Confirmed: Our Government Has Criminalized Beauty Products

A year and a half ago, I warned that if you bought certain beauty supplies–hydrogen peroxide and acetone–you might be a terrorism suspect.

I’m going to make a wildarsed guess and suggest that the Federal Government is doing a nationwide search to find out everyone who is buying large amounts of certain kinds of beauty products. And those people are likely now under investigation as potential terrorism suspects.

Shortly thereafter, John Kyl basically confirmed that the government had been tracking certain people buying hydrogen peroxide.

Yesterday, FBI Director Robert Mueller did so in even more explicit terms.

Federal Bureau of Investigation Director Robert Mueller appeared to indicate for the first time Wednesday that his agency uses a provision of the PATRIOT Act to obtain information about purchases of hydrogren peroxide–a common household chemical hair bleach and antiseptic that can also be turned into an explosive.

The comment in passing by Mueller during a Senate Intelligence Committee hearing was noteworthy because critics have suggested that the FBI is using a provision in the PATRIOT Act to conduct broad surveillance of sales of lawful products such as hydrogen peroxide and acetone.

“It’s been used over 380 times since 2001,” Mueller said of the so-called business records provision, also known as Section 215. “It provides us the ability to get records other than telephone toll records, which we can get through another provision of the statutes. It allows us to get records such as Fedex or UPS records….or records relating to the purchase of hydrogen peroxide, or license records—records that we would get automatically with a grand jury subpoena on the criminal side, the [Section] 215 process allows us to get on the national security side.” (Emphasis original)

Emptywheel: where you read today about the civil liberties infringements your government will confirm years from now.

What Mueller didn’t confirm, but what we can pretty much conclude at this point, is that they’ve used the 215 provision to investigate as terrorists perfectly innocent (and possibly Muslim) purchasers of beauty supplies.

Recall how I first figured out the government was using Section 215 to track beauty supplies. After DiFi blabbed that they had used Section 215 in the Najibullah Zazi case, I examined the detention motion on Zazi to see what kind of evidence they used to justify refusing him bail. It included this:

Evidence that “individuals associated with Zazi purchased unusual quantities of hydrogen and acetone products in July, August, and September 2009 from three different beauty supply stores in and around Aurora;” these purchases include:

  • Person one: a one-gallon container of a product containing 20% hydrogen peroxide and an 8-oz bottle of acetone
  • Person two: an acetone product
  • Person three: 32-oz bottles of Ion Sensitive Scalp Developer three different times

The federal government argued, in part, that Zazi had to be denied bail because three people “associated with him” bought beauty supplies “in and around Aurora.”

Last February, Zazi accepted a plea agreement and has been cooperating with investigators; the government has twice delayed his sentencing, suggesting he’s still fully cooperating. Since that time, the only people arrested for participating in the actual plot–as opposed to obstructing justice by trying to hide the evidence of Zazi’s bomb-making, with which both Zazi’s father and uncle were charged–are in NY or Pakistan.

That is, it appears that Zazi had no accomplices “in and around Aurora.”

That’s particularly interesting given that Zazi is reported to have had few close ties in the Denver area. He only moved there in January 2009, 8 months before his arrest. And both his employer and the other worshipers at his mosque describe him as keeping to himself.

Unlike most drivers at ABC, who drove eight- or nine-hour shifts, Zazi routinely worked 16-to-18-hour days, often putting in as many as 80 hours a week ferrying passengers to and from DIA. “He was a regular kind of guy, but he worked hard and he wanted money,” says Hicham Semmaml, a Moroccan-born ABC driver. “I would have never suspected any of this.”

[snip]

“He kept to himself pretty much, and he never gave any outward signs of being connected with anybody,” Gross said.

[snip]

Zazi would turn up for afternoon prayers each Friday — Islam’s holy day — parking the ABC van in the parking lot outside the sprawling brick complex with its black dome and narrow minaret. Other regular worshippers agreed that he never spoke to anyone and usually rushed off immediately once the service ended.

All the currently available evidence suggests that these three Zazi “associates” buying beauty supplies turned out to be completely innocent. That would mean that one of the reasons the government said Zazi should be held without bail (there were plenty of others) basically amounts to innocent people with some attenuated tie to Zazi buying beauty supplies.

But consider what their beauty supply purchase has exposed them to–particularly if the association involved amounts to membership in the same mosque as him. Their purchase of beauty supplies undoubtedly made them a target for further investigation, presumably FBI agents asking questions of their neighbors and employers, probably the use of other PATRIOT provisions to track their calls and emails, and possibly even a wiretap.

So these three people, because they worshiped at the same mosque as Zazi or drove an airport van but presumably in the absence of any evidence of actual friendship with him had their lives unpacked by our government because they bought a couple bottles of beauty supplies.




Themis Applies JSOC Techniques to Citizens “Extorting” from Corporate Clients

I have a feeling I’ll be doing a lot of these posts, showing how Hunton & Williams asked “Themis” (the three firm team of HBGary, Palantir, and Berico Technologies) to apply counterterrorism approaches to combat First Amendment activities.

This particular installment comes from an early presentation and accompanying proposal Themis prepared for Hunton & Williams. These documents were attached to an email dated November 2, 2010 sent out by Berico Technologies’ Deputy Director. He explains that the presentation and proposal would be briefed to H&W the following day.

The Powerpoint includes a slide describing the purpose of Themis’ pitch to H&W.

Purpose: Develop a corporate information reconnaissance service to aid legal investigations through the open source collection of information on target groups and individuals that appear organized to extort specific concessions through online slander campaigns.

Now, this is in the period when H&W was only beginning to discuss the Chamber of Commerce project with Themis, long before the BoA pitch. That is, this is the period when they were discussing generalized opposition to Chamber of Commerce.

And of that they got “extortion”? “slander”?

Apparently the team members of Themis–several of whom, as veterans, would have sworn an oath to our Constitution–accepted the premise that union members and poorly financed liberals opposing the wholesale sellout of our politics to private corporations constituted “extortion” and “slander.”

These firms, two of which deny any ill will, were willing to describe political speech–the opposition of working people to the Chamber’s hijacking of our politics–as “extortion” and “slander.”

More shocking to me, though, is where the proposal uses a Special Operations model to describe what Themis planned to do for H&W. On a proposal bearing Berico Technologies’ document header, Themis places their proposed “Corporate Information Reconnaissance Cell” next to a Joint Special Operations Command F3EA “targeting cycle” with this explanation:

Team Themis will draw on our extensive operational and intelligence experience to rapidly make sense of the volumes of data we’ve collected through the application of proven analytical/targeting methodologies.  Drawing on the principles and processes developed and refined by JSOC in the “Find, Fix, Finish, Exploit, Analyze” (F3EA) targeting cycle, we will develop and execute a tailored CIRC intelligence cycle suited to enable rapid identification/understanding, refined collection/detection, focused application of effects, exploitation, and analysis/assessment.

Mind you, this is just a fancy graphic for “analysis”–the kind of stuff civilians do all the time. But Themis–led by Berico Technologies in this case–decided to brand it as a JSOC (Joint Special Operations Command) product, applying an American unconventional warfare model  to targeting political opponents engaging in free speech.

This is a bunch of veterans proposing to go to war against citizen activism on behalf the Chamber of Commerce and other corporations.

The proposal also highlights the JSOC experience of one Palantir team member.

He commanded multiple Joint Special Operations Command outstations in support of the global war on terror. Doug ran the foreign fighter campaign on the Syrian border in 2005 to stop the flow of suicide bombers into Baghdad and helped to ensure a successful Iraqi election. As a commander, Doug ran the entire intelligence cycle: identified high-level terrorists, planned missions to kill or capture them, led the missions personally, then exploited the intelligence and evidence gathered on target to defeat broader enemy networks.

Berico’s statement (from their CEO, Guy Filippelli, whose experience as Special Assistant to the Director of National Intelligence was also highlighted in the proposal) denied they would proactively target any Americans and spun the project itself as “consistent with industry standards for this type of work.”

Berico Technologies is a technical and analytic services firm that helps organizations better understand information critical to their core operating objectives. Our leadership does not condone or support any effort that proactively targets American firms, organizations or individuals.

[snip]

Late last year, we were asked to develop a proposal to support a law firm. Our corporate understanding was that Berico would support the firm’s efforts on behalf of American companies to help them analyze potential internal information security and public relations challenges. Consistent with industry standards for this type of work, we proposed analyzing publicly available information and identifying patterns and data flows relevant to our client’s information needs.

Yet it was Berico Technologies’ Deputy Director who sent out these documents adopting a military targeting approach for responding to citizens engaging in free speech.




Curveball: I Lied to Get Rid of Saddam

Almost eight years after he helped start a war, the Iraqi behind the US claim that Iraq had mobile weapons labs admitted in an interview with the Guardian that he lied. (h/t Hissypit)

Rafid Ahmed Alwan al-Janabi, codenamed Curveball by German and American intelligence officials who dealt with his claims, has told the Guardian that he fabricated tales of mobile bioweapons trucks and clandestine factories in an attempt to bring down the Saddam Hussein regime, from which he had fled in 1995.

The article as a whole provides fascinating details of how the German intelligence, BND, service basically fed Curveball the details he’d need to fabricate his lies.

But I’m particularly interested in two new details he reveals. First, BND and British intelligence met with Curveball’s boss in mid-2000; the boss debunked Curveball’s claims.

Janabi claimed he was first exposed as a liar as early as mid-2000, when the BND travelled to a Gulf city, believed to be Dubai, to speak with his former boss at the Military Industries Commission in Iraq, Dr Bassil Latif.

The Guardian has learned separately that British intelligence officials were at that meeting, investigating a claim made by Janabi that Latif’s son, who was studying in Britain, was procuring weapons for Saddam.

That claim was proven false, and Latif strongly denied Janabi’s claim of mobile bioweapons trucks and another allegation that 12 people had died during an accident at a secret bioweapons facility in south-east Baghdad.

The German officials returned to confront him with Latif’s version. “He says, ‘There are no trucks,’ and I say, ‘OK, when [Latif says] there no trucks then [there are none],'” Janabi recalled.

So this is yet another well-placed Iraqi who warned western intelligence that the WMD evidence that would eventually lead to war was baseless (one George Tenet and others haven’t admitted in the past).

And Curveball describes how BND returned to his claims in 2002, then dropped it, then returned to it just before Colin Powell’s Feruary 5, 2003 speech at the UN.

We’ve known the outlines of these details before. But it sure adds to the picture of the US dialing up the intelligence it needed — however flimsy — to start a war.




Chet Uber Contacted HBGary before He Publicized His Role in Turning in Bradley Manning

A reader found a very interesting email among the HBGary emails: Chet Uber emailed–after having tried to call–HBGary CEO Greg Hoglund on June 23, 2010.

> Sir,

>

>

>

> I would like to speak to Mr. Hoglund. My name is Chet Uber

> and I was given his name by common associates as someone I should speak with.

> The nature of our work is highly sensitive so no offense but I cannot explain

> the details of my call. I was given a URL and a phone number. I was not given

> his direct line and every time I try to get an attendant you phone system

> disconnects me. Would you please forward him this email to him. The links below

> are new and as much information as we have ever made public.

>

>

>

> Sorry for the mystery but in my world we are careful about

> our actions and this is something interpreted as rudeness. I am being polite,

> so any cooperation you can provide is greatly appreciated.

Uber copies himself, Mark Rasch, George Johnson, and Mike Tomasiewicz, and sends links to two stories about Project Vigilant, which had been posted on the two proceeding days.

In response to the email, Hoglund asks Bob Slapnick to check Uber out with someone at DOD’s CyberCrime Center.

Chet Uber, as you’ll recall, is the guy who held a press conference at DefCon on August 1 to boast about his role in helping Adrian Lamo turn Bradley Manning in to authorities. Mark Rasch is the former DOJ cybercrimes prosecutor who claims to be Project Vigilant’s General Counsel and who says he made key connections with the government on Manning.

Mind you, the multiple versions of Uber’s story of his involvement in turning in Manning are inconsistent. At least a couple versions have Lamo calling Uber in June, after Manning had already been arrested.

So there are plenty of reasons to doubt the Lamo and Uber story. And security insiders have suggested the whole Project Vigilant story may be nothing more than a publicity stunt.

Furthermore, this email may be more of the same. Uber may have been doing no more than cold-calling Hoglund just as he was making a big publicity push capitalizing on the Manning arrest.

But consider this.

Lamo’s conversations with Manning have always looked more like the coached questions of someone trying to elicit already-suspected details than the mutual boasting of two hackers. Because of that and because of the inconsistencies and flimsiness of the Project Vigilant story, PV all looked more like a cover story for why Lamo would narc out Bradley Manning than an accurate story. And Uber’s email here and his DefCon press conference may well be publicity stunts. But then, that’s what Aaron Barr’s research on Anonymous was supposed to be: a widely publicized talk designed to bring new business. But a key part of the PV story was the claim that Adrian Lamo had volunteered with the group working on “adversary characterization.”

Uber says Lamo worked as a volunteer research associate for Project Vigilant for about a year on something called adversary characterization, which involved gathering information for a project on devising ways to attribute computer intrusions to individuals or groups. He helped define the roles, tools and methods intruders would use to conduct such attacks.

While it is described as more technical, that’s not all that different from what Aaron Barr was doing with social media on Anonymous.

One more thing. Consider what DOJ has been doing since the time Lamo turned in Manning and now: asking social media providers for detailed information about a network of people associated with Wikileaks. That is, DOJ appears to have been doing with additional legal tools precisely what Barr was doing with public sources.

That’s likely all a big coinkydink. But these security hackers all seem to love turning their freelance investigations into big publicity stunts.




Judge: Government Can Shield Its Conversations about Engaging in Torture

Josh Gerstein reports that a Federal Judge has rejected ACLU’s effort to get the government to remove more of the redactions in the OPR Report on the torture memos. Judge Rosemary Collyer basically argued that the President’s need to get candid advice on how to make torture legal trumps citizens’ right to know about such illegal activity.

Rather than arguing that exemptions (b)(1) and (3) are inapplicable under the Executive Order or the proffered statutes, Plaintiffs argue that the substance of the redactions: (1) the names of the detainees; and (2) the “actual and potential implementation” of “enhanced interrogation techniques,” including “conditions of confinement” that functioned as part of the “enhanced interrogation techniques,” are unlawful, and therefore fall outside the protection of “intelligence sources and methods” granted by those exemptions. Pls.’ Mem. at 11–24. But, as recently stated by the D.C. Circuit, the illegality of information is immaterial to the classification of such information under exemptions (b)(1) and (3) as intelligent sources or methods.

[snip]

While the Court recognizes the public’s interest, this interest does not overcome the need for frank discussions on serious issues that confront a President. Without a free and candid dialectic, the President cannot be properly armed with the tools required to make difficult decisions on consequential issues. Because the declaration sufficiently details its rationale for redaction, and because the public’s interest does not overcome the privilege in this case, the Court finds that Defendant has satisfied its burden as to the limited redactions withheld pursuant to the presidential communications privilege.

Mind you, the Judge is reading broadly here. For at least one of the meetings, we have evidence a decision was made without the input of the President. Yet she has interpreted meetings of Administration officials where Bush was absent as Presidential communications.

So in reality, she’s not just shielding Bush’s decisions, she’s shielding Cheney’s and Alberto Gonzales’ decisions as well. Eh, I guess she thinks Cheney was really in charge?

Where Judge Collyer’s opinion gets really crazy is where she accepts the government’s argument that, having left its discussion about “mock burial” unredacted in one instance, it does not have to reveal the other instances.

Plaintiffs next argue that the name of the interrogation technique that the CIA considered using, i.e. “mock burial,” has already been unclassifed and thus should be disclosed. It is true that when the government has officially acknowledged information, a FOIA plaintiff may compel disclosure of that information even over an agency’s otherwise valid exemption claim. See Wolf, 473 F.3d at 378; Fitzgibbon, 911 F.2d at 765. For information to qualify as “officially acknowledged,” however, it must satisfy three criteria: (1) the information requested must be as specific as the information previously released; (2) the information requested must match the information previously disclosed; and (3) the information requested must already have been made public through an official and documented disclosure. Id. After reviewing additional information in camera, the Court finds that the redacted information does not match the very broad information previously disclosed. Due to the specificity and context of the redacted information, coupled with the agency affidavit that affirmatively states that: “notwithstanding these prior disclosures (which I took into account when reviewing the Report), many details of the detention and interrogation program and the intelligence activities undertaken in support of it remain classified,” Payne Decl. ¶ 28, the Court is satisfied that this redacted information has not been already “officially acknowledged,” and thus is appropriately redacted pursuant to exemptions (b)(1) and (3) as “intelligent sources or methods.”

Maybe this is particularly sensitive because they actually did use mock burial and mock executions with detainees but didn’t prosecute? Or maybe the CIA just asked her, on the basis that they sometimes referred to mock execution and other times referred to mock burial and other times referred to death threats, these are different specifics?

It gets worse. If you want to ruin your appetite, click through and see how she justified sustaining the redactions of Jennifer Koester’s name.




The HBGary Scandal: Using Counterterrorism Tactics on Citizen Activism

As I described on the Mike Malloy show on Friday and as Brad Friedman discusses in his post on being targeted by the Chamber of Commerce, the essence of the Chamber of Commerce/Bank of America/HBGary scandal is the use of intelligence techniques developed for use on terrorists deployed for use on citizens exercising their First Amendment rights.

ThinkProgress has a post making it clear that the Chamber of Commerce’s nondenial denials don’t hold up. In this post, I’ll begin to show the close ties between the tactics HBGary’s Aaron Barr proposed to use against Wikileaks and anti-Chamber activists and those already used in counterterrorism.

Barr Says He’s Done this with Terrorists

I will get into what we know of Barr’s past intelligence work in future posts, but for the moment I wanted to look just at his reference to analysis he did on FARC. Barr’s HBGary coder, who sounds like the smartest cookie of the bunch was balking at his analysis of Anonymous for several reasons–some of them ethical, some of them cautionary, and some of them technical. In the middle of an argument over whether what Barr was doing had any technical validity (the coder said it did not), Barr explained.

The math is already working out. Based on analysis I did on the FARC I was able to determine that Tanja (the dutch girl that converted to the FARC is likely managing a host of propoganda profiles for top leaders. I was able to associate key supporters technically to the FARC propoganda effort.

He’s referring to Tanja Anamary Nijmeijer, a Dutch woman who has been an active FARC member for a number of years. And while it’s not proof that Barr did his analysis on Nijmeijer for the government, she was indicted in the kidnapping of some American contractors last December and the primary overt act the indictment alleged her to have committed was in a propaganda function.

On or about July 25, 2003, JOSE IGNACIO GONZALEZ PERDOMO, LUIS ALBERTO JIMENEZ MARTINEZ, and TANJA ANAMARY NIJMEIJER, and other conspirators, participated in making a proof of life video of the three American hostages. On the video, the FARC announced that the “three North American prisoners” will only be released by the FARC once the Colombian government agrees to release all FARC guerrillas in Colombian jails in a “prisoner exchange” to take place “in a large demilitarized area.” The proof of life video was then disseminated to media outlets in the United States.

In any case, Barr is referring to an ongoing investigation conducted by the Miami and Counterterrorism Section of DOJ, with assistance from the DNI.

His “proof” that this stuff works is that it has worked in the past (he claims) in an investigation of Colombian (and Dutch) terrorists.

Now it’s not at all clear that it is valid (I’ll have more to say on this in the future, too). Barr’s coder argued that what he’s measuring is only guilt by association, not real association (see where this begins to sound familiar?). TechHerald, in a useful analysis of the paper he was going to give on Anonymous, judges,

His research has plenty of interesting aspects, but seems to have several flaws as well. He is right when he says social media can be used to target and exploit people and organizations, but wrong when he assumes the spider web links between people are proof positive of anything criminal or malicious.

In other words, what Barr has done has mapped out associations with no guarantee the associations mean anything, much less any involvement in a particular group.

Our Intelligence Agencies Talk to HBGary

The fact that Barr’s project is so dubious is all the more troubling, given that DOJ and our intelligence community seemed prepared to take his work seriously. Barr’s emails make it clear that he was in talks on February 4 with several branches of our intelligence community about sharing his analysis of Anonymous.

>> Interesting Day.

>>

>> So I have been contacted by OSD (Rosemary [Wenschel, head of Cyberops at DOD]), FBI, USG, and now DNI…all today.

>>

>> I have a meeting with FBI/OSD Monday @ 11am.

>>

>> Met with some folks at my old customer today (I should fill u in on that).

>>

>> And looks like a meeting to be set up with Dawn [Meyerriecks, head of DNI’s Acquisition and Technology]…

>>

>> Let me know if you would like to get together.

>>

>> Aaron

The reference to USG or “my old customer” may mean the CIA, as someone signing an email MFM that was sent from CIA’s public domain name contacted Barr about “timely capabilities” on the 4th as well. (“My old customer” may also mean TASC and/or NSC, since Barr was in talks about being bought out to work in TASC’s Ft. Meade office.)

Barr’s contemplated work (and in some cases, ongoing discussions) with entities like DOD’s Cyberops, NSA, and CIA is all the more troubling given an exchange he had with his former colleague from Northrup Grumman. Barr described the meeting with his former client, emphasizing that that client was not capable of “doing the right activities” “because of authority and policy restrictions.”

The conversation was very interesting today. The admit they had no idea this was happening until it hit the streets. They have no idea how to manage things like this in the future. And the agree they are not capable of doing the right activities (like I did) to be better prepared in the future because of authority and policy restrictions.

That is, whoever the client was, they agreed that they couldn’t do the kind of spying domestically Barr could because of policy restrictions.

Barr’s former colleague asked “Do you suppose there might be a market for an offshore intel gathering organization that would sell results?” To which Barr responded, “absolutely needed. Government is not going to get out of their way anytime soon to be able to do this work.”

As I will show in the future, Barr had already done this kind of analysis within the intelligence community. He had pushed to apply it to citizen activism (as well as Anonymous, though some of the people he targeted may also have engaged solely in First Amendment protected activites), and the intelligence community was anxious to hear about his Anonymous work (though there’s no indication they knew how dubious it was).




Senior Officials Wave Their SIGINT Around

You’ve probably already read this story detailing how Hosni Mubarak used his 18 day delay in resigning to rob the Egyptian people. While the whole thing is worth a read, I wanted to point out how a senior Western intelligence official makes a point of revealing that we’ve been aware of conversations among Mubarak’s thieving family members.

But a senior Western intelligence source claimed that Mubarak had begun moving his fortune in recent weeks.

We’re aware of some urgent conversations within the Mubarak family about how to save these assets,” said the source, “And we think their financial advisers have moved some of the money around. If he had real money in Zurich, it may be gone by now.” [my emphasis]

The reference to “urgent conversations” seems to suggest they were actually listening in on them. (It also raises the question of why we didn’t try to stop Mubarak from stealing the money, but I think we know the answer to that question.)

That’s similar to the way another senior official–this one identified as American–brags to CNN about the satellites we’re using to collect intelligence in Egypt. (h/t Tim Shorrock)

As the Obama administration reacted, Washington was using a variety of intelligence assets to see what was happening in Cairo and other Egyptian cities, CNN has learned.

The U.S. military and intelligence community are using “national technical means” in the sky over Egypt to gather information about the demonstrations and the deployment of Egyptian security forces.

The phrase “national technical means” is used by the U.S. government to generally refer to the use of reconnaissance satellites to gather imagery or signals intelligence.

A senior U.S. official with direct knowledge of the operation confirmed the intelligence-gathering but declined to be identified because of the sensitive nature of the matter.

The official declined to say to what extent the Egyptian government is aware of the activity. The official would not say specifically which intelligence-gathering elements were being used but indicated that operations were being conducted in a manner that would not be visible to the Egyptian populace.

The official said the decision to use intelligence-gathering assets came in part after violence erupted in the early days of the Cairo demonstrations. [my emphasis]

Now, it should surprise no one to know that the US has been collecting signals intelligence from Egypt. We would be focusing on Egypt anyway because of our Israeli and counterterrorism interests. And SIGINT will undoubtedly be more important as our relationship with Omar Suleiman shifts along with his position in the government. But normally it’s considered polite not to admit to using SIGINT so blatantly.

What seems to be a key intent of these public admissions of our spying is to disclose to whom we were listening–Mubarak’s family (and presumably other top officials)–and why we shifted our normal focus away from counterterrorism targets–because of Egyptian security forces had used violence against protesters.

In other words, this seems to be a message to top officials in Egypt–both Mubarak and our partners in Egypt’s military–that we’ve shifted our gaze away from counterterrorism and onto the government itself.

I thought we weren’t supposed to tell the people we were eavesdropping on that we were doing so?




The CIA IG Report on Renditions

There are a couple of details I want to return to in this AP story on what has happened to those responsible for CIA’s biggest fuck-ups and crimes.

One is this discussion of the CIA Inspector General’s report on “erroneous” renditions.

While the inspector general was investigating the mishandled el-Masri case, congressional investigators discovered several other CIA renditions that seemed to rest on bad legal footing, a U.S. intelligence official said. The CIA looked into them and conceded that, yes, the renditions had been based on faulty analysis.

But the agency said the renditions would have been approved even if the correct analysis had been used, so nobody was disciplined.

Now, we’ve heard of this investigation before. References to it (but no details) appear in a lot of the documents or Vaughn Indices released as part of the torture and ghost detainee FOIAs (often in the form of Congress nagging the CIA for the results of the study). The most detailed early description of the investigation comes from a 2005 Dana Priest article that was also one of the earliest detailed description of Khaled el-Masri’s treatment.

The CIA inspector general is investigating a growing number of what it calls “erroneous renditions,” according to several former and current intelligence officials.

One official said about three dozen names fall in that category; others believe it is fewer. The list includes several people whose identities were offered by al Qaeda figures during CIA interrogations, officials said. One turned out to be an innocent college professor who had given the al Qaeda member a bad grade, one official said.

“They picked up the wrong people, who had no information. In many, many cases there was only some vague association” with terrorism, one CIA officer said.

Priest reviews several of the people rendered by the CIA but ultimately dumped in Gitmo which served–one of Priest’s sources explains–as the dumping ground for CIA’s mistakes.

Among those released from Guantanamo is Mamdouh Habib, an Egyptian-born Australian citizen, apprehended by a CIA team in Pakistan in October 2001, then sent to Egypt for interrogation, according to court papers. He has alleged that he was burned by cigarettes, given electric shocks and beaten by Egyptian captors. After six months, he was flown to Guantanamo Bay and let go earlier this year without being charged.

Another CIA former captive, according to declassified testimony from military tribunals and other records, is Mohamedou Oulad Slahi, a Mauritanian and former Canada resident, who says he turned himself in to the Mauritanian police 18 days after the 9/11 attacks because he heard the Americans were looking for him. The CIA took him to Jordan, where he spent eight months undergoing interrogation, according to his testimony, before being taken to Guantanamo Bay.

Another is Muhammad Saad Iqbal Madni, an Egyptian imprisoned by Indonesia authorities in January 2002 after he was heard talking — he says jokingly — about a new shoe bomb technology. He was flown to Egypt for interrogation and returned to CIA hands four months later, according to one former intelligence official. After being held for 13 months in Afghanistan, he was taken to Guantanamo Bay, according to his testimony.

Note Habib is one of the former detainees whose treatment at the hand of Omar Suleiman has come under new scrutiny given Suleiman’s role in a post-Mubarak Egypt.

Now, the AP piece doesn’t provide many new details, but two are worthy of note.

First, apparently Congress identified the erroneous renditions, not the CIA. That suggests the CIA was not forthcoming in admitting its mistakes to Congress (which is about par for the course).

But I’m interested too in the conclusion:the renditions had been based “on faulty analysis” but they would have been approved even if “the correct analysis” was used.

That suggests Inspector General John Helgerson, not long after CIA had finagled a way to limit his conclusions about torture, focused on just the analysis–presumably, the approval process–that went into the rendition. I’m not sure what that means, but looking back at Priest’s description of the problem behind “erroneous” renditions–notably, its reliance on torture-induced evidence from al Qaeda detainees–I wonder whether Helgerson assessed the actual facts behind the rendition, or just whether the rendition, using those faulty facts, would have been approved according to the right decision process. That is, I wonder whether the CIA decided that the disappearances that even it considers were wrong didn’t matter so much because they didn’t evaluate the lies and misinformation their torture program had introduced into the process by which they chose people to disappear.

That is, it appears CIA has labeled its disappearances simply a matter of flawed bureaucracy rather than a clear example of the problems that result when you eliminate due process.




A Lovely Day at the Beach

Every year, for the first few Sundays after the Super Bowl, McCaffrey the MilleniaLab starts sulking at about 3:00 because for some reason we won’t turn on our weekly football game. (Last year we actually resorted to watching basketball the first weekend after the season ended.)

So we decided to try to tire him out before the sulk hit with a nice walk on the beach (it was a very balmy 39 degrees out).

I’ll let you know whether this effectively pre-empted the first post-football sulk of the season or not.




FBI Still Inventing New Ways to Surveil People with No Oversight

Marisa Taylor has an important update on the OLC exigent letter opinion. Last year, DOJ’s now-retired Inspector General Glenn Fine released a report revealing how the FBI had used exigent letters to get call data information from telecoms with no oversight. Ryan Singel noted a reference to an OLC opinion that basically melted away the problems created by use of these exigent letters (see pages 264-266 of the report).

On January 8, 2010, the OLC issued its opinion, concluding that the ECPA “would not forbid electronic communications service providers [three lines redacted]281 In short, the OLC agreed with the FBI that under certain circumstances [~2 words redacted] allows the FBI to ask for and obtain these records on a voluntary basis from the providers, without legal process or a qualifying emergency.

Taylor FOIAed the opinion.

And while DOJ refused to release the opinion, they did apparently reveal enough in their letter explaining their refusal to make it clear that the FBI maintains that it does not need any kind of court review to get telephone records of calls made from the US to other countries.

The Obama administration’s Justice Department has asserted that the FBI can obtain telephone records of international calls made from the U.S. without any formal legal process or court oversight, according to a document obtained by McClatchy.

[snip]

The Obama administration’s Justice Department has asserted that the FBI can obtain telephone records of international calls made from the U.S. without any formal legal process or court oversight, according to a document obtained by McClatchy.

EFF’s Kevin Bankston provides some context.

“This is the answer to a mystery that has puzzled us for more than a year now,” said Kevin Bankston, a senior staff attorney and expert on electronic surveillance and national security laws for the nonprofit Electronic Frontier Foundation.

“Now, 30 years later, the FBI has looked at this provision again and decided that it is an enormous loophole that allows them to ask for, and the phone companies to hand over, records related to international or foreign communications,” he said. “Apparently, they’ve decided that this provision means that your international communications are a privacy-free zone and that they can get records of those communications without any legal process.”

Now, I’m trying to get some clarification as to precisely what language DOJ used (see update below). But the revelation is interesting for two reasons.

As I argued last year, the opinion probably serves to clean up a lot of the illegal stuff done under the Bush Administration. I think it likely that this includes Cheney’s illegal wiretap program. If I’m right, then this claim would be particularly interesting not least because of all the discussions about US to international calls during the debate around FISA Amendments Act.

Then of course there’s the even bigger worry. When Fine released his report, the FBI assured him that it wouldn’t actually use this opinion. “No, Dad, I have no intention of taking the Porsche out for a spin, so don’t worry about leaving the keys here.”

But the fact that DOJ seems to be doubling down on this claim sort of suggests they are relying on the opinion.

Also, I can’t help but note about the timing of this FOIA response: Conveniently for DOJ, they didn’t respond to McClatchy until after Russ Feingold and Glenn Fine, the two people most likely to throw a fit about this, were out of the way.

Update: Via email, Kevin Bankston told me this is the clause the government is using to find its loophole: 18 USC 2511(2)(f).

(f) Nothing contained in this chapter or chapter 121 or 206 of this title, or section 705 of the Communications Act of 1934, shall be deemed to affect the acquisition by the United States Government of foreign intelligence information from international or foreign communications, or foreign intelligence activities conducted in accordance with otherwise applicable Federal law involving a foreign electronic communications system, utilizing a means other than electronic surveillance as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978, and procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.