a day, seven days a week, the new employees took 3 1/2 years to clear up the backlog. They also succeeded in transferring the FBI's fingerprint cards into computerized entries.
The new IAFIS office will continue with its 24-hour staffing. Formerly, the FBI only worked on new fingerprint requests five days a week on a two-shift schedule.
"When your answer was a month or two away, there wasn't much hurry," Jolma said.
Machines may be too costly
But some are worried that the new system may be too advanced. All state-level police agencies except West Virginia can send and receive electronic fingerprints. But many local police departments lack this technology and must mail in fingerprint cards for checks.
The FBI is encouraging local departments to buy "live scan" devices that record fingerprints with a camera instead of ink. Local departments can also use scanners that digitize fingerprint cards originally inked on paper. But both types of machines are costly.
"The real problem is when you're talking about a real small police department, say one with five sworn officers," Jolma said. "The 'live scan' machine costs $50,000 to $60,000. A card scan device might cost $10,000."
"If they can't get a grant for them," Jolma added, "there's a problem."
Paper prints slow down process
Though the IAFIS system will continue to accept paper fingerprint cards for now, the FBI is actively discouraging such paper prints.
Any prints submitted on paper will take five to six days to process, as opposed to two hours for electronic prints. And the FBI will mail back results for prints sent in on paper, even though it can e-mail back these results.
The FBI is hoping that this approach will totally eliminate paper submissions in two to five years.
But once the IAFIS system goes online, departments with the equipment to send their prints electronically say they'll be letting fewer bad guys out the jail house door.
"Until recently, there wasn't any alternative," said Sleeter. "Now, very shortly, we'll have a much better way of doing business."
###
Hans H. Chen is an APBNews.com staff writer (hans.chen@apbnews.com).
Some might raise the question of whether
money that Congress appropriates to
help solve the Year 2000 computer problem
might be used as a basis for the
Fidnet program, a system designed to monitor
private computer networks.
The head of the Y2K Conversion Council,
John Koskinien testified a recent
Senate Y2K Committee hearing that the infrastructure
created to help address
Y2K issues might not be temporary: “This
is not a one-time only issue. The
infrastructure will continually be vulnerable
to attack,” Mr. Koskinen said.
House Majority Leader Dick Armey wrote the
following letter to Mr. Koskinen to
find answers.
August 4, 1999
Mr. John Koskinen
Year 2000 Conversion Council
115 OEOB
Washington DC 20502
Dear Mr. Koskinen:
As you know,
many questions are being raised about a new Administration
proposal that would establish the Federal
Intrusion Detection Network (FIDNet),
which would, among other things, monitor
civilian network traffic. This new bureaucracy
would look for suspicious activity on both
government and private computer networks,
and the information collected would be
gathered at the FBI's National Infrastructure
Protection Center.
News reports
about this system have understandably caused a great deal of
concern. If the American people lost confidence
in the security of their most personal
communications, it could jeopardize the
success of online commerce and other new
areas of technological growth. Beyond that,
it's simply frightening to think about the
possibility of government bureaucrats snooping
in our e-mail, particularly in light of the
Administration's stance on encryption legislation.
At the same
time, additional questions have been raised about our nation's
preparedness for the Y2K computer problem.
Congress has appropriated over $3
billion to your agency, and to every other
Federal agency and Department, for the
express purpose of preparing for the Y2K
problem. To my knowledge, none of that
money was intended for the purpose of establishing
a permanent bureaucracy to
monitor the integrity of private communications
networks. Given the controversy
surrounding the FIDNet proposal, or any
federal monitoring of private networks, I
wanted to take this opportunity to let
you clarify your intentions.
I would appreciate if you could address the following concerns:
Have you,
or anyone in your agency, been involved in any discussions concerning
FIDNet or
any other proposal to establish a permanent monitoring system for
private communications
networks?
Has any of
the money appropriated for Y2K readiness been used for the
purpose of
establishing FIDNet or any other proposal to establish a permanent
monitoring
system for private communications networks?
What role,
if any, will the Y2K Information Coordination Center play in
implementing
FIDNet or any other proposal to establish a permanent monitoring
system for
private communications networks?
What are
the consequences, if any, for any private entity that does not cooperate
or voluntarily
provide information to the Y2K Information Coordination Center?
Will information
collected by the ICC be used only for preparing for Y2K
readiness,
or will that information be made available to FIDNet or any other
proposal
to establish a permanent monitoring system for private communications
networks?
When do you
envision the Y2K Conversion Center completing its work? When
do you envision
the Y2K Information Coordination Center completing its work?
How do you
intend to ensure the privacy of individuals or corporations that have
provided
information to the Y2K Information Coordination Center?
Congress has
a duty to the American people to make sure that there is no plan
which would undermine the confidence of
the American people and the future success
of our economy. We also have a responsibility
to make sure that federal agencies do
not engage in “mission creep,” changing
the nature of their operation to ensure a more
permanent role once a temporary problem
has been addressed. I appreciate your
efforts in helping us understand the Administration's
plans in these areas.
Sincerely,
Dick Armey
House Majority Leader
Plans for vast DNA library to fight crime By Andrew Sparrow, Political Correspondent
Electronic Telegraph/UK
Equipping the police with the hi-tech tools to fight crime
in the 21st century [30 Jul
'99] - Home Office
Briefings - National Council for Civil Liberties
The Evaluation of Forensic DNA Evidence - National
Research Council
THE police would be given extensive new powers to use DNA and fingerprint evidence under plans announced yesterday by Jack Straw.
The Home Secretary said that Britain was "on the threshold of some of the most exciting changes in police technology in decades" as he published proposals to change the law on scientific evidence.
The police welcomed the plans, which include allowing them to keep thousands of DNA samples given by innocent people during investigations. But Liberty, the civil rights group, complained that the consultation document illustrated how rights of suspects were gradually being eroded.
The DNA plan was one of the most radical in a list of ideas designed to strengthen police powers. Currently, if an individual provides a DNA sample during a mass screening following a major crime, then it has to be destroyed once that person has been eliminated as a suspect. So far there have been 120 mass screenings, gathering an average of 4,000 samples at a cost of £40 each - a total of more than 400,000 samples.
Mr Straw's plans would allow the police to keep DNA profiles for years, but individuals would still have to agree. He said samples would only be stored with the donor's consent and would be kept on a separate database to the National DNA Database, which contains samples from 600,000 convicted offenders.
The police would also be given the right to use electronic scanners to gather fingerprints from suspects, rather than relying on ink pads and paper. This will pave the way for hand-held scanners which will be linked to a national database and enable officers on the street to make an instant identification of arrested suspects.
Mr Straw said the changes were necessary to bring the law up to date with the latest technology. He said: "Twenty-first century police officers will be able to tap into a national fingerprint database capable of comparing over one million fingerprints every second."
Changes in the law are necessary because there is some doubt at the moment about the legitimacy of electronically gathered fingerprints, which involve suspects rubbing their fingers over a scanner instead of using ink and paper.
So-called Livescan units installed in police stations are already being piloted and have led to the identification of more than 5,000 suspects. Police hope to extend this to officers on patrol with units called Live-ID, hand-held devices.
The use of footprints as evidence will be put on the same basis as fingerprints under the Home Office plans.
In recognition of the international nature of crime, Mr Straw also wants to allow the police to use DNA profiles and fingerprints gathered in England and Wales to be checked against records either held by foreign police forces or other bodies, such as the Ministry of Defence, armed forces or Interpol.
Chief Supt Peter Gammon, president of the Police Superintendents' Association of England and Wales, said yesterday that the organisation had long campaigned to be able to keep DNA samples and for the law to keep up with changes.
He said: "Not only is that common sense, but also sound business sense if police resources are to be used more effectively to combat crime."
But John Wadham, director of Liberty, warned: "The proposals
to allow police officers to take fingerprints on the streets will lead
to more innocent people being subject to unnecessary and intrusive harassment.
He said: "In practice this is likely to have a disproportionate effect
on black people."
U.S. NATIONAL IDENTITY CARD COMING SOON
July 23, 1999
Wired News reported: "If Representative
Lamar Smith has his way, your driver's license will soon sport your Social
Security number, whether you like it or not. It may also include
microchips encoded with your fingerprints and other personal data. Government
agencies will no longer accept as identification licenses that don't meet
the new
standards...At a hearing Thursday, the
House Immigration subcommittee will debate the future of modified driver
licenses, which detractors derisively call a ‘national ID card.’ Since
Smith heads the subcommittee, his opponents have had an uphill battle.
Making their
fight even more difficult is the fact that
Congress approved the new license rules in 1996. Civil liberties and privacy
groups are doggedly attempting to repeal the law before it takes effect
next year. So far, they've had little success. It's true that in 1998 they
managed to get the Transportation Department to delay following through
on
regulations for a year. But that temporary
setback expires in October 1999. They had no luck in inserting a flat-out
repeal in a transportation spending bill last month..."
by Michael
Woodhead, Frankfurt
GERMAN male chauvinists could soon be hit where it hurts. A parliamentary bill, expected to be approved this autumn, requires men to pay pocket money to their wives.
Although the government has yet to indicate how much, informed
speculation suggests the figure could be at least 5% of a man's net income
- about £50 a month on average.
There would be no fiddling of figures: the bill also compels
men to show wives their bank accounts. Anyone who refuses could be taken
to a family court and ordered to pay.
"We have a lot of marriages in Germany where only the husband
earns and each month he hands over a tiny allowance on the kitchen table
and thinks he is a hero for
doing it," said Kai Sonntag, spokesman for the justice ministry
of Baden-Wurttemberg, which introduced the bill with all-party support
in the Bundesrat, Germany's upper
house of parliament. It goes to the Bundestag, the lower house,
for final approval after the summer recess.
"Many wives have no real idea what their husband earns. We
are saying that being at home looking after the house and children is equally
as important as running a company,"
Sonntag said. The measure, known as the "pocket money charter",
follows an abortive attempt by the Greens, the junior partner in Gerhard
Schröder's ruling coalition, to
obtain an even more radical law that would have obliged men
to do half the housework.
In principle, the new bill could prompt househusbands as well
as housewives to claim an allowance from a breadwinning spouse. In practice,
however, the beneficiaries
are likely to be overwhelmingly female. Only 40% of married
women in Germany work, one of the lowest figures in Europe.
The bill has been welcomed by many women. "It is not just about
pocket money," said Barbara Frank, editor of Emma, a feminist magazine.
"The Bundesrat is saying that women
are equal on every level. Marriage is an agreement between
two people and women should have the legal right to say what is or is not
enough money."
Others are unimpressed. "What's this? A silly season joke?"
thundered the Independent Women's Association. "It's a lot of hot air."
July 18, 1999
New Computer Tool Aids Police in Identifying Suspects in Crimes
By THE ASSOCIATED PRESS
WASHINGTON -- A computer system that went to work this week gives
the police in any community the ability to take a single fingerprint from
a suspect in a roadside arrest and determine within minutes from the Federal
Bureau of Investigation whether that
person is wanted for a crime.
The ability to respond so quickly is a result of the bureau's new
computerized national crime data system, which went into operation last
Sunday, replacing a system that kept the police waiting for hours, days
or longer for answers to such queries. The new system, the National Crime
Information Center 2000, has taken over from a computer network that
linked the bureau to state and local police agencies.
Some law-enforcement agencies already have the equipment needed to use the new system, including the New Jersey and Michigan State Police, said Steve Fischer, a spokesman for the F.B.I. The bureau hopes to have most agencies in the country hooked up within three years.
The bureau will provide the software free, but the agencies must buy their own lap-top computers, fingerprint scanners and printers.
Among a series of improvements, the new system can automatically
process fingerprints and mug shots. It also contains the old system's lists
of
wanted people, criminal histories, missing and deported people,
stolen guns, vehicles, license plates, stocks, boats and other articles.
Before, the police had to mail or fax fingerprints to the F.B.I., which checked them by hand against its 39 million sets of fingerprints.
Now, a police officer in a station or even in a squad car can put a suspect's index finger into a small reader that transmits the print to the bureau's computers in Clarksburg, W.Va. Within minutes, the computer checks the single print against 250,000 fingerprints in the agency's file of fugitives and wanted people.
The answer pops out in minutes. If the print identifies the suspect as someone who is wanted, the 2000 computer not only relays the result to the police but also sends a mug shot.
Louis J. Freeh, the F.B.I. Director, said on Thursday that the system
would "foster a revolution in law enforcement."
Davis asks students to give back to public
UC, CSU undergrads would help community
By Jeff Ristine
STAFF WRITER
July 16, 1999
SAN FRANCISCO -- Gov. Gray Davis' administration yesterday
asked the University of California and California State University to adopt
a community-service requirement for their undergraduates, partly
as a
"payback" to taxpayers for subsidizing public education.
"The governor strongly believes that a service ethic should be taught and acted upon in our public colleges and universities," Secretary of Education Gary K. Hart said in an address to the UC Board of Regents' Committee on Educational Policy.
"Through a community service requirement, students can give back to their communities and learn the importance and satisfaction of contributing to those in need."
Hart said he hoped UC would have a proposal ready for adoption by the regents' early next year in order to take effect with the incoming class of fall 2000.
Any new graduation requirement would have to be analyzed and deliberated by academic groups at each campus, however, and faculty representatives said they doubted the matter could go through their channels quite that fast.
Davis, who serves on the Board of Regents but did not attend yesterday's meeting, raised the community-service proposal during his first few months in office. In separate letters to UC and CSU leaders yesterday, he asked that they begin working to implement his idea.
Hart and state Sen. Tom Hayden, D-Santa Monica, noted that the two systems will need to answer a number of questions about the proposed graduation requirement.
One is whether the universities would provide opportunities for service learning, performed during a course taken for credit, as opposed to some sort of noncredit, supervised volunteer activity with no direct connection to a class.
Thousands of students across the state already are engaged in both types of activities, but among public institutions it is a requirement only at CSU Monterey Bay.
The length of service required and types of activity that would satisfy the requirement also must be reviewed, Hart said, adding that Davis favors an approach with maximum flexibility. But tutoring fellow students probably wouldn't count as community service, he said.
Hayden, who has co-authored a legislative proposal dealing with the issue, said legislators are willing to provide the funding needed to implement a community-service requirement.
Yesterday's kickoff to discussion among UC's faculty and regents, Hayden said, "is a green light that says this is really going to move more into the mainstream of the academic culture."
While there already has been some resistance to the idea, Hayden said a community-service requirement fits in well with UC's public-service mission.
And Hart said Davis believes that the state's higher-education students "receive a tremendous education which is underwritten at significant taxpayer expense, and that it is appropriate to ask them in return to contribute a modest amount of their time to community service."
He noted that UC officials already consider whether applicants performed community service during high school in making some admissions decisions.
Hart said the requirement is likely to apply only to students seeking four-year baccalaureate degrees, not those enrolled at community colleges (although it is possible transfer students might have opportunities to satisfy the requirement at a community college).
Regents were receptive to the Davis proposal without committing to it.
Regent Sherry Lansing said community service could advance
UC's outreach efforts, and student regent Michelle K. Pannor of the Berkeley
campus said it can "enrich" the student experience.
The following message includes a copy of a lawsuit filed by June Griffin from the Chattanooga, Tennessee area on behalf of herself as a pro se litigant in a challenge to that state's requirement for an SSN as a condition for driving.
Those who have been following the SSN-for-license issue may notice
some technical inaccuracies, such as the references to "USC 656" where
"section 656 of the Immigration Reform Act of 1996" is intended. Section
656 of the IIRIRA is the provision which prohibits federal agencies from
accepting any state-issued identification document unless it complies with
the federal standards including the demand for SSNs at the time of license
application. Implementation of section 656 is presently on hold as the
result of a one
year moratorium imposed by Congress in October of 1998.
Also, the distinction between the welfare reform, deadbeat dad laws
(which mandates that states obtain SSNs from ALL license applicants as
a condition for the state to receive welfare funding) and the immigration
reform measure is not clearly established. Nevertheless, the point IS clearly
made that ANY demand for an SSN as a condition to functioning normally
in life is contrary to the principles of liberty and freedom, in addition
to being a violation of the right to exercise one's religious beliefs as
protected by the First
Amendment. June makes her point quite well and it is certain the
court will have NO problem understanding the complaint.
If everyone receiving this message got involved to the level June has, this business about state demands for SSNs would be stopped in its tracks. Having just gotten off the phone from speaking with June, I can attest this is one lady resolute in here conviction to stop the state from demanding SSNs for identification.
Great work June!
Scott
=====================================================
Subject: News blackout about my lawsuit
From: Jacob B Griffin <jb21@juno.com>
Date: Wed, 14 Jul 1999 20:28:00 EDT
A copy of my sworn complaint against the State of Tennessee and the Department of Safety was given to the Nashville Tennessean Monday after it was filed in Chancery Court in Davidson County and I have called them since. There is no response. The Judge ordered a hearing set for July 27 at 1:30 CST. in Chancery Court, Nashville.
This critical case involves a tyranny which is being run from Donna Shalala's office through mandates forced on the State, forcing them to put SSN's on every license in order to get their "grant money" into the State. It is an absolute tyranny and my Complaint is the first of its kind. It is mandated under USC 656 AND 666.
Please help me get this distribution sent everywhere.
June Griffin
-----------------------------------------------------
Subject: Suit filed Monday against USC 666 AND REFERENCED MANDATE
From: Jacob B Griffin <jb21@juno.com>
Date: Wed, 14 Jul 1999 20:56:43 EDT
IN THE CHANCERY COURT FOR DAVIDSON COUNTY, TENNESSEE AT
NASHVILLE
PART _____
PEGGY JUNE GRIFFIN,
Petitioner,
GOVERNOR, THE STATE OF )
TENNESSEE,
)
and
) Docket No._______
COMMISSIONER, TENNESSEE )
DEPARTMENT OF SAFETY )
SWORN COMPLAINT
Petitioner, Peggy June
Griffin, would show unto the Court as follows:
1. Griffin is a resident
of Rhea County, Tennessee, residing at 522 Crestview, Dayton, for the past
nine years, being a citizen and housewife, officer in the Cumberland Missionary
Society, Old Path Publishers, and founder of Citizens for Decency in Taxation,
voluntary
helper in the family business, Jay Bee Dental Laboratory, and Preacher
in the American Bible Protestant denomination, and since 1970 has conducted
independent studies of early American and Tennessee history and has dedicated
her life to do all in her power to maintain the inherited legacy as an
American and to propagate the principles, privileges and blessings
of the United States and Tennessee Constitutions.
2. In this pursuit of
this endeavor, Griffin came under conviction to investigate the history
and contemplate the reform of the Social Security system, under which her
generation had been burdened since her birth in 1939. She then under serious
constraints of conscience and to show her firm sincerity in her endeavors,
rescinded the number assigned to her in her minority by the Social Security
Administration, a number whose card stated: NOT TO BE USED FOR IDENTIFICATION,
by filing an affidavit in the Rhea County Court House, July 2, 1991, which
is hereby attached as Exhibit I. Furthermore in town meetings with Congressman
Jim Cooper, Griffin made public notice of her intent to relinquish her
right to Social Security funds which may have been due her as a result
of
public employment, from clerical jobs with Peerless Woolen Mills
and Du Pont to Staff Assistant at the University of Kentucky and later
as Secretary with dams-Frazier-Anderson, Consulting Engineers, a term of
ten years paid into the Social Security system. Yet she relinquished her
rights to benefits as a show of good faith and sincerity and to divest
her of any special interests she might have and to throw herself on the
mercy of the God of our Fathers to care for her in her sickness or old
age, as He did Abraham. Furthermore, studies showed her that the
Pilgrims in 1620 broke their insurance compact with the London Company,
and being impressed with the faith of her American fathers, as well
as their prosperity, she under the auspices of their publishing company,
published Exhibit II.. Thus she acted in good faith.
3. Griffin further published
her plan of restoration and reform through a newspaper article in the Herald
News of Dayton, Tennessee, hereby attached as Exhibit III
4. In 1992, the State
of Tennessee, for the first time in the history of driver's license, instituted
a requirement that Social Security numbers be on Tennessee driver's license.
Thus Griffin filed a Petition for Exemption in Rhea County Circuit Court,
November 19, 1992, that as a result of her action, she be exempted from
this requirement. Griffin was granted by Judge Oscar Greer her Petition
for Default (Exhibit IV) because the Attorney for the State of Tennessee
failed to show up for the hearing. The State filed a Motion to Set Aside
the Default Judgment under a different Judge, Buddy Perry,(Exhibit V) on
the
basis that the suit should be tried in Davidson County. This inconvenienced
Griffin and discouraged her from pursuing the litigation at that time.
Griffin then turned to the legislature for redress which was granted by
TCA 55-50-321. This legislative act granted virtual liberty to obtain a
driver's license until the Federal Personal Responsibility and Work Opportunity
Reconciliation Act of 1996, under "Welfare Reform" was passed in Congress.
As a result of this massive legislation, the State of Tennessee was mandated,
under USC 656, Illegal Immigration Reform and Responsibility Act of 1996,
and USC 666 (a) (13), for child support enforcement. Congress imposed a
one-year moratorium on
any action taken on behalf of Section 656(b) of the 1996 law, which
moratorium is in effect for Fiscal Year 1999. This moratorium means that
states should not be concerned about being found in non-compliance of the
rule during 1999. (Exhibit VI). This notice of moratorium was forwarded
to Griffin by the office of Congressman Van Hilleary in the belief that
the moratorium set forth in USC 656 would be sufficient to allow Griffin
to get her driver's license. However, the Department of Safety refused
to allow this and stated so in a letter from their Legal Counsel (Exhibit
VII) because of a technicality that there was no moratorium for USC 666(a)(13).
5. The isolation of USC
656 and USC 666 in their moratorium renders the law vague and MORE IMPORTANTLY,
is ludicrous since the moratorium on enforcement of USC 656 alone WILL
LEAVE IMMIGRANTS ELIGIBLE FOR LICENSES WHILE AMERICAN CITIZENS, 'DEAD BEAT'
OR NOT ARE FORBIDDEN TO
DRIVE, WORK, GET MARRIED, OR APPLY FOR A PROFESSION, if they do
not, for
some reason or another, wish to use their Social Security Number
on applications. That Social Security Numbers are an easy mark for thieves
is so well known that it is evident on its face. The fact is that the Social
Security System has been a hallmark of caprice since its
inception, going from forbidding the use of the number as identification,
to widespread use, all at the whims of one political administration after
another. The latest status of such whimsical maneuvers is shown in a letter
marked Exhibit VIII, which is one of a chain of frustrating attempts by
a home schooler in Pennsylvania who wants to drive a car, but who has no
Social Security Number and has no intention of getting one. While it is
a fact that Pennsylvania struggles under burdensome regulations too laborious
to show in this paper, Griffin in her conscientious pursuit of Constitutional
liberties, does not want Tennessee, with its heritage of volunteer service
for freedom, to fall under the iron heel of such regulations under
which other states burden their citizens.
6. Both USC 656 and USC
666 are totally unreasonable and irrelevant to Petitioner since she is
certainly not "at large" or involved in child support cases, nor is a "dead
beat" parent but rather an upstanding citizen easily accessible to
any person by phone or
address.
7. In Memorandum and
Order, Bruce Lindsey and Tammy Lindsey, Parents and next friend of Danniele
Lindsey and Lea Ann Lindsey vs. Robert D. Lawson, Commissioner of the Tennessee
Department of Safety, and the State of Tennessee, No. 90-3701-I, Chancery
Court Judge Irwin H. Kilcrease, Jr. refused to grant these minors Injunctive
relief to get
their license without applying Social Security Numbers because "motion
for a temporary injunction only concerns inconveniences to them with respect
to their intentions to travel by automobile. Thus, plaintiffs have not
proven that they will suffer immediate and irreparable harm or injury pending
a trial on the merits." (Exhibit IX)
8. Griffin is prepared
to show that this not only would be inconvenient, but it would destroy
her livelihood. Petitioner is an intricate part of delivery and service
calls in the family business and being unable to drive would render it
impossible to carry out the
necessary functions of the business.
9. Furthermore, Griffin
enjoys driving as a part of her pursuit of happiness and liberty as a right,
both under the United States Constitution and the Tennessee Constitution.
She is under strict obligations as a citizen to uphold these rights, especially
Article I, Section 2 of the Declaration of Rights, Tenn. Constitution:
"That government being instituted for the common benefit the doctrine of
nonresistance to arbitrary power and oppression is absurd, slavish, and
destructive of the the good and happiness of mankind." and as such is
forbidden to tolerate any arbitrary act which could be classified
as absurd. Furthermore, Petitioner holds this requirement, not only absurd,
but tyrannical, a force which is alien to the foundations and tenets of
the State of Tennessee..
10. In addition to the
pleasure of driving, Griffin is a safe driver in that she has never had
an accident since she was licensed at sixteen years old, does not take
any drugs, alcohol, or medicine, and offers up a prayer for a safe trip
with each drive, giving glory to God for this blessing..
11. Griffin is a founding
member of the Cumberland Missionary Society and is engaged actively pursuing
her dedication to this work, of which driving is an integral part. As a
minister to church groups in other states, she is required to visit and
hold meetings which makes driving a necessity. Furthermore, her political
activities render it
mandatory that she be able to drive and this hindrance would render
her duty to God and country next to Impossible. For example, pursuing Social
Security Reform necessitates long trips to hearings, such as the
Pew Foundation's "Americans Discuss Social Security Forums," of which Griffin
participated both in Atlanta, Ga. and Buffalo, New York, as well as often
trips to Washington, DC and Pennsylvania. As well, Griffin is currently
carrying out a state-wide visitation to every County on behalf of the Ten
Commandments Resolution which has already been adopted by 20 counties in
Tennessee. Her being able to drive a car is the only way she can carry
out any aspect of her multiplied duties and dedication.
12. Griffin would further
beg the Court to consider the pleasure that she enjoys with her husband
on occasional fishing trips, which are now barred by the ridiculous requirement.
that fishing license must contain a Social Security Number. In the spirit
of the words of Thomas Jefferson, who stated that man is often given to
fabricate artificial rules, this far-fetched and ludicrous fancy must certainly
be corrected to something more reasonable and relevant to being able to
catch a fish. Although Plaintiff is happily married for 38 years to this
date, she would certainly beg the Court to make allowance by this injunction
that
younger people who do not have Social Security Numbers may be able
to be lawfully married, which is forbidden by USC 666.
13. Petitioner would
hereby insert a very sobering consideration in that Tennessee foundations
were rooted in the Bible. The 13th Chapter of Revelation states that a
time would come when none would be able to make a living unless he received
a "number of the beast." Rev. 13:15, 16, and further declares a penalty
on those that do not resist such tyrannies by promising they would
"drink of the wine of the wrath of God" (translated into the Battle Hymn
of the Republic..."He is trampling out His Vintage where the grapes of
wrath are stored...") and other horrible execrations, (Rev. 14: 9, 10)
none of which any person would want to be partaker. Petitioner hereby states
that this Court is in a position to
show that this requirement is null and void, thus relieving the
minds of multitudes of God-fearing Americans who tremble at the Word of
God and who are made uneasy by the fact that this arbitrary and irrelevant
law would place good citizens in abject poverty. To force a person of this
belief into compliance with the State requirement would violate the
Christian's First Amendment rights under the "free exercise" clause
The State in the past has combatted the Christian's rights of free exercise
by stating that it has a "compelling interest." In this issue, the State
is exercising arbitrary power which would be no support for a stand of
"compelling interest" because Congress has rendered USC 656 under moratorium,
therefore muddying the waters of State interest.. By the mere fact of the
State forcing the "Number" requirement on the Christian, the State would
be making the Christian fulfill the claims of Revelation 13 and 14,
in an unusual and unnecessary force. Petitioner is requesting the Court
to prove that this Number is NOT the "number of the
beast."
14. There is no law that
requires a person to apply for a Social Security Number; therefore any
peripheral requirements passed by any other agencies would classify as
"artificial rules" by Thomas Jefferson, who condemned the practice of Coercion
as making one half of the people fools and the other half hypocrites.
15. Based on the above
reasons, Plaintiff respectfully begs the Court to grant an injunction and
restrain the State of Tennessee and the Tennessee Department of Safety
from enforcement of TCA 55-50-321 (Exhibit X) because it is unreasonable
and irrelevant and tyrannical. Petitioner requests the Court to consider
the treatment of this
pro se case in light of White v. C.I.R., Civ. A.No. 80-K-397, U.S.Distr.Court,
D. Colorado, April 13, 1982, which reads as follows: "Under liberal construction
of requirements of rule, complaint that gives defendant fair notice of
what plaintiff's claim is and grounds upon which it rests complies with
rule, and under principles that pro plaintiffs are not to be held to the
same standard as imposed on trained lawyers, complaint complied with rule."
THIS IS THE FIRST APPLICATION FOR EXTRAORDINARY RELIEF FILED IN
THIS CAUSE.
Respectfully submitted,
_______________________
PEGGY JUNE GRIFFIN
Pro se
522 Crestview
Dayton, TN 37321
(423) 775-3796
By The Associated Press
7.14.99
People who carry signs with that message and stand along roadways in Oklahoma City will need to have a license from now on.
The City Council passed an ordinance yesterday that prohibits people who wish to barter goods and services from doing so on public streets. It requires anyone engaging in such activities within city limits to obtain a license, which will cost $30 plus $17.50 to cover administrative overhead and the cost of a criminal background check.
[ Gee, I can't help but wonder at this point about what options are available to the hapless peasant who fails the background check? "Sorry man, you can't legally 'work for food' here. Hey, maybe you'll be able to think of some 'other way' to get food. ... No, no I'm sorry, I'm afraid we can't refund your $17.50. Bye now, and have a nice day!" ]
Under terms of the ordinance, people who barter must display the license at all times. Bartering without a license could result in a fine up to $750.
"We're not trying to prevent, necessarily, this activity, but we do want to make sure the individuals involved are decent and are truthful to their word," municipal attorney Bill West said.
West said the ordinance is tailored after one in Cleveland, Ohio, which was upheld by the 6th U.S. Circuit Court of Appeals.
Joann Bell, executive director of the American Civil Liberties Union affiliate in Oklahoma City, said the law could chill free-speech rights along area streets and highways.
"It stands to reason that if a person doesn't have the money to buy a hamburger and Coke, then they probably don't have the money to buy the permit, either," she said.
"How much does free speech cost in Oklahoma? That's the question."
The ordinance went into effect today.
A unanimous opinion issued by the New York Court of Appeals on July
6 marks
a significant shift in the wiretapping jurisprudence of New York's
highest court. Following the decision in People v. Martello, police
may install pen registers -- devices that monitor numbers dialed from a
telephone line -- without obtaining a warrant based on
probable cause. A "reasonable suspicion" is now sufficient
for pen register surveillance to be initiated.
Most pen registers include a regular wiretapping feature to supplement
the number recording feature. It was the potential for abuse of these"dual-feature"
pen registers that prompted the New York court's 1993 decision in People
v. Bialostok, requiring police to obtain wiretapping warrants for their
use. The Bialostok decision noted that
"it is the warrant requirement, interposing the magistrate's oversight,
that provides to citizens appropriate protection against unlawful intrusion."
In its latest ruling, the Court of Appeals drastically limited Bialostok,
holding that it did not apply to investigations conducted under Article
705 of the state Criminal Procedure Law, a 1988 amendment that allows police
to obtain a court order authorizing pen register surveillance upon a showing
of reasonable suspicion. The Court also held that Bialostok does
not apply retroactively to investigations completed prior to 1993.
Consequently, the Court refused to suppress pen register evidence against
Martello gathered by
police from 1990 to 1992.
Additional information on electronic surveillance is available at:
http://www.epic.org/privacy/wiretap/
Imagine that federal law enforcement officials had the right to seize
your property—your home, your car, and your business—and you hadn’t even
been convicted of a crime. Unfortunately, under a system called “asset
forfeiture,” this is the law of the land.
Currently asset forfeiture is used by federal law enforcement officials
as a dream way to fill their coffers by seizing assets allegedly used in
a crime. But asset forfeiture has become a nightmare for many Americans
who have been accused of a crime but have not been proven guilty. In many
cases, even when the accused citizens are found innocent, they face an
expensive struggle with government bureaucrats to recover their property.
Many times they are unsuccessful in ever recovering their property!
To help remedy this problem, Rep. Henry Hyde (R-IL) has introduced
HR 1658, the “Civil Asset Forfeiture Reform Act of 1999.” This legislation
would shift the burden of proof from guilty until proven innocent by requiring
the federal government to prove with clear and convincing evidence that
property is subject to forfeiture if the seizure is challenged by the property
owner. It would also permit judges to order law enforcement agencies to
release property they’ve seized before the case is resolved if continued
possession by the government would pose substantial hardship to the property
owner. Stop Federal Law Enforcement Agents from Wrongfully Seizing Property!
The rules governing asset forfeiture turn fundamental notions of
fairness and due process on their head. The following are some serious
flaws with the current practice:
Civil forfeiture presumes property owners guilty until proven innocent.
The process has extremely short periods for filing a claim to contest the
seizure of property. Unlike the courts, legal counsel is not provided for
citizens who wish to contest an improper seizure.
TRENTON -- In an aggressive effort to catch drug smugglers, New Jersey state troopers have quietly enlisted workers at dozens of hotels along the New Jersey Turnpike to tip them off about suspicious guests who, among other things, pay for their their rooms in cash or receive a flurry of phone calls, according to people who have participated in the program.
The Hotel-Motel Program, operated out of the state police special projects unit since the early 1990's and modeled on a similar initiative in Los Angeles and by some Federal agencies, has recruited managers and employees at an undisclosed number of hotels to act as confidential informers about people who fit the profile of drug smugglers.
Hotel managers who participate in the program say they routinely allow troopers, without a warrant, to leaf through the credit card receipts and registration forms of all guests at the hotel and to offer $1,000 rewards to hotel workers whose tips lead to successful arrests.
In return, the hotel and motel managers say, they are assured that any searches or arrests will occur after the suspect drives off the hotel premises and that their workers will never be required to testify or have their names revealed in court documents.
At the heart of the program are the troopers' surveillance seminars, which train front desk clerks, bellhops and porters to scrutinize guests who fit the profile of drug traffickers by asking for corner rooms, hauling trailers behind their cars or frequently moving from room to room. Several hotel employees and union leaders said troopers have also trained them to take racial characteristics into account and pay particular attention to guests who speak Spanish.
State police officials, who have been besieged for years by charges that troopers illegally single out black and Hispanic motorists on New Jersey highways, acknowledge that hotel personnel have been enlisted as informers.
But they would not say how many people had been searched, questioned or arrested in the program, and they denied that race played any role in it.
Lieut. Bruce Geleta, who commands the unit, declined to discuss what factors troopers teach hotel employees to look for, saying that he did not want to alert the drug traffickers to his tactics. But he insisted that race was not among them.
"Believe me, these days, we're very careful not to do anything like that," he said in an interview.
But Clo Smith, a front desk clerk at the Holiday Inn near Newark Airport, said she sat through the hourlong seminar three years ago and was offended that the state police detective suggested that Spanish-speaking guests should be treated with more suspicion than those who speak English.
"Let's just say I found it somewhat insensitive," said Ms. Smith, the union steward for Local 819 of the International Brotherhood of Teamsters, which represents front desk employees at the hotel.
David Feeback, president of Hotel and Restaurant Employees Local 69 in Secaucus, said some of his members have also complained that troopers have pressured them to participate and report any patrons at hotel restaurants who speak Spanish and pay with large sums of cash.
"It's racial profiling, plain and simple," Feeback said. "They shouldn't be discriminating against people that way. And if any of my members ask, I tell them to have nothing to do with it."
Lieutenant Geleta said he would not provide a racial breakdown of those people stopped, searched or arrested as part of the Hotel-Motel Program.
John R. Hagerty, a spokesman for the state police, also declined to release the names or court case numbers of individuals who were prosecuted after being arrested by troopers in the Hotel-Motel unit.
Although it is a common, and widely accepted, investigative technique
for detectives to develop a network of sources within the community they
police, the state troopers' Hotel-Motel Program is particularly aggressive
because in some cases it uses the entire staff of a hotel to keep guests
under the watchful eyes of police informers throughout their
stay.
That has made the program very effective, Lieutenant Geleta said.
And although the practice of using such informers is legal as long as their participation is voluntary, civil rights advocates and members of the tourism and hospitality industry say it raises privacy concerns.
"For the state police to be looking through people's credit card
receipts and registration forms, and from what I understand, conducting
surveillance on some of them, is just a gross invasion of privacy," said
Lenora Lapidus, legal director for the New Jersey chapter of the
American Civil Liberties Union.
Jan Larsen, president of the New Jersey Hotel and Motel Association, said that he had not heard of the program and that the organization had never been asked to take a formal position on it.
But Larsen, who runs the East Brunswick Hilton, said he would not allow his staff to participate.
"We wouldn't allow the police to look through our records without a subpoena, period," Larsen said. "We have an obligation to protect people's privacy. I would think there's a civil liability if we start giving out information."
Robert Fields, owner of the Days Inn near Newark Airport, said he refused to participate in the program because he thought it violated his guests' right to privacy. Fields said that in 1997, his general manager was asked by the state police to join the program, but Fields and his manager both decided it would be intrusive to grant the troopers' requests to search arbitrarily through "the bucket" where registration cards and credit card imprints are stored.
"It's like a tactic out of some dictatorship," Fields said. "When a person checks into a hotel, he or she has a reasonable assumption that the place of business will protect their privacy, not treat them like a criminal."
Days Inn is part of national chain, as are some of the participating motels; the national owners or managers in some cases allow each individual manager to decide independently whether to participate. The Hilton chain, for instance, forbids managers to allow the police to inspect the records of its guests without a subpoena.
The existence of the program came to light after some hotel workers, offended by what they perceived to be discrimination, began to complain to lawyers who in turn notified some reporters.
Ms. Lapidus said that among the questions raised by the disclosure of the informer program was whether troopers testified truthfully in court hearings about arrests that were initiated by hotel employees.
"There are certainly search and seizure issues here," Ms. Lapidus said.
"The Constitution guarantees that every defendant knows all the evidence against them and all the witnesses against them, so if we find that that hasn't been happening, it's certainly something we'd be interested in pursuing."
But Lieutenant Geleta said that his detectives were savvy enough to conceal their informers' identities without violating either the law or police procedure.
"We have ways of handling that," he said, but declined to elaborate.
Moreover, he said, the vast majority of the arrests made by the Hotel-Motel unit ended with guilty pleas long before trial.
Hotel managers who participated in the program differed in their assessments of whether race played a role in it.
Fred Hartman, manager of the Ramada Inn near Newark Airport, said he was convinced that guests were scrutinized only on their behavior, and not on their race.
"There's no profiling whatsoever," said Hartman, who acknowledged that he never attended one of the troopers' training sessions. Hartman said he had no qualms about allowing troopers to check through the credit card receipts and registration forms of guests on a weekly basis because "they're good guys, and we want to cooperate with them whenever we can."
But even some hotel managers who support the program say that state
troopers have told them that the intent is to catch West Indians or Hispanic
people, particularly South and Central Americans, involved in the drug
trade. Chip Woodell, general manager of the Hampton Inn near Newark Airport,
said he agreed to let the state police address his
employees last month because troopers convinced him they were interested
only in catching international drug smugglers rather than guests who may
use narcotics themselves.
"They told me they weren't interested in catching someone smoking a joint in their room," said Woodell, who said he allows troopers to check through his guests' registration records an average of twice a week. "What they want is some guy from Colombia, who swallowed a kilo of cocaine wrapped in balloons, who was trying to sneak it through the airport."