Flickr image courtesy Mark Pritchard
Investigators from the FBI want to know more about the foul odor emanating from a massive $45 million network of surveillance cameras in Chicago paid for with federal homeland security grants. Auditors were already examining the high-tech system known as Project Shield begun in 2004, and according to the Chicago Sun-Times, they found something “that sparked the FBI’s interest.”
Cook County officials have requested another $5 million for the project, but it was originally supposed to be finished by 2008 and cost much less: $31.5 million. Project Shield is now behind schedule and millions of dollars over budget. The equipment has also reportedly been plagued by technical problems. That and other issues have led some cities in the area not to take part in the joint effort.
A lawsuit filed last year alleges that a company one local official had a relationship with benefitted from the millions in federal preparedness grants he was responsible for helping to dole out. From an earlier Sun-Times story:
Project Shield was born out of the terrorist attacks of 9/11. Federal grant money started pouring into Illinois to outfit suburban police cars with state-of-the-art cameras to feed live video back to a central command in times of an emergency. First responders would have eyes on the ground.
**********
Despite a brief outcry last Thanksgiving over the use of revealing, full-body scanners at airports, federal officials are moving forward with the purchase of nearly 300 more costing $77 million, or $280,000 each. That would bring the total deployed at airports nationwide to 1,275.
The Transportation Security Administration is testing software it says would enhance privacy for travelers by generating a cartoon-like outline of the individual scanned instead of a more intimate X-ray image.
According to the Homeland Security Newswire:
The DHS budget request also includes increased funding for behavioral detection officers at airports, who are trained to detect abnormal behavior in passengers before they arrive at checkpoints. The program will receive $237 million [for expansion] at large U.S. airports and [be extended] to some smaller airports. The expansion of the program comes despite a report released by the Government Accountability Office last year that called into question the efficacy of the program’s operational premise.
**********
Meanwhile, airport body scanners aren’t always successful at detecting even seemingly simple threats. That’s what an undercover investigator discovered in Dallas when she slipped her firearm through an X-ray scanner during testing, apparently on more than one occasion. A TSA source in Dallas told the NBC affiliate there that the tests were a “dismal failure.” Federal agents insisted that body scanners do work, “but only if the officers monitoring them are paying attention.”
**********
The federal government is going to “extraordinary lengths” in order to hide its relationship with a California computer programmer who promised that his whiz-bang technology could catch terrorists. After spending millions of dollars in taxpayer money, it appears those promises were a hoax.
New York Times reporters James Risen and Eric Lichtblau tell the story of Michael Montgomery, called a “con man” by his former lawyer. Montgomery’s patented software led to an international false alarm in 2003 that included an order by President Bush for airliners over the Atlantic Ocean to head back.
Justice Department officials have twice obtained protective orders shielding the government’s relationship with Montgomery from public view citing possible threats to national security. Sources interviewed by Lichtblau and Risen say the federal government is simply trying to avoid public embarrassment:
A onetime biomedical technician with a penchant for gambling, Mr. Montgomery is at the center of a tale that features terrorism scares, secret White House briefings, backing from prominent Republicans, backdoor deal-making and fantastic-sounding computer technology. … The software led to dead ends in connection with a 2006 terrorism plot in Britain. And they were used by counterterrorism officials to respond to a bogus Somali terrorism plot on the day of President Obama’s inauguration, according to previously undisclosed documents.
Republish this article
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Republish Our Content
Thanks for your interest in republishing a story from Reveal. As a nonprofit newsroom, we want to share our work with as many people as possible. You are free to embed our audio and video content and republish any written story for free under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 license and will indemnify our content as long as you strictly follow these guidelines:
-
Do not change the story. Do not edit our material, except only to reflect changes in time and location. (For example, “yesterday” can be changed to “last week,” and “Portland, Ore.” to “Portland” or “here.”)
-
Please credit us early in the coverage. Our reporter(s) must be bylined. We prefer the following format: By Will Evans, Reveal.
-
If republishing our stories, please also include this language at the end of the story: “This story was produced by Reveal from The Center for Investigative Reporting, a nonprofit news organization. Learn more at revealnews.org and subscribe to the Reveal podcast, produced with PRX, at revealnews.org/podcast.”
-
Include all links from the story, and please link to us at https://www.revealnews.org.
PHOTOS
-
You can republish Reveal photos only if you run them in or alongside the stories with which they originally appeared and do not change them.
-
If you want to run a photo apart from that story, please request specific permission to license by contacting Digital Engagement Producer Sarah Mirk, smirk@revealnews.org. Reveal often uses photos we purchase from Getty and The Associated Press; those are not available for republication.
DATA
-
If you want to republish Reveal graphics or data, please contact Data Editor Soo Oh, soh@revealnews.org.
IN GENERAL
-
We do not compensate anyone who republishes our work. You also cannot sell our material separately or syndicate it.
-
You can’t republish our material wholesale, or automatically; you need to select stories to be republished individually. To inquire about syndication or licensing opportunities, please contact Sarah Mirk, smirk@revealnews.org.
-
If you plan to republish our content, you must notify us republish@revealnews.org or email Sarah Mirk, smirk@revealnews.org.
-
If we send you a request to remove our content from your website, you must agree to do so immediately.
-
Please note, we will not provide indemnification if you are located or publishing outside the United States, but you may contact us to obtain a license and indemnification on a case-by-case basis.
If you have any other questions, please contact us at republish@revealnews.org.