The “Oversight” over NCTC’s Not-Terrorist-Terrorist Database

Back when John Negroponte appointed him to be the Director of National Intelligence’s Civil Liberties Protection Officer, Alexander Joel admitted he had no problem with Cheney’s illegal domestic wiretap program.

When the NSA wiretapping program began, Mr. Joel wasn’t working for the intelligence office, but he says he has reviewed it and finds no problems. The classified nature of the agency’s surveillance work makes it difficult to discuss, but he suggests that fears about what the government might be doing are overblown.

“Although you might have concerns about what might potentially be going on, those potentials are not actually being realized and if you could see what was going on, you would be reassured just like everyone else,” he says.

That should trouble you, because he’s the cornerstone of oversight over the National Counterterrorism Center’s expanded ability to obtain and do pattern analysis on US person data.

The Guidelines describe such oversight to include the following:

  • Periodic spot checks overseen by CLPO to make sure database use complies with Terms and Conditions
  • Periodic reviews to determine whether ongoing use of US person data “remains appropriate”
  • Reporting (the Guidelines don’t say by whom) of any “significant failure” to comply with guidelines; such reports go to the Director of NCTC, the ODNI General Counsel, the CLPO, DOJ (it doesn’t say whom at DOJ), and the IC Inspector General; note, the Guidelines don’t require reporting to the Intelligence Oversight Board, which should get notice of significant failures
  • Annual reports from the Director of NCTC on an (admittedly worthwhile) range of metrics on performance to the Guidelines; this report goes to the CLPO, ODNI General Counsel, the IC IG, and–if she requests it–the Assistant Attorney General for National Security

There are a few reasons to be skeptical of this. First, rather than replicate the audits recently mandated under the PATRIOT Act–in which the DOJ Inspector General develops the metrics, these Guidelines have NCTC develop the metrics themselves. And they’re designed to go to the CLPO, who officially reports to the NCTC head, rather than an IG with some independence.

That is, to a large extent, this oversight consists of NCTC reporting to itself.

Also, note who doesn’t get these reports? Congress. Not even the Intelligence Committees.

One of the only mentions of Congressional Committees comes when describing permissible dissemination of US person data. NCTC can, the Guidelines say, share US person data with “a Congressional Committee to perform its lawful oversight functions, after approval by the ODNI Office of General Counsel.” If Congress has lawful oversight functions, shouldn’t they be heeded whether or not ODNI GC approves?

Then there’s the rather curious treatment of the Privacy and Civil Liberties Oversight Board–what is supposed to be an independent congressionally-approved board representing citizens’ interest in the face of government security claims.  The Guidelines say that if there’s a dispute between agencies over whether NCTC should get a database, the head of the agency objecting may appeal to the DNI, then the NSC and AG, and they, in turn, can consult the PCLOB. The Guidelines also say PCLOB “shall have access to all relevant NCTC records … that it deems relevant to its oversight of NCTC activities.”

And all that might provide an independent check on the mother-of-all-databases. Except that Obama took almost 3 years before he got around to appointing a quorum of people to PCLOB. And in the 3 months since then, the Senate Judiciary Committee hasn’t gotten around to dealing with those nominations. Thus, like the Cybersecurity plans working their way through Congress, the NCTC’s mother-of-all-databases also acknowledges that PCLOB has a legally definable oversight role (really, PCLOB’s role would have been most valuable in the last 18 months when NCTC was putting these Guidelines together). But PCLOB–and therefore its oversight function–doesn’t exist.

There are a lot of reasons this proposal, as implemented, is a bad idea: it doesn’t solve the problem it was implemented to solve (and indeed may well drown the analysts in even more data), it creates a one-stop shop for the theft of US person data.

But just as problematic is the geniuses who designed this in secret didn’t even try to build in any truly independent oversight over this massive intrusion into US person privacy.

Alexander Joel thought that if only people could see what the government was doing with its illegal wiretap program, they wouldn’t mind so much. But this vast new power grab was designed to make sure no one independent will see it, either.

Self-oversight like NCTC has designed here amounts to little more than navel gazing. And how likely will thorough navel gazing be, given that NCTC will be scrutinizing all of our belly-buttons at the same time?

Tweet about this on Twitter22Share on Reddit0Share on Facebook2Google+0Email to someone

20 Responses to The “Oversight” over NCTC’s Not-Terrorist-Terrorist Database

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20

Emptywheel Twitterverse
bmaz @TeaParty_AZ @yvonnewingett @FeleciaForAZ I've never been a prosecutor, but always an officer of the court, and I think you are full of shit
4mreplyretweetfavorite
bmaz @TeaParty_AZ @yvonnewingett @Mark4AZ @FeleciaForAZ This is an absolute gibberish question. Get a clue.
3hreplyretweetfavorite
JimWhiteGNV RT @RaysBaseball: Nothing grander. Outlaw deposits a changeup in the RF seats. It's the first grand slam of @KKiermaier39's career. #RaysUp
3hreplyretweetfavorite
bmaz I am sorry, but @azcentral owes duty to AZ citizens to call this hollow bull out for what it is @yvonnewingett @Mark4AZ cc: @FeleciaForAZ
4hreplyretweetfavorite
bmaz "Shield of sovereignty", "sword of justice + "air guitar"?? Seriously? This is embarrassing to AZ @yvonnewingett @Mark4AZ cc: @FeleciaForAZ
4hreplyretweetfavorite
JimWhiteGNV Obama: "He who smelt it dealt it!" http://t.co/JN7XxsDS7l
4hreplyretweetfavorite
JimWhiteGNV What a waste of photoshop time on the Perry-Obama pic. Shoulda used the other end of the horse...
6hreplyretweetfavorite
emptywheel @JesselynRadack They were doing 3 at the time.
6hreplyretweetfavorite
emptywheel @OKnox Sure, but they're not gonna use the term "regime" for a nice friendly authoritarian regime like Saudi Arabia.
7hreplyretweetfavorite
emptywheel @MasaccioFDL Tho the thing to do would have been to make a lateral move into Cyber before leaving to cash out.
7hreplyretweetfavorite