Feeds

The American way of spying gets a makeover

Intel reform bill finally emerges from Congress

  • alert
  • submit to reddit

Security for virtualized datacentres

A controversial intelligence reform bill inspired by the 9/11 Commission has finally passed through both chambers of Congress and will soon be signed by the President.

The bill, which had previously been stalled by House Republicans, was approved by a wide margin during a brief lame-duck session this week, after language that the nay-sayers believed could allow civilian authorities to hamper military intelligence gathering and dissemination was re-jiggered.

National scapegoat

The main feature is a new national intelligence czar, to whom, it is imagined, the many federal agencies engaged in intel and counterterrorism will report. Previously, the Director of Central Intelligence (DCI) was the de facto Godfather; but he has no budgetary control over other agencies, hence no power to punish, and is more than occupied with the task of administering the CIA, and testifying before myriad Congressional committees.

The new post will have some budgetary authority, but not a lot. Republican skeptics believed that putting too much power in the hands of a civilian could jeopardize military operations, so there was a last-minute scaling-down to get the bill passed. This may result in one of Congress's most plentiful products, a 'worst-of-both-worlds' compromise.

Critics charge that the last thing needed in any reform effort is another layer of Washington bureaucracy, and there's wisdom in that position. Supporters claim that someone has got to be in charge of the 20+ agencies involved in national security, or they'll be doomed to work at cross purposes. The reform bill, as adopted, gives us someone in charge, but doesn't give him all the power he needs to succeed, if, indeed, he can succeed.

Basically, the bill creates an Office of Security Scapegoat, so that the next time the United States suffers a spectacular, mass-casualty attack, Congress will know who to blame. This feature alone accounts for much of its allure among Members. Whenever things go sideways, Congress is always looking for someone to blame. Members find it comforting to know ahead of time who that unfortunate bugger will be.

I spy with my little eye

The bill marks the federal government's final triumph over the Act of Posse Comitatus, a niggling restriction on the use of military assets in domestic law enforcement. Boosters have used such gimmicky euphemisms as "breaking down the walls" and "connecting the dots" to describe the business of wholesale intel sharing among military and law-enforcement bodies, but the wind up is that distinctions between the two are being dissolved on counterterrorist pretexts.

There are new, expanded powers and lower barriers for federal electronic wiretaps; and there is a most regrettable expansion of the Foreign Intelligence Surveillance Act (FISA), that basically lets the Feds apply it to anyone they wish to investigate without first establishing that they are, in fact, foreign agents.

The bill also throws extra money at futile biometric ID schemes, and makes gestures toward standardized driver's licenses and birth certificates. It lays the early groundwork for the eventual establishment of a national, biometrically-enhanced ID card, without really saying so. People would complain about that, so the idea here is to equip us with them before we know what they really imply.

Window dressing

On the plus side, the bill mandates a certain amount of futile Congressional oversight (as if there weren't enough of that already), and the establishment of a White House privacy and civil liberties liaison to help with policy decisions, in case the President wishes to be so advised. Unfortunately, the White House remains in a position to sideline the privacy and civil liberties office in case it should become troublesome, as it might when, say, a war is proposed on utterly fictional pretenses, or when people with Arabic names might need to be sweated in jails without access to legal counsel.

Not that this would ever occur in such a highly-evolved Democracy as the USA, mind, which is bringing Liberty and the blessings of a bourgeois Protestant God to the far corners of the Earth. But, theoretically, it could happen if, by some odd chance, the Bill of Rights or the Geneva Conventions were ignored, say.

Purely an outside chance, certainly. ®

Related stories

Close the email wiretap loophole
Ashcroft proposes vast new surveillance powers

Beginner's guide to SSL certificates

More from The Register

next story
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
It's on by default – didn't you read the small print?
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
NOT OK GOOGLE: Android images can conceal code
It's been fixed, but hordes won't have applied the upgrade
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.