Newly Released OLC Opinion Reveals How Yoo Relied on Eliminating Fourth Amendment to Wiretap Illegally

As Josh Gerstein and Jack Goldsmith note, DOJ just released two of the opinions underlying the warrantless wiretap programs. They both focus on the May 6, 2004 opinion Goldsmith wrote in the wake of the hospital confrontation; I’ll have far more to say about that opinion later today and/or tomorrow.

But I wanted to look at what the highly redacted opinion John Yoo wrote on November 2, 2001 tells us.

The opinion is so completely redacted we only get snippets. Those snippets are, in part:

FISA only provides safe harbor for electronic surveillance, and cannot restrict the President’s ability to engage in warrantless searches that protect the national security.

[snip]

Thus, unless Congress made a clear statement that it sought to restrict presidential authority to conduct warrantless searches in the national security area–which it has not–then the statute must be construed to avoid such a reading.

[snip]

intelligence gathering in direct support of military operations does not trigger constitutional rights against illegal searches and seizures.

[snip]

A warrantless search can be constitutional “when special needs, beyond the normal need for law enforcement, make the warrant and probable-cause requirement impracticable.”

To understand what those quotes mean, it helps to recall that on October 23, 2001, John Yoo and Robert Delahunty wrote another memo assessing whether the military could deploy in the US in a war against terrorists. It concludes, in part, that,

Fourth, we turn to the question whether the Fourth Amendment would apply to the use of the military domestically against foreign terrorists. Although the situation is novel (at least in the nation’s recent experience), we think that the better view is that the Fourth Amendment would not apply in these circumstances. Thus, for example, we do not think that a military commander carrying out a raid on a terrorist cell would be required to demonstrate probable cause or to obtain a warrant.

Fifth, we examine the consequences of assuming that the Fourth Amendment applies to domestic military operations against terrorists. Even if such were the case, we believe that the courts would not generally require a warrant, at least when the action was authorized by the President or other high executive branch official. The Government’s compelling interest in protecting the nation from attack and in prosecuting the war effort would outweigh the relevant privacy interests, making the search or seizure reasonable.

It relies on the hypothetical in which a military commander searches an entire apartment building for the WMD inside.

Consider, for example, a case in which a military commander, authorized to use force domestically, received information that, although credible, did not amount to probable cause, that a terrorist group had concealed a weapon of mass destruction in an apartment building. In order to prevent a disaster in which hundreds or thousands of lives would be lost, the commander should be able to immediately seize and secure the entire building, evacuate and search the premises, and detain, search, and interrogate everyone found inside.

As I have suggested in the past, it helps to replace “apartment building” with “email server” to understand the implications of such an opinion given that our wiretapping is done by military commanders at the NSA.

In other words, on October 23, 2001, Yoo wrote an opinion largely justifying searches by military commanders domestically.

And then on November 2, 2001, he interpreted wiretapping as a search (presumably arguing that since we were vacuuming up all data signals, we were obtaining physical possession of them that thereby got around restrictions on electronic surveillance, at least in Yoo’s addled little mind).

Of course, the Fourth Amendment opinion is utterly ridiculous. But they were still relying on it until October 6, 2008, even while equivocating to members of Congress about doing so.

So you see, Cheney’s illegal wiretapping program was totally legal. What you didn’t know, though, is that the Fourth Amendment is just a quaint artifact of time before 9/11.

NSA’s Clusterfuck Financial Management

I’m reading through the Senate Select Committee on Intelligence’s report on what it did last Congress. Among a number of interesting details, the report describes really really bad accounting at the National Security Agency (NSA).

The report describes how the Intelligence Authorization Bill of 2002 required that our big intelligence agencies produce auditable financial statements by 2005. Most agencies at least showed improvement; the National Reconnaissance Office (NRO) actually fixed its books so they were auditable. But when the Committee looked at NSA’s books in 2009, they were still a complete clusterfuck.

The NSA‘s annual financial report was the exception, in that it showed no apparent improvement. In particular, the Committee was concerned about the failed implementation of NSA‘s new financial system. An NSA Inspector General report found that this system was put into operation before it was adequately tested and that operators were not properly trained to use it. The NSA also made $7 million in duplicative invoice payments, and the agency could not successfully reconcile its financial books at the end of fiscal year 2008. Further, a July 2008 Army Finance Command report, referenced by the NSA IG, found that the NSA‘s accounting system was in violation of public laws, Treasury Department financial manuals, and DoD regulations, and was inconsistent with the Federal Managers Financial Integrity Act.

After SSCI cracked heads, the NSA claimed it had fixed the problems in June 2009. Only they hadn’t.

In June 2009, the Director of NSA wrote to the Chairman and Vice Chairman, claiming that the NSA was now ―fully compliant with the laws, regulations, and manuals referenced in the U.S. Army Finance Command report and the Federal Financial Managers Integrity Act. The NSA Director‘s letter also stated that the NSA had been able to reconcile its fiscal year 2008 financial records. In July 2009, the Chairman and Vice Chairman wrote to the Secretary of Defense concerning the NSA Director‘s letter. They stated that in light of the NSA‘s past difficulties in producing auditable financial statements, the Committee believed the progress claimed by the NSA should be independently confirmed by the DoD Inspector General. Specifically, the letter requested that the DoD IG conduct a form and content review of the NSA‘s fiscal year 2009 financial statements to determine whether they were supported by reliable and accounting data and supporting information.

The Committee received the results of the DoD IG‘s review in November 2009, which was very critical of NSA‘s claims. Overall, the IG found that the NSA‘s financial statements were not adequately supported by reliable accounting data and supporting information. An even more disturbing finding was that the NSA‘s ―remediation plans do not fully address audit impediments. Specific findings included an inability to reconcile critical general ledger balances, failure to perform required accounting processes, and inconsistencies between the information contained in the notes to the financial statements and the information provided to the IG. The IG‘s findings raised serious questions about the assertions made by the NSA Director in his June 2009 letter and the support he is receiving from the administrative staff involved.

The report doesn’t actually say whether NSA has since fixed its auditing systems such that someone can actually tell whether the telecoms paid to spy on us are paid what they are supposed to be paid. So the most up-to-date information the report provides is that in late 2009, the NSA wasn’t really planning to fix the things that made it difficult to audit its books.

Along the way, some lucky telecoms (or other contractors) got paid twice. Or maybe got paid for stuff that is not on the books, who knows?

Now, $7 million is small potatoes in the great pot of money the NSA doles out to contractors. It’s not like they lost $9 billion in cash, like some other entities at DOD.

But at the same time as SSCI was discovering how bad NSA’s book-keeping practices were, they were overseeing the assignment to NSA of our Cyber Command. Keith Alexander, the guy who oversaw this book-keeping clusterfuck, is now in charge of even more secret contracts to people who spy on activities that might sweep up Americans.

Call me crazy, but NSA’s apparently inability or unwillingness to fix its book-keeping seems rather ripe for abuse.

US Cheating on European SWIFT Agreement Reveals Safeguards Were Oversold

As I noted last night, the US has been violating the spirit of its agreement with the EU on access to the SWIFT database–the database tracking international financial transfers. Rather than giving Europol specific, written requests for data, it has been giving it generic requests backed by oral requests the Europol staffers are not supposed to record. That arrangement makes it impossible to audit the requests the US is making, as required by the agreement between the US and EU.

But not only does our cheating make us an arrogant data octopus, it may suggest we’re violating our own internal safeguards on the program.

Back when Lichtblau and Risen first exposed the SWIFT program, they described how it initially operated under emergency powers. On such terms, SWIFT turned over its entire database.

Indeed, the cooperative’s executives voiced early concerns about legal and corporate liability, officials said, and the Treasury Department’s Office of Foreign Asset Control began issuing broad subpoenas for the cooperative’s records related to terrorism. One official said the subpoenas were intended to give Swift some legal protection.

Underlying the government’s legal analysis was the International Emergency Economic Powers Act, which Mr. Bush invoked after the 9/11 attacks. The law gives the president what legal experts say is broad authority to “investigate, regulate or prohibit” foreign transactions in responding to “an unusual and extraordinary threat.”

[snip]

Within weeks of 9/11, Swift began turning over records that allowed American analysts to look for evidence of terrorist financing. Initially, there appear to have been few formal limits on the searches.

“At first, they got everything — the entire Swift database,” one person close to the operation said.

But then they put in more safeguards. One of those safeguards was to have an outside auditing firm review the requests to make sure they were based on actual leads about actual suspected terrorists.

Officials realized the potential for abuse, and narrowed the program’s targets and put in more safeguards. Among them were the auditing firm, an electronic record of every search and a requirement that analysts involved in the operation document the intelligence that justified each data search. Mr. Levey said the program was used only to examine records of individuals or entities, not for broader data searches.

[snip]

Swift executives have been uneasy at times about their secret role, the government and industry officials said. By 2003, the executives told American officials they were considering pulling out of the arrangement, which began as an emergency response to the Sept. 11 attacks, the officials said. Worried about potential legal liability, the Swift executives agreed to continue providing the data only after top officials, including Alan Greenspan, then chairman of the Federal Reserve, intervened. At that time, new controls were introduced.

Among the safeguards, government officials said, is an outside auditing firm that verifies that the data searches are based on intelligence leads about suspected terrorists. “We are not on a fishing expedition,” Mr. Levey said. “We’re not just turning on a vacuum cleaner and sucking in all the information that we can.”

Read more

US Cheats on SWIFT Agreement with Oral Requests

I have tracked the American negotiations with the post-Lisbon EU to get continued access to the SWIFT database, the database that tracks international money payments.

Basically, after the Lisbon Treaty went into effect last year, the EU Parliament balked at giving Americans free run of the SWIFT database. The EU and US put an interim agreement in place. Which the EU Parliament then overturned in February. The US then granted EU citizens privacy protections Americans don’t have.

As part of the Terrorist Finance Tracking Program agreement negotiated between the US and EU, the Europol Joint Supervisory Body was tasked with auditing whether the US was complying with the data protection requirements of the agreement.

Back in November, JSB did their first audit; they just released their report.

The report revealed that the Americans have been submitting largely identical requests–but then supplementing them with oral requests.

The oral requests, of course, make it impossible to audit the requests.

At the time of the inspection, Europol had received our requests for SWIFT data. Those four requests are almost identical in nature and request–in abstract terms–broad types of data, also involving EU Member States’ data. Due to their abstract nature, proper verification of whether the requests are in line with the conditions of the Article 4(2) of the TFTP Agreement–on the basis of the available documentation–is impossible. The JSB considers it likely that the information in the requests could be more specific.

Information provided orally–to certain Europol staff by the US Treasury Department, with the stipulation that no written notes are made–has had an impact upon each of Europol’s decisions; however, the JSB does not know the content of that information. Therefore, where the requests lack the necessary written information to allow proper verification of compliance with Article 4(2) of the TFTP Agreement, it is impossible to check whether this deficiency is rectified by the orally provided information.

And boy are the Europeans P-I-S-S-E-D mad at the Americans for betraying the spirit of the agreement.

“As Members of Parliament we feel betrayed reading this report”, said Alexander Alvaro (ALDE, DE), Parliament’s rapporteur on the TFTP agreement. “We voted in favour [of this agreement last year] in the trust that both parties would apply the adopted agreement”, which “concerns the transfer of sensitive data belonging to our citizens”, he stressed, adding that “the credibility of Parliament and of this committee are being jeopardised. This is about trust and confidence of the public in what the EU did and is capable of doing here”.

“We have given our trust to the other EU institutions, but our trust has been betrayed”, said Sophia in’t Veld (ALDE, NL), rapporteur on the EU-US Passenger Name Record (PNR) agreements. “This should be kept in mind when they want our approval for other agreements”, she declared.

“Somehow I am not surprised”, said Simon Busuttil (EPP, MT), recalling that “at the time of the negotiations last year we were not satisfied with having Europol controlling it – we wanted additional safeguards”. He added that “the agreement is not satisfactory”, since it involves the transfer of bulk data, and insisted that “we need an EU TFTP”.

Read more

With David Kris Gone, DOJ Tries to Vacate Vaughn Walker’s FISA Opinion

There’s an interesting tidbit in the government’s mediation questionnaire in anticipation of their appeal of Vaughn Walker’s decision that al-Haramain had been illegally wiretapped and was entitled to damages.

The government is willing to negotiate.

In response to the direction, “Provide any other information that might affect the suitability of this case for mediation,” the government wrote:

This matter touches upon fundamental legal issues that may be difficult if not impossible to compromise. It is also not clear that any viable settlement could take place absent vacatur of the district court’s legal rulings. The government is unwilling to state, however, that it would refuse to participate in mediation.

Granted, they didn’t say, “Let’s make a deal.” But compared to the imperious language the government has been using throughout this case (directed not just at the al-Haramain team, but even at Judge Walker himself), the statement that “the government is unwilling to state … that it would refuse to participate in mediation,” is like a romantic love letter. (Compare it, too, to what Imperial County said regarding mediation of Judge Walker’s equally momentous ruling in the Prop 8 case: “Due to the nature and complexity of this case, mediation will not be beneficial;” the Prop 8 defendant-intervenor team itself didn’t even answer the question!)

So on what terms is the government willing to negotiate?

It is also not clear that any viable settlement could take place absent vacatur of the district court’s legal rulings.

They’re suggesting they might just maybe be willing to maybe get into bed with al-Haramain if they’d be willing to vacate Judge Walker’s rulings.

What’s so horrible in Walker’s rulings that the government might entertain “letting the terrorists win” in exchange for vacating the rulings? It seems there are three possible parts of Walker’s July 2008 ruling the government might want vacated. (And remember, this is all premised on my supposition that the government’s coy openness to mediation suggests they are focused on vacating Walker’s ruling, which is really just a WAG.)

FISA trumps State Secrets; Congress can limit Article II secrecy

First, Walker ruled that FISA trumps state secrets.

Plaintiffs argue that the in camera procedure described in FISA’s section 1806(f) applies to preempt the protocol described in Reynolds in this case. Doc # 435/20 at 11-14. The court agrees.

[snip]

Given the possibility that the executive branch might again engage in warrantless surveillance and then assert national security secrecy in order to mask its conduct, Congress intended for the executive branch to relinquish its near total control over whether the fact of unlawful surveillance could be protected as a secret.

Walker relied on the legislative history and another case in which congressional action pre-empted common law, Milwaukee v. Illinois, to side with al-Haramain. More interesting, perhaps, is the way Walker addressed the government’s claim that USA v. Nixon and Navy v. Egan held that Article II gave the President unlimited authority over classified information. I’m particularly interested in Walker’s comments on Navy v. Egan (because both the Bush and Obama Administrations routinely rely on Navy v. Egan to claim unlimited control over classification, and it’s one part of his ruling they repeatedly ignored) are Walker’s comments on that case.

Egan recognized the president’s constitutional power to “control access to information bearing on national security,” stating that this power “falls on the President as head of the Executive Branch and as Commander in Chief” and “exists quite apart from any explicit congressional grant.” Id at 527. But Egan also discussed the other side of the coin, stating that “unless Congress specifically has provided otherwise, courts traditionally have been reluctant to intrude upon the authority of the Executive in military and national security affairs.” Id at 530 (emphasis added). Egan recognizes that the authority to protect national security information is neither exclusive nor absolute in the executive branch. When Congress acts to contravene the president’s authority, federal courts must give effect to what Congress has required.

Note, Walker also includes several references endorsing Congress’ claim that the government can’t withhold information about illegal intelligence activities, which probably gives the Administration gas all by itself.

In other words, one aspect of Walker’s ruling the government might want to see vacated is the ways in which he shows Congress has the authority to enact laws to limit the President’s unlimited control over secrecy.

FISA is the exclusive means to conduct electronic surveillance

This is a big one, as readily apparent from the verbal gymnastics the government engaged in during the FISA Amendments Act debate. Repeatedly, they tried to avoid letting DiFi introduce language to the effect of, “no, we meant it the first time, exclusive means means exclusive means.”

In his July 2008 ruling, Walker said,

Congress appears clearly to have intended to——and did——establish the exclusive means for foreign intelligence surveillance activities to be conducted. Whatever power the executive may otherwise have had in this regard, FISA limits the power of the executive branch to conduct such activities and it limits the executive branch’s authority to assert the state secrets privilege in response to challenges to the legality of its foreign intelligence surveillance activities.

To understand why the government might want this vacated, you have to go no further than the government’s stall tactics with regards to the White Paper that purportedly made the warrantless wiretap program retroactively legal in 2006. Read more

Will DOJ Finally Finish Its “Review” of Faulty White Paper on Illegal Wiretapping on Monday?

Steven Aftergood reports that, as of December 10, DOJ was still “reviewing” the flawed January 2006 white paper that the Bush Administration used to retroactively claim the 2001 Authorization to Use Military Force also authorized Bush to ignore FISA.

In June 2009, Senator Russ Feingold (D-WI) asked the Obama Administration to rescind certain classified legal opinions issued by the Justice Department Office of Legal Counsel (OLC) that asserted legal justifications for the Bush Administration’s warrantless wiretapping program.

But more than a year and a half later, those OLC opinions remain under review and no action has been taken to invalidate them, the Justice Department indicated in a newly published hearing volume.

[snip]

In a December 2010 response (pdf, at pp. 29-30) that has just been published, DOJ repeated that “The Department is still conducting its review, and will work with you and your staff to provide a better sense regarding the timing of the completion of the review.” (at pp. 29-30)

Now, Aftergood suggests that, without Feingold around to nag DOJ twice a year, this is where things will remain, with the white paper under permanent review (sort of the same way torture is under permanent “investigation”).

But a review that continues indefinitely is practically indistinguishable from no review at all.  And since Senator Feingold has now left the Senate, the Department will not be working with him and his staff to resolve this issue.  All that remains is the Senator’s warning about the hazards of embracing “unsupportable claims of executive power.”

And he may well be right.

But I wonder whether, some time years from now, we will learn that DOJ ended up completing its review and deciding to keep the white paper around about next Monday, March 7.

After all, Feingold was likely not the only one nagging DOJ to ditch the white paper.

David Kris was probably doing so too.

Even as the white paper was being written, now Assistant Attorney General for National Security David Kris tried to persuade members of the Bush Administration their effort to legitimize the program was problematic. And within two weeks after the white paper was released, Kris wrote a very clear debunking of the white paper. He demolished the Administration’s effort to claim AUMF authorized the program.

In sum, I do not believe the statutory law will bear the government’s weight. It is very hard to read the AUMF as authorizing “electronic surveillance” in light of the nearly simultaneous enactment of the Patriot Act. It is essentially impossible to read it as repealing FISA’s exclusivity provision. And the AUMF suffers further in light of FISA’s express wartime provisions. Even with the benefit of constitutional avoidance doctrine, I do not think Congress can be said to have authorized the NSA surveillance.

And while his final conclusion was more gentle, predicting the program would be “met with … hostility,” Kris made it clear that, though he didn’t know all the facts about the program, it was probably constitutionally suspect.

So I would imagine Kris has been pushing DOJ to “review” this dubious white paper since he rejoined DOJ.

But Friday is his last day. With Marty Lederman’s departure last summer and Dawn Johnsen’s abandonment by the Administration, Kris’ departure will mean the last of the noted defenders of the rule of law will be gone from DOJ. Along with Russ Feingold, seemingly the last real defender of the Constitution in Congress.

So Monday morning, nothing–no one–will be there to stop DOJ from simply declaring “Mission Accomplished” of making the white paper, rather than Congressionally-passed statute, the law of the land.

Newt’s Singeing Statement

Newt Gingrich, in a role that was probably cast years ago, now calls on Obama to be impeached because he refuses to defend the Defense of Marriage Act in court.

Former House Speaker Newt Gingrich, who plans within two weeks to announce if he will run for president, said today that if President Obama doesn’t change his mind and order his Justice Department to enforce the Defense of Marriage Act, Republicans in Congress should strike back and even consider impeachment proceedings.

“I believe the House Republicans next week should pass a resolution instructing the president to enforce the law and to obey his own constitutional oath, and they should say if he fails to do so that they will zero out [defund] the office of attorney general and take other steps as necessary until the president agrees to do his job,” said Gingrich. “His job is to enforce the rule of law and for us to start replacing the rule of law with the rule of Obama is a very dangerous precedent.”

Mind you, Newt seems to misunderstand what’s going on. After all, Obama will continue to enforce DOMA. What he won’t do is defend a law he believes to be unconstitutional; but he’ll let a court decide whether he’s right or not.

Which makes what Obama did far far less abusive (in all senses of the word) than what George W Bush did with his long catalog of signing statements. Perhaps Bush’s most famous was his signing statement to the Detainee Treatment Act.

The executive branch shall construe Title X in Division A of the Act, relating to detainees, in a manner consistent with the constitutional authority of the President to supervise the unitary executive branch and as Commander in Chief and consistent with the constitutional limitations on the judicial power, which will assist in achieving the shared objective of the Congress and the President, evidenced in Title X, of protecting the American people from further terrorist attacks. Further, in light of the principles enunciated by the Supreme Court of the United States in 2001 in Alexander v. Sandoval, and noting that the text and structure of Title X do not create a private right of action to enforce Title X, the executive branch shall construe Title X not to create a private right of action. Finally, given the decision of the Congress reflected in subsections 1005(e) and 1005(h) that the amendments made to section 2241 of title 28, United States Code, shall apply to past, present, and future actions, including applications for writs of habeas corpus, described in that section, and noting that section 1005 does not confer any constitutional right upon an alien detained abroad as an enemy combatant, the executive branch shall construe section 1005 to preclude the Federal courts from exercising subject matter jurisdiction over any existing or future action, including applications for writs of habeas corpus, described in section 1005. [my emphasis]

Not long after the DTA went into effect, Stephen Bradbury wrote his ridiculous Appendix M opinion allowing DOD to use any techniques they wanted to claim were included in that Appendix and later refused to share it with Congress.

But my personal favorite is the one he signed on the Defense Appropriation Bill in 2003, after Congress defunded data mining programs directed at Americans.

Sections 8082, 8091, 8117, and 8131 of the Act make clear that the classified annex accompanies but is not incorporated as a part of the Act, and therefore the classified annex does not meet the bicameralism and presentment requirements specified by the Constitution for the making of a law. Accordingly, the executive branch shall construe the classified annex references in sections 8082, 8091, 8117, and 8131 as advisory in effect. My Administration continues to discourage any efforts to enact secret law as part of defense funding legislation and encourages instead appropriate use of classified annexes to committee reports and joint statements of managers that accompany the final legislation.

As this timeline makes clear, it appears to have been an attempt to avoid having the data mining prohibition apply to the illegal wiretap program that was used, among other things, to wiretap protected conversations between defendants and their lawyers. Even after Jim Comey et al refused to reauthorize the program with its next approval (leading up to the hospital confrontation), Bush authorized it to continue anyway.

Of course, Newt didn’t make a peep when Bush issued signing statements followed by executive branch assertions of authority (his March 10, 2004 reauthorization of the illegal wiretap program and Bradbury’s memo) designed to thwart Congressional efforts to shut down specific programs.

But now that Obama has stepped back to allow the courts to decide whether a legally married gay man can extend his federal benefits to his spouse–even while continuing to enforce DOMA–Newt considers such executive branch tactics an impeachable offense.

Once again, torture and domestic surveillance are acceptable abuses of executive authority for Republicans. But a blowjob or a loving marriage requires impeachment.

Did FBI First Request James Risen’s Phone Records Using the CAU Program?

In Josh Gerstein’s report on DOJ’s collection of James Risen’s phone and business records, he quotes University of Minnesota law professor Jane Kirtley saying that the government doesn’t give reporters notice when it collects telephone or business records on them.

Kirtley also said journalists often aren’t notified when the government asks telecom companies, banks or other service providers for their records.

DOJ must inform reporters if their call records have been subpoenaed

That may be the case in practice. But DOJ policy actually requires that journalists receive notice if their phone records are subpoenaed.

(g) In requesting the Attorney General’s authorization for a subpoena for the telephone toll records of members of the news media, the following principles will apply: (1) There should be reasonable ground to believe that a crime has been committed and that the information sought is essential to the successful investigation of that crime. The subpoena should be as narrowly drawn as possible; it should be directed at relevant information regarding a limited subject matter and should cover a reasonably limited time period. In addition, prior to seeking the Attorney General’s authorization, the government should have pursued all reasonable alternative investigation steps as required by paragraph (b) of this section.

(2) When there have been negotiations with a member of the news media whose telephone toll records are to be subpoenaed, the member shall be given reasonable and timely notice of the determination of the Attorney General to authorize the subpoena and that the government intends to issue it.

(3) When the telephone toll records of a member of the news media have been subpoenaed without the notice provided for in paragraph (e)(2) of this section, notification of the subpoena shall be given the member of the news media as soon thereafter as it is determined that such notification will no longer pose a clear and substantial threat to the integrity of the investigation. In any event, such notification shall occur within 45 days of any return made pursuant to the subpoena, except that the responsible Assistant Attorney General may authorize delay of notification for no more than an additional 45 days.

(4) Any information obtained as a result of a subpoena issued for telephone toll records shall be closely held so as to prevent disclosure of the information to unauthorized persons or for improper purposes.

From that we should assume that DOJ got the phone records by subpoenaing Sterling’s records, not Risen’s. But if that’s the case, you’d think the government would have just told Risen that when his lawyer asked whether his records had been subpoenaed back in 2008.

Risen said the government never notified him that they were seeking his phone records. But he said he got an inkling in 2008 that investigators had collected some information about his calls.

“We heard from several people who had been forced to testify to the grand jury that prosecutors had shown them phone records between me and those people—not the content of calls but the records of calls,” he said. “As a result of what they told us, my lawyers filed a motion with the court as asking how the Justice Department got these phone records and whether or not they had gotten my phone records.”

“We wanted the court to help us decide whether they had abided by the attorney general’s guidelines,” Risen said. “We never got an answer from the court or the government.”

In other words, there may be no cause for suspicion, except for the suspicious funkiness on the government’s part.

DOJ has refused to inform at least one reporter his or her records were subpoenaed

Now, there is one case we know of where DOJ collected information on a reporter’s phone records and did not inform him or her. The DOJ Inspector General Report on Exigent Letters describes three cases in which reporters’ phone records were collected through the telecom’s onsite Communications Analysis Unit. Two of these were collected using exigent letters; in both, the editors (for stories published in both the NYT and WaPo) and the journalist (for an Ellen Nakashima story) were informed the reporters’ records had been collected.

In the third case, the records were collected with a grand jury subpoena. Here’s what we know about the collection:

  • The investigative team included two federal prosecutors who appear to belong to a counterintelligence group at DOJ, an AUSA from the jurisdiction in which the grand jury was seated who was rubberstamping records for the investigation, the FBI case agent, and intelligence analysts.
  • The FBI case agent asked the CAU agent about how to do a phone records subpoena for the leak investigation, and the CAU agent referred the case agent to the telecom analysts at CAU for help with the subpoena. Following a meeting with (I think) an AT&T analyst, the case agent asked that analyst for boilerplate language to make sure the subpoena was “as encompassing as possible.” It appears from the report (though this information is highly redacted) that the resultant subpoena may have asked for the community of interest of the suspected leaker’s numbers. That is, it appears the subpoena asked for a network analysis of all the people who had directly contacted the target.
  • One of the two prosecutors used that boilerplate language to write up attachments to the subpoena; the rubberstamp AUSA never saw the attachments. This was the first subpoena the rubberstamp AUSA signed in the case.
  • The prosecutor that generated the subpoena claims–with an undated document to back up that claim–that the case agent told him the subpoena would not collect phone records for the reporter that–they both knew at the time–had been in phone contact with the suspected leaker. The case agent, however, did not recall such a discussion and claims it was “very unlikely” such a conversation occurred. The implication of this seems to be that the case agent knew full well he’d be getting the reporter’s call data.
  • In talking to a counterintelligence Special Agent, the prosecutor who generated the subpoena learned that such a subpoena could produce the records of reporters; he also learned there was a way to write the subpoena to avoid that from happening. Once he realized that, he had conversations with other DOJ lawyers and supervisors about what to do; they all agreed to seal the records. Though they sealed the records of the case agent and deleted them from his computer, they didn’t ask what CAU had done with the records, much less ask the CAU analyst to delete the records.
  • When the IG learned about all this, they finally checked whether this information got loaded into the investigative database. The target’s records were entered into the FBI database; the IG did not find any reporters’ information uploaded, though much of the report’s discussion on this topic is redacted.
  • DOJ’s Criminal Division informed the Court overseeing the grand jury of the subpoenas and the “corrective actions” taken.

After learning all this, the IG asked DOJ whether it should have notified the reporter in question per the policy cited above. Here’s what happened:

The Criminal Division and the OIG asked the Department’s Office of Legal Counsel (OLC) to opine on the question when the notification provision in the regulation would be triggered. Read more

The Business Records and Classified (?) Emails of James Risen

Jeffrey Sterling’s lawyers are throwing a number of interesting theories against the wall. In a filing demanding a bill of particulars (and presumably ultimately supporting a greymail defense),they demand to know which “defense information” is tied to each count of leaking or possessing such information, arguing that they need to know that to prevent double jeopardy. As part of that argument, though, they note that the 10 year statute of limitations on this crime exists only to make sure crafty Communists don’t evade the law.

In this case, the Government will surely claim that there is a ten year statute of limitations applicable to violations of 18 U.S.C. 793. See Internal Security Act, Ch. 1024, 64 Stat. 987, P.L. 831 (§19) (1950).

As set forth in the statute, this law was passed, by its terms, because of the then existing threat of global communism.

There exists a world Communist movement which, in its origins, its development, and its present practice, is a world-wide revolutionary movement whose purpose is by treachery, deceit…espionage, sabotage, terrorism, and any other means necessary, to establish a Communist totalitarian dictatorship in the countries throughout the world through the medium of a worldwide Communist organization. Id. at § 2 (1)

In this regard, the Court can see that when this law was passed in 1950, it appears that the Congress extended the statute of limitations applicable to 18 U.S.C. § 793 because the “agents of communism have devised clever and ruthless espionage and sabotage tactics which are carried out in many instances in form and manner successfully evasive of existing law.” Id. at § 2 (11).

As such, the defense reserves the right to challenge the application of this McCarthy era law to the charges in this case which challenge would result in the application of the general five year statute applied to felonies. 18 U.S.C. § 3282.

Sterling is alleged to have leaked to James Risen in 2003; if a 5 year SOL applied, then it would have expired after the time when the Bush DOJ declined to charge Sterling. Charging him at this late date, he seems to suggest, is just McCarthyite.

But the other interesting aspect of this filing is the one Josh Gerstein points out: the details Sterling’s lawyers provide about what they’ve gotten in discovery.

In this case, for example, the United States has provided in unclassified discovery various telephone records showing calls made by the author James Risen. It has provided three credit reports – Equifax, TransUnion and Experian – for Mr. Risen. It has produced Mr. Risen’s credit card and bank records and certain records of his airline travel. The government has also provided a copy of the cover of the book State of War written by Mr. Risen and published in 2006. It has provided receipts and shipping records from Borders and Barnes and Noble indicating that State of War was sold in this District between November 1, 2005 and March 1, 2006.4 From this document production, it can be inferred that Mr. Risen is Author A and that the “national defense information” at issue can perhaps be found somewhere in State of War.

But State of War is a long book containing many chapters. Just pointing the defense to the book, or even a particular chapter in the book, is not legally sufficient to provide notice.

4 Count Eight is a mail fraud count under 18 U.S.C. §§1341 & 2, that seeks to hold Mr. Sterling criminally liable for the decision of Author A’s publisher to sell in the Eastern District of Virginia a book allegedly containing “national defense information” obtained from Mr. Sterling. Author A and his publisher are not charged with any crime.

Now, obviously this passage does several things. It sets up a future argument–one that might be modeled on the AIPAC case–that if they’re going to charge mail fraud they also need to charge Risen’s publishers. Also, it exploits the fact that the government has sent an entire book full of highly classified disclosures–including details of the warrantless wiretap program–to introduce selective prosecution. Why is the government choosing to prosecute the alleged leaker of MERLIN information, but not the leakers of the illegal surveillance program?

But it seems Sterling’s lawyers are just as interested in getting details about the government surveillance of Risen into the record.

Now, some of this is unsurprising. We knew the government had Risen’s phone records, because the indictment cites at least 46 phone calls between Risen and Sterling. The indictment also mentions a trip Risen made (presumably to Vienna), so it’s unsurprising they have his credit card and airline information.

But that leaves two other items.

The filing mentions Risen’s three credit reports and bank records. The only possible application of this information in the indictment is the repeated distinction between Risen’s office and his residence. Presumably the latter would show up on the credit report. But that information would also be available by public means (publicly available property records, for example). So why collect Risen’s credit reports and bank records?? Was the government trying to argue Risen was in some way induced to publish this?

Also, given that this would have qualified as a counterintelligence investigation, one wonders whether the government used the PATRIOT Act to collect these records.

More interesting, though, is what Sterling’s lawyers don’t mention in this passage: emails. We know they got emails, since they refer to at least 13 emails between Risen and Sterling (and point out that the emails went through a server conveniently located in the CIA’s home district!). But for some reason, Sterling’s lawyers don’t mention having received the emails in what they specify is “unclassified discovery.”

The probable explanation for that, of course, is that they have received those emails. It’s possible they can’t mention them, though, in an unclassified filing (one clearly targeted to the public), because they were turned over in classified discovery.

It’s troubling that the government collected Risen’s credit report and bank records to develop its case against Sterling. But the possibility that the government considers the email traffic between Risen and Sterling classified suggests some even more troubling possibilities.

Political Giving and Willingness to Cave to Law Enforcement

When Jason Leopold linked to a WSJ report titled, “Obama breaks bread with Silicon Valley execs,” I quipped, “otherwise known as, Obama breaks bread w/our partners in domestic surveillance.” After all, some of the companies represented–Google, Facebook, Yahoo–are among those that have been willingly sharing customer data with federal law enforcement officials.

Which is why I found this Sunlight report listing lobbying and political donations of the companies so interesting.

Lobbying (2010) Contributions to Obama (2008)
Apple $1,610,000.00 $92,141.00
Google $5,160,000.00 $803,436.00
Facebook $351,390.00 $34,850.00
Yahoo $2,230,000.00 $164,051.00
Cisco Systems $2,010,000.00 $187,472.00
Twitter $0.00 $750.00
Oracle $4,850,000.00 $243,194.00
NetFlix $130,000.00 $19,485.00
Stanford University $370,000.00 $448,720.00
Genentech $4,922,368.00 $97,761.00
Westly Group $0.00 $0.00

Just one of the companies represented at the meeting, after all, has recently challenged the government’s order in its pursuit of WikiLeaks to turn over years of data on its users: Twitter. And the difference between Twitter’s giving and the others’ is stark.

Does Twitter have the independence to challenge the government WikiLeaks order because it hasn’t asked or owed anyone anything, politically?

Mind you, there’s probably an interim relationship in play here, as well. Those companies that invest a lot in politics also have issues–often regulatory, but sometimes even their own legal exposure–that they believe warrant big political investments. Which in turn gives the government some issue with which to bargain on.

Maybe this is all a coinkydink. And maybe having broken bread with Obama, Twitter will cave on further government orders.

But I do wonder whether there’s a correlation between those telecommunication companies that try to buy political favors and those that offer federal law enforcement favors in return.

image_print