U.S. Airport Screeners Are Watching What You Read
September 21st, 2007Via: Wired:
International travelers concerned about being labeled a terrorist or drug runner by secret Homeland Security algorithms may want to be careful what books they read on the plane. Newly revealed records show the government is storing such information for years.
Privacy advocates obtained database records showing that the government routinely records the race of people pulled aside for extra screening as they enter the country, along with cursory answers given to U.S. border inspectors about their purpose in traveling. In one case, the records note Electronic Frontier Foundation co-founder John Gilmore’s choice of reading material, and worry over the number of small flashlights he’d packed for the trip.
The breadth of the information obtained by the Gilmore-funded Identity Project (using a Privacy Act request) shows the government’s screening program at the border is actually a “surveillance dragnet,” according to the group’s spokesman Bill Scannell.
“There is so much sensitive information in the documents that it is clear that Homeland Security is not playing straight with the American people,” Scannell said.
The documents show a tiny slice of the massive airline-record collection stored by the government, as well as the screening records mined for the controversial Department of Homeland Security passenger-rating system that assigns terrorist scores to travelers entering and leaving the country, including U.S. citizens.
The so-called Automated Targeting System scrutinizes every airline passenger entering or leaving the country using classified rules that tell agents which passengers to give extra screening to and which to deny entry or exit from the country.
The system relies on data ranging from the government’s 700,000-name terrorism watchlist to data included in airline-travel database entries, known as Passenger Name Records, which airlines are required to submit to the government.
According to government descriptions, ATS mines data from intelligence, law enforcement and regulatory databases, looking for linkages in order to identify “high-risk” targets who may not already be on terrorist watchlists.