Posts

The Clapper Review: How to Fire 90% of SysAdmins?

Yesterday, I noted it took just 72 hours from Obama to turn an “independent” “outside” review of the government’s SIGINT programs into the James Clapper Review of James Clapper’s SIGINT Programs.

But many other commenters have focused on the changed description of the review’s mandate. In his speech on Friday, Obama said the review would study, “how we can maintain the trust of the people, how we can make sure that there absolutely is no abuse in terms of how these surveillance technologies are used, ask how surveillance impacts our foreign policy.”

On Monday, his instruction to James Clapper said the review would, “whether, in light of advancements in communications technologies, the United States employs its technical collection capabilities in a manner that optimally protects our national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust.”

Both addressed public trust. But Monday’s statement replaced a focus on “absolutely no abuse” with “risk of unauthorized disclosure.”

Now, I’m not certain, but I’m guessing we all totally misunderstood (by design) Obama’s promises on Friday.

The day before the President made those promises, after all, Keith Alexander made a different set of promises.

“What we’re in the process of doing – not fast enough – is reducing our system administrators by about 90 percent,” he said.

The remarks came as the agency is facing scrutiny after Snowden, who had been one of about 1,000 system administrators who help run the agency’s networks, leaked classified details about surveillance programs to the press.

Before the change, “what we’ve done is we’ve put people in the loop of transferring data, securing networks and doing things that machines are probably better at doing,” Alexander said.

We already know that NSA’s plan to minimize the risk of unauthorized disclosure involves firing 900 SysAdmins (Bruce Schneier provides some necessary skepticism about the move). They probably believe that automating everything (including, presumably, the audit-free massaging of the metadata dragnet data before analysts get to it) will ensure there “absolutely is no abuse.”

And by turning the review intended to placate the civil libertarians into the review that will come up with the brilliant idea of putting HAL in charge of spying, the fired SysAdmins might just blame the civil libertarians.

So this review we all thought might improve privacy? Seems, instead, designed to find ways to fire more people faster.

I Told You So, It’s about Cybersecurity Edition

When James “Least Untruthful” Clapper released the first version of PRISM success stories and the most impressive one involved thwarting specific cyberattacks, I noted that the NSA spying was about hackers as much as terrorists.

When  “Lying Keith” Alexander answered a question about hacking China from George Stephanopoulos by talking about terror, I warned that these programs were as much about cybersecurity as terror. “Packets in flight!”

When the Guardian noted that minimization procedures allowed the circulation of US person communications collected incidentally off foreign targets if they were “necessary to understand or assess a communications security vulnerability,” I suggested those procedures fit cybersecurity targets better than terror ones.

When Ron Wyden and Mark Udall caught Lying Keith (again) in a lie about minimization, I speculated that the big thing he was hiding was that encrypted communications are kept until they are decrypted.

When I compared minimization procedures with the letter of the law and discovered the NSA had secretly created for itself the ability to keep US person communications that pose a serious threat to property (rather than life or body), I suggested this better targeted cyber criminals than terrorists.

When Joel Brenner suggested Ron Wyden was being dishonorable for asking James Clapper a yes or no question in March 2013, I noted that Wyden’s question actually referred to lies Lying Alexander had told the previous year at DefCon that hid, in part, how hackers’ communications are treated.

When the Guardian happened to publish evidence the NSA considers encryption evidence of terrorism the same day that Keith Alexander spokes to a bunch of encrypters exclusively about terrorism, I suggested he might not want to talk to those people about how these programs are really used.

And when I showed how Lying Keith neglected his boss’ earlier emphasis on cyber in his speech to BlackHat in favor of terror times 27, I observed Lying Keith’s June exhortation that “we’ve got to have this debate with our country,” somehow didn’t extend to debating with hackers.

I told you it would come to this:

U.S. officials say NSA leaks may hamper cyber policy debate

Over two months after Edward Snowden’s first disclosures, the cyberwarriors are now admitting disclosures about how vast is NSA’s existing power — however hidden behind the impetus of terror terror terror — might lead Congress to question further empowering NSA to fight cyberwar.

I told you so. Read more

Stewart Baker’s User Interface and Edward Snowden’s Authorities

Former NSA Counsel Stewart Baker has been in an increasingly urgent froth since Edward Snowden’s leaks first became public trying to prove that the NSA should have more, not less, unchecked authority.

He outdid himself yesterday with an attempt to respond to Jack Goldsmith’s question,

How is the NSA Director Alexander’s claim that “we can audit the actions of our people 100%” (thus providing an important check against abuse) consistent with (a) stories long after Snowden’s initial revelations that the White House does not “know with certainty” what information Snowden pilfered, (b) reported NSA uncertainty weeks after the initial disclosure about what Snowden stole, (c) Alexander’s own assertion (in June) that NSA was “now putting in place actions that would give us the ability to track our system administrators”?

Baker’s totally inadequate response consists of pointing to certain features of XKeyscore revealed by the Guardian.

Take a close look at slide 7 of the latest leaked powerpoints.

It shows a sample search for a particular email address, including a box for “justification.” The sample justification (“ct target in n africa”) provides both the foreign intelligence reason for surveillance and the location of the target. What’s more, the system routinely calls for “additional justification.” All this tends to confirm NSA’s testimony that database searches must be justified and are subject to audits to prevent privacy abuses.

Now, I don’t know about Baker, but even without a drop-down menu, the average American high schooler is thoroughly adept at substituting a valid justification (“grandmother’s funeral,” “one day flu”) for an invalid one (“surfs up!” “first day of fishing season”). I assume the analysts employed by NSA are at least as adept at feeding those in authority the answers they expect. XKeyscore just makes that easier by providing the acceptable justifications in a drop-down menu.

More problematic for Baker, he commits the same error the Guardian’s critics accuse it of committing: confusing a User Interface like XKeyscore or PRISM with the underlying collections they access. (The Guardian has repeated Snowden and Bill Binney’s claims the NSA collects everything, without yet presenting proof that that includes US person content aside from incidental content collected on legitimate targets.)

That error, for Baker, makes his response to Goldsmith totally inapt to his task at hand, answering Goldsmith’s questions about what systems administrators could do, because he responds by looking at what analysts could do. Goldsmith’s entire point is that the NSA had insufficient visibility into what people with Snowden’s access could do, access which goes far beyond what an analyst can do with her drop-down menu.

And one of the few documents the government has released actually shows why that is so important.

The Primary Order for the Section 215 metadata dragnet, released last week, reveals that technical personnel have access to the data before it gets to the analyst stage.

Appropriately trained and authorized technical personnel may access the BR metadata to perform those processes needed to make it usable for intelligence analysis. Technical personnel may query the BR metadata using selection terms4 that have not been RAS-approved (described below) for those purposes described above, and may share the results of those queries with other authorized personnel responsible for these purposes, but the results of any such queries will not be used for intelligence analysis purposes. An authorized technician may access the BR metadata to ascertain those identifers that may be high volume identifiers. The technician may share the results of any such access, i.e., the identifers and the fact that they are high volume identifers, with authorized personnel (including those responsible for the indentification and defeat of high volume and other unwanted BR metadata from any of NSA’s various metadata respositories), but may not share any other information from the results of that access for intelligence analysis purposes. In addition, authorized technical personnel may access the BR metadata for purposes of obtaining foreign intelligence information pursuant to the requirements of subparagraph (3)(C) below.

[snip]

Whenever the BR metadata is accessed for foreign intelligence analysis purposes or using foreign intelligence analysis query tools, an auditable record of the activity shall be generated.

Note, footnote 4 describing these selection terms is redacted and the section in (3)(C) pertaining to these technical personnel appears to be too.

Now, I suspect the technical personnel who access the metadata dragnet are different technical personnel than the Snowdens of the world. They’re data crunchers, not network administrators. Which only shows there’s probably a second category of person that may escape the checks in this system.

That’s because with their front-end manipulation of the dataset (though not the activities described under (3)(C)), these personnel are not conducting what are considered foreign intelligence searches of the database. The data they extract from the database is specifically prohibited (though, with weak language) from circulation as foreign intelligence information. That appears to mean their actions are not auditable. When Keith Alexander says the data is 100% auditable? You shouldn’t believe him, because his own document appears to say only the analytical side of this is audited. (The document also makes it clear that once the data has been queried, the results are openly accessible without any audit function; the ACLU had a good post on this troubling revelation.)

I suspect a lot of what these technical personnel are doing is stripping numbers — probably things like telemarketer numbers — that would otherwise distort the contact chaining. Unless terrorists’ American friends put themselves on the Do Not Call List, then telemarketers might connect them to every other American not on the list, thereby suggesting a bunch of harassed grannies in Dubuque are 2 degrees from Osama bin Laden.

But there’s also the reference to “other unwanted BR metadata.” As I’ll explain in a future post, I suspect that may be some of the most sensitive call records in the dataset.

Whatever call records get purged on the front end, though, it appears to all happen outside the audit chain that Keith Alexander likes to boast about. Which would put it well outside the world of drop-down menus that force analysts actions to conform with something that looks like foreign intelligence analysis.

In other words, even the document the government provided (with heavy redactions) to make us more comfortable about this program shows places where it probably has insufficient visibility on what happens to the data. And that’s well before you get into the ability of people who can override other technical checks on NSA behavior as system administrators.

Update: More froth from Stewart Baker. This response to my post seems to be an utter capitulation to Goldsmith’s point.

Wheeler thinks this is important because it means that the “justification” menus don’t guarantee auditability of every use of intercept data by every employee at NSA. Again, that may be true, but the important point about the “justification” menu isn’t that it offers universal protection against abuse; nothing does. [my emphasis]

Shut Down CyberCommand — US CyberCommander Keith Alexander Doesn’t Think It’s Important

Back on March 12 — in the same hearing where he lied to Ron Wyden about whether the intelligence community collects data on millions of Americans — James Clapper also implied that “cyber” was the biggest threat to the United States.

So when it comes to the distinct threat areas, our statement this year leads with cyber. And it’s hard to overemphasize its significance. Increasingly, state and non-state actors are gaining and using cyber expertise. They apply cyber techniques and capabilities to achieve strategic objectives by gathering sensitive information from public- and private sector entities, controlling the content and flow of information, and challenging perceived adversaries in cyberspace.

That was the big takeaway from Clapper’s Worldwide Threat Assessment. Not that he had lied to Wyden, but that that cyber had become a bigger threat than terrorism.

How strange, then, that the US CyberCommander (and Director of National Security) Keith Alexander mentioned cyber threats just once when he keynoted BlackHat the other day.

But this information and the way our country has put it together is something that we should also put forward as an example for the rest of the world, because what comes out is we’re collecting everything. That is not true. What we’re doing is for foreign intelligence purposes to go after counterterrorism, counterproliferation, cyberattacks. And it’s focused. [my emphasis]

That was it.

The sole mention of the threat his boss had suggested was the biggest threat to the US less than 5 months earlier. “Counterterrorism, counterproliferation, cyberattacks. and it’s focused.”

The sole mention of the threat that his audience of computer security professionals are uniquely qualified to help with.

Compare that to his 27 mentions of “terror” (one — the one with the question mark — may have been a mistranscription):

terrorists … terrorism … terrorist attacks … counterterrorism … counterterrorism … terrorists … counterterrorism … terrorist organizations … terrorist activities … terrorist … terrorist activities … counterterrorism nexus … terrorist actor … terrorist? … terrorism … terrorist … terrorists … imminent terrorist attack … terrorist … terrorist-related actor … another terrorist … terrorist-related activities … terrorist activities … stopping terrorism … future terrorist attacks … terrorist plots … terrorist associations

That was the speech the US CyberCommander chose to deliver to one of the premiere group of cybersecurity professionals in the world.

Terror terror terror.

Sitting among you are people who mean us harm

… US CyberCommander Alexander also said.

Apparently, Alexander and Clapper’s previous intense focus on stopping hacktavists and cyberattacks and cybertheft and cyber espionage have all been preempted by the necessity of scaring people into accepting the various dragnets that NSA has deployed against Americans.

Which, I guess, shows us the true seriousness of the cyber threat.

To be fair to our CyberCommander, he told a slightly different story back on June 27, when he addressed the Armed Forces Communications and Electronics Association International Cyber Symposium.

Sure, he started by addressing Edwards Snowden’s leaks.

But then he talked about a debate he was prepared to have.

I do think it’s important to put that on the table, because as we go into cyber and look at–for cyber in the future, we’ve got to have this debate with our country. How are we going to protect the nation in cyberspace? And I think this is a debate that is going to have all the key elements of the executive branch–that’s DHS, FBI, DOD, Cyber Command, NSA and other partners–with our allies and with industry. We’ve got to figure how we’re going to work together.

How are we going to protect the nation in cyberspace? he asked a bunch of Military Intelligence Industrial Complex types.

At his cyber speech, Alexander also described his plan to build, train, and field one-third of the force by September 30 — something you might think he would have mentioned at BlackHat.

Not a hint of that.

Our US CyberCommander said — to a bunch of industry types — that we need to have a debate about how to protect the nation in cyberspace.

But then, a month later, with the group who are probably most fit to debate him on precisely those issues, he was all but silent.

Just terror terror terror.

Keith Alexander: We Report Violations to “Everyone”

At 32:14 in his speech to BlackHat yesterday, Keith Alexander said of the Section 215 dragnet,

We comply with the court orders and do this exactly right. And if we make a mistake, we hold ourselves accountable and report it to everyone.

Here’s what the 2011 report on both the telecom and Internet dragnets declassified yesterday said about NSA’s compliance failures (see PDF page 8).

Screen shot 2013-08-01 at 11.45.38 AM

By “everyone” Alexander appears not to include “citizens and taxpayers.”

As I reported Friday, Ron Wyden and Mark Udall say the Intelligence Committee downplays the seriousness of the violations that have occurred.

Their violations of the rules for handling and accessing bulk phone information are more troubling than have been acknowledged and the American people deserve to know more details.

Monday, Wyden elaborated further.

I am not allowed to discuss the classified nature of that, but I want to make sure those who are following this debate know that from my vantage point, reading those documents that are classified, these violations are more serious than have been stated by the intelligence community, and in my view that is very troubling. So I do hope Senators will go to the Intelligence Committee and ask to see those classified documents because I think when they read them–I think they will come to the conclusion to which I have come that, not only is what was stated by the Director of National Intelligence in that letter that was sent to you and me and Senator Udall and 23 other Senators–not only was that correct, but I think Senators who read those classified documents will also come to the conclusion that the violations are more serious than they thought–than the intelligence community portrayed.

After Alexander’s speech yesterday, CNBC asked further questions, including specifically about Wyden’s claims.

CNBC: General Alexander, Senator Wyden said yesterday that phone records collection abuse has been more significant than the government has acknowledged. What do you say about that?

Alexander: I’m not sure what he’s referring to, so I don’t know without him being more specific. If he could be. I think, um, maybe we should have a discussion on what that means.

(Alexander went on to provide actual specifics about what “everyone” means, though he did not explicitly admit it doesn’t include “everyone.”)

I’m not actually sure where that “if he could be” fits syntactically in Alexander’s response. But here’s why Wyden can’t provide more specifics.

Screen shot 2013-08-01 at 11.45.38 AM

Alexander, who is a classification authority (though James Clapper may be the classification authority for the 215 program), responded to a question about abuse by demanding that Wyden, who is not a classification authority, provide more details about something that NSA and ODNI have specifically kept classified.

But don’t worry. When they commit abuses, Alexander claimed, they tell “everyone.”

Later in the interview, Alexander told CNBC it could help.

Just reporting what somebody says is not the right thing to do for our country.

[snip]

Let’s put the facts on the table. If you just blindly take what somebody says, I think that’s not what our nation needs.

Yet blindly taking what somebody says about government abuse is precisely where Alexander and Clapper have left American citizens.

 

 

On Same Day Alexander Tells BlackHat, “Their Intent Is to Find the Terrorist That Walks Among Us,” We See NSA Considers Encryption Evidence of Terrorism

Screen shot 2013-08-01 at 9.34.18 AM

Thirty minutes into his speech at BlackHat yesterday, Keith Alexander said,

Remember: their intent is not to go after our communications. Their intent is to find the terrorist walks among us.

He said that to a room full of computer security experts, the group of Americans probably most likely to encrypt their communications, even hiding their location data.

At about the same time Alexander made that claim, the Guardian posted the full slide deck from the XKeyscore program it reported yesterday.

How do I find a cell of terrorists that has no connection to known strong-selectors?

Answer: Look for anomalous events

Among other things, the slide considers this an anomalous event indicating a potential cell of terrorists:

  • Someone who is using encryption

Meanwhile, note something else about Alexander’s speech.

13:42 into his speech, Alexander admits the Section 702 collection (this is true of XKeyscore too — but not the Section 215 dragnet, except in its use on Iran) also supports counter-proliferation and cybersecurity.

That is the sole mention in the entire speech of anything besides terrorism. The rest of it focused exclusively on terror terror terror.

Except, of course, yesterday it became clear that the NSA considers encryption evidence of terrorism.

Increasingly, this infrastructure is focused intensively on cybersecurity, not terrorism. That’s logical; after all, that’s where the US is under increasing attack (in part in retaliation for attacks we’ve launched on others). But it’s high time the government stopped screaming terrorism to justify programs that increasing serve a cybersecurity purpose. Especially when addressing a convention full of computer security experts.

But maybe Alexander implicitly admits that. At 47:12, Alexander explains that the government needs to keep all this classified because (as he points into his audience),

Sitting among you are people who mean us harm.

(Note after 52:00 a heckler notes the government might consider BlackHat organizer Trey Ford a terrorist, which Alexander brushes off with a joke.)

It’s at that level, where the government considers legal hacker behavior evidence of terrorism, that all reassurances start to break down.

Update: fixed XKeystroke for XKeyscore–thanks to Myndrage. Also, Marc Ambinder reported on it in his book.

Update: NSA has now posted its transcript of Alexander’s speech. It is 12 pages long; in that he mentioned “terror” 27 times. He mentions “cyber” just once.

Is THIS What Wyden Meant by “Allowing the NSA to Deliberately Search for Records of Particular Americans”?

A month ago, I noted that after Ron Wyden and Mark Udall criticized Keith Alexander for suggesting the NSA could not deliberately search the records of specific Americans, the NSA Director withdrew the white sheet implying such a claim.

The latest report from Glenn Greenwald, describing how XKeyscore allows analysts — with no court review or other oversight — to review already collected information by indexing on metadata.

The purpose of XKeyscore is to allow analysts to search the metadataas well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a “selector” in NSA parlance) associated with the individual being targeted.

Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.

One document notes that this is because “strong selection [search by email address] itself gives us only a very limited capability” because “a large amount of time spent on the web is performing actions that are anonymous.”

The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.

Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use themetadata also stored in the databases to narrow down what to review.

A slide entitled “plug-ins” in a December 2012 document describes the various fields of information that can be searched. It includes “every email address seen in a session by both username and domain”, “every phone number seen in a session (eg address book entries or signature block)” and user activity – “the webmail and chat activity to include username, buddylist, machine specific cookies etc”.

[snip]

One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:

Now, one of the graphics included with the story has a drop down menu recording how the analyst decided the target of this collection was outside the US. That is, it should exclude US persons and others located within the US. So I’m not convinced this is what Wyden and Udall referred to (unless there’s a way to get to targets’ interlocutors I can’t immediately identify).

But if analysts can access information this easily I can understand why the Senators would be so concerned.

 

Candidate Obama’s Tribute to “Courage and Patriotism” of Whistleblowers Disappears 2 Days after First Snowden Revelations

Sunlight Foundation discovers the Obama Administration has removed access to his 2008 campaign promises from the White House website. It suggests one of the promises Obama may want to hide has to do with his support for whistleblowers.

While front splash page for for Change.gov has linked to the main White House website for years, until recently, you could still continue on to see the materials and agenda laid out by the administration. This was a particularly helpful resource for those looking to compare Obama’s performance in office against his vision for reform, laid out in detail on Change.gov.

According to the Internet Archive, the last time that content (beyond the splash page) was available was June 8th — last month.

Why the change?

Here’s one possibility, from the administration’s ethics agenda:

Protect Whistleblowers: Often the best source of information about waste, fraud, and abuse in government is an existing government employee committed to public integrity and willing to speak out. Such acts of courage and patriotism, which can sometimes save lives and often save taxpayer dollars, should be encouraged rather than stifled. We need to empower federal employees as watchdogs of wrongdoing and partners in performance. Barack Obama will strengthen whistleblower laws to protect federal workers who expose waste, fraud, and abuse of authority in government. Obama will ensure that federal agencies expedite the process for reviewing whistleblower claims and whistleblowers have full access to courts and due process.

It may be that Obama’s description of the importance of whistleblowers went from being an artifact of his campaign to a political liability.

To be fair, Obama did extend whistleblower protection beyond that of the law last year — though he did it largely in secret.

Of course, that came at the same time as Obama rolled out an Insider Threat Detection system that seems designed to discourage anyone from speaking out … about anything.

And then there’s the issue of all the whistleblower prosecutions.

But if Obama did hide his campaign promises specifically to hide this tribute to the “courage and patriotism” of whistleblowers, then I find the timing particularly interesting. June 8 was just two days after the first Edward Snowden release (at a time, moreover, when the Guardian had reported only issues that went to lies James Clapper and Keith Alexander had told, making Snowden’s claim to be unable to go through regular channels quite credible).

Mind you, Obama could be hiding other promises. I still think promises about mortgages and homes are his biggest failure.

Steny Hoyer Thinks All Americans May Be Pre-Investigation Terrorist Communicators

Screen shot 2013-07-25 at 8.05.39 AM

Like Glenn Greenwald, I’m appalled by the crazy language Steny Hoyer circulated yesterday to oppose the Amash-Conyers amendment. Here’s the language:

2) Amash/Conyers/Mulvaney/Polis/Massie Amendment – Bars the NSA and other agencies from using Section 215 of the Patriot Act (as codified by Section 501 of FISA) to collect records, including telephone call records, that pertain to persons who may be in communication with terrorist groups but are not already subject to an investigation under Section 215.

The language is crazy on the macro level, as Glenn notes, but I’m also fascinated by the structure of it. First, the language reverses the structure of the actual “relevant to” language that has been blown up beyond all meaning pretending it is instead specific: “pertain to persons who may be in communication with terrorist groups.” But this language is only true if you assume every single American is a pre-investigative terrorist communicator (and to be fair, with the permission to go three hops deep into the dragnet database, we probably all are “in communication with terrorist groups”). Steny then qualifies this group (all of us, really, now that we’ve all been defined to be terrorist communicators through the genius of the half-Bacon) as “not already subject to an investigation.”

But you will be, America. You will be subject to an investigation, according to Steny Hoyer.

Then there are details of the language that suggest why the Administration panicked so badly. This language would have defunded all bulk collection under Section 215, including phone records, but also including acetone and hydrogen peroxide and probably now pressure cookers. Presumably, that’s what Keith Alexander and James Clapper explained to Congress in their TS/SCI briefings the other day (not having learned they’re better off admitting their dragnets rather than having them exposed).

Which is why I find it interesting that Steny noted this would apply to NSA “and other agencies,” which includes, but is apparently not limited to, FBI.  And these other agencies are using 215 to collect, “records, including telephone call records.” And probably including health records and geolocation and gun records and the like.

And Steny wants to make sure the FBI and other agencies can get this information about us, because after all, once you go three hops deep, every American just becomes a terrorist communicator not yet under investigation.

The Liars Are “Very Concerned” Program They Lied About Will Be Defunded

Buried at the bottom of a broader story on opposition to the Amash-Conyers amendment, CNN offers a very solicitous account of the White House statement opposing it, making no note of how absurd the entire premise is.

The White House issued a statement Tuesday evening, saying that it opposes the amendment and urges the House to reject it. “In light of the recent unauthorized disclosures, the president has said that he welcomes a debate about how best to simultaneously safeguard both our national security and the privacy of our citizens,” the statement said. “However, we oppose the current effort in the House to hastily dismantle one of our intelligence community’s counterterrorism tools. This blunt approach is not the product of an informed, open, or deliberative process.”

CNN does, however, provide James Clapper and Keith Alexander an opportunity to give their readout of the TS/SCI briefings they gave Congress.

In spite of reporting describing it as a lobbying session, these noted prevaricators claim their job wasn’t to persuade, it was just to answer questions.

“Our mission wasn’t to convince the House to do anything other than to provide information for them to make a decision,” Alexander told CNN.

Asked if they satisfied lawmakers and persuaded them not to change the program, Alexander would only say it was useful to “get the facts on the table.”

Sort of gives you the impression they failed to persuade, huh?

But if their mission was really to “provide information” and “get the facts on the table,” then what have all the unclassified briefings been about? Is this claim they were only now “providing information” yet another indication that they were, perhaps, misinforming before? Again?

That, to me, is a big part of this story: that two men who have lied repeatedly about these programs felt the need to conduct Top Secret briefings to provide information that hadn’t been provided in the past.

All of which makes me very unsympathetic to Clapper’s stated worry.

A day before the House is expected to vote on restrictions to the National Security Agency’s controversial phone surveillance program, the director of national intelligence told CNN Tuesday he would be “very concerned” if the measure were to pass.

This program is problematic for several reasons: it is overkill to achieve its stated purpose and it violates the intent of the Fourth Amendment.

But add to that the trust those overseeing the program chose to piss away by lying about this collection repeatedly in the past.

If Amash-Conyers does pass (and it’s still a long-shot unless each and every one of you manages to convince your Rep to support it), it will be in significant part because Clapper and Alexander abused the trust placed in them.

Update: HuffPo covers this straight, too, though at least it includes Demand Progress’ views.