Spotlight on Surveillance
Customs and Border Protection�s Automated System Targets U.S. Citizens
EPIC�s �Spotlight on Surveillance� project scrutinizes federal government programs that affect individual privacy. For more information, see previous Spotlights on Surveillance. The Automated Targeting System, part of the Department of Homeland Security�s Customs and Border Protection, is under the Spotlight this month. For Fiscal Year 2007, President Bush has requested $1.94 billion for border security, which includes the Automated Targeting System. The system was originally established to assess cargo that may pose a threat to the United States. Now the Department of Homeland Security proposes to use the system to establish a secret terrorism risk profile for millions of people, most of whom will be U.S. citizens. Simultaneously, it is seeking to remove Privacy Act safeguards for the database.
Source: U.S. Customs and Border Protection
The Automated Targeting System assigns a “risk assessment” to every person and container seeking to enter or exit the U.S. In Fiscal Year 2005, Customs and Border Protection “processed 431 million pedestrians and passengers, 121 million privately owned vehicles, and processed and cleared 25.3 million sea, rail, and truck containers,” according to Customs.
The Department of Homeland Security recently published a �Notice of Privacy Act system of records� for the Automated Targeting System (�ATS�), which it says �performs screening of both inbound and outbound cargo, travelers, and conveyances.� ATS is associated with the Treasury Enforcement Communications System (�TECS�), a database containing �every possible type of information from a variety of Federal, state and local source.� The new description of the database differs significantly from an earlier one. As recently as March, ATS was described as �a computerized model that [Customs and Border Protection] officers use as a decision support tool to help them target oceangoing cargo containers for inspection.� It is unknown when ATS expanded from merely screening shipping cargo to scrutinizing land and sea travelers. On the same day as the Homeland Security notice about the proposal to use ATS to target individuals, the Senate Homeland Security and Governmental Affairs Committee asked the department for a briefing about ATS.
According to the Department of Homeland Security, ATS assigns a �risk assessment,� which is essentially a terrorist risk rating, to all people �seeking to enter or exit the United States,� �engag[ing] in any form of trade or other commercial transaction related to the importation or exportation of merchandise,� �employed in any capacity related to the transit of merchandise intended to cross the United States border,� and �serv[ing] as operators, crew, or passengers on any vessel, vehicle, aircraft, or train who enters or exits the United States.� This numbers in the hundreds of millions. In Fiscal Year 2005, Customs and Border Protection �processed 431 million pedestrians and passengers, 121 million privately owned vehicles, and processed and cleared 25.3 million sea, rail, and truck containers.�
The Automated Targeting System�s terrorist risk profiles will be secret, unreviewable, and maintained by the government for 40 years. The profiles will determine whether individuals will be subject to invasive searches of their persons or belongings, and whether U.S. citizens will be permitted to enter or exit the country. Individuals will not have judicially enforceable rights to access information about them contained in the system, nor to request correction of information that is inaccurate, irrelevant, untimely or incomplete.
This system is reminiscent of the now-defunct �Total Information Awareness� program, which sought to capture a person�s �information signature� so that the government could track potential terrorists and criminals involved in �low-intensity/low-density� forms of warfare and crime. The goal of the system was to track individuals by collecting as much information about them as possible and using computer algorithms and human analysis to detect potential activity. Although the public focused on the data collected for Total Information Awareness, a key part of the design, as described by John Poindexter, was the ability of the government to assign a secret terrorist rating to each individual.
Source: Democratic Staff of the House Committee on Homeland Security
�There are many gaps remaining in our port security. As some experts have noted, the current port security regime is a �house of cards,� in which containers are often not inspected and the government does not truly know which containers are �high risk,�� according to an August 2006 report by the Democratic Staff of the House Committee on Homeland Security.
According to the notice, ATS creates �risk assessments� for each person or item by �associat[ing] information obtained from CBP�s cargo, travelers, and border enforcement systems with a level of risk posed by each item and person as determined through the rule based query of the cargo or personal information accessed by ATS.� A massive amount of information from many systems including the Treasury Enforcement Communications System, the Advance Passenger Information System, and travelers� Passenger Name Record data, which includes address and payment data, itineraries and other travelers in the same party, will be analyzed under �criteria and rules developed by CBP� that are unknown to the public. TECS has �5.3 billion records accessed 766 million times daily.� ATS also will retain the risk assessments for 40 years, even assessments of people who are not considered a threat. Customs and Border protection says, �All risk assessments need to be maintained because the risk assessment for individuals who are deemed low risk will be relevant if their risk profile changes in the future, for example, if terrorist associations are identified.�
Although individuals will not be able to view the terrorist profile rating that has been assigned by the government, the data and the risk assessment will be available to other federal agencies for a wide range of activities. According to the Privacy Act notice, Customs and Border Protection has identified 15 categories of �routine uses� of personal information to be collected and maintained in the program�s system of records. In one category, CBP anticipates disclosure to:
To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental organizations where CBP is aware of a need to utilize relevant data for purposes of testing new technology and systems designed to enhance border security or identify other violations of law.
Another category allows disclosure to:
Federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a statute, rule, regulation, order, or license, where CBP believes the information would assist enforcement of civil or criminal laws.
These categories are so broad as to be almost meaningless, allowing for potential disclosure to virtually any government agency worldwide for an array of actual or potential undefined violations.
Not only does Customs and Border Protection seek to broadly use ATS data, but it proposes to exempt the system from Privacy Act requirements that an individual be permitted access to personal information, that an individual be permitted to correct and amend personal information, and that an agency assure the reliability of personal information for its intended use. When it enacted the Privacy Act in 1974, Congress sought to restrict the amount of personal information that federal agencies could collect and required agencies to be transparent in their information practices.
Customs and Border Protection proposes to exempt ATS from all Privacy Act provisions guaranteeing citizens the right to access records containing information about them. The Privacy Act provides, among other things, that:
� an individual may request access to records an agency maintains about him or her;
� an individual may seek judicial review to enforce the statutory right of access provided by the Act, and
� the agency must publish a notice of the existence of records in the Federal Register, along with the procedures to be followed to obtain access.
The agency also seeks to exempt ATS from the Privacy Act requirements that define the government�s obligation to allow citizens to challenge the accuracy of information contained in their records, such as:
� an agency must correct identified inaccuracies promptly;
� an agency must make notes of requested amendments within the records; and
� an agency must establish procedures to handle disputes between the agency and individual as to the accuracy of the records.
Source: U.S. Customs and Border Protection
Although individuals will not be able to view the terrorist profile rating that has been assigned by the government, the data and the risk assessment will be available to other federal agencies for a wide range of activities. Customs and Border Protection has identified 15 categories of “routine uses” of personal information to be collected and maintained in ATS.
Customs and Border Protection�s notice establishes a system that provides neither adequate access nor the ability to amend or correct inaccurate, irrelevant, untimely and incomplete records. �Generally, this system of records may not be accessed for purposes of determining if the system is a record pertaining to a particular individual� nor is it to be accessed �under the Privacy Act for the purpose of inspection,� the notice says. In lieu of the judicially enforceable right of access provided by the Privacy Act, �general inquiries regarding ATS may be directed to the Customer Satisfaction Unit.� In its Privacy Impact Assessment for ATS, Homeland Security states, �There is no procedure to correct the risk assessment and associated rules stored in ATS.� Under the redress procedure to correct data in the source systems, such as TECS, a person must write to CBP Customer Satisfaction Unit in the Office of Field Operations.
It is unknown how a person would know that there is incorrect information in ATS when the system can neither be accessed under the Privacy Act for inspection nor can it be accessed to determine if it includes an individual�s record. In fact, the only indication a traveler may have that the government is keeping records about him is if he is subjected to extra scrutiny, detained or arrested at the border.
Homeland Security Secretary Michael Chertoff recently discussed the citizens� right to redress in cases where they are mistakenly listed as �threats� on the Transportation Security Administration�s �no-fly lists.� He said, �we don�t conduct court hearings on this� because �first of all, almost all the information is classified; second, because I'm quite sure that the 19 hijackers, if we could replay history, would have contested being on a no-fly list, and we're not about to let them do that; and third, because we would be inundated with proceedings.� Secretary Chertoff is correct: if citizens had the right to sue to ensure that their records are correct, that they are not mistakenly given terrorist �risk assessments,� then the department would be inundated – and innocent citizens would be cleared of the �threat� label. People have had to suffer the consequences of false identifications under the no-fly lists. Last year, the director of the Transportation Security Administration�s redress office revealed that more than 30,000 people who are not terrorists have asked the Transportation Security Administration to remove their names from the lists since September 11, 2001. Now, with the redress problem for air travelers still unresolved, the Department of Homeland Security is proposing to dramatically expand the secret profiling of American citizens.
If the Department of Homeland Security is allowed to exempt the ATS from the Privacy Act requirements, then the agency would not ensure the reliability of the data, provide citizens with access to their personal data, or opportunities to correct inaccurate or incomplete data. These are significant failures, as the Government Accountability Office (�GAO�) reported in March that there are questions about the accuracy and reliability of ATS risk assessments. The office�s review of ATS showed that CBP �currently does not have reasonable assurance that ATS is effective,� testified Richard M. Stana, Director of Homeland Security and Justice Issues at the Government Accountability Office, at a Senate committee hearing in March. Stana also questioned the accuracy and reliability of ATS risk assessments. �CBP does not yet have key internal controls in place to be reasonably certain that ATS is providing the best available information to allocate resources for targeting and inspecting that are the highest risk and not overlook inspecting containers that pose a threat to the nation.� These criticisms remain even after a 2004 GAO review suggested improvements to the system.
The Automated Targeting System was created to screen shipping cargo, but it has many problems even completing that mission. An August 2006 report from the Democratic Staff of the House Committee on Homeland Security gave both port and border security low marks. For port security, the department�s grade is a C-/D+. �There are many gaps remaining in our port security. As some experts have noted, the current port security regime is a �house of cards,� in which containers are often not inspected and the government does not truly know which containers are �high risk.�� More resources are needed. �Current staffing shortages at foreign seaports participating in CSI are resulting in thirty-five percent of �high risk�� containers not being inspected before they are shipped to the U.S.� In fact, 75 percent �of our ports do not have the ability to screen a container for dirty bombs or nuclear weapons,� according to the report.
EPIC has highlighted the problems inherent in passenger profiling systems in previous testimony and comments. In testimony before the National Commission on Terrorist Attacks Upon the United States (more commonly known as �the 9/11 Commission�), EPIC President Marc Rotenberg explained, �there are specific problems with information technologies for monitoring, tracking, and profiling. The techniques are imprecise, they are subject to abuse, and they are invariably applied to purposes other than those originally intended.�
The Automated Targeting System mines a vast amount of data to create a �risk assessment� on hundreds of millions of people per year, a label that will follow them for the rest of their lives, as the data will be retained for 40 years. Yet the system is deeply flawed, and the funds spent turning ATS into a citizen profiling program would be better spent in perfecting its cargo screening process, so that port security can be stronger than a �house of cards.�
 Department of Homeland Security, Budget-in-Brief Fiscal Year 2007 (Feb. 6, 2006) available at http://www.dhs.gov/xlibrary/assets/Budget_BIB-FY2007.pdf and http://www.epic.org/privacy/surveillance/spotlight/0806/dhsb07.pdf.
 Department of Homeland Security, Notice of Privacy Act system of records, 71 Fed. Reg. 64543 (Nov. 2, 2006) [hereinafter �ATS Privacy Act Notice�] available at http://edocket.access.gpo.gov/2006/06-9026.htm.
 Department of the Treasury, Notice of Privacy Act system of records, 66 Fed. Reg. 52983, 53029 (Oct. 18, 2001) available at http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=2001_register&docid=f:18ocn2.pdf.
 Richard M. Stana, Director, Homeland Security and Justice Issues, Government Accountability Office, Testimony at a Hearing on Neutralizing the Nuclear and Radiological Threat: Securing the Global Supply Chain (Part Two) Before the Subcom. on Investigations of the S. Comm. on Homeland Security and Governmental Affairs, 109th Cong. (Mar. 30, 2006) [hereinafter �GAO Testimony on ATS�] available at http://www.gao.gov/new.items/d06591t.pdf.
 Ellen Nakashima and Spencer S. Hsu, U.S. Plans to Screen All Who Enter, Leave Country, Wash. Post, Nov. 3, 2006.
 W. Ralph Basham, Commissioner, Customs and Border Protection, Department of Homeland Security, Statement at a Hearing on Customs Budget Authorizations & Other Customs Issues Before the Subcom. on Trade of the H. Comm. on Ways & Means, 109th Cong. (July 25, 2006) available at http://waysandmeans.house.gov/hearings.asp?formmode=view&id=5160.
 See discussion, infra.
 According to Under Secretary of Defense for Acquisition, Logistics, and Technology Edward C. �Pete� Aldridge, �The purpose of TIA would be to determine the feasibility of searching vast quantities of data to determine links and patterns indicative of terrorist activities.� Question and Answer Response by Joint Staff and Under Secretary of Defense for Acquisition, Logistics, and Technology Edward C. �Pete� Aldridge at DoD Press Conference, DoD News Briefing—ASD(PA) Clark and Adm. Gove, Nov. 20, 2002 available at http://www.defenselink.mil/transcripts/2002/t11202002_t1120asd.html.
 ATS Privacy Act Notice, supra note 2 at 64544.
 National Research Council of the National Academies, Transportation Research Board, Cybersecurity of Freight Information Systems: A Scoping Study 69 (2003) available at http://trb.org/publications/sr/sr274.pdf.
 ATS Privacy Act Notice, supra note 2 at 64546.
 Id. at 64545.
 S. Rep. No. 93-1183 at 1 (1974).
 ATS Privacy Act Notice, supra note 2 at 64545.
 5 U.S.C. � 552a(d)(1).
 5 U.S.C. � 552a(g)(1).
 5 U.S.C. �� 552a(e)(4)(G), (e)(4)(H), (f).
 5 U.S.C. � 552a(d)(2)(B), (d)(3).
 5 U.S.C. � 552a(d)(4).
 5 U.S.C. � 552a(f)(4).
 ATS Privacy Act Notice, supra note 2 at 64546.
 Department of Homeland Security, Customs and Border Protection, Privacy Impact Assessment for the Automated Targeting System 19 (Nov. 22, 2006) available at http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_cbp_ats.pdf.
 Michael Chertoff, Secretary of Homeland Security, Remarks at the Federalist Society's Annual Lawyers Convention, Nov. 17, 2006 available at http://www.dhs.gov/xnews/speeches/sp_1163798467437.shtm.
 Anne Broache, Tens of thousands mistakenly matched to terrorist watch lists, CNet News.com, Dec. 6, 2005.
 The Department of Homeland Security is seeking exemptions under �552a(j)(2) and (k)(2). ATS Privacy Act Notice, supra note 2 at 64545.
 GAO Testimony on ATS, supra note 4 at 5.
 Id. at 5-6.
 Democratic Staff of the H. Comm. on Homeland Security, 109th Cong., The State of Homeland Security 2006: Annual Report Card on the Department of Homeland Security ii (Aug. 2006) available at http://hsc-democrats.house.gov/SiteDocuments/20060814122421-06109.pdf.
 Id. at 5.
 See EPIC�s pages on Passenger Profiling, http://www.epic.org/privacy/airtravel/profiling.html; Secure Flight, http://www.epic.org/privacy/airtravel/secureflight.html; and EPIC�s Spotlight on Surveillance about Registered Traveler (October 2005), http://www.epic.org/privacy/surveillance/spotlight/1005/.
 Marc Rotenberg, President, EPIC, Prepared Testimony and Statement for the Record of a Hearing on Security & Liberty: Protecting Privacy, Preventing Terrorism Before the National Commission on Terrorist Attacks Upon the United States (Dec. 8, 2003) available at http://www.epic.org/privacy/terrorism/911commtest.pdf.
EPIC Spotlight on Surveillance Page | EPIC Privacy Page | EPIC Home Page