US Justice: A Rotting Tree of Poisonous Fruit?

Saturday, the NYT reported that other agencies within government struggle to get NSA to share its intelligence with them.

Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency’s vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say.

Of the 1,410 words in the article, 313 words are explicitly attributed to Tim Edgar, who used to work for ACLU but starting in 2006 worked first in the Office of Director of National Intelligence and then in the White House. Another 27 are attributed to “a former senior White House intelligence official,” the same description used to introduce Edgar in the article.

The article ends with Edgar expressing relief that NSA succeeded in withholding material (earlier he made a distinction between sharing raw data and intelligence reports) from agencies executing key foreign policy initiatives in the age of cyberwar and Transnational Criminal Organizations, and in so doing avoid a “nightmare scenario.”

As furious as the public criticism of the security agency’s programs has been in the two months since Mr. Snowden’s disclosures, “it could have been much, much worse, if we had let these other agencies loose and we had real abuses,” Mr. Edgar said. “That was the nightmare scenario we were worried about, and that hasn’t happened.”

Today, San Francisco Chronicle reminds that NSA does hand over evidence of serious criminal activities if it finds it while conducting foreign intelligence surveillance, and prosecutors often hide the source of that original intelligence.

Current and former federal officials say the NSA limits non-terrorism referrals to serious criminal activity inadvertently detected during domestic and foreign surveillance. The NSA referrals apparently have included cases of suspected human trafficking, sexual abuse and overseas bribery by U.S.-based corporations or foreign corporate rivals that violate the Foreign Corrupt Practices Act.

[snip]

“If the intelligence agency uncovers evidence of any crime ranging from sexual abuse to FCPA, they tend to turn that information over to the Department of Justice,” Litt told an audience at the Brookings Institution recently. “But the Department of Justice cannot task the intelligence community to do that.”

[snip]

“The problem you have is that in many, if not most cases, the NSA doesn’t tell DOJ prosecutors where or how they got the information, and won’t respond to any discovery requests,” said Haddon, the defense attorney. “It’s a rare day when you get to find out what the genesis of the ultimate investigation is.”

The former Justice Department official agreed: “A defense lawyer can try to follow the bouncing ball to see where the tip came from — but a prosecutor is not going to acknowledge that it came from intelligence.”

And (as bmaz already noted) Reuters reminds that the DEA has long had its own electronic surveillance capability, and it often hides the source of intelligence as well.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin – not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to “recreate” the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant’s Constitutional right to a fair trial. If defendants don’t know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence – information that could reveal entrapment, mistakes or biased witnesses.

As bmaz also noted, none of this was very secret or new. The FISA sharing is clearly permitted by the minimization procedures. Litigation on it 11 years ago suggested it may be even more abusive than laid out under the law. And bmaz has personally been bitching about the DEA stuff as long as I’ve known him.

These articles suggesting there may be more sharing than the NYT made out on Saturday, then, are primarily reminders that when the fruits of this intelligence get shared, the source of the intelligence often remains hidden from those it is used against.

Which brings me to this WSJ op-ed Edgar published last week. In some ways the op-ed makes a laudable case for more transparency.

What, then, accounts for the public mistrust? Intelligence officials forget that the public sees none of this. Where the government sees three branches of government working together in harmony, the public sees a disturbing pattern of secret law and secret government accompanied by demands to “trust us, we are keeping you safe.” Secret checks and balances appear to be nothing more than a pale shadow of our constitutional design.

[snip]

President Obama should go further, wresting control from the leakers and restoring trust with the public. He should ask Mr. Clapper to look across the intelligence community and disclose to the public the types of large databases it collects in bulk, under what legal powers or interpretations, and pursuant to what safeguards to protect Americans’ privacy—while keeping necessary details secret.

[snip]

Openness is a value in itself, but it is also a necessary precondition to the effective functioning of our three branches of government.

Though it seems to contradict itself as to whether the NSA is collecting everything.

‘Big data” is one name for the insight that collecting all the information in a massive database will uncover facts that collecting only some of the information cannot. This is not news to Gen. Keith Alexander, director of the National Security Agency. Gen. Alexander is a zealous advocate of getting it all whenever practically and legally possible.

[snip]

Despite what Americans see in the movies, the NSA doesn’t actually collect everything.

But the truly bizarre part of this op-ed that endorses more transparency is this claim about Amnesty v. Clapper.

The ACLU has challenged the constitutionality of NSA surveillance programs for years, but that case never got to the issue of constitutional rights. The intelligence community argued, and the Supreme Court agreed, that the civil-liberties groups couldn’t maintain their lawsuit. Civil-liberties advocates represented a variety of people with entirely reasonable fears of monitoring. Whether they were actually under surveillance was a secret (and properly so). The government argued vigorously that this secrecy meant the case could not go forward, and the court agreed. [my emphasis]

Remember, as a threshold matter, what we’re talking about. Amnesty v. Clapper’s plaintiffs included human rights organizations like Amnesty International and Human Rights Watch; criminal defense attorneys including Khalid Sheikh Mohammed and Mohamedou Ould Salahi‘s attorneys by name, the Nation and Chris Hedges, and SEIU.

Since SCOTUS rejected the plaintiffs’ case on standing, leaked minimization standards have made it clear Section 702 surveillance provides no protection for human rights workers, journalists, political organizations, or even attorneys representing people — like Salahi — who have not yet been criminally charged. While none of the plaintiffs in the case could be directly targeted, their communications with people they have every business to be talking to easily could be. And we’d never know whether these entities — whose work makes them adversaries to the government — were surveilled unless the government decided to charge them or their interlocutors and reveal that fact.

And Tim Edgar, civil libertarian, thinks it is “proper” that all these people, most of whose activities are protected under the Constitution, should never know if the government is surveilling their work.

Then there’s the other problem with Edgar’s endorsement of secrecy surrounding whether Amnesty v. Clapper plaintiffs have been surveilled: the government has reneged on the several promises it made over the course of that litigation to reveal when this surveillance is used on defendants (precisely the issue the SFChron and Reuters stories emphasize).

What we have learned since the Clapper decision, however, has revealed a yawning chasm between the government’s words and actions. Faced with recent revelations about the FAA surveillance program, intelligence officials have raced to defend the controversial law. And, in doing so, they have touted at least four cases where warrantless FAA surveillance was purportedly critical to preempting terrorist plots. Yet not one of the defendants in these prosecutions was told that the government’s evidence was obtained from FAA surveillance, and thus they had no opportunity to challenge the statute. This fact runs directly contrary to the arguments that lawyers for the government paraded before the Supreme Court just last fall.

Indeed, the government has openly departed from its previous position. Criminal defendants in Chicago and Florida have filed motions seeking to compel the government to provide notice of its intent to rely on evidence obtained from warrantless wiretapping under the FAA, yet the government is now arguing that it has no obligation to do so.

This extends to the program Edgar specifically defends in his op-ed, the Section 215 dragnet, where the government never told Basaaly Saaed Moalin it used the Section 215 dragnet — apparently accessed by claiming al-Shabaab’s pre-terrorist designation effort to expel US-backed invaders of Somalia amounted to plotting against “the homeland” — to identify and justify wiretaps on him.

Given Edgar’s enthusiasm for the surveillance of even protected activities to remain secret, taken in tandem with all the known examples where the government hides the source of this surveillance, there is no reason to believe an article based significantly on his claims that NSA’s information (whether in raw data form or as intelligence reports) is not shared widely in the government. Maybe it’s true.

But ultimately we have one way of testing such claims: in the courts. And if even defendants are never given an opportunity to challenge not just the constitutionality of the programs themselves, but also potentially dubious claims made to justify the surveillance, all the so-called transparency from those already caught in lies is of limited use.

image_print
13 replies
  1. orionATL says:

    well, there’s this:

    http://www.theguardian.com/technology/2013/aug/05/tor-deep-web-servers-offline-freedom-hosting

    sounds like a victor bout case but involving largely electronic police work.

    i believe this is the third (one in britain, two in the u.s.) case involving sexual abuse since the guardian first broke the news of the nsa spying.

    child sexual abuse, because it is so repugnant, is the perfect vehicle for testing govt’s questionable policing tactics and, now, for defending govt electronic spying.

  2. P J Evans says:

    This is one area where I’ve come to believe that if their lips are moving, they’re lying. If they’re providing written statements, the paper has singed edges.

  3. What Constitution says:

    This will get really interesting when the NY Attorney General tries to get some Wall Street materials out of NSA. If nothing else, it’s about whose ox is being gored, after all.

  4. peasantparty says:

    As I stated below in the post by Bmaz it may be Insurance Companies too.

    Home, Auto, and Health insurers maybe requesting info to keep from paying out claims. Maybe you made a phone call to the spouse upon leaving the doctor’s office and said a few of your thoughts. Maybe you said you were in a hurry to get somewhere on facebook. Maybe you tweeted you might have left something on the stove.

  5. M.Black says:

    This matter of the “poison fruit” can’t help but put me in mind of your post a couple of days ago regarding the “pressure cooker” online searches that led to law enforcement visiting a family in New York. That same day there was an update to the story to the effect, “Move along, folks, nothing to see here — no NSA involvement”: The local authorities claim the investigation was the result of a tip from some former employer who claimed the husband had searched for the term some time ago on a computer he had once used.

    We now learn that this kind of thing is rather sweetly called “recreating the investigative trail.” So who knows how that investigation got started?

    Which brings us back to the point made by Julian Assange months ago, I believe in the context of the James Rosen and AP subpoenas: The NSA already has everything and these trappings which might be termed “investigative artifacts” are simply manufactured in order to create a more plausibly legal, conventional court case.

  6. earlofhuntingdon says:

    @M.Black: “Recreating”? That means lying about where the government developed information it seeks to use in a criminal matter in public court. Lying to the public, to defendants, to a federal judge. One would think that would be a felony; for the lawyers involved, it should lead to censure and disbarment.

  7. What Constitution? says:

    @earlofhuntingdon: Yes, and don’t forget that Scott Bloch, Esq. recently was sentenced to a full day in jail after pleading guilty to bringing in computer experts to wipe the OLC hard drives in his department after receiving a subpoena from Congress, as I recall. So it’s clear, very clear, that hard time awaits government lawyers who might stoop so low as to manufacture false evidence trails and lie to courts and Congress to hide it. NO, no, that’s not it: rather, a Federal judge recently rejected the effort by former OLC lawyer Scott Bloch and Washington lawyers from the DOJ to completely avoid jail time for Bloch on these facts, and instead levied a prison sentence that literally multiplied the proposed sentence by an infinite amount… to one whole day. Surely, with such a precedent now set, by the time someone in the government gets prosecuted for doing what is described as commonplace here, they’ll be able to see their way clear to throw away the key for such a miscreant. Yes?

  8. Francois T says:

    If Tim Edgar want to be believed, he needs to explain why congressmen like Alan Grayson and Morgan Griffith have been systematically stymied and lied to when they requested information about the NSA programs from the House Intelligence Committee.

    What, then, accounts for the public mistrust? Intelligence officials forget that the public sees none of this. Where the government sees three branches of government working together in harmony

    You call that harmony Mr Edgar?? You must think everyone outside the intelligence community is congenitally stupid…or emoprog like obnoxious fuckwad extraordinaire John Schindler wrote after his appearance on Chris Hayes show.

  9. max says:

    Despite what Americans see in the movies, the NSA doesn’t actually collect everything.

    This is true in one sense – I very much doubt they are seeing and then collecting NTP [Network Time Protocol] traffic, DNS traffic and so on. That said, the simplest, straight-forward way to intercept connections between people in the US and the rest of the world is simply to roll up all traffic (other than the above) or all traffic that crosses an international border. (Which would mean they would be dropping something like 25% of all traffic because it’s redundant or useless, as above, and dropping maybe 10-20% of the rest (point to point traffic wholly inside the US). Given that they got rollback of comms on the Tsarnaev brothers, I am pretty sure they’re also collectiong that other 10-20%, and just ‘not looking at it’.

    Which is apparently how they rationalize the collection.

    ‘It’s not like the movies’ and ‘we’re collecting everything but not looking at it unless we can cough up a semi-plausible excuse’ are pretty much exactly the same thing, but sound real different.

    max
    [‘Given that the Bushies essentially ordered them to tap all traffic illegally, I’ve got no reason to think they ever stopped.’]

Comments are closed.