IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Stopping Bin Laden: How Much Surveillance is Too Much?

An anti-terrorism bill is gathering support, but privacy advocates fear abuse of expanded surveillance powers.

WASHINGTON, D.C. -- Alleged terrorism mastermind Osama bin Laden relies on modern technology as much as anybody, according to one expert on cyber-security and encryption policy.

According to Jim Lewis, director of the technology and public policy program at the Center for Strategic and International Studies, a Washington, D.C., public-policy think tank, although bin Laden has proved an elusive target, his very reliance on high-tech communications could be turned back on him in exactly the same way that he allegedly turned technology against those he ordered killed two weeks ago.

"Its a judo maneuver," Lewis said. "Hes been able to exploit some of our vulnerabilities. But the same stuff that hes using gives us vulnerabilities that we can exploit. Thats what weve got to look for."

The federal government is looking. During the past two days, U.S. Attorney General John Ashcroft has been testifying before members of Congress, urging them to pass the Anti-Terrorism Act of 2001, which would, among other things, relax restrictions on wiretapping suspected terrorists while easing rules on obtaining phone and Internet records.

Its a proposal that has drawn widespread support, but also has drawn flak from several quarters, including some of the congressmen to whom Ashcroft spoke.

One, Rep. Barney Frank, D-Mass., expressed eagerness to give law agents more tools to track down bin Laden and other suspected terrorists. But he also expressed fear that information could be used in inappropriate ways once obtained by authorities, referencing the dirty-tricks campaign against Martin Luther King by former FBI Director J. Edgar Hoover.

Having failed to find criminal evidence to use against King, Frank said, Hoover instead used information gained through surveillance to embarrass and publicly humiliate the civil rights leader.

The attorney generals request also raises the specter of Carnivore, the powerful software that FBI allows agents -- if they have proper warrants -- to spy on e-mail and Internet communications.

The Electronic Privacy Information Center (EPIC) is among those worried that Ashcrofts anti-terrorism platform might be rushed through Congress because of the looming threat of terrorism, even though the privacy-rights implications of the law have not been sufficiently worked out.

"Having been in the government for 12 years, I know they observe these [laws] very strictly," said Lewis, who once was in charge of encryption policy for the U.S. Commerce Department. "And so, yes, if it was the 1960s, we should have concerns. But under the laws we have now, I dont think those concerns are justified. "Im not worried about these new technologies. We need to find ways to use them to our advantage."

Lewis cites various reports that indicate that bin Laden no longer uses the satellite telephones he once relied on to communicate with terrorist cells, because U.S. surveillance intercepted some of his calls just before the U.S. cruise missiles were launched on his training camps in 1998.

Instead, Lewis said, bin Laden relies on couriers who take CD-ROMs or floppy disks from bin Ladens computers and travel out of the country to meet with other emissaries. Using a primitive method of encryption called steganography, bin Ladens messages to his followers are hidden inside other messages on the disks. Once they are decoded, they can be sent out around the world over the Internet, in a manner that makes it difficult if not impossible to trace them directly back to bin Laden.

Nonetheless, Lewis added, there are continuing reports that bin Laden may still occasionally use e-mail himself -- and there was word Monday that he had sent a personal message by fax to an Arab TV station urging Muslims in Pakistan to fight a holy war against "Americas crusader forces."

The more he does that sort of thing, the better, Lewis suggested.

The worst thing that the United States could possibly do would be to try to cut off the terrorist leaders ability to utilize the technology that keeps him in contact with his far-flung allies, the analyst said, noting that tracking Bin Ladens moves through Internet and telecommunications surveillance is probably the best chance investigators have of pinpointing his whereabouts.

"Hes not always going to be able to encrypt everything," Lewis said. "So when he goes onto the financial network to transfer money; when his operatives talk on the phone in the clear or send e-mail in the clear; these are opportunities for us. Even just knowing that there is a certain pattern of messages being sent, that gives us an advantage in figuring out the structure of the network."

These seem to be the sorts of ideas that lie behind Ashcrofts anti-terrorism proposal. Ashcroft, testifying before the House Judiciary Committee Monday, assured House members that the plan would not expand the law; just allow it to "grow as technology grows."

Current law, he said, restricts investigators to tactics that were effective in the days when criminals used only analog communications technologies. But those days, Ashcroft says, are gone.

"Our proposal would allow a federal court to issue a single order that would apply to all providers in a communications chain, including those outside the region where the court is located," Ashcroft testified Monday. "We need speed in identifying and tracking down terrorists. Time is of the essence. The ability of law enforcement to trace communications into different jurisdictions without obtaining an additional court order can be the difference between life and death for American citizens."

Not everyone believes that Ashcroft and the Bush administration have only terrorists in mind in their efforts to extend the reach of surveillance, however.

U.S. Rep. Bob Barr, R-Ga., questioned Monday whether the Justice Department was seeking to take advantage of the terrorist attacks by requesting investigative powers that Congress has previously refused to allow.

"We see many, many provisions in the proposal that have nothing to do with fighting terrorism," Barr said.

David Sobel, general counsel at EPIC, in Washington, D.C., has similar concerns, though he stops short of making allegations about motives. He disagrees with the contention of the CSISs Lewis that current laws will provide suitable protections against abuse of expanded federal surveillance powers.

"Thats a novel position," Sobel said. "I guess its explained by the fact that [Lewis] was in the government for a long time. Nobody outside of government feels that way."

He said he is concerned by what he indicates is a certain opaqueness shrouding the anti-terrorism measures being pushed by Ashcroft.

"I think it needs more explanation," Sobel said. "Thats one of the problems right now. Its not entirely clear what the implications of these changes would be, and I think there does need to be more opportunity to get a better understanding of what the real implications might be."

The implications dont just extend to the current war against terrorism, Sobel indicated.

"They are talking about their needs with respect to a terrorism investigation, but they dont seem interested in limiting the new powers to only those investigations," he said. "This is not about just today, but its looking ahead to the continued convergence of technology and the development of new technologies. Thats why this is a complicated issue that requires some time. Because were talking about a quickly evolving environment and we need to fully understand the implications of changes to the legal framework."

Lewis agrees that care needs to be taken that any changes to the surveillance laws do not go too far. But he also said that he believes as a society, weve gone "squeamish" about technologies like Carnivore.

"I think we can do this in a balanced way that will increase security without damaging civil liberties," Lewis said.

Kevin Featherly, Newsbytes