What Is It with GOPers and Their Email?

CREW and the National Security Archive won the first part of their fight with the White House–getting a court order requiring the White House to preserve their emails and the back-ups (h/t PJ Evans).

A federal judge Monday ordered the White House to preserve copies ofall its e-mails, a move that Bush administration lawyers had arguedstrongly against.

U.S. District Judge Henry Kennedy directed the Executive Office of thePresident to safeguard the material in response to two lawsuits thatseek to determine whether the White House has destroyed e-mails inviolation of federal law.

The White House is seekingdismissal of the lawsuits brought by two private groups — Citizens forResponsibility and Ethics in Government and the National SecurityArchive.

This is just the first part of the battle, of course. The White House will surely invoke some kind of expansive privilege to avoid telling us taxpayers whether it destroyed emails, why, and how. But for now, they’re forced to contend with an order that they keep the emails.

Wonder what will happen if we discover they’ve destroyed these, too?

Which is effectively what’s been happening with Matt Blunt in MO. Via the Pope, Blunt has been definitively busted pretending not to know he shouldn’t delete emails Read more

Margaret Chiara and the Ongoing Problem of Justice on Reservations

Buried in an excellent article on the difficulties Native Americans have getting someone in USA offices to prosecute serious crime is this Margaret Chiara quote:

"I’ve had (assistant U.S. attorneys)look right at me and say, ‘I did not sign up for this,"’ said MargaretChiara, who until March was the U.S. attorney for western Michigan,with jurisdiction over several reservations. "They want to do big drugcases, white-collar crime and conspiracy.

"And I’ll tell you, the vast majority of the judges feel the same way. They will look at these Indian Country cases and say, ‘What is this doing here? I could have stayed in state court if I wanted this stuff,"’ she said.       

"It’s a terrible indifference, which is dangerous because lives are involved."

Of course, both Chiara and Thomas Heffelfinger showed a great deal of commitment to overcoming this indifference, but neither is working for DOJ anymore. For that matter, Paul Charlton did too–particularly in his efforts to require the taping of interviews to directly address an issue raised in the article: the prevalence of cases that cannot be charged because tribal investigators may not meet federal standards of interviewing.

Federal investigators usually take the leadwhen the [sexual assault] victim is Read more

CIA Contractor Fired for Stating Waterboarding Is Torture

My post on Armitage forced me to wade through the archives, where I saw this post.

On July 13, Christine Axsmith posted this on her blog on the CIA’s confidential intranet, Intelink.

Waterboarding is torture, and torture is wrong.

Not to mention ineffective.  Econo-Girl has serious doubts as to whether European lives were  saved.

Econo-Girl’spurpose in writing this blog is to start a dialog on the GenevaConvention, since it now applies to the Department of Defense again.Guess it’s not quaint anymore, eh?

Over the next few weeks,Econo-Girl would like to post articles about the Geneva Convention,like its origin and major provisions. Legal analysis is not the magicsome would have you believe.

If the grunts and paper pushers are knowledgeable, the anti-torture infrastructure will be strengthened.

On July 13, her blog was taken down and her security badge taken away. Fewer than 890 people read the post.

On July 17, she was fired from her job with CIA contractor BAE Systems and she lost her Top Secret security clearance (hat tip to Laura Rozen for the links).

Given our new Attorney General’s inability to make the same clear statement, I thought it deserved to be posted again.

Armitage, a Review

About 6,204 people have emailed me news of Armitage’s mea kinda culpa on Blitzer. The admission of stupidity is really nothing new–Armitage said something similar when he came forward to speak with David Martin last fall.

Since a lot of people have asked what memo he learned of Plame’s identity from–here it is. As you can see, the memo itself is Top Secret, presumably because the fourth paragraph, which details the objection to the claims about Iraq’s use of aluminum tubes, is Top Secret. Also, some of the attachments that were not included with the version of the memo introduced at the trial may be Top Secret. The paragraph including the description of Valerie is classified Secret, likely because Joe Wilson’s trip itself was classified Secret (see the trip report included with the INR memo).

The paragraph describing the famous February 19, 2002 meeting (and the notes on which that paragraph are based) includes Valerie’s first name, but not the name Plame. Neither description of Valerie notes her covert status, and I’ve never seen any indication Douglas Rohn, who wrote the notes, knew Valerie was covert. These details don’t exonerate Armitage for blabbing about Valerie–as someone with a lifetime experience working Read more

The Axis of False Intelligence Claims

Fill in the blanks:

[ISIS President David] Albright said yesterday that the tubes acquired by ___________ neededto be cut in half and shaped in order to be used as the outer casingsof centrifuges. If ___________ proves that the tubes were untouched, hesaid, it could "shatter the argument" that they were meant for auranium program.

Let’s see, WMD expert David Albright describing doubts about claims that a country was using aluminum tubes to build a nuclear centrifuge. It must be the debate over Iraq’s aluminum tubes, right?

No. It’s the growing debate over whether US claims that North Korea had a large-scale uranium enrichment program have any basis in fact.

North Korea is providing evidence to the United States aimed at proving that itnever intended to produce highly enriched uranium for nuclear weapons,undermining a key U.S. intelligence finding, South Korean and U.S.officials said this week.

In closely held talks, the North Korean government has granted U.S. experts access to equipment and documents to make its case, in preparation for declaring the extent of its nuclear activities before the end of the year. North Korean officials hope the United States will simultaneously lift sanctions against Pyongyang as the declaration is made.

If North Korea successfully demonstrates Read more

If Ever You Needed Proof that Pseudonymity Anonymity Hysteria Is Bunk

DBJ at DKos, relating Karl Rove’s speech about "Citizen 2.0" in DC yesterday, makes a good point. When a man who has used the cover of being an anonymous source to leak a CIA operative’s identity–not to mention untold other smears–complains that commenters online can be anonymous pseudonymous, it pretty much discredits that complaint once and for all.

Then it got surreal. 

Karl Rove is angry that the internet is a place where people canpost anonymously.  He feels it hurts our democracy to have people saythings but not put their names to them.  The anonymity gives people away to say things but not take responsibility for them.

Yes.  Mr. Out-the-CIA-Agent-To-Douchebag-Of-Liberty-Novakula is upset because the internet allows for anonymity. 

After all, most people who comment anonymously pseudonymously online do so in an effort to protect their job and their family from people like Karl Rove. Karl Rove, on the other hand, uses anonymity to cowardly
hide his central involvement in nasty smears.

Illegal Spying on Hackers

I’m going to have plenty to say on Shane Harris’ story revealing that the NSA used hackers and foreign cyberhacks as their excuse for illegally accessing customer data prior to 9/11. First, though, I’d like to remind readers of this earlier Shane Harris story (with Tim Naftali)–to my mind the best reporting on this topic outside of the Risen-Lichtblau early scoop.

A former telecom executive told us that efforts to obtain call detailsgo back to early 2001, predating the 9/11 attacks and the president’snow celebrated secret executive order. The source, who asked not to beidentified so as not to out his former company, reports that the NSAapproached U.S. carriers and asked for their cooperation in a"data-mining" operation, which might eventually cull "millions" ofindividual calls and e-mails.

In other words, nearly two years ago, Harris (with Naftali) quoted a telecom executive saying that something had gone on earlier than 9/11. And now, he’s providing details about Qwest’s refusal to cooperate.

The Rationale

So, returning to this story after Nacchio’s appeal has raised a lot of questions about the earlier request, Harris reveals the rationale the Administration offered for its earlier data mining.

However, in February 2001, the NSA’s primary purpose in seeking accessto Qwest’s network apparently was not to search for terrorists but towatch for computer hackers and foreign-government forces trying topenetrate and compromise U.S. government information systems,particularly within the Defense Department, sources said. Governmentofficials have long feared a "digital Pearl Harbor" if intruders wereto seize control of these systems or other key U.S. infrastructuresthrough the Internet.

[snip]

[former NSA Director] Minihan singled out Russia and China; the latter, he said, had alreadyincorporated cyber-warfare into its military training. He also pointedto the emergence of "transnational security challenges," includingterrorism, drug trafficking, and international organized crime. "Theseopportunists, enabled by the explosion of technology and theavailability of inexpensive, secure means of communication, pose asignificant threat to the interests of the United States and itsallies," Minihan said.

Harris also gives a general sense of how the program was justified as legal.

A former senior NSA official said that the agency also worried thatbecause these groups understood privacy laws so well, they knew how toavoid detection and could predict what the NSA would, and wouldn’t, doto track them. "There was such a nuanced understanding of how to tie usin knots and use American law against us, that there were certainlypockets of people saying, ‘We’ve got to be assertive; we’ve got to bemore aggressive on this,’ " the former official said.

Hayden, who ran the NSA from 1999 to 2005, was well known forhis willingness to push operations to the legal edge. "We’re prettyaggressive within the law," Hayden said in public remarks after 9/11. "As a professional, I’m troubled if I’m not using the full authority allowed by law."

Hayden has repeated that refrain since the attacks. But formerintelligence officials doubted that he would have authorized anyrequest to Qwest, or other companies, that he believed violated thelaw. They noted, however, that many in the agency had long thought thatmonitoring "metadata," such as a phone number, the length of a call, ora series of calls placed from a particular phone, didn’t implicateprivacy because such information didn’t constitute the "content" of amessage — its written or spoken words. [my emphasis]

This excuse sounds precisely like public denials about the program Hayden made after the NYT revealed the problem with the program involved data mining (this quote is a riff on a Glenn Greenwald quote).

In January, 2006, Gen. Michael Hayden — the NSA Director during theimplementation of the "TSP" and the current CIA Director — gave apress briefing at the National Press Club in which he emphatically denied that the NSA had been engaging in the type of "data mining" which this morning’s articles describe. During his opening remarks, Hayden said:

Let me talk for a few minutes also about what this program is not. It is not a driftnet over Dearborn or Lackawanna or Freemont grabbingconversations that we then sort out by these alleged keyword searchesor data-mining tools or other devices that so-called experts keeptalking about.

This is targeted and focused. This is not about interceptingconversations between people in the United States. This is hot pursuitof communications entering or leaving America involving someone webelieve is associated with al Qaeda.

Hethen made clear that the NSA could not and would not engage in suchdata mining because of the "ethical" and "practical" considerationsinvolved:QUESTION: Are you spying on or intercepting ourcommunications, e-mails and telephone conversations of those of us whoare organizing The World Can’t Wait to Drive Out the Bush Regime?

GEN. HAYDEN: You know, I tried to make this as clear as I couldin prepared remarks. I said this isn’t a drift net, all right? I said we’re not there sucking up coms and then using some of these magically alleged keyword searches — "Did he say ‘jihad’?

[bold Glenn’s; italics mine]

In other words, faced with the anonymous description that the problem with the warrantless wiretap program had to do with data mining, Hayden neatly parsed that it couldn’t be data mining because they didn’t "[suck] up coms and then [use] some of those magically alleged keyword searches." Hayden denied that they had mined content, but he stopped well short of saying that they hadn’t mined metadata.

Which strongly suggests that Michael Hayden was well aware that the NSA was mining metadata, long before 9/11.

Falafel Foresight

On December 19. 2005, just days after Risen and Lichtblau revealed the illegal domestic wiretap program, I wrote the following:

I’m proposing it’s not an indirect link to Al Qaeda, that the NYT isusing this language to shield the technical details (if these peoplewere really linked to Al Qaeda, the FISA warrant would be a cinch). I’mproposing that it’s a link of similarity. They find the communicationpatterns of a known Al Qaeda operative, and they start monitoringeveryone who has similar communication patterns.

[snip]

Is it possible the dubious ties are as little as a fondness for a take-out joint favored by suspected Al Qaeda operatives?

Later, I envisioned the most ridiculous kind of food-based surveillance: falafel.

I’ve long suggested that they may have wrapped up folks who shopped thesame falafel joints as genuine Al Qaeda targets (ut oh–Bill O’Reillymay be in trouble).

As you’ve no doubt heard, I was not being as clever as I thought I was being.

Like Hansel and Gretel hoping to followtheir bread crumbs out of the forest, the FBI sifted through customerdata collected by San Francisco-area grocery stores in 2005 and 2006,hoping that sales records of Middle Eastern food would lead to Iranianterrorists.

The idea was that a spike in, say, falafelsales, combined Read more

Terminate

Telecom lobbyist John Ashcroft is back on the influence circuit again, trying to admonish us that refusing the telecoms immunity will kill people. Only he usually doesn’t refer to telecom immunity as such. Instead, he calls on Congress to "terminate" the lawsuits against the telecom companies.

There are many complex and difficult issues associated with thesedebates, but whether to terminate the huge lawsuits that have beenfiled against the nation’s major telecommunications carriers accused ofcooperating with classified counterterrorism programs is not one ofthem.

Who knew that John Ashcroft was such a good sophist?

Not surprisingly, Ashcroft dodges several key issues. He suggests that there are only two circumstances where immunity would be granted.

The Senate bill would confer immunity in only two limitedcircumstances: if the carrier did not do what the plaintiffs claim; orif the carrier did do what the plaintiffs claim but based on explicitassurances from the highest levels of the government that theactivities in question were authorized by the president and determinedto be lawful.

But that’s one of the tricks with this surveillance–the telecoms did something, and it’s not entirely clear we’ve described what they did properly. Moreover, there’s the presence of telecoms that recognized the form of the requests was illegal–for some reason, Read more

Where’s Duke?

Seth Hettena notes that one of Mark Geragos’ most effective lines in the Brent Wilkes trial was the insinuation that the government backed off calling Duke Cunningham as a witness.

During his closing argument to jurors, defense attorney Mark Geragosasked jurors to keep one question in mind. If the governmentprosecutors believed Brent Wilkes had plied Congressman Randy “Duke”Cunningham with more than $600,00 in bribes, why didn’t they put theex-honorable gentleman on the witness stand?

It’s a good question. As the jury enters its third full day ofdeliberations, they may be wondering the same thing, and it remains tobe seen whether keeping Cunningham off the stand will hurt thegovernment’s case.

In his closing argument, Geragos told jurors the government didn’tcall Duke because he would never, ever admit that Brent Wilkes’contracting work was bad for the country. Prosecutor Jason Forgecountered that in rebuttal by saying that he didn’t want to call themost corrupt congressman in history and ask jurors to rely on histestimony.

So why didn’t Geragos call Cunningham ? Geragos said the governmenthad the burden of proof. When I reminded him that he had told jurors hewould call Duke, Geragos replied that Wilkes was a better witness. It’snot too hard to believe that he was Read more

image_print