Lawmakers violated the state Constitution in two ways
More of the old "Do as I say, not as I do" from our government masters.
Remember they expect us to obey the law to the letter even if it is too complex to understand, and they frequently severally punish us for minor violations of their laws.
But when THEY break the law it's not big deal. And of course there are not penalties for when THEY break the law.
Source
Bill on elections, HOAs is targeted
By Mary Jo Pitzl The Republic | azcentral.com Tue Jul 16, 2013 10:50 PM
Lawmakers combined unrelated topics in a bill last month, violating the state Constitution in two ways, according to a lawsuit filed Tuesday.
The suit takes aim at Senate Bill 1454, which passed in the legislative session’s closing rush. The legislation tacked on a number of changes to homeowners-association procedures to a bill dealing with numerous election-related measures.
Combining different topics in a bill — a tactic known as logrolling — violates the Constitution’s single-subject rule, argued attorney Tim Hogan of the Arizona Center for Law in the Public Interest. He filed the suit in Maricopa County Superior Court on behalf of two men active in homeowners associations.
The bill’s second constitutional misstep is its title, which does not accurately capture the topics addressed in the bill, the suit states. The title refers to elections and does not address homeowners-association changes.
While the bill should not be dealing with the two topics, its title nonetheless should at least accurately reflect its contents, Hogan said.
The lack of a proper title made it impossible for the plaintiffs, who opposed the homeowners-association provisions, to track the legislation, the suit states. It asks the court to block the bill from becoming law as scheduled on Sept. 13.
Sen. Kimberly Yee, R-Phoenix, sponsored the underlying bill, which, among other things, required cities to conform their election dates to the state elections calendar. It also prevented candidates running with public financing from using corporate logos or trademarks that the candidate uses in his or her business life. The provision stemmed from Yee’s complaint last year against one of her opponents who used his business logo on campaign materials.
Hours before the Legislature adjourned for the year, Rep. Michelle Ugenti, R-Scottsdale, amended the bill to include a long list of rules for homeowners associations. It was a way to salvage her legislation, which had stalled. It passed with strong majorities in both chambers.
“Somebody wanted to make Rep. Ugenti happy,” Hogan said.
Ugenti did not return a call seeking comment.
Hogan said SB 1454 is a textbook example of what happens when the Legislature moves too fast on long, complicated legislation. The Ugenti amendments were more than 65 pages long, the suit states.
He said if lawmakers want to make changes to laws governing elections and homeowners associations, they should do so in separate bills.
Fix fire hydrants or bust post smokers
What's more important? Paying some cop $25+/hr to bust harmless pot smokers, or paying some maintenance man $12/hr to fix busted fire hydrants???
From this article it sure sounds like it is more important to the members of the Phoenix City Council to get the police vote and pay the 3,000+ Phoenix cops big bucks to bust harmless pot smokers, then it is to pay the 5 guys who make $12/hr to fix fire hydrants and keep homes from burning down.
Source
East Valley-area family loses home; faulty fire hydrant partially to blame?
Posted: Monday, July 15, 2013 8:01 am | Updated: 8:42 am, Mon Jul 15, 2013.
By Katie Conner, ABC15.com
An Ahwatukee family says a broken fire hydrant prevented fire crews from saving their home.
The Bergmans' home caught fire around 3 a.m. on June 24.
Kimberly Bergman says when firefighters arrived, they tried to use the fire hydrant directly across from their home, but it was broken.
According to Bergman, by the time firefighters hooked up to fire hydrants down the street, flames had completely engulfed her home and spread to their neighbor's. Both homes were destroyed by the fire.
The Bergman family has lived in their home for 20 years.
“All these years, it never occurred to us that the fire hydrant across from our house would be broken,” Bergman said.
She says even though they lost their home, she’s lucky to be alive.
“To have as large of a fire as we did, and the way it spread, we’re all just very very lucky,” Bergman said.
The City of Phoenix Water Department is responsible for checking fire hydrants. According to Bergman, the hydrant in front of their home was deemed broken by the city six months prior to the fire.
“I was horrified and angry by the time I got outside and realized that the hydrant was broken and my home was burning down,” Bergman said.
She says she and her family have received an outpouring of support and help from the community.
They are currently living in a rental home but plan to rebuild next year.
Smoke weed? That's fine with God, pastors say
Source
Smoke weed? That's fine with God, pastors say
Jun. 14, 2013
Clergy says war on drugs is immoral
The Rev. Edwin Sanders says churches should help heal the sick, feed the hungry, and set prisoners free.
Even if they smoke pot.
Sanders, pastor of Metropolitan Interdenominational Church in Nashville, is part of a group of clergy who want to end the war on drugs by decriminalizing drug use. They met this week in Nashville at American Baptist College.
Sanders said the so-called war on drugs has failed for two reasons. First, he said, addiction to drugs is a disease, not a crime.
“You don’t criminalize and incarcerate people who have a disease,” Sanders said. “You treat and care for them.”
Second, Sanders said, the laws on drug use aren’t enforced fairly. A report from the ACLU of Tennessee released Thursday showed that black Tennesseans are arrested on marijuana possession charges four times as often as whites. About 45 percent of those arrested for marijuana-related crimes are black, even though they make up about 17 percent of the state’s population.
The war on drugs has led to mass incarceration of young black men, said the Rev. Forrest Harris, president of American Baptist College.
“The war on drugs is a moral injustice,” he said.
Ethan Nadelmann of the New York-based Drug Policy Alliance, which advocates decriminalizing drug use, was one of the guest speakers at the conference, which ended Friday.
He said pastors and many other Americans, especially in the South, believe drugs are inherently evil. That’s why jailing people for using them sounds so appealing.
“Deep down, we believe that putting these drugs in our bodies is a sin,” he said.
Punishing people for alleged sins didn’t work during Prohibition, Nadelmann said, and it doesn’t work now.
A growing number of Americans seem to agree with Nadelmann. A Pew Research Center Poll released in April found that 52 percent of Americans polled supported legalizing pot. That’s up from 41 percent in a similar poll in 2010.
Nadelmann said 18 states, plus the District of Columbia, allow medical marijuana, and at least another dozen states no longer consider possession of small amounts of marijuana a crime.
The Rev. Enoch Fuzz of Corinthian Baptist Church in Nashville, who was not at the conference, was skeptical about legalizing drugs. Instead, he would like to see more money spent on treatment. He would also like the police to focus on major drug dealers and less on the people who use drugs.
“We need to keep it criminal and increase our efforts to catch the big-time dealers, who are making all the money,” he said.
Clergy at the conference said the consequences of a drug arrest can last long after a person gets out of jail.
Many drug convictions are felonies, and those with felony convictions have a harder time finding jobs or housing, lose their voting rights, and sometimes are disqualified from getting financial aid if they want to go to college.
A new proposal in the Senate would bar felons from getting food stamps, said the Rev. Derrick Boykin, associate for African-American leadership outreach at Bread for the World, an anti-hunger organization.
Boykin said Bread for the World doesn’t have a position on decriminalizing drugs. But he argues that there’s a link between the war on drugs and hunger.
When parents go to jail for possessing drugs, family members are left to fend for themselves. They lose the parent’s income, so not as much money comes in to pay for essentials like food or housing.
Cutting off food stamps because of a felony conviction would hurt families, he said — “they won’t be able to put food on the table.”
This week’s meetings were sponsored by American Baptist, the Drug Policy Alliance, and the Samuel Dewitt Proctor Conference, a San Francisco-based network of progressive African-American churches.
The Proctor Conference has also published Bible studies based on a book called “The New Jim Crow” by Michelle Alexander, which criticizes the war on drugs because of the racial disparities in those jailed for drug arrests.
For many of the three dozen or so participants at the conference, the topic of drug arrests had a personal side. Members of their churches have been jailed for drug offenses as young men and those arrests have haunted those men for years.
The Rev. John Jackson from Trinity United Church of Christ in Gary, Ind., who is a former Chicago police officer turned pastor, said there has to be a better alternative to jail time for drug use.
“God does not care if you smoke weed,” he said. “God is not that petty.”
Contact Bob Smietana at 615-259-8228 or bsmietana@tennessean.com. Follow him on Twitter @bobsmietana.
PRISM a small part of more intrusive snooping effort
Source
June 15, 2013
PRISM a small part of more intrusive snooping effort
By The Associated Press
WASHINGTON -- In the months and early years after 9 /11, FBI agents began showing up at Microsoft Corp. more frequently than before, armed with court orders demanding information on customers.
Around the world, government spies and eavesdroppers were tracking the email and Internet addresses used by suspected terrorists. Often, those trails led to the world's largest software company and, at the time, largest email provider.
The agents wanted email archives, account information, practically everything, and quickly. Engineers compiled the data, sometimes by hand, and delivered it to the government.
Often, there was no easy way to tell if the information belonged to foreigners or Americans. So much data was changing hands that one former Microsoft employee recalls that the engineers were anxious about whether the company should cooperate or not.
Inside Microsoft, some called it "Hoovering" -- not after the vacuum cleaner, but after J. Edgar Hoover, the first FBI director, who gathered dirt on countless Americans.
This frenetic, manual process was the forerunner to PRISM, the recently revealed highly classified National Security Agency program that seizes records from Internet companies. As laws changed and technology improved, the government and industry moved toward a streamlined, electronic process, which required less time from the companies and provided the government data in a more standard format.
The revelation of PRISM this month by The Washington Post and The Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe.
However, interviews with more than a dozen current and former government and technology officials and outside experts show that, while PRISM has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort.
Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber-optic cables that make up the Internet's backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.
Whether by clever choice or coincidence, PRISM appears to do what its name suggests. Like a triangular piece of glass, PRISM takes large beams of data and helps the government find discrete, manageable strands of information.
The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the president's daily briefing. PRISM makes sense of the cacophony of the Internet's raw feed. It provides the government with names, addresses, conversation histories and entire archives of email inboxes.
Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a classified, continuing effort. Those interviews, however, along with public statements and the few public documents available, show there are two vital components to PRISM's success.
The first is how the government works closely with the companies that keep people perpetually connected to each other and the world. That storyline has attracted the most attention so far.
The second -- and far murkier one -- is how PRISM fits into a larger U.S. wiretapping program in place for years.
After 9/11, the 'Terrorist Surveillance Program' begins
Deep in the oceans, hundreds of cables carry much of the world's phone and Internet traffic. Since at least the early 1970s, the NSA has been tapping foreign cables. It doesn't need permission. That's its job.
However, Internet data doesn't care about borders. Send an email from Pakistan to Afghanistan and it might pass through a mail server in the United States, the same computer that handles messages to and from Americans. The NSA is prohibited from spying on Americans or anyone inside the United States. That's the FBI's job -- and it requires a warrant.
Despite that prohibition, shortly after the Sept. 11 al-Qaida terrorist attack, President George W. Bush secretly authorized the NSA to plug into the fiber-optic cables that enter and leave the United States, knowing it would give the government unprecedented, warrantless access to Americans' private conversations.
Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there, zipping by at the speed of light.
"You have to assume everything is being collected," said Bruce Schneier, who has been studying and writing about cryptography and computer security for two decades.
The New York Times disclosed the existence of this effort in 2005. In 2006, former AT&T technician Mark Klein revealed that the company had allowed the NSA to install a computer at its San Francisco switching center, a key hub for fiber-optic cables.
What followed was the most significant debate over domestic surveillance since the 1975 Church Committee, a special Senate committee led by Sen. Frank Church, D-Idaho, reined in the CIA and FBI for spying on Americans.
Unlike the recent debate over PRISM, however, there were no visual aids, no easy-to-follow charts explaining that the government was sweeping up millions of emails and listening to phone calls of people accused of no wrongdoing.
The Bush administration called it the "Terrorist Surveillance Program" and said it was keeping the United States safe.
"This program has produced intelligence for us that has been very valuable in the global war on terror, both in terms of saving lives and breaking up plots directed at the United States," Vice President Dick Cheney said at the time.
The government has said it minimizes all conversations and emails involving Americans. Exactly what that means remains classified, but former U.S. officials familiar with the process say it allows the government to keep the information as long as it is labeled as belonging to an American and stored in a special, restricted part of a computer.
That means Americans' personal emails can live in government computers, but analysts can't access, read or listen to them unless the emails become relevant to a national security investigation.
The government doesn't automatically delete the data, officials said, because an email or phone conversation that seems innocuous today might be significant a year from now.
What's unclear to the public is how long the government keeps the data. That is significant because the United States someday will have a new enemy. Two decades from now, the government could have a trove of American emails and phone records it can tap to investigative whatever Congress declares a threat to national security.
The Bush administration shut down its warrantless wiretapping program in 2007 but endorsed a new law, the Protect America Act, which allowed the wiretapping to continue with changes: The NSA generally would have to explain its techniques and targets to a secret court in Washington, but individual warrants would not be required.
Congress approved it, with then-Sen. Barack Obama, D-Ill., in the midst of a campaign for president, voting against it.
"This administration also puts forward a false choice between the liberties we cherish and the security we provide," Obama said in a speech two days before that vote. "I will provide our intelligence and law enforcement agencies with the tools they need to track and take out the terrorists without undermining our Constitution and our freedom."
US-98XN, or PRISM, takes over warrantless-wiretapping effort
When the Protect America Act made warrantless wiretapping legal, lawyers and executives at major technology companies knew what was about to happen.
One expert in national-security law, who is directly familiar with how Internet companies dealt with the government during that period, recalls conversations in which technology officials worried aloud that the government would trample on Americans' constitutional right against unlawful searches, and that the companies would be called on to help.
The logistics were about to get daunting, too.
For years, the companies had been handling requests from the FBI. Now, Congress had given the NSA the authority to take information without warrants. Although the companies didn't know it, the passage of the Protect America Act gave birth to a top-secret NSA program, officially called US-98XN.
It was known as PRISM.
Although many details are still unknown, it worked like this:
Every year, the attorney general and the director of national intelligence spell out in a classified document how the government plans to gather intelligence on foreigners overseas.
By law, the certification can be broad. The government isn't required to identify specific targets or places.
A federal judge, in a secret order, approves the plan.
With that, the government can issue "directives" to Internet companies to turn over information.
While the court provides the government with broad authority to seize records, the directives themselves typically are specific, said one former associate general counsel at a major Internet company. They identify a specific target or groups of targets. Other company officials recall similar experiences.
All adamantly denied turning over the kind of broad swaths of data that many people believed when the PRISM documents were first released.
"We only ever comply with orders for requests about specific accounts or identifiers," Microsoft said in a statement.
Facebook said it received between 9,000 and 10,000 requests for data from all government agencies in the second half of 2012. The social media company said fewer than 19,000 users were targeted.
How many of those were related to national security is unclear, and likely classified. The numbers suggest each request typically related to one or two people, not a vast range of users.
Tech company officials were unaware there was a program named PRISM. Even former law enforcement and counterterrorism officials who were on the job when the program went live and were aware of its capabilities said this past week that they didn't know what it was called.
What the NSA called PRISM, the companies knew as a streamlined system that automated and simplified the "Hoovering" from years earlier, the former assistant general counsel said. The companies, he said, wanted to reduce their workload. The government wanted the data in a structured, consistent format that was easy to search.
Any company in the communications business can expect a visit, said Mike Janke, CEO of Silent Circle, a company that advertises software for secure, encrypted conversations. The government is eager to find easy ways around security.
"They do this every two to three years," said Janke, who said government agents have approached his company but left empty-handed because his computer servers store little information. "They ask for the moon."
That often creates tension between the government and a technology industry with a reputation for having a civil-libertarian bent. Companies occasionally argue to limit what the government takes. Yahoo even went to court -- and lost -- in a classified ruling in 2008, The New York Times reported Friday.
"The notion that Yahoo gives any federal agency vast or unfettered access to our users' records is categorically false," Ron Bell, the company's general counsel, said recently.
Under PRISM, the delivery process varied by company.
Google, for instance, says it makes secure file transfers. Others use contractors or have set up stand-alone systems. Some have set up user interfaces that make it easier for the government, according to a security expert familiar with the process.
Every company involved denied the most sensational assertion in the PRISM documents: that the NSA pulled data "directly from the servers" of Microsoft, Yahoo, Google, Facebook, AOL and more.
Technology experts and a former government official say that phrasing, taken from a PowerPoint slide describing the program, was likely meant to differentiate PRISM's neatly organized, company-provided data from the unstructured information snatched out of the Internet's major pipelines.
In slides made public by the newspapers, NSA analysts were encouraged to use data coming from PRISM and from the fiber-optic cables.
PRISM, as its name suggests, helps narrow and focus the stream. If eavesdroppers spot a suspicious email among the torrent of data pouring into the United States, analysts can use information from Internet companies to pinpoint the user.
With PRISM, the government gets a user's entire email inbox. Every email, including contacts with American citizens, becomes government property.
Once the NSA has an inbox, it can search its huge archives for information about everyone with whom the target communicated. All those people can be investigated, too.
That's one example of how emails belonging to Americans can become swept up in the hunt.
In that way, PRISM helps justify specific, potentially personal searches. However, it's the broader operation on the Internet fiber-optic cables that actually captures the data, experts say.
"I'm much more frightened and concerned about real-time monitoring on the Internet backbone," said Wolf Ruzicka, CEO of EastBanc Technologies, a Washington software company. "I cannot think of anything, outside of a face-to-face conversation, that they could not have access to."
One unanswered question, according to a former technology executive at one of the companies involved, is if the government can use the data from PRISM to work backward.
For example, not every company archives instant message conversations, chat room exchanges or videoconferences. However, if PRISM provided general details, known as metadata, about when a user began chatting, could the government "rewind" its copy of the global Internet stream, find the conversation and replay it in full?
That would take enormous computing, storage and code-breaking power. It's possible that the NSA could use supercomputers to decrypt some transmissions, but it's unlikely it would have the ability to do that in volume. In other words, it would help to know what messages to zero in on.
Whether the government has that power and whether it uses PRISM this way or not remains a closely guarded secret.
After decrying Bush for PRISM, President Obama keeps it going
A few months after Obama took office in 2009, the surveillance debate reignited in Congress because the NSA had crossed the line. Eavesdroppers, it turned out, had been using their warrantless wiretap authority to intercept far more emails and phone calls of Americans than they were supposed to.
Obama, no longer opposed to the wiretapping, made unspecified changes to the process. The government said the problems were fixed.
"I came in with a healthy skepticism about these programs," Obama said recently. "My team evaluated them. We scrubbed them thoroughly. We actually expanded some of the oversight, increased some of the safeguards."
Years after decrying Bush for it, Obama said Americans did have to make tough choices in the name of safety.
"You can't have 100 percent security and also then have 100 percent privacy and zero inconvenience," the president said.
Obama's administration, echoing his predecessor's, credited the surveillance with disrupting several as yet unspecified terrorist attacks. Leading figures from the Bush administration who endured criticism during Obama's candidacy have applauded the president for keeping the surveillance intact.
Jason Weinstein, who recently left the Justice Department as head of its cybercrime and intellectual property section, said it's no surprise Obama continued the eavesdropping.
"You can't expect a president to not use a legal tool that Congress has given him to protect the country," he said. "So, Congress has given him the tool. The president's using it. And the courts are saying 'The way you're using it is OK.' That's checks and balances at work."
Schneier, the author and security expert, said it doesn't really matter how PRISM works, technically. Just assume the government collects everything, he said.
He said it doesn't matter what the government and the companies say, either. It's spycraft, after all.
"Everyone is playing word games," he said. "No one is telling the truth."
Experts deride bite marks as unreliable in court
Using bite marks to convict people of crimes is junk science???
Ray Krone was framed for murder by the Phoenix Police based on bite marks. Ray Krone was the 100th person freed when DNA testing proved he didn't do it.
Source
Experts deride bite marks as unreliable in court
2:39 p.m. EDT June 16, 2013
At least 24 men convicted or charged with murder or rape based on bite marks on the flesh of victims have been exonerated since 2000, many after spending more than a decade in prison. Now a judge's ruling later this month in New York could help end the practice for good.
A small, mostly ungoverned group of dentists carry out bite mark analysis and their findings are often key evidence in prosecutions, even though there is no scientific proof that teeth can be matched definitively to a bite into human skin.
DNA has outstripped the usefulness of bite mark analysis in many cases: The FBI doesn't use it and the American Dental Association does not recognize it.
"Bite mark evidence is the poster child of unreliable forensic science," said Chris Fabricant, director of strategic litigation at the New York-based Innocence Project, which helps wrongfully convicted inmates win freedom through DNA testing.
Supporters of the method, which involves comparing the teeth of possible suspects to bite mark patterns on victims, argue it has helped convict child murderers and other notorious criminals, including serial killer Ted Bundy. They say problems that have arisen are not about the method, but about the qualifications of those testifying, who can earn as much as $5,000 a case.
"The problem lies in the analyst or the bias," said Dr. Frank Wright, a forensic dentist in Cincinnati. "So if the analyst is … not properly trained or introduces bias into their exam, sure, it's going to be polluted, just like any other scientific investigation. It doesn't mean bite mark evidence is bad."
The Associated Press reviewed decades of court records, archives, news reports and filings by the Innocence Project in order to compile the most comprehensive count to date of those exonerated after being convicted or charged based on bite mark evidence. Two dozen forensic scientists and other experts were interviewed, including some who had never before spoken to a reporter about their work.
The AP analysis found that at least two dozen men had been exonerated since 2000, mostly as a result of DNA testing. Many had spent years in prison, including on death row, and one man was behind bars for more than 23 years. The count included at least six men arrested on bite mark evidence who were freed as they awaited trial.
Two court cases this month are helping to bring the debate over the issue to a head. One involves a 63-year-old California man who is serving a life term for killing his wife, even though the forensic dentist who testified against him has reversed his opinion.
In the second, a New York City judge overseeing a murder case is expected to decide whether bite mark analysis can be admitted as evidence, a ruling critics say could kick it out of courtrooms for good.
Some notable cases of faulty bite mark analysis include:
— Two men convicted of raping and killing two 3-year-old girls in separate Mississippi crimes in 1992 and 1995. Marks on their bodies were later determined to have come from crawfish and insects.
— A New Mexico man imprisoned in the 1989 rape and murder of his stepdaughter, who was found with a possible bite mark on her neck and sperm on her body. It was later determined that the stepfather had a medical condition that prevented him from producing sperm.
— Ray Krone, the so-called "Snaggletooth Killer," who was convicted in 1992 and again in 1996 after winning a new trial in the murder of a Phoenix bartender found naked and stabbed in the men's restroom of the bar where she worked. Krone spent 10 years in prison, three on death row.
Raymond Rawson, a Las Vegas forensic dentist, testified at both trials that bite marks on the bartender could only have come from Krone, evidence that proved critical in convicting him. At his second trial, three top forensic dentists testified for the defense that Krone couldn't have made the bite mark, but the jury didn't give their findings much weight and again found him guilty.
In 2002, DNA testing matched a different man, and Krone was released.
Rawson, like a handful of other forensic dentists implicated in faulty testimony connected to high-profile exonerations, remains on the American Board of Forensic Odontology, the only entity that certifies and oversees bite mark analysts. Now retired, he didn't return messages left at a number listed for him in Las Vegas.
Rawson has never publicly acknowledged making a mistake, nor has he apologized to Krone, who described sitting helplessly in court listening to the dentist identify him as the killer.
"You're dumbfounded," Krone said in a telephone interview from his home in Newport, Tenn. "There's one person that knows for sure and that was me. And he's so pompously, so arrogantly and so confidently stating that, beyond a shadow of doubt, he's positive it was my teeth. It was so ridiculous."
The history of bite mark analysis began in 1954 with a piece of cheese in small-town Texas. A dentist testified that a bite mark in the cheese, left behind in a grocery store that had been robbed, matched the teeth of a drunken man found with 13 stolen silver dollars. The man was convicted.
The first court case involving a bite mark on a person didn't come until two decades later, in 1974, also in Texas. Two dentists testified that a man's teeth matched a bite mark on a murder victim. Although the defense attorney fought the admissibility of the evidence, a court ruled that it should be allowed because it had been used in 1954.
Bite mark analysis hit the big time at Bundy's 1979 Florida trial.
bitemarks2
Forensic odontologist Dr. Richard Souviron pointing to a blown-up photograph of accused murderer Theodore Bundy's teeth during Bundy's 1979 murder trial in Miami, Fla.(Photo: AP Photo)
On the night Bundy went on a killing spree that left two young women dead and three others seriously wounded, he savagely bit one of the murder victims, Lisa Levy. A Florida forensic dentist, Dr. Richard Souviron, testified at Bundy's murder trial that his unusual, mangled teeth were a match.
Bundy was found guilty and executed. The bite marks were considered the key piece of physical evidence against him.
That nationally televised case and dozens more in the 1980s and 1990s made bite mark evidence look like infallible, cutting-edge science, and courtrooms accepted it with little debate.
Then came DNA testing. Beginning in the early 2000s, new evidence set free men serving prison time or awaiting the death penalty largely because of bite mark testimony that later proved faulty.
At the core of critics' arguments is that science hasn't shown it's possible to match a bite mark to a single person's teeth or even that human skin can accurately record a bite mark.
Fabricant, of the Innocence Project, said what's most troubling about bite mark evidence is how powerful it can be for jurors.
"It's very inflammatory," he said. "What could be more grotesque than biting someone amid a murder or a rape hard enough to leave an injury? It's highly prejudicial, and its probative value is completely unknown."
Fabricant and other defense attorneys are fighting to get bite mark analysis thrown out of courtrooms, most recently focusing their efforts on the New York City case.
It involves the death of 33-year-old Kristine Yitref, whose beaten and strangled body was found wrapped in garbage bags under a bed in a hotel near Times Square in 2007. A forensic dentist concluded a mark on her body matched the teeth of Clarence Brian Dean, a 41-year-old fugitive sex offender from Alabama, who is awaiting trial on a murder charge.
Dean told police he killed Yitref in self-defense, saying she and another man attacked him in a robbery attempt after he agreed to pay her for sex; no other man was found.
Dean's defense attorneys have challenged the prosecution's effort to admit the bite mark evidence, and a judge is expected to issue a ruling as early as mid-June — a pivotal step critics hope could eventually help lead to a ban on such evidence.
A dayslong hearing last year over the scientific validity of bite marks went to the heart of the debate.
"The issue is not that bite mark analysis is invalid, but that bite mark examiners are not properly vetted," Dr. David Senn, of San Antonio, testified at the hearing.
Another case gaining attention is that of William Joseph Richards, convicted in 1997 of killing his wife, Pam, in San Bernardino, Calif., and sentenced to life in prison.
Pam Richards had been strangled and beaten with rocks, her skull crushed by a cinder block, and her body left lying in the dirt in front of their home, naked from the waist down.
Dr. Norman Sperber, a well-respected forensic dentist, testified that a crescent-shaped wound on her body corresponded with an extremely rare abnormality in William Richards' teeth.
But at a 2009 hearing seeking Richards' freedom, Sperber recanted his testimony, saying that it was scientifically inaccurate, that he no longer was sure the wound was a bite mark, and that even if it was, Richards could not have made it.
Shortly after that, a judge tossed out Richards' conviction and declared him innocent. The prosecution appealed and the case went all the way to the California Supreme Court, which ruled in December that Richards had failed to prove his innocence, even though the bite mark evidence had been discredited. In a 4-3 decision, the court said forensic evidence, even if later recanted, can be deemed false only in very narrow circumstances and Richards did not meet that high bar.
Since April 27, Richards' attorneys have been on what they dubbed a two-month "innocence march" from San Diego to the state capital, Sacramento, to deliver a request for clemency to Gov. Jerry Brown and raise awareness about wrongful convictions. They are expected to arrive later this month.
The American Board of Forensic Odontology recently got a request from Richards' attorneys, who are affiliated with the Innocence Project, for a written opinion on the shoddy bite mark evidence used against him. The board declined.
Only about 100 forensic dentists are certified by the odontology board, and just a fraction are actively analyzing and comparing bite marks. Certification requires no proficiency tests. The board requires a dentist to have been the lead investigator and to have testified in one current bite mark case and to analyze six past cases on file — a system criticized by defense attorneys because it requires testimony before certification.
Testifying can earn a forensic dentist $1,500 to $5,000 per case, though most testify in only a few a year. The consequences for being wrong are almost nonexistent. Many lawsuits against forensic dentists employed by counties and medical examiner's offices have been thrown out because as government officials, they're largely immune from liability.
Only one member of the American Board of Forensic Odontology has ever been suspended, none has ever been decertified, and some dentists still on the board have been involved in some of the most high-profile and egregious exonerations on record.
Even Dr. Michael West, whose testimony is considered pivotal in the wrongful convictions or imprisonment of at least four men, was not thrown off the board. West was suspended and ended up stepping down.
Among his cases were the separate rapes and murders of the two 3-year-old girls in Mississippi, where West testified that two men later exonerated by DNA evidence were responsible for what he said were bite marks on their bodies. The marks later turned out to be from crawfish and insects, and a different man's DNA matched both cases.
“People love to have a black-and-white, and it's not black and white. I thought it was extremely accurate, but other cases have proven it's not.”
— Dr. Michael West
West now says DNA has made bite mark analysis almost obsolete.
"People love to have a black-and-white, and it's not black and white," said West, of Hattiesburg, Miss., where he has a dental practice but no longer works on bite mark cases. "I thought it was extremely accurate, but other cases have proven it's not."
Levon Brooks, convicted of killing one of the girls, spent 16 years in prison. The other, Kennedy Brewer, was behind bars for 13 years, many of them on death row.
West defended his testimony, saying he never testified that Brooks and Brewer were the killers, only that they bit the children, and that he's not responsible for juries who found them guilty.
Other dentists involved in exonerations have been allowed to remain on the board as long as they don't handle more bite mark cases, said Wright, the Cincinnati forensic dentist.
"The ABFO has had some internal issues as far as not really policing our own," he said.
Wright and other forensic dentists have been working to develop guidelines to help avert problems of the past while retaining bite mark analysis in the courtroom.
Their efforts include a flow chart to help forensic dentists determine whether bite mark analysis is even appropriate for a given case. Wright also is working on developing a proficiency test that would be required for recertification every five years.
An internal debate over the future of the practice was laid bare at a conference in Washington in February, when scores of dentists — many specializing in bite mark analysis — attended days of lectures and panel discussions. The field's harshest critics also were there, leading to heated discussions about the method's limitations and strengths.
Dr. Gregory Golden, a forensic dentist and president of the odontology board, acknowledged that flawed testimony has led to the "ruination of several innocent people's lives" but said the field was entering a "new era" of accountability.
Souviron, who testified against Bundy in 1979 and is one of the founding fathers of bite mark analysis in the U.S., argued there's a "real need for bite marks in our criminal justice system."
In an interview with the AP, Souviron compared the testimony of well-trained bite mark analysts to medical examiners testifying about a suspected cause of death.
"If someone's got an unusual set of teeth, like the Bundy case, from the standpoint of throwing it out of court, that's ridiculous," he said. "Every science that I know of has bad individuals. Our science isn't bad. It's the individuals who are the problem."
Many forensic dentists have helped the Innocence Project win exonerations in bite mark cases gone wrong by re-examining evidence and testifying for the wrongfully convicted.
But a once-cooperative relationship has turned adversarial ever since the Innocence Project began trying to get bite mark evidence thrown entirely out of courtrooms, while at the same time using it to help win exonerations.
"They turn a blind eye to the good side of bite mark analysis," Golden told the AP.
One example is a case Wright worked on in 1998. He analyzed the bite marks of the only three people who were in an Ohio home when 17-day-old Legacy Fawcett was found dead in her crib. Of the three, two sets of teeth could not have made the bite marks, Wright testified; only the teeth of the mother's boyfriend could have. The boyfriend was found guilty of involuntary manslaughter and served eight years in prison.
Without the bite mark, Wright said, the wrong person might have been convicted or the man responsible could have gone free, or both.
"Bite mark evidence can be too important not to be useful," Wright said. "You can't just throw it away."
Copyright 2013 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
A Taxpayer financed Swiss Vacation for Tempe cops????
Source
Tempe, Swiss cops swap spots on reality TV
By Aaron Granillo
Originally published: May 28, 2013 - 12:10 pm
TEMPE, Ariz. -- Two Tempe police officers will soon be stars on the Swiss reality TV show, "Job Swap."
Officers Dennison Dawson and Jess Dever-Jakusz found out on Monday they were chosen to represent Tempe police for five days in Switzerland.
"We didn't even know where we were going, because that's part of the show," said Dawson. "We still don't know much. They're not informing us step-by-step, so that's part of the show I guess, the surprise factor."
On Tuesday, a Swiss film crew documented the two leaving from police headquarters. Officers played bagpipes as a motorcade escorted the future reality TV stars to the airport.
Dever-Jakusz said she's never been to Europe. Dawson has never left the country.
"Coming from Arizona, being a native I got that thin blood," said Dawson. "I got to get used to that cold weather, but for something like this I'll freeze a little bit. It's a great opportunity."
Two officers from Switzerland will fly into Sky Harbor Monday night and shadow Tempe police for the rest of the week.
Aaron Granillo, News Editor
NSA: The finder and keeper of countless US secrets
Source
NSA: The finder and keeper of countless US secrets
Associated PressBy KIMBERLY DOZIER | Associated Press – Sun, Jun 9, 2013
WASHINGTON (AP) — An email, a telephone call or even the murmur of a conversation captured by the vibration of a window — they're all part of the data that can be swept up by the sophisticated machinery of the National Security Agency.
Its job is to use the world's most cutting edge supercomputers and arguably the largest database storage sites to crunch and sift through immense amounts of data. The information analyzed might be stolen from a foreign official's laptop by a CIA officer overseas, intercepted by a Navy spy plane flying off the Chinese coast, or, as Americans found out this past week, gathered from U.S. phone records.
Code-breakers at the Fort Meade, Md.-based NSA use software to search for keywords in the emails or patterns in the phone numbers that might link known terrorist targets with possible new suspects. They farm out that information to the 16 U.S. intelligence agencies and to law enforcement, depending on who has the right to access which type of information, acting as gatekeeper, and they say, guardian of the nation's civil liberties as well as its security.
The super-secret agency is under the spotlight after last week's revelations of two surveillance programs. One involves the sweeping collection of hundreds of millions of phone records of U.S. customers. The second collects the audio, video, email, photographic and Internet search usage of foreign nationals overseas — and probably some Americans in the process — who use major Internet companies such as Microsoft, Google, Apple, and Yahoo.
NSA was founded in 1952. Only years later was the NSA publicly acknowledged, which explains its nickname, "No Such Agency."
According to its website, NSA is not allowed to spy on Americans. It is supposed to use its formidable technology to "gather information that America's adversaries wish to keep secret," and to "protect America's vital national security information and systems from theft or damage by others," as well as enabling "network warfare, a military operation," that includes offensive cyberoperations against U.S. adversaries.
The agency also includes the Central Security Service, the military arm of code-breakers who work jointly with the agency. The two services have their headquarters on a compound that's technically part of Fort Meade, though it's slightly set apart from the 5,000-acre Army base.
Visible from a main highway, the tightly guarded compound requires the highest of clearances to enter and is equipped with electronic means to ward off an attack by hackers.
Other NSA facilities in Georgia, Texas, Colorado and Hawaii duplicate much of the headquarters' brain and computer power in case a terrorist attack takes out the main location, though each one focuses on a different part of the globe.
A new million-square-foot storage facility in Salt Lake City will give the agency untold additional capacity to store the massive amounts of data it collects, as well as adding to its analytical capability.
"NSA is the elephant of the U.S. intelligence community, the biggest organization by far with the most capability and (literally) the most memory," said former senior CIA official Bruce Riedel, who now runs the Brookings Intelligence Project.
NSA's experts include mathematicians and cryptologists, a term that means everything from breaking codes to learning and translating multiple foreign languages. There also are computer hackers who engage in offensive attacks like the one the U.S. and Israel are widely believed to have been part of, planting the Stuxnet virus into Iranian nuclear hardware, damaging Iran's nuclear development program in 2010.
Then there are "siginters," the signals intelligence experts who go to war zones to help U.S. troops break through encrypted enemy communications or work with a CIA station chief abroad, helping tap into a foreign country's phone or computer lines.
"More times than we can count, we've made history, without history even knowing we were there," reads a quote on the NSA's Web page by the current director, Gen. Keith Alexander.
NSA workers are notoriously secretive. They're known for keeping their families in the dark about what they do, including their hunt for terror mastermind Osama bin Laden. NSA code-breakers were an essential part of the team that tracked down bin Laden at a compound in Pakistan in 2011.
Their mission tracking al-Qaida and related terrorist groups continues, with NSA analysts and operators sent out to every conflict zone and overseas U.S. post, in addition to surveillance and analysis conducted at headquarters outside Washington.
The director of national intelligence, James Clapper, said in a statement Saturday that the NSA's programs do not target U.S. citizens. But last week's revelations show that the NSA is allowed to gather U.S. phone calls and emails and to sift through them for information leading to terrorist suspects, as long as a judge signs off. Lawmakers are questioning the scope of the information gathered, and how long and how much of it is kept.
"Does that data all have to be held by the government?" asked Sen. Angus King, a member of the Senate Intelligence Committee.
King, a Maine independent, was briefed on the program this past week, but would not discuss how long the government holds on to the phone records. "I don't think there is evidence of abuse, but I think the program can be changed to be structured with less levels of intrusion on the privacy of Americans," he said.
While NSA has deferred any public comment to Clapper, it offered an internal article written by director of compliance John DeLong, who's is in charge of making sure NSA protects Americans' privacy.
DeLong writes that privacy protections are being written into the technology that sifts the information, "which allows us to augment — not wholly replace — human safeguards." The NSA also uses "technology to record and review our activities. ... Sometimes, where appropriate, we even embed legal and policy guidance directly into our IT architecture."
What that means is that the data sifting is mostly done not by humans, but by computers, following complicated algorithms telling them what to look for and who has a right to see it.
"Through software, you can search for key words and key phrases linking a communication to a particular group or individual that would fire it off to individual agencies that have interest in it," just like Amazon or Google scans millions of emails and purchases to track consumer preferences, explained Ronald Marks, a former CIA official and author of "Spying in America in the Post 9/11 World."
Detailed algorithms try to determine whether something is U.S. citizen-related or not. "It shows analysts, 'we've got a US citizen here, so we've got to be careful with it,'" he said.
Another way counterterrorist officials try to protect U.S. citizens is through centers where operators from the military, CIA, NSA, FBI, Treasury and others sit side by side. When one comes across information that his or her agency is not supposed to access, it's turned over to someone in the center who's authorized to see it.
But the process isn't perfect, and sometimes what should be private information reaches agencies not authorized to see it.
"When information gets sent to the CIA that shouldn't, it gets destroyed, and a note sent back to NSA saying, 'You shouldn't have sent that,'" Marks said. "Mistakes get made, but my own experience on the inside of it is, they tend to be really careful about it."
Analysts need that level of detail because they are no longer looking for large networks, but small cells or individuals that carry out "lone wolf" attacks, as the Boston Marathon bombing is thought to have been.
"If we are going to fight a war or low intensity conflict that has gone down to the level of individual attacks by cells one or two people, if you are looking for total risk management, this is the kind of thing you're going to have to do," Marks said.
___
Follow Dozier on Twitter at http://twitter.com/kimberlydozier
___
Online:
NSA: http://www.nsa.gov/
License plate cameras track millions of Americans
Source
License plate cameras track millions of Americans
By Craig Timberg, Wednesday, July 17, 7:00 AM
The spread of cheap, powerful cameras capable of reading license plates has allowed police to build databases on the movements of millions of Americans over months or even years, according to an American Civil Liberties Union report released Wednesday.
The license-plate readers, which police typically mount along major roadways or on the backs of cruisers, can identify vehicles almost instantly and compare them against “hot lists” of cars that have been stolen or involved in crimes.
Do they have your photo?
In 26 states, police often can find out who you are based on your facial image, even if you've never been arrested for any crime.
Users of the enterprise cloud software giant will add the ability for sales teams to coach, motivate, and reward their fellow workers.
But the systems collect records on every license plate they encounter — whether or not they are on hot lists — meaning time and location data are gathered in databases that can be searched by police. Some departments purge information after a few weeks, some after a few months and some never, said the report, which warns that such data could be abused by authorities, and chill freedom of speech and association.
“Using them to develop vast troves of information on where Americans travel is not an appropriate use,” said Catherine Crump, a staff attorney at the ACLU and one of the authors of the report, “You are Being Tracked: How License Plate Readers Are Being Used to Record Americans’ Movements.”
The use of license-plate readers is common in the Washington area, where concerns about terrorism have fueled major investments in the equipment, with much of the money coming from federal grants. Agreements among departments and jurisdictions allow sharing of the location information, with data typically retained for at least a year.
Such details, say police and law enforcement experts, can help investigators reconstruct suspects’ movements before and after armed robberies, auto thefts and other crimes. Departments typically require that information be used only for law enforcement purposes and require audits designed to detect abuse.
“We’d like to be able to keep the data as long as possible, because it does provide a rich and enduring data set for investigations down the line,” said David J. Roberts, senior program manager for the Technology Center of the International Association of Chiefs of Police.
But the ACLU argues that data collection by most police departments is unnecessarily broad. In an analysis of data collected in Maryland, the report found that license-plate readers recorded the locations of vehicle plates 85 million times in 2012.
Based on a partial-year analysis of that data, the ACLU found that about one in 500 plates registered hits. In the overwhelming majority of cases, it said, the alleged offenses were minor, involving lapsed registrations or failures to comply with the state’s emission-control program.
For each million plates read in Maryland, 47 were associated with serious crimes, such as a stolen vehicle or a wanted person, the report said. Statistics collected by the ACLU in several other jurisdictions around the country also found hit rates far below 1 percent of license plates read.
Maryland officials have defended their program, which collects data from departments across the state in a fusion center, which shares intelligence among federal, state and local agencies. In a recent three-month period, state officials said, license-plate readers contributed to 860 serious traffic citations and the apprehension of 180 people for crimes including stolen autos or license plates.
The center deletes the data one year after they are collected, in what officials said was a compromise between investigative needs and privacy rights.
“We don’t want to retain more information . . . than is necessary,” said Harvey Eisenberg, an assistant U.S. attorney who oversees Maryland’s Anti-Terrorism Advisory Council. “You strike the balance, because people are legitimately concerned.”
The license-plate readers are also widely used in Northern Virginia and the District, which has them mounted on many of the major roadways entering and exiting the city. A D.C. police spokeswoman did not immediately comment on the ACLU report.
Private companies also are using license-plate-reading technology to build databases, typically to help in repossessing cars.
License plate readers: A useful tool for police comes with privacy concerns
Source
License plate readers: A useful tool for police comes with privacy concerns
By Allison Klein and Josh White, Published: November 19, 2011 E-mail the writers
An armed robber burst into a Northeast Washington market, scuffled with the cashier, and then shot him and the clerk’s father, who also owned the store. The killer sped off in a silver Pontiac, but a witness was able to write down the license plate number.
Police figured out the name of the suspect very quickly. But locating and arresting him took a little-known investigative tool: a vast system that tracks the comings and goings of anyone driving around the District.
License plate reader cameras — separate from those used for surveillance and detection of red-light running and speeding — are set up by local law enforcement to track movements of individuals on watch lists.
Scores of cameras across the city capture 1,800 images a minute and download the information into a rapidly expanding archive that can pinpoint people’s movements all over town.
Police entered the suspect’s license plate number into that database and learned that the Pontiac was on a street in Southeast. Police soon arrested Christian Taylor, who had been staying at a friend’s home, and charged him with two counts of first-degree murder. His trial is set for January.
More than 250 cameras in the District and its suburbs scan license plates in real time, helping police pinpoint stolen cars and fleeing killers. But the program quietly has expanded beyond what anyone had imagined even a few years ago.
With virtually no public debate, police agencies have begun storing the information from the cameras, building databases that document the travels of millions of vehicles.
Nowhere is that more prevalent than in the District, which has more than one plate-reader per square mile, the highest concentration in the nation. Police in the Washington suburbs have dozens of them as well, and local agencies plan to add many more in coming months, creating a comprehensive dragnet that will include all the approaches into the District.
“It never stops,” said Capt. Kevin Reardon, who runs Arlington County’s plate reader program. “It just gobbles up tag information. One of the big questions is, what do we do with the information?”
Police departments are grappling with how long to store the information and how to balance privacy concerns against the value the data provide to investigators. The data are kept for three years in the District, two years in Alexandria, a year in Prince George’s County and a Maryland state database, and about a month in many other suburban areas.
“That’s quite a large database of innocent people’s comings and goings,” said Jay Stanley, senior policy analyst for the American Civil Liberties Union’s technology and liberty program. “The government has no business collecting that kind of information on people without a warrant.”
But police say the tag readers can give them a critical jump on a child abductor, information about when a vehicle left — or entered — a crime scene, and the ability to quickly identify a suspected terrorist’s vehicle as it speeds down the highway, perhaps to an intended target.
Having the technology during the Washington area sniper shootings in 2002 might have stopped the attacks sooner, detectives said, because police could have checked whether any particular car was showing up at each of the shooting sites.
“It’s a perfect example of how they’d be useful,” said Lt. T.J. Rogers, who is responsible for the 26 tag readers maintained by the Fairfax County police. “We see a lot of potential in it.”
The plate readers are different from red-light or speed cameras, which issue traffic tickets and are tools for deterrence and enforcement. The readers are an investigative tool, capturing a picture of every license plate that passes by and instantly analyzing them against a database filled with cars wanted by police.
License plate reader cameras — separate from those used for surveillance and detection of red-light running and speeding — are set up by local law enforcement to track movements of individuals on watch lists.
Police can also plug any license plate number into the database and, as long as it passed a camera, determine where that vehicle has been and when. Detectives also can enter a be-on-the-lookout into the database, and the moment that license plate passes a detector, they get an alert.
It’s that precision and the growing ubiquity of the technology that has libertarians worried. In Northern Virginia recently, a man reported his wife missing, prompting police to enter her plate number into the system.
They got a hit at an apartment complex, and when they got there, officers spotted her car and a note on her windshield that said, in essence, “Don’t tow, I’m visiting apartment 3C.” Officers knocked on the door of that apartment, and she came out of the bedroom. They advised her to call her husband.
A new tool in the arsenal
Even though they are relatively new, the tag readers, which cost about $20,000 each, are now as widely used as other high-tech tools police employ to prevent and solve crimes, including surveillance cameras, gunshot recognition sensors and mobile fingerprint scanners.
License plate readers can capture numbers across four lanes of traffic on cars zooming up to 150 mph.
“The new technology makes our job a lot easier and the bad guys’ job a lot harder,” said D.C. Police Chief Cathy Lanier.
The technology first was used by the postal service to sort letters. Units consist of two cameras — one that snaps digital photographs and another that uses an optical infrared sensor to decipher the numbers and letters. The camera captures a color image of the vehicle while the sensor “reads” the license plate and transfers the data to a computer.
When stored over time, the collected data can be used instantaneously or can help with complex analysis, such as whether a car appears to have been followed by another car or if cars are traveling in a convoy.
Police also have begun using them as a tool to prevent crime. By positioning them in nightclub parking lots, for example, police can collect information about who is there. If members of rival gangs appear at a club, police can send patrol cars there to squelch any flare-ups before they turn violent. After a crime, police can gather a list of potential witnesses in seconds.
“It’s such a valuable tool, it’s hard not to jump on it and explore all the things it can do for law enforcement,” said Kevin Davis, assistant chief of police in Prince George’s County.
The readers have been used across the country for several years, but the program is far more sophisticated in the Washington region. The District has 73 readers; 38 of them sit stationary and the rest are attached to police cars. D.C. officials say every police car will have one some day.
The District’s license plate cameras gather more than a million data points a month, and officers make an average of an arrest a day directly from the plate readers, said Tom Wilkins, executive director of the D.C. police department’s intelligence fusion division, which oversees the plate reader program. Between June and September, police found 51 stolen cars using the technology.
Police do not publicly disclose the locations of the readers. And while D.C. law requires that the footage on crime surveillance cameras be deleted after 10 days unless there’s an investigative reason to keep it, there are no laws governing how or when Washington area police can use the tag reader technology. The only rule is that it be used for law enforcement purposes.
License plate reader cameras — separate from those used for surveillance and detection of red-light running and speeding — are set up by local law enforcement to track movements of individuals on watch lists.
Click Here to View Full Graphic Story
License plate reader cameras — separate from those used for surveillance and detection of red-light running and speeding — are set up by local law enforcement to track movements of individuals on watch lists.
“That’s typical with any emerging technology,” Wilkins said. “Even though it’s a tool we’ve had for five years, as it becomes more apparent and widely used and more relied upon, people will begin to scrutinize it.”
Legal concerns
Such scrutiny is happening now at the U.S. Supreme Court with a related technology: GPS surveillance. At issue is whether police can track an individual vehicle with an attached GPS device.
Orin Kerr, a law professor at George Washington University who has been closely watching the Supreme Court case, said the license plate technology probably would pass constitutional muster because there is no reasonable expectation of privacy on public streets.
But, Kerr said, the technology’s silent expansion has allowed the government to know things it couldn’t possibly know before and that the use of such massive amounts of data needs safeguards.
“It’s big brother, and the question is, is it big brother we want, or big brother that we don’t want?” Kerr said. “This technology could be used for good and it could be used for bad. I think we need a conversation about whether and how this technology is used. Who gets the information and when? How long before the information is deleted? All those questions need scrutiny.”
Should someone access the database for something other than a criminal investigation, they could track people doing legal but private things. Having a comprehensive database could mean government access to information about who attended a political event, visited a medical clinic, or went to Alcoholics Anonymous or Planned Parenthood.
Maryland and Virginia police departments are expanding their tag reader programs and by the end of the year expect to have every major entry and exit point to the District covered.
“We’re putting fixed sites up in the capital area,” said Sgt. Julio Valcarcel, who runs the Maryland State Police’s program, which now has 19 mobile units and one fixed unit along a major highway, capturing roughly 27 million reads per year. “Several sites are going online over the winter.”
Some jurisdictions store the information in a large networked database; others retain it only in the memory of each individual reader’s computer, then delete it after several weeks as new data overwrite it.
A George Mason University study last year found that 37 percent of large police agencies in the United States now use license plate reader technology and that a significant number of other agencies planned to have it by the end of 2011. But the survey found that fewer than 30 percent of the agencies using the tool had researched any legal implications.
There also has been scant legal precedent. In Takoma Park, police have two tag readers that they have been using for two years. Police Chief Ronald A. Ricucci said he was amazed at how quickly the units could find stolen cars. When his department first got them, he looked around at other departments to see what kind of rules and regulations they had.
“There wasn’t much,” Ricucci said. “A lot of people were using them and didn’t have policies on them yet.”
License plate reader cameras — separate from those used for surveillance and detection of red-light running and speeding — are set up by local law enforcement to track movements of individuals on watch lists.
License plate reader cameras — separate from those used for surveillance and detection of red-light running and speeding — are set up by local law enforcement to track movements of individuals on watch lists.
Finding stolen cars faster
The technology first came to the Washington region in 2004 as a pilot program. During an early test, members of the Washington Area Vehicle Enforcement Unit recovered eight cars, found 12 stolen license plates and made three arrests in a single shift. Prince George’s police bought several units to help combat the county’s crippling car theft and carjacking problem. It worked.
“We recover cars very quickly now. In previous times that was not the case,” said Prince George’s Capt. Edward Davey, who is in charge of the county’s program. “Before, they’d be dumped on the side of the road somewhere for a while.”
Now Prince George’s has 45 units and is likely to get more soon.
“The more we use them, the more we realize there’s a whole lot more on the investigative end of them,” Davey said. “We are starting to evolve. Investigators are starting to realize how to use them.”
Arlington police cars equipped with the readers regularly drive through the parking garage at the Pentagon City mall looking for stolen cars, checking hundreds of them in a matter of minutes as they cruise up and down the aisles. In Prince William County, where there are 12 mobile readers, the units have been used to locate missing people and recover stolen cars.
Unlike in the District, in most suburban jurisdictions, the units are only attached to police cars on patrol, and there aren’t enough of them to create a comprehensive net.
Virginia State Police have 42 units for the entire state, most of them focused on Northern Virginia, Richmond and the Tidewater area, and as of now have no fixed locations. There is also no central database, so each unit collects information on its own and compares it against a daily download of wanted vehicles from the FBI and the state.
But the state police are looking into fixed locations that could capture as many as 100 times more vehicles, 24 hours a day, with the potential to blanket the interstates.
“Now, we’re not getting everything — we’re fishing,” said Sgt. Robert Alessi, a 23-year veteran who runs the state police’s program. “Fixed cameras will help us use a net instead of one fishing pole with one line in the water waiting to get a nibble.”
Beyond the technology’s ability to track suspects and non-criminals alike, it has expanded beyond police work. Tax collectors in Arlington bought their own units and use the readers to help collect money owed to the county. Chesterfield County, in Virginia, uses a reader it purchased to collect millions of dollars in delinquent car taxes each year, comparing the cars on the road against the tax rolls.
Police across the region say that they are careful with the information and that they are entrusted with many pieces of sensitive information about citizens, including arrest records and Social Security numbers.
“If you’re not doing anything wrong, you’re not driving a stolen car, you’re not committing a crime,” Alessi said, “then you don’t have anything to worry about.”
A $5.5 million jobs program for cops???
If this grant to stop terrorism is run like most of the other programs to stop terrorists, less then one percent of the arrests will be for terrorist crimes. In those other programs most of the arrests were for victimless drug war crimes, followed by victimless gun crimes, with actual terrorist crimes being close to one half of one percent of the arrests.
But I am sure the folks in the US Senate and US Congress who passed the law could care less. Mainly because the intent is to get the votes of the local cops who will earn most of the $5.5 million in overtime pay.
Source
Feds raise Phoenix’s terrorist risk, boost funds to $5.5M
By Jacob Green Special to The Republic | azcentral.com Wed Jul 17, 2013 1:53 PM
The Department of Homeland Security gave Phoenix a $5.5 million grant after the federal agency bumped up the city’s terrorist-risk assessment from 18 to 15.
Homeland Security ranks 25 high-risk urban areas every fiscal year based on several factors, including population, border crossings, key infrastructure and assessments made by the FBI.
The rankings correlate with the amount of federal dollars allocated through the Urban Area Security Initiative, which helps cities in preventing, responding to and recovering from potential terrorist attacks and other emergencies.
“While we would like to say we don’t have high risk, it’s more important to be realistic,” Phoenix Councilman Daniel Valenzuela said. “It’s important that our ranking accurately reflects the security risk in our area.”
Valenzuela, along with Mayor Greg Stanton, Emergency Management coordinator Scott Krushak and other city officials, traveled to Washington, D.C., this year to meet with Homeland Security Secretary Janet Napolitano to push for the increase in Phoenix’s ranking.
“We felt that we were not ranked where we needed to be ranked,” Valenzuela said. “Some people may say it’s bad because there’s some potential risk, but at least now we are getting the necessary funding.”
Phoenix received $1.5 million more this year than in 2012.
Valenzuela said the potential dangers that validate a jump in the rankings include the city’s proximity to Mexico’s border, the size of its population and the Palo Verde Nuclear Generating Station, the largest nuclear-powered electrical-generating facility in the country, which he said is a particularly sensitive target.
“If something were to happen there, it would be felt throughout Arizona,” he said.
Stanton said he has been lobbying Washington for several years to increase the ranking for Phoenix.
“We had not been receiving our appropriate share of the grant money based on where we were ranked,” he said.
Phoenix has not become exposed to any new risks, Stanton said.
“Nothing has changed to make us a riskier place. We just wanted better acknowledgment of where we should have been ranked all along,” he said.
Krushak said Congress has been “shrinking” federal grant money provided through Homeland Security, and so an increase in Phoenix’s ranking was necessary to secure limited funds.
A City Council report by Krushak, Fire Chief Bob Khan and Police Chief Daniel V. Garcia said the city will spread the money across departments to purchase equipment, set up terrorism and other emergency-response programs and “to implement target-hardening measures to protect critical infrastructure.”
Previous
articles
on Medical Marijuana and the evil Drug War.
More
articles
on Medical Marijuana and the evil Drug War.