As the top Intelligence Community lawyers have made clear, the IC maintains it can search US person data incidentally collected under Section 702 without any suspicion, as well as for the purposes of making algorithms, cracking encryption, and to protect property.
The Leahy-Sensenbrenner bill tries to rein in this problem. And its fix is far better than what we’ve got now. But it almost certainly won’t fix the underlying problem.
Here’s what the law would do to the “Limitations” section of Section 702. The underlined language is new.
(1) IN GENERAL.—An acquisition
(A) may not intentionally target any person known at the time of acquisition to be located in the United States;
(B) may not intentionally target a person reasonably believed to be located outside the United States if a significant purpose of such acquisition is to target a particular, known person reasonably believed to be in the United States;
(C) may not intentionally target a United States person reasonably believed to be located outside the United States;
(D) may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States; and
(E) shall be conducted in a manner consistent with the fourth amendment to the Constitution of the United States.
(2) CLARIFICATION ON PROHIBITION ON SEARCHING OF COLLECTIONS OF COMMUNICATIONS OF UNITED STATES PERSONS.—
(A) IN GENERAL.—Except as provided in subparagraph (B), no officer or employee of the United States may conduct a search of a collection of communications acquired under this section in an effort to find communications of a particular United States person (other than a corporation).
Here the public interest in disclosure seems, at least to me, remarkably weak, after all. At the policy level, the entire story amounts to nothing more than the proposition that NSA is under 12333 collecting large volumes of live-stream data, storing it, and protecting U.S. person material within that data only through minimization requirements. We knew all of that already.
So what does this story reveal that we didn’t already know? A specific collection method that people can now frustrate and a particular interest in collecting contact lists. In other words, here the Post does not seem to be balancing the costs of the disclosure against its benefit to the public interest. The costs, rather, are the benefit to the public interest. Put another way, I can’t quite shake the feeling that my old newspaper is now blowing secrets merely for the sake of doing so.
But his response to this post from Conor Freidersdorf convinced me to do a post. He’s written about 40 tweets in response, asserting things like, “there is no good argument that this sort of activity is illegal under current law.” In all that tweeting, he did not, however, respond to what I thought was a pretty decent argument this sort of activity might be illegal under current law.
Two years ago, then FISA Court Judge John Bates considered the legality of content collected off US switches. He found the practice, as had been conducted for over 3 years, violated both Section 702 of FISA Amendments Act and the Fourth Amendment because it intentionally collected US person data (NSA’s apologists usually obscure this last point, but Bates’ opinion was quite clear that this was intentional collection). To make the collection “reasonable” under a special needs exception, he required NSA to follow more stringent minimization procedures than already required under Section 702, effectively labeling some of the data and prohibiting the NSA from using US person data except in limited circumstances.
That collection differs from the contact list collection revealed by the WaPo in several ways:
The contact lists are collected overseas
WaPo’s sources are quite clear: this collection would be illegal in the US. They get around that restriction by collecting the data overseas.
The NSA has not been authorized by Congress or the special intelligence court that oversees foreign surveillance to collect contact lists in bulk, and senior intelligence officials said it would be illegal to do so from facilities in the United States. The agency avoids the restrictions in the Foreign Intelligence Surveillance Act by intercepting contact lists from access points “all over the world,” one official said, speaking on the condition of anonymity to discuss the classified program. “None of those are on U.S. territory.”
It’s not clear whether the contact list counts as metadata or content
The collection reviewed by Bates was clearly content: Internet messages collected because a selector appeared in the body of the message. With the contact lists, I could see the government claiming it was just metadata, and therefore (incorrectly, in my opinion but not in current law) subject to a much lower standard of protection. Except (as noted) WaPo’s sources admit this would be illegal if collected in the US, probably because NSA is collecting content as well.
Each day, the presentation said, the NSA collects contacts from an estimated 500,000 buddy lists on live-chat services as well as from the inbox displays of Web-based e-mail accounts.
Contact lists stored online provide the NSA with far richer sources of data than call records alone. Address books commonly include not only names and e-mail addresses, but also telephone numbers, street addresses, and business and family information. Inbox listings of e-mail accounts stored in the “cloud” sometimes contain content, such as the first few lines of a message.
This data is subjected to a much lower standard of minimization than that imposed by Bates
In his flurry of tweets, Ben keeps repeating that the US person contact lists collected under this program are protected by minimization, so it’s all good. But minimization for Executive Order 12333 collection is not as rigorous as minimization under Section 702, and certainly doesn’t include the special handling that Bates required to make the Section 702 upstream collection compliant with the Fourth Amendment. So even for those who believe minimization on bulk collection gets you to compliance with the Fourth Amendment, it’s unclear whether the minimization provided for this collection does, and given Bates’ ruling, there’s reason to believe it does not.
Neither Congress nor the FISA Court oversee this collection closely
This is the part of the WaPo story that a guy like Ben who wails NAKED! every time someone questions whether there’s adequate oversight ought to have noted. A single source claimed this program includes checks and balances. But as WaPo lays out, these aren’t checks and balances like those protecting other US person collections.
A senior U.S. intelligence official said the privacy of Americans is protected, despite mass collection, because “we have checks and balances built into our tools.”
NSA analysts, he said, may not search within the contacts database or distribute information from it unless they can “make the case that something in there is a valid foreign intelligence target in and of itself.”
In this program, the NSA is obliged to make that case only to itself or others in the executive branch. With few exceptions, intelligence operations overseas fall solely within the president’s legal purview. The Foreign Intelligence Surveillance Act, enacted in 1978, imposes restrictions only on electronic surveillance that targets Americans or takes place on U.S. territory.
Sen. Dianne Feinstein, the California Democrat who chairs the Senate Intelligence Committee, said in August that the committee has less information about, and conducts less oversight of, intelligence gathering that relies solely on presidential authority. Continue reading
As you have likely heard by now, a former FBI agent has agreed to plead guilty to leaking material about the second underwear bomb attempt to reporters in May of 2012. Charlie Savage of the New York Times has the primary rundown:
A former Federal Bureau of Investigation agent has agreed to plead guilty to leaking classified information to The Associated Press about a foiled bomb plot in Yemen last year, the Justice Department announced on Monday. Federal investigators said they identified him after obtaining phone logs of Associated Press reporters.
The retired agent, a former bomb technician named Donald Sachtleben, has agreed to serve 43 months in prison, the Justice Department said. The case brings to eight the number of leak-related prosecutions brought under President Obama’s administration; under all previous presidents, there were three such cases.
“This prosecution demonstrates our deep resolve to hold accountable anyone who would violate their solemn duty to protect our nation’s secrets and to prevent future, potentially devastating leaks by those who would wantonly ignore their obligations to safeguard classified information,” said Ronald C. Machen Jr., the United States attorney for the District of Columbia, who was assigned to lead the investigation by Attorney General Eric H. Holder Jr.
In a twist, Mr. Sachtleben, 55, of Carmel, Ind., was already the subject of a separate F.B.I. investigation for distributing child pornography, and has separately agreed to plead guilty in that matter and serve 97 months. His total sentence for both sets of offenses, should the plea deal be accepted by a judge, is 140 months.
Here is the DOJ Press Release on the case.
So Sachtleben is the leaker, he’s going to plead guilty and this all has a nice beautiful bow on it! Yay! Except that there are several troubling issues presented by all this tidy wonderful case wrap up.
First off, the information on the leak charges refers only to “Reporter A”, “Reporter A’s news organization” and “another reporter from Reporter A’s news organization”. Now while the DOJ may be coy about the identities, it has long been clear that the “news organization” is the AP and “Reporter A” and “another reporter” are AP national security reporters Matt Apuzzo and Adam Goldman (I’d hazard a guess probably in that order) and the subject article for the leak is this AP report from May 7, 2012.
What is notable about who the reporters are, and which story is involved, is that this is the exact matter that was the subject of the infamous AP phone records subpoenas that were incredibly broad – over 20 business and personal phone lines. These subpoenas, along with those in the US v. Steven Kim case collected against James Rosen and Fox News, caused a major uproar about the sanctity of First Amendment press and government intrusion thereon.
The issue here is that Attorney General Eric Holder and the DOJ, as a result of the uproar over the Continue reading
We do a lot of things here at Emptywheel including occasionally, goofing off. But our primary focus has always been the intersection of security issues, law and politics. I think I can speak for Marcy and Jim, and I certainly do for myself, we would love it if that intersection were not so critical in today’s world. But, alas, it is absolutely critical and, for all the voices out there in the community, there are precious few that deep dive into the critical minutiae.
Today we welcome a new and important player in the field, the Just Security Blog. It has a truly all star and broad lineup of contributors (most all of whom are listed as “editors” of one fashion or another), including good friends such as Steve Vladeck, Daphne Eviatar, Hina Shamsi, Julian Sanchez, Sarah Knuckey and many other quality voices. It is an ambitious project, but one that, if the content already posted on their first day is any indication, will be quite well done. The home of Just Security is the New York University School of Law, so they will have ample resources and foundation from which to operate for the long run.
Ironically, it was little more than three years ago (September 1, 2010 actually) that the Lawfare Blog went live to much anticipation (well, at least from me). Whether you always agree with Ben Wittes, Bobby Chesney, Jack Goldsmith and their contributors or not, and I don’t always, they have done this field of interest a true service with their work product, and are a fantastic and constantly evolving resource. There is little question but that Just Security intends to occupy much of the same space, albeit it in a complimentary as opposed to confrontational manner. In fact, it was Ben Wittes who hosted the podcast with Steve Vladeck and Ryan Goodman that serves as the multi-media christening of Just Security.
Orin Kerr (who is also a must read at Volokh conspiracy), somewhat tongue in cheek, tweeted that the cage match war was on between Lawfare and Just Security. That was pretty funny actually, but Orin made a more serious point in his welcome post today, and a point that I think will greatly interest the readers of Emptywheel:
Whereas Lawfare tend to have a center or center-right ideological orientation, for the most part, Just Security‘s editorial board suggests that it will have a progressive/liberal/civil libertarian voice.
From my understanding, and my knowledge of the people involved, I believe that to be very much the case. And that is a very good thing for us here, and the greater discussion on so much of our work.
Hello. Is there anybody in there? Just nod if you can hear me.
I am not sure how well the Trash Talk Machine is greased after such egregious neglect. But, we can only do what we do, and carry on. And those skilz have NOT been forgotten jack. So saddle up cowboys and cowgirls.
You would think being a blogger is an easy, Cheetos filled, lifestyle. Not the case. It is hard work, hard work I tell ya. I have suffered the indignation of Marcy and Jim yammering about wanting “trash this” and “trash that”. Weeeeelllllll that is so much SPAM! So, as I said earlier, it’s not easy, you know. I get no respect!
To make a quick comment on the title of this 2013 football season opening trash, shit is truly fucked up and bullshit. We have Mr. Constitutional Nobel Scholar President agitating to make unilateral bizarrely unnecessary war on Syria….apparently because he screwed up and drew a moronic “red line” in the sand and now has to prove he actually has bolas, in addition to stupidity and hubris. The man who when seeking votes to be elected in 2007-2008 claimed war without Congressional assent was wrong, and whose Vice-Predident called such unsanctioned war bullshittery and an “impeachable offense”, now insists without the UN, without the Brits, and with a coalition of effectively one (one who were previously described as “cheese eating surrender monkeys” not that long ago in American lore). But that is where we are now. Which is why the best name for this clusterfuck is “Operation Ballsack“. Yes, it is all about Obama’s balls, and his desperate need to prove he actually has a primordial pair.
Huh? Oh, wait! This was supposed to be football Trash Talk wasn’t it?!?!
Yikes, better get to that then. Last night was a pretty exciting open to the NCAA 2013 schedule. The ‘Ole Ball Coach Spurrier and the ‘Cocks did not seem all that animated, but still clocked a fairly solid NC Tarheel team. Looked like Vady was gonna take a bite off the ‘Ole Miss Rebels, but Ole Miss tailback Jeff Scott let loose with a 75 yard TD romp with 1:07 left, giving the Rebels a 39-35 last minute win. Good stuff. In other news, Lane Kiffen proves the question of why he has not been fired yet is still very salient by coaching a narrow win for Tommy Trojan over the Rainbows. Mighty Troy barely made it over the Rainbows. Yay. If that is all USC has, even the Sun Devils are going to wax them this year (a game I will be attending by the way). also, from Friday night, let me just say that Sparty has some VERY sticky fingered defenders. Look out B1G.
Well, what else is up I wonder? Hmmmm, appears some fella named “Manziel” was suspended half a game for something. Guess it wasn’t anything bad, cause Dez Bryant got suspended a whole season for eating dinner with Neon Deion Sanders. I sign my name on things a lot too. I get paid to do so. Not sure who would sign thousands of items for zip, nuthin, free. Apparently the crack investigators and accountability specialists at the NCAA found no problem though. And you KNOW how sane they are, cause they banned Penn State from all bowls for four years without having any NCAA violation whatsoever present. Ugh.
Alright. Games. Real ones are being played this weekend. Battle manufactured where it should be. Naturally. By a nerd at ESPN instead of that fake Operation Obama Ballsack baloney.
The game of the weekend looks to be Georgia at Clemson. These are two top ten worthy teams, if not potential national championship contenders. Special players abound everywhere on both teams, including Sammy Watkins the super receiver for the Tigers, and Tajh Boyd his quarterback. For the Bulldogs, Aaron Murray may be the best QB in the conference, and that includes Johnny Football. Awesome game to have so early. Alabama hosting Virginia Tech is another unusual one to start off with. The Tide will roll them, but there could be a struggle. should be a way better game than the Tide expected.
Honorable mentions goes to TCU and LSU in neutral Texas, Boise State/Washington and Cal versus Northwestern. Tell us what you have and why!
The one other thing I want to address is the noggins of the NFL. As you may have heard, there was a settlement this week, and it heavily favored the NFL. The craven plantation owners admitted nothing, gave up no liability findings, and gave up a ridiculously cheap total sum as hard settlement. By the time lawyer’s fees and mandatory testing etc. is deducted, it is criminal how little was gotten for a class of at risk humans. Down the road, if these class members live, they and their representatives will be screaming bloody murder. Here is an outrageously great article laying out the factors, and doing so with the tart and sarcastic truth it deserves
This long Labor Day weekend’s music is from the one, the only, Ms. Linda Ronstadt. I have a real affinity for Linda, and haver seen her numerous times including a couple of very special ones. If there has ever been a better pure female vocal talent, I am not sure I have seen it. Pure, and with a range to die for. The singing voice may be silenced, but Linda is rocking on and fighting for the causes she believes in. And they are, and always have been, great, and the right, ones. Oh, also, in case you didn’t notice, she had a backup band on the first video. Chuck Berry, Keith Richards, Robert Cray and some other chaps. The second is the band she normally toured with (including Waddy Wachtel – but with Mike Botts on drums instead of Russ Kunkel, who I always saw) and, trust me, they were absolutely killer, and very cool people to boot.
That’s it for now. Let Willis, and one and all, rock this joint. We are Livin In The USA. All things considered, it is still pretty fucking grand. Enjoy the holiday weekend my friends.
On Monday I laid out the dynamics that would be in play for the court in considering what sentence to give Bradley Manning in light of both the trial evidence and testimony, and that presented during the sentencing phase after the guilty verdict was rendered. Judge Lind has entered her decision, and Bradley Manning has been sentenced to a term of 35 years, had his rank reduced to E-1, had all pay & allowances forfeited, and been ordered dishonorably discharged. This post will describe the parole, appeal and incarceration implications of the sentence just imposed.
Initially, as previously stated, Pvt. Manning was credited with the 112 days of compensatory time awarded due to the finding that he was subjected to inappropriate pre-trial detention conditions while at Quantico. Pvt. Manning was credited with a total 1294 days of pre-trial incarceration credit for the compensatory time and time he has already served since the date of his arrest.
Most importantly at this point, Manning was sentenced today to a prison term of 35 years and the issue of what that sentence means – above and beyond the credit he was given both for compensatory time and time served – is what is critical going forward. The following is a look at the process, step by step, Bradley Manning will face.
The first thing that will happen now that Judge Lind has gaveled her proceedings to a close is the court will start assembling the record, in terms of complete transcript, exhibits and full docket, for transmission to the convening authority for review. It is not an understatement to say that this a huge task, as the Manning record may well be the largest ever produced in a military court martial. It will be a massive undertaking and transmission.
At the same time, the defense will start preparing their path forward in terms of issues they wish to argue. It is my understanding that Pvt. Manning has determined to continue with David Coombs as lead counsel for review and appeal, which makes sense as Coombs is fully up to speed and, at least in my opinion, has done a fantastic job. For both skill and continuity, this is a smart move.
The next step will be designation of issues to raise for review by the “convening authority”. In this case, the convening authority is Major General Jeffrey Buchanan, who heads, as Commanding General, the US Army’s Military District of Washington. This step is quite different than civilian courts, where a defendant proceeds directly to an appellate court.
The accused first has the opportunity to submit matters to the convening authority before the convening authority takes action – it’s not characterized as an “appeal,” but it’s an accused’s first opportunity to seek relief on the findings and/or the sentence. According to the Manual for Courts-Martial, Rule for Court-Martial 1105:
(a) In general. After a sentence is adjudged in any court-martial, the accused may submit matters to the convening authority in accordance with this rule.
(b) Matters which may be submitted.
(1) The accused may submit to the convening au thority any matters that may reasonably tend to af fect the convening authority’s decision whether to disapprove any findings of guilty or to approve the sentence. The convening authority is only required to consider written submissions.
(2) Submissions are not subject to the Military Rules of Evidence and may include:
(A) Allegations of errors affecting the legality of the findings or sentence;
(B) Portions or summaries of the record and copies of documentary evidence offered or intro duced at trial;
(C) Matters in mitigation which were not avail able for consideration at the court-martial; and
(D) Clemency recommendations by any member, the military judge, or any other person. The defense may ask any person for such a recommendation.
Once the convening authority has the full record and the defense has designated its matters for review, Buchanan will perform his review and determine whether any adjustments to the sentence are appropriate, and that will be considered the final sentence. At this point, the only further review is by a traditional appeal process.
Generally, the level of appellate review a case receives depends on the sentence as approved by the Continue reading
In a piece making the obvious comparison between fugitive spy Robert Seldon Lady and accused Espionage fugitive Edward Snowden, Tom Englehardt writes off the press silence about presumed American assistance to Lady in fleeing an international arrest warrant as the reality of being the sole superpower.
It’s no less a self-evident truth in Washington that Robert Seldon Lady must be protected from the long (Italian) arm of the law, that he is a patriot who did his duty, that it is the job of the U.S. government to keep him safe and never allow him to be prosecuted, just as it is the job of that government to protect, not prosecute>, CIA torturers who took part in George W. Bush’s Global War on Terror.
So there are two men, both of whom, Washington is convinced, must be brought in: one to face “justice,” one to escape it. And all of this is a given, nothing that needs to be explained or justified to anyone anywhere, not even by a Constitutional law professor president. (Of course, if someone had been accused of kidnapping and rendering an American Christian fundamentalist preacher and terror suspect off the streets of Milan to Moscow or Tehran or Beijing, it would no less self-evidently be a different matter.)
Don’t make the mistake, however, of comparing Washington’s positions on Snowden and Lady and labeling the Obama administration’s words and actions “hypocrisy.” There’s no hypocrisy involved. This is simply the living definition of what it means to exist in a one-superpower world for the first time in history. For Washington, the essential rule of thumb goes something like this: we do what we want; we get to say what we want about what we do; and U.N. ambassadorial nominee Samantha Powers then gets to lecture the world on human rights and oppression.
This version of how it all works is so much the norm in Washington that few there are likely to see any contradiction at all between the Obama administration’s approaches to Snowden and Lady, nor evidently does the Washington media.
Englehardt doesn’t mention Sabrina De Sousa’s claims about the CIA’s kidnapping of Osama Mustapha Hassan Nasr (Abu Omar) and Italy’s subsequent prosecution of those involved. Adding her in the mix makes it clear how closely immunity for the Commander in Chief and his top aides is part of this superpower big-footing.
De Sousa, who says she served as an interpreter for the kidnappers on a planning trip, but not in the operation itself, was convicted and sentenced in Italy in part because the government refused to invoke diplomatic immunity (she admits she worked for CIA, but was under official cover).
The kidnapping did not meet US standards for renditions, but Station Chief Jeff Castelli wanted to do one anyway, and pushed through its approval even without Italian cooperation.
Despite concerns with the strength of Castelli’s case, CIA headquarters still agreed to move forward and seek Rice’s approval, De Sousa said. She recalled reading a cable from late 2002 that reported that Rice was worried about whether CIA personnel “would go to jail” if they were caught.
In response, she said, Castelli wrote that any CIA personnel who were caught would just be expelled from Italy “and SISMi will bail everyone out.”
Of her CIA superiors, De Sousa said, “They knew this (the rendition) was bullshit, but they were just allowing it. These guys approved it based on what Castelli was saying even though they knew it never met the threshold for rendition.”
Asked which agency officials would have been responsible for reviewing the operation and agreeing to ask Rice for Bush’s authorization, De Sousa said they would have included Tenet; Tyler Drumheller, who ran the CIA’s European operations; former CIA Director of Operations James Pavitt and his then-deputy, Stephen Kappes; Jose Rodriguez, then the head of the CIA’s Counterterrorism Center, and former acting CIA General Counsel John Rizzo.
De Sousa says the Italians and Americans colluded to protect the highers up, while prosecuting her and other lower level people.
De Sousa accused Italian leaders of colluding with the United States to shield Bush, Rice, Tenet and senior CIA aides by declining to prosecute them or even demanding that Washington publicly admit to staging the abduction.
Calling the operation unjustified and illegal, De Sousa said Italy and the United States cooperated in “scape-goating a bunch of people . . . while the ones who approved this stupid rendition are all free.”
Note, she doesn’t say this, but some of the people in the chain of command for this kidnapping — in both the US and Italy — were also involved in planting the Niger forgeries used to start the Iraq War. And, of course, a number of the Americans were involved in the torture program and its cover-up.
Since then, De Sousa has used all legal avenues to blow the whistle on this kidnapping.
De Sousa said that she has tried for years to report what she said was the baseless case for Nasr’s abduction and her shoddy treatment by the CIA and two administrations.
Her pleas and letters, however, were ignored by successive U.S. intelligence leaders, the CIA inspector general’s office, members and staff of the House and Senate intelligence committees, Rice, former Secretary of State Hillary Clinton and Attorney General Eric Holder, said De Sousa.
Assuming De Sousa’s story is correct (and an anonymous source backs its general outlines), then it adds one more reason why Lady quietly got to return to the US while Snowden will be loudly chased around the world.
What Americans are buying off on — along with superpower status that may defund schools in exchange for empire — with their silence about the disparate treatment of Sady and Snowden, then, is not just the ego thrill of living in a thus far unrivaled state.
It’s also, implicitly, the kind of immunity for the Commander in Chief and executive branch that shouldn’t exist in democratic states.
Cora Currier describes the absurd response she got when she asked for a list of our enemies.
At a hearing in May, Sen. Carl Levin, D-Mich., asked the Defense Department to provide him with a current list of Al Qaeda affiliates.
The Pentagon responded – but Levin’s office told ProPublica they aren’t allowed to share it. Kathleen Long, a spokeswoman for Levin, would say only that the department’s “answer included the information requested.”
A Pentagon spokesman told ProPublica that revealing such a list could cause “serious damage to national security.”
“Because elements that might be considered ‘associated forces’ can build credibility by being listed as such by the United States, we have classified the list,” said the spokesman, Lt. Col. Jim Gregory. “We cannot afford to inflate these organizations that rely on violent extremist ideology to strengthen their ranks.”
Thing is, this is not entirely new. At least until February, the government had been refusing to give Ron Wyden a list of every country in which we’ve used lethal force. And he’s on the Intelligence Committee!
Indeed, Currier suggests one reason this might be classified would be if Obama was fighting these enemies under Inherent Authority.
The AUMF isn’t the only thing the government relies on to take military action. In speeches and interviews Obama administration officials also bring up the president’s constitutional power to defend the country, even without congressional authorization.
But, as Jack Goldsmith notes, something else seems to be going on here, because the response Currier got suggests the list is classified Secret, not whatever Top Secret compartment the government maintained for a year Wyden couldn’t access.
The language of the DOD release suggests that at least a few more groups (or elements of groups), and maybe many more groups (or elements), are on the AUMF “list.” The existence of a “list” (which was unclear in the May 2013 AUMF hearing), and the fact that there may be at least a few groups (or elements of groups) on it, is itself news in the AUMF-watcher world. It is also consistent with suggestions and implications in reports, such as in Mark Mazzetti’s book, that the AUMF is being invoked in various ways by DOD Special Operations Forces for non-covert military activities in many countries around the globe.
Third, it is entirely unclear why the USG can acknowledge some groups without unduly “inflating” them, and not others. And this in turn makes me skeptical of the notion of “inflation.” To be sure, some groups that are AUMF-able (such as, perhaps, the Haqqani network, a known but not acknowledged U.S. target) perhaps cannot be named because the operations are covert actions and involve deals of non-acknowledgment with foreign governments (or elements of foreign governments). But that cannot be a comprehensive explanation for DOD’s secrecy. By stating that disclosure of groups on the list would “reasonably be expected to cause serious damage to the national security,” DOD has tipped off that the list is classified only at the secret (as opposed to top secret) level. (See Section 1.2 of E.O. 13,256.) Covert actions are typically classified at the top secret level. This implies (but does not prove) that some if not all of the AUMF-groups in question are not subjects of covert actions.
But remember: There are two other instances where the government has refused to clarify who is, and is not, an enemy.
When a bunch of people who have talked to, but not assisted, terrorists sued to stop the NSAA’s provisions allowing indefinite detention, the government refused (until it became convenient) to say whether they could be detained or not.
Then, as part of the Bradley Manning charges, the government kept one of the enemies it was going to prove he had aided classified (but ultimately didn’t argue he had aided that enemy in court).
Prosecutors accuse him of “aiding the enemy,” and three in particular: al-Qaida, al-Qaida in the Arabian Peninsula and a “classified enemy” referred to by a Bates number, which is a form of legal document identification.
Three professors of military law – Yale Law School’s Eugene Fidell, Duke University School of Law’s Scott Silliman and Texas Tech University School of Law’s Richard Rosen – told Courthouse News they had never heard of a case involving a “classified enemy.”
After being informed that the phrase stumped the professors, a military spokeswoman insisted that the confusion stemmed from a misunderstanding, because “who the enemy ‘is’ is not classified.”
“What ‘is’ classified is that our government has confirmed that this enemy is in receipt of certain compromised classified information, and that the means and methods of collection that the government has employed to make that determination are classified,” the spokeswoman said in an email.
One thing about all these instances — refusing to share a list of lethal force targeted countries with Ron Wyden, sharing a classified list with Carl Levin only on request, refusing to tell Americans (and one member of parliament from Iceland) whether they are counted as enemies, and refusing to tell Manning which enemy he supposed aided — is that they provide the executive maximum flexibility. That may not be the only thing this extreme secrecy about enemies does. But it is one thing it does do, along with hiding how broad the unilaterally declared war under Inherent Authority is.
It sure does make things confusing, though!
Little more than few hours ago, a critical ruling was handed down by Judge Denise Lind in the Bradley Manning UCMJ prosecution ongoing at Fort Meade. The decision was on based on this motion by the defense seeking dismissal of the “Aiding the Enemy” charge, among others in the prosecution.
To make a long, even if sadly predictable, story short, the motion was denied by Judge Lind and the charge will proceed to determination on the merits. This is, to be sure, a nod to the prosecution (which is actually the standard in such motions for directed verdicts during trials; that is the facts are taken in the light most favorable to the non-moving party, the government). It is also, obviously, a blow to the defense, although undoubtedly an expected one for defense attorney David Coombs. There is a very outside chance of a silver lining I will discuss below.
Julie Tate at the Washington Post sets the table:
The motion to dismiss the charge was filed July 4 by Manning’s civilian defense attorney. He argued that the government had failed to show that Manning “had ‘actual knowledge’ that by giving information to WikiLeaks, he was giving information to an enemy of the United States.” He said the government did introduce evidence “which might establish that PFC Manning ‘inadvertently, accidentally, or negligently’ gave intelligence to the enemy,” but that this was not enough to prove the most serious charge against him, known as an Article 104 offense.
On two separate occasions, Lind, an Army colonel, had questioned military prosecutors about whether they would be pursuing the charge if the information had been leaked directly to The Washington Post or the New York Times. Each time, the prosecution said it would. That troubles advocates for whistleblowers, who fear that the leaking of national defense information that appears online, as it inevitably does, can be construed as assisting the enemy.
If convicted of aiding the enemy, Manning, an intelligence analyst who served in Iraq, could face life in prison.
That describes the motion and the stakes as to Manning. Julie’s article also gives more particulars on the denial this morning, and is worth a read. For a tick tock, please see the continuously good coverage by Kevin Gosztola of Firedoglake.
But as enormous as the stakes are for Bradley Manning, the enterprise of investigative journalism is also on trial, even if in an indirect manner.
Yet another journalist who has tirelessly, and superbly, covered the Manning prosecution, Alexis O’Brien, has written at the Daily Beast, the stakes for investigative journalism are also life and/or death in the face of the security/surveillance state. Citing the in court, and on the trial record, compelling testimony of Professor Yochai Benkler of Harvard Law School, Alexis related:
In a historic elocution in court last week, Prof. Yochai Benkler, co-director of the Berkman Center for Internet and Society at Harvard Law School, told Lind that “the cost of finding Pfc. Manning guilty of aiding the enemy would impose” too great a burden on the “willingness of people of good conscience but not infinite courage to come forward,” and “would severely undermine the way in which leak-based investigative journalism has worked in the tradition of [the] free press in the United States.”
“[I]f handing materials over to an organization that can be read by anyone with an internet connection, means that you are handing [it] over to the enemy—that essentially means that any leak to a media organization that can be read by any enemy anywhere in the world, becomes automatically aiding the enemy,” said Benkler. “[T]hat can’t possibly be the claim,” he added.
Benkler testified that WikiLeaks was a new mode of digital journalism that fit into a distributed model of emergent newsgathering and dissemination in the Internet age, what he termed the “networked Fourth Estate.” When asked by the prosecution if “mass document leaking is somewhat inconsistent with journalism,” Benkler responded that analysis of large data sets like the Iraq War Logs provides insight not found in one or two documents containing a “smoking gun.” The Iraq War Logs, he said, provided an alternative, independent count of casualties “based on formal documents that allowed for an analysis that was uncorrelated with the analysis that already came with an understanding of its political consequences.”
Those really are the stakes in the, now, not all that new age of digital journalism. When the prosecutors in the Manning trial, upon direct questioning by Judge Lind as to whether they would still prosecute Manning if his leaks had been delivered straight to the New York Times or Washington Post, it had to be a wake up call for traditional media. Or so you would think. But, really, the outrage has been far greater over the James Rosen/Fox subpoena that could, and arguably should, be considered relative peanuts.
But, Yochai Benkler is right as to the import of the consideration as to Wikileaks in the Manning case.
In closing, the one slim and thin ray of limited hope from today’s ruling by Denise Lind: If I were Lind and cared at all about the ultimate verdict on Pvt. Bradley Manning, I too would have made this ruling. Why, you ask? Well, because a dismissal on the motion would have been the equivalent of a directed verdict on the law and would be far easier to overturn on appeal than a decision on the merits that the government has not met its burden of proof. Is this possible; sure, it certainly is. Is this likely; no, I would not make any substantial bets on it.
I was in court, so I didn’t see it, but apparently there was a little hearing over at House Judiciary Committee this morning on “Oversight of the Administration’s Use of FISA Authorities“. There was an august roll of Administration authorities and private experts: Mr. James Cole, United States Department of Justice; Mr. John C. Inglis, National Security Agency; Mr. Robert S. Litt, ODNI; Ms. Stephanie Douglas, FBI National Security Branch; Mr. Stewart Baker; Mr. Steven G. Bradbury; Mr. Jameel Jaffer; and Ms. Kate Martin.
Hmmm, let’s take a look and see if anything interesting occurred (as reported by Pete Yost of AP). Uh, well, there was THIS:
For the first time, NSA deputy director John C. Inglis disclosed Wednesday that the agency sometimes conducts what’s known as three-hop analysis. That means the government can look at the phone data of a suspect terrorist, plus the data of all of his contacts, then all of those people’s contacts, and finally, all of those people’s contacts.
If the average person calls 40 unique people, three-hop analysis could allow the government to mine the records of 2.5 million Americans when investigating one suspected terrorist.
The government says it stores everybody’s phone records for five years. Cole explained that because the phone companies don’t keep records that long, the NSA had to build its own database.
Go read all of Yost’s report, there is quite a bit in there that is stunning in the blithe attitude the Administration takes on this hoovering of data and personal information. Also clear: Congress has no real grasp or control of the government’s actions. The Article I brakes are out and the Article II car is accelerating and careening down the road.