SWIFT: Big Brother with a Booz Assist, Only without the Paperwork

As reporting on Edward Snowden reveal the scope of our spying on European friends, I’ve been thinking a lot about SWIFT.

SWIFT, you recall, is the database tracking international online money transfers. After 9/11, the US Government started helping itself to the data to track terrorist financing. But then in 2010 the servers moved entirely to the EU, and the EU forced the US to accede to certain protections: protections for EU citizens, a prohibition on bulk collection (and with it data mining), and two-pronged audit system.

Today, the CEO of SWIFT until 2007, Leonard Schrank, and the former Homeland Security Advisor, Juan Zarate, boast about the controls on SWIFT, suggesting it provides a model for data collection with oversight.

Both the Treasury and Swift ensured that the constraints on the information retrieved and used by analysts were strictly enforced. Outside auditors hired by Swift confirmed the limited scope of use, and Swift’s own representatives (called “scrutineers”) had authority to stop access to the data at any time if there was a concern that the restrictions were being breached. These independent monitors worked on site at government agencies and had real-time access to the system. Every time an analyst queried the system, the scrutineer could immediately review the query. Each query had to have a reason attached to it that justified it as a counterterrorism matter. Over time, the scope of data requested and retained was reduced.

This confirmed that the information was being used in the way we said it was — to save lives.

[snip]

The use of the data was legal, limited, targeted, overseen and audited. The program set a gold standard for how to protect the confidential data provided to the government. Treasury legally gained access to large amounts of Swift’s financial-messaging data (which is the banking equivalent of telephone metadata) and eventually explained it to the public at home and abroad.

It could remain a model for how to limit the government’s use of mass amounts of data in a world where access to information is necessary to ensure our security while also protecting privacy and civil liberties.

This description should already raise concerns about the so-called gold standard for spying. When “scrutineers” cohabit with those they’re supposed to be scrutinizing, it tends to encourage cooperation, not scrutiny.

And somehow, Schrank and Zarate neglect to mention that the vaunted audit process they describe was conducted by none other than Booz Allen Hamilton, the contractor that hired and let Edward Snowden abscond with the spying world’s crown jewels. And, as ACLU noted in a report for the EU in 2006, even during Schrank’s tenure, Booz was neck deep in aggressive surveillance.

But the real problem with highlighting SWIFT as a poster child of massive surveillance done right post-dates Schrank’s tenure (though he must know about this), when the EU’s independent audits for the first time revealed what went on in SWIFT queries. Among other things: the actual requests were oral, and therefore couldn’t be audited.

The report revealed that the Americans have been submitting largely identical requests–but then supplementing them with oral requests.

The oral requests, of course, make it impossible to audit the requests.

At the time of the inspection, Europol had received our requests for SWIFT data. Those four requests are almost identical in nature and request–in abstract terms–broad types of data, also involving EU Member States’ data. Due to their abstract nature, proper verification of whether the requests are in line with the conditions of the Article 4(2) of the TFTP Agreement–on the basis of the available documentation–is impossible. The JSB considers it likely that the information in the requests could be more specific.

Information provided orally–to certain Europol staff by the US Treasury Department, with the stipulation that no written notes are made–has had an impact upon each of Europol’s decisions; however, the JSB does not know the content of that information. Therefore, where the requests lack the necessary written information to allow proper verification of compliance with Article 4(2) of the TFTP Agreement, it is impossible to check whether this deficiency is rectified by the orally provided information. [my emphasis]

In addition, in spite of demands that the program include no bulk downloads, that’s precisely what the US was doing.

“We have given our trust to the other EU institutions, but our trust has been betrayed”, said Sophia in’t Veld (ALDE, NL), rapporteur on the EU-US Passenger Name Record (PNR) agreements. “This should be kept in mind when they want our approval for other agreements”, she declared.

“Somehow I am not surprised”, said Simon Busuttil (EPP, MT), recalling that “at the time of the negotiations last year we were not satisfied with having Europol controlling it – we wanted additional safeguards”. He added that ”the agreement is not satisfactory”, since it involves the transfer of bulk data, and insisted that ”we need an EU TFTP”.

For Claude Moraes (S&D, UK), the US demands are “too general and too abstract”. He also recalled that MEPs had insisted at the time that it must be specified how the US request would be made and that they needed to be “narrowly tailored”. A written explanation should accompany each request, he added.

This agreement is not in line with Member States’ constitutional principles and with fundamental rights, argued Jan Philipp Albrecht (Greens/EFA, DE). He highlighted the problem of bulk data transfer, “which is exactly what we have criticised before“. [my emphasis]

In other words, once an actual independent reviewer — not an embedded contractor like Booz — reviewed the program, it became clear it was designed to be impossible to audit, even while engaging in precisely the bulk downloads the Europeans feared.

Not only is the experience of SWIFT one reason why the Europeans are so quick to object to the scale of US spying on them. But it is actually a poster child for surveillance done wrong.

Contrary to what its boosters want you to believe.

Share this entry

Is the Section 215 Dragnet Limited to Terrorism Investigations?

Unlike PRISM, most public discussions about the Section 215 dragnet program suggest that it is tied to terrorism. It’s a claim, for example, that Charlie Savage makes in this story, which he traces back to this statement from Director of National Security James Clapper.

And indeed, that statement does claim the program is limited to terrorism investigations.

The collection is broad in scope because more narrow collection would limit our ability to screen for and identify terrorism-related communications. Acquiring this information allows us to make connections related to terrorist activities over time. The FISA Court specifically approved this method of collection as lawful, subject to stringent restrictions.

The information acquired has been part of an overall strategy to protect the nation from terrorist threats to the United States, as it may assist counterterrorism personnel to discover whether known or suspected terrorists have been in contact with other persons who may be engaged in terrorist activities.

[snip]

By order of the FISC, the Government is prohibited from indiscriminately sifting through the telephony metadata acquired under the program. All information that is acquired under this program is subject to strict, court-imposed restrictions on review and handling. The court only allows the data to be queried when there is a reasonable suspicion, based on specific facts, that the particular basis for the query is associated with a foreign terrorist organization. Only specially cleared counterterrorism personnel specifically trained in the Court-approved procedures may even access the records.

All information that is acquired under this order is subject to strict restrictions on handling and is overseen by the Department of Justice and the FISA Court. Only a very small fraction of the records are ever reviewed because the vast majority of the data is not responsive to any terrorism-related query. [my emphasis]

Even assuming James “Least Untruthful Too Cute by Half” Clapper can be trusted on this point, consider a few things about this statement.

  • It was released after only the first Guardian release. Thus, it was almost certainly rushed. And while NSA has claimed they had identified Edward Snowden before he started publishing, it is possible they did not know precisely what he had taken (though it is equally possible they already knew).
  • Clapper avoids mentioning precisely what program he is referring to in this statement, not even mentioning the Section 215 authority directly (though he does mention the PATRIOT Act. The Executive Branch has a well-established history — on this and related programs precisely — in addressing just a subset of a program so as to try to hide larger parts of it.

In addition, recall that when DOJ Inspector General Glenn Fine referred to these secret programs in a 2008 report on the use of Section 215, he spoke in the plural and included two classified appendices to describe them. In 2011, Acting Assistant Attorney General Todd Hinnen referred only to programs, plural. Thus, there almost certainly are at least two secret programs, and Michael Hayden has claimed Obama has expanded the use of this authority, which might mean there are more than two.

Furthermore, compare Clapper’s statement from June 6 — which mentioned only terrorists — with how he explained the dragnet program to Andrea Mitchell on June 9.

ANDREA MITCHELL: At the same time, when Americans woke up and learned because of these leaks that every single telephone call in this United States, as well as elsewhere, but every call made by these telephone companies that they collect is archived, the numbers, just the numbers, and the duration of these calls. People were astounded by that. They had no idea. They felt invaded.

JAMES CLAPPER: I understand that. But first let me say that I and everyone in the intelligence community all– who are also citizens, who also care very deeply about our– our privacy and civil liberties, I certainly do. So let me say that at the outset. I think a lot of what people are– are reading and seeing in the media is a lot of hyper– hyperbole.
A metaphor I think might be helpful for people to understand this is to think of a huge library with literally millions of volumes of books in it, an electronic library. Seventy percent of those books are on bookcases in the United States, meaning that the bulk of the of the world’s infrastructure, communications infrastructure is in the United States.

There are no limitations on the customers who can use this library. Many and millions of innocent people doing min– millions of innocent things use this library, but there are also nefarious people who use it. Terrorists, drug cartels, human traffickers, criminals also take advantage of the same technology. So the task for us in the interest of preserving security and preserving civil liberties and privacy is to be as precise as we possibly can be when we go in that library and look for the books that we need to open up and actually read.

You think of the li– and by the way, all these books are arranged randomly. They’re not arranged by subject or topic matter. And they’re constantly changing. And so when we go into this library, first we have to have a library card, the people that actually do this work.

Which connotes their training and certification and recertification. So when we pull out a book, based on its essentially is– electronic Dewey Decimal System, which is zeroes and ones, we have to be very precise about which book we’re picking out. And if it’s one that belongs to the– was put in there by an American citizen or a U.S. person.

We ha– we are under strict court supervision and have to get stricter– and have to get permission to actually– actually look at that. So the notion that we’re trolling through everyone’s emails and voyeuristically reading them, or listening to everyone’s phone calls is on its face absurd. We couldn’t do it even if we wanted to. And I assure you, we don’t want to.

ANDREA MITCHELL: Why do you need every telephone number? Why is it such a broad vacuum cleaner approach?

JAMES CLAPPER: Well, you have to start someplace. If– and over the years that this program has operated, we have refined it and tried to– to make it ever more precise and more disciplined as to which– which things we take out of the library. But you have to be in the– in the– in the chamber in order to be able to pick and choose those things that we need in the interest of protecting the country and gleaning information on terrorists who are plotting to kill Americans, to destroy our economy, and destroy our way of life.

In speaking of the way in which the government uses this dragnet collection as a kind of Dewey Decimal system to identify communications it wants to go back and view, he doesn’t limit it to terrorists. Indeed, he doesn’t even limit it to those foreign intelligence uses the PATRIOT Act authorizes, like counterintelligence (though Obama’s roll-out of Transnational Crime Organization initiative in 2011 — which effectively started treating certain transnational crime networks just like terrorists — may suggest only those crime organizations are being targeted).

Given two more days of disclosures after his initial Section 215 statement, Clapper acknowledged that PRISM has been used (at a minimum) to pursue weapons proliferators and hackers in addition to terrorists. Then, the next day, he at least seemed to suggest that Section 215 collection is used to pinpoint not just terrorists, but also drug cartels and other criminal networks.

And as I’ll show in a follow-up post, it seems to have targeted far more than that.

Share this entry

BREAKING: Globalization Is Dangerous

Globalization is dangerous.

But not, as it turns out, because it has gutted the middle class. Not even because a globalized supply chain has made it easier for our rivals to sabotage our defense programs, or that a globalized supply chain has led to a loss of manufacturing capacity that threatens our defense, to say nothing of our distinctly American commercial sectors.

Rather, retired Admiral James Stavridis, in a more popularized version of a piece he wrote for a National Defense University volume on the topic, argues that “deviant globalization,” whether that of drug traffickers, terrorists, counterfeiters, or hackers, poses a rising threat.

Convergence may be thought of as the dark side of globalization. It is the merger of a wide variety of mobile human activities, each of which is individually dangerous and whose sum represents a far greater threat.

I’m sure it is a threat. But Stavridis makes the same mistake just about everyone else makes when they consider criminal globalized networks to be a security threat: they ignore that there is little these illicit networks do that licit ones didn’t already pioneer. They ignore that the only thing that makes them illicit is state power, the same state power that corporatized globalization has weakened.

In fact Stavridis’ fourth point telling how to combat deviant globalization is notable for what it’s missing.

Fourth, we must shape and win the narrative. Many have said there is a “war of ideas.” That is not quite the right description. Rather, the United States is a “marketplace of ideas.” Our ideas are sound: democracy, liberty, freedom of speech and religion — all the values of the Enlightenment. They have a critical role in confronting the ideological underpinnings of crime and terror. Our strategic communications efforts are an important part of keeping our networks aligned and cohesive.

You see it? In spite of using the metaphor of the market to describe the realm of ideas, Stavridis neglects to mention that one of our ideas, so-called capitalism (or the marketplace itself!), that value of Enlightenment, is precisely the logic that has made globalization imperative.

If the way to beat these criminal globalized networks is to compete ideologically, but the ideological foundation our elites cling to most desperately is the same one the criminal globalized networks are exploiting so spectacularly, haven’t we already lost the battle of ideas?

Stavridis’ choice to ignore capitalism is probably why he doesn’t get the problem with his call to “follow the money.”

Third, we must follow the money. Huge sums of cash from these trafficking activities finance terrorists and insurgents such as the Taliban, as well as corruption. The money is used to undermine fragile democracies. Efforts to upend threat financing must be fused with international initiatives, move across U.S. agency lines and have the cooperation of the private-sector institutions involved.

It is true that globalized cash flows undermine weak governments (the same ones that otherwise might make these criminal globalized networks illicit). But that’s at least as true of the money looted from poorer countries and deposited, completely legally per western elites, in secrecy regimes, or of the hot money that destabilizes the global economy more generally. Moreover, one of the biggest impediments to tracking the flows of criminal globalized networks is that the so-called licit multinational banks they use to transfer their money are more interested in the profits from the money than in cooperating with increasingly weak states. So long as HSBC can get away with a wrist slap, after all, why would any multinational bank give up its customer base to American authorities?

Stavridis ends his column by citing Hardy’s warning about icebergs.

Just over a century ago , the poet Thomas Hardy wrote “The Convergence of the Twain” about the collision of the Titanic and the iceberg that sank it. “And as the smart ship grew/ In stature, grace, and hue/ In shadowy silent distance grew the Iceberg too.” There is an iceberg out there in the form of weapons of mass destruction; what is most worrisome is the convergence of such a weapon with a sophisticated global trafficking route enabled by cybercrime and the cash it generates. That is the convergence we must do all in our power to prevent.

Stavridis almost gets it. He almost gets it that these global trafficking routes, whether deemed licit or illicit by increasingly weak states, are the iceberg that is looming.

It’s just that he chooses to ignore the iceberg he can see for the parts he can’t see.

Share this entry

Classification Games Hiding the Afghan Defeat

Amidst all the discussion of the Administration’s crack-down on leaks, two details have made it clear the Administration is using its own abuse of classification to hide reports of our impending defeat in Afghanistan.

Administration leaks to enforce and protect our pro-corruption policy

One of those comes from Sarah Chayes, the former Stanley McChrystal advisor. She was last seen on the pages of this blog complaining about CIA support for corruption in Afghanistan. In a new piece, she offers one of the most interesting takes on the Administration’s pursuit of leaks.

While her main point is that if reporters were as exposed as their sources to legal consequences for leaks, they might better judge the truly important leaks, she throws some fascinating details showing how broken the classification system is.

Far too much information is protected by unwarranted classification. It’s hard to take a system seriously that places so many gigabytes of material that are not critical to national security under the same umbrella as the few nuggets that are. I’ve seen a New Yorker article included among prep documents for a National Security Council meeting stamped SECRET//NOFORN (meaning that only cleared U.S. citizens were allowed to read it).

[snip]

In September 2010, a flurry of coverage in major U.S. newspapers reported a supposed government decision on how corruption in Afghanistan would be handled. Perusing the articles with growing wonder, I looked down at a memo on my desk. Not only were passages quoted from it classified, the document was also watermarked DRAFT. No decision had been made yet because debate on the draft had not even reached the level of Cabinet secretaries. It was a classic Washington case of offensive leaking. For months, I was convinced that the perpetrator was the late Richard Holbrooke, then special representative to Afghanistan and Pakistan. But I kept asking reporters. Finally I traced the leak to a senior White House official, whose career has progressed untroubled.

She makes it very clear what the second example of classification abuse is. While she links to this early September 2010 WaPo article describing a decision to ignore corruption in Afghanistan, in her own account of what happened, she points to mid-September as the period when it became clear top figures in the Administration had bought off on supporting corruption in exchange for “progress” towards wiping out the Taliban.

Effectively, Chayes is suggesting that a top White House figure effectively won the debate in support of ignoring corruption in Afghanistan by leaking a draft classified decision as a fait accompli. Given her suggestion that this person’s career has “progressed,” it’s a safe bet that it is one of the people — like current National Security Advisor Tom Donilan, current CIA Director John Brennan, or current Deputy National Security Advisor Ben Rhodes — who got promoted since this leak.

Chayes doesn’t provide much guidance about which New Yorker article was classified SECRET and used in a National Security Council meeting, but I’m betting it was this Dexter Filkins article that rehearses the same issues of corruption. As I’ve noted, while the NYT (where Filkins had recently departed) only hinted at how badly the collapse of the Kabul Bank implicated Hamid Karzai’s corrupt administration, Filkins provided extensive details. The Filkins article, like the earlier series of articles, arises out of the decision to capitulate to CIA bagman Muhammad Zia Salehi’s blackmail to avoid prosecution.

Salehi telephoned Karzai from his jail cell. “He told Karzai, ‘If I spend one night in jail, I’ll bring the whole thing down,’ ” the Western official recalled.

Out of fear Salehi would “bring the whole thing down,” it seems, the Obama Administration chose to abuse the classification system to ignore — while hiding the true extent of — the corruption of our Afghan partners.

Selective protection of CIA’s efforts to convince our allies to remain in Afghanistan

Meanwhile, one of the things the government convinced Bradley Manning trial judge Denise Lind to keep secret even after it had been inadvertently released once appears to relate to CIA’s efforts to shore up support for the Afghan War among our European allies.

Alexa O’Brien makes a compelling argument that one of the witnesses who will testify to the harm allegedly caused by Manning’s leaks in secret is Robert Roland. She further argues that Roland will testify about 2 CIA Red Cell Memos, one of which strategizes how to ward off political opposition to the Afghan War of the kind that got our coalition partners in the Netherlands ousted (the other, which I wrote about herepertains to concerns that other countries will figure out we export terrorism). The analysis of the memo itself is rather unsophisticated; it argues if we emphasize the benefit for women of our continued presence in Afghanistan and the support one poll showed Afghans had for our presence, it’ll be enough to keep French and German voters in line.

But I guess it is rather embarrassing to have CIA’s reflections, however naive, on how to counter democratic opposition to war out there. And I suppose Roland’s identity might have been protected until whatever reviewer missed it in one of Manning’s defense filings.

At this point, however, both are public. Yet Roland’s identity and the CIA reports are being treated with far more sensitivity than far more damning State reports that will be discussed publicly.

Ah well. The report I want to see is the CIA plan to shore up support for the Afghan war as it becomes more and more clear the war serves only to prop up the crooks the CIA has been bribing for 12 years.

Share this entry

Philip Mudd Makes the Case for Signature Strikes against Banksters

Last Friday, former Deputy Director of CIA’s Counterterrorism Center and FBI Philip Mudd defended the use of signature strikes when used against multinational networked organizations that hide in safe havens.

Signature strikes have pulled out these lower-level threads of al Qaeda’s apparatus — and that of its global affiliates — rapidly enough that the deaths of top leaders are now more than matched by the destruction of the complex support structure below them. Western conceptions of how organizations work, with hierarchal structures driven by top-level managers, do not apply to al Qaeda and its affiliates. These groups are instead conglomerations of militants, operating independently, with rough lines of communication and fuzzy networks that cross continents and groups. They are hard to map cleanly, in other words.

[snip]

Part of the reason signature strikes have become so prominent in this global counterterror war is, simply put, geography. Local terrorist groups only become international threats if they have leadership that can execute a broad, globalist vision, and if that leadership has the time and space to plot without daily distractions from armies and security services — as in safe havens like Yemen, Somalia, the Sahel, and the tribal areas of Pakistan. These are exactly the places where the United States cannot apply conventional force and where local governments lack the capability or will to counter the threat. Exactly the places where drones offer an option to eviscerate a growing terror threat that has a dispersed, diffuse hierarchy. [my emphasis]

Of course, Mudd is crazy to suggest that the networked organization of terrorism is not found in the West. Indeed, corporations in the West pioneered the concept, with cell structures that provided them legal opacity. Though the safe havens they hid in were named Jersey and Cayman Islands rather than Yemen or Somalia.

So it seems this defense of signature strikes should be read as one of two things. Either, a case that the best defense against the damage banksters have caused is the fairly indiscriminate killing of their mid-level managers. Or, if that solution seems barbarous at its core, then perhaps this is a good case study in how extreme the idea of signature strikes would seem if it weren’t couched in a sloppy kind of Orientalism advocating it for others but not for our own.

Share this entry

The Blame Game Begins: Who Will Be Held Responsible for Creating the Afghan “Vertically Integrated Criminal” Government?

Last Sunday, the Beltway professed to be shocked — shocked!! — that the CIA has been bribing Hamid Karzai for years.

Moreover, there is little evidence that the payments bought the influence the C.I.A. sought. Instead, some American officials said, the cash has fueled corruption and empowered warlords, undermining Washington’s exit strategy from Afghanistan.

“The biggest source of corruption in Afghanistan,” one American official said, “was the United States.”

Fred Kaplan, author of a fawning David Petraeus biography, described how Petraeus tried to fix that corruption but was stymied by practicality.

Petraeus was impressed with their analysis but found their proposals impractical. First, he couldn’t simply bypass Karzai. One of his strategic goals was to help stabilize Afghanistan. Overhauling the districts’ governing boards and transferring power to new officials—who may themselves just be a new array of warlords—was hardly a recipe for stability. Second, the plan would undermine another strategic goal—protecting the Afghan population. The local officials who were taking bribes and extorting merchants were also helping out with local security, sometimes guarding convoys of NATO supply trucks. If the cash spigot were shut off, they might let the Taliban attack those trucks, maybe even join in.

Then Sarah Chayes, one of the civilian advisors who fought against Afghan corruption in the transition period from Stanley McChrystal to Petraeus, wrote an account of what Petraeus really did.

Our PowerPoint presentation spelling out this plan ran to more than 40 slides. We selected a dozen we really planned to brief, but at a meeting with the entire command staff, General Petraeus read through every one. With a calculated flourish, he marked a check on each page as he turned it over. Petraeus was on board.

[snip]

But when he stood up to address the assembled brass, Petraeus seemed to skip past — or even argue against — the slides we had prepared explaining the new governance approach. We were stunned. What had happened? Had we misunderstood? Had he changed his mind?

For another month, we kept at it; I hammered out a detailed implementation of our general concept to be employed in Kandahar province, alongside the troop surge. But by mid-September 2010, it was clear to me that Petraeus had no intention of implementing it, or of pursuing any substantive anti-corruption initiative at all. Four months later, in an intense interagency struggle over the language of a document spelling out objectives for Afghanistan by 2015, the U.S. government, at the cabinet level, explicitly reached the same decision.

That was the moment I understood the Afghanistan mission could not succeed.

Like Kagan, Chayes ultimately blames CIA. But she does so, specifically, in the context of the attempted July 2010 arrest of the CIA’s bagman, Muhammad Zia Salehi.

I spent weeks wracking my brain, trying to account for the about-face. Eventually, after a glance in my calendar to confirm the dates, it came to me. It was the Salehi arrest. The Salehi arrest had changed everything.

[snip]

Throughout the unfolding investigation, two senior U.S. officials have told me, through Salehi’s arrest and release after a few hours of police detention, CIA personnel never mentioned their relationship with him. Even afterwards, despite pressure in Kabul and Washington, the CIA refused to provide the ambassador or the key cabinet officials a list of Afghans they were paying. The CIA station chief in Kabul continued to hold private meetings with Karzai, with no other U.S. officials present.

So whom did Salehi call from his jail cell the afternoon of his arrest? Was it Karzai, as many presumed at the time? Or was it the CIA station chief?

However lethal our bribes to Karzai have been to our so-called strategy in Afghanistan (though I wonder: have they simply forestalled an all-out civil war?), he’s still going to proudly receive the cash.

“Yes, we received cash from the CIA for the past 10 years. It was very useful, and we are very thankful for this aid,” the president said during a news conference Saturday in Kabul.

“Yesterday, I thanked the CIA’s chief in Kabul and I requested their continued help, and they promised that they will continue.”

If all this sounds vaguely familiar, it should.

That’s because much of this dispute played out in reporting at the time. After NYT first reported CIA’s ties to Salehi a month after the attempted arrest in 2010 — and quoted one official saying “Fighting corruption is the very definition of mission creep” — the WaPo reported more anonymous sources almost boasting of the bribes (and reminding they went back to the mujahadeen era). Read more

Share this entry

The Find Every Terrorist at Any Cost Industry

As a thought experiment, replace the word “terrorist” in this paragraph with “soldier” or “military.”

All terrorists fundamentally see themselves as altruists: incontestably believing that they are serving a “good” cause designed to achieve a greater good for a wider constituency—whether real or imagined—which the terrorist and his organization or cell purport to represent. Indeed, it is precisely this sense of self-righteous commitment and self-sacrifice that that draws people into terrorist groups. It all helps them justify the violence they commit. It gives them collective meaning. It gives them cumulative power. The terrorist virtually always sees himself as a reluctant warrior: cast perpetually on the defensive and forced to take up arms to protect himself and his community. They see themselves as driven by desperation——and lacking any viable alternative—to violence against a repressive state, a predatory rival ethnic or nationalist group, or an unresponsive international order.

The paragraph comes from Bruce Hoffman, a Georgetown Professor/ThinkTanker whose studies of terrorism predate 9/11 by decades. It forms part of his explanation, post Boston, for why people become terrorists: because they, like our own country increasingly, see violence as a solution to their grievance.

That’s not all of Hoffman’s description of what makes people terrorists, mind you. He goes onto discuss religion and the human relations that might convince someone to engage in violence. But the paragraph has haunted me since I read it over a week ago for how clearly it should suggest that one of the few things that separates terrorism from our country’s own organized violence is official sanction (and at least lip service about who makes an appropriate and legal target).

Which is one reason why Jack Levin, in a piece debunking four myths about terrorism, offers this as one solution.

Somehow, we must reinstate the credibility of our public officials — our president, our Congress, and our Supreme Court Justices — so that alienated Americans do not feel they must go outside of the mainstream and radicalize in order to satisfy their goals.

Blaming terrorism on our dysfunctional political system feels far too easy, but it’s worth remembering that in Afghanistan, Somalia, and parts of Yemen, Al Qaeda has at times won support from locals because it offered “justice” where the official government did not or could not.

In any case, the common sense descriptions Hoffman and Levin offer haven’t prevented a slew of people responding to Boston — some experts, some not — from demanding that we redouble our efforts to defeat any possible hint of Islamic terrorism, no matter the cost.

Batshit crazy Texas Congressman Louie Gohmert claims the Boston attack is all Spencer’s fault: because FBI purged some its training materials of some of the inaccurate slurs about Muslims (but did not even correct the training of Agents who had been taught that claptrap in the first place), it can no longer speak a language appropriate to pursuing terrorists. “They can’t talk about the enemy. They can’t talk about jihad. They can’t talk about Muslim. They can’t talk about Islam.” Which elicited the equally batshit crazy response from Glenn Kessler of taking Gohmert’s premise as a valid one that should be disproven by weighing how much offensive language remains in FBI materials, rather than debunking the very premise that only people who engage in cultural slurs would be able to identify terrorists. I award Kessler four wooden heads.

Somewhat more interesting is this piece from Amy Zegart, another Professor/ThinkTanker. She admits we may not know whether Boston involved some kind of intelligence failure for some time.

Finding out what happened will be trickier than it sounds. Crowdsourcing with iPhones, Twitter, and Lord & Taylor surveillance video worked wonders to nail the two suspects with lightning speed. But assessing whether the bombing constituted an intelligence failure will require more time, patience, and something most people don’t think about much: understanding U.S. counter-terrorism organizations and their incentives and cultures, which lead officials to prioritize some things and forget, or neglect, others.

But that doesn’t stop her from insisting FBI’s culture remains inappropriate to hunting terrorists “pre-boom.”

But it is high time we asked some hard, public questions about whether the new FBI is really new enough. Transformation — moving the bureau from a crime-fighting organization to a domestic intelligence agency — has been the FBI’s watchword since 9/11. Read more

Share this entry

Maybe Dzhokhar’s Buddies Just Wanted a Job at HSBC?

A lot of people on Twitter are talking about how dumb-as-shit Dzhokhar Tsarnaev’s college buddies, Azamat Tazhayakov, Dias Kadyrbayev, and Robel Phillipos were when they allegedly removed evidence relating to the Boston Marathon bombing and threw it in the trash or (in the case of Phillipos) lied about those activities.

I’m not convinced, though.

I’m not defending what the young men did. Nor am I vouching for their intelligence. Nor am I saying they shouldn’t be prosecuted — they should!

But I’m having a hard time distinguishing what they did from what, say, HSBC did, for years. Aside from the fact that HSBC affirmatively helped terrorists, rather than just covered up that help. And aside from the fact HSBC made a billion dollars doing so.

As a reminder, where’s what HSBC did — eliciting nary a blink of an eye from the same DOJ that is now (rightly) prosecuting these dumb-as-shit kids. They were a key — perhaps the key — bank providing Saudi al-Rajhi bank cash dollars. Details emerged in 2001 that the bank had been providing the dollars terrorists used in their plots, including the 9/11 plot. It took four years for HSBC to begin to get worried about it. But it still only halted the dollar trade for al-Rajhi while its US regulator, OCC, looked into its money laundering practices (it says something about HSBC’s awareness of the sensitivity of this issue that they didn’t halt their other abundant money laundering activities).

And then, once OCC was out of its hair, HSBC moved back into the cash dollar business with al-Rajhi, a bank reportedly involved with the most spectacular terrorist acts of recent years.

Just HSBC’s brief exit from the cash business with al Rajhi is similar to what Dzhokhar’s dumb-as-shit buddies did when they put his backpack in the public trash. Covering up terrorism.

Read more

Share this entry

When the Preet Promotion Industry Speaks, the Nation Gets Nervous

In an article with the URL “when-preet-bharara-speaks-the-shady-get-nervous,” the WaPo repeats a now familiar formula for stories boosting US Attorney Preet Bharara’s fortune: lots of quotes from political powerful allies…

“If [Bharara] smells corruption, he’ll go after it and figure out a way to corral it,” [Chuck] Schumer said. “But he will not make up cases for the sake of making up cases.”

Lots of celebration of recent headlines (I mean, cmon, as I understand it, indicting corrupt NY officials has become the prosecutorial equivalent of shooting fish in a barrel)…

“For the second time in three days, we unseal criminal charges against a sitting member of our state legislature,” Bharara, 44, said during the Thursday afternoon news conference in downtown Manhattan. This time, the U.S. attorney accused a Bronx assemblyman of accepting bribes as part of a scheme to aid developers, which Bharara called “a fairly neat trick” that amounted to “a legislator selling legislation.”

And lots of hints that scream “Pick Preet! Promote Preet!”

It is now highly unlikely that the White House would forget about Bharara, as administration officials somehow did in 2009, when they failed to invite the Indian American powerhouse to the Indian state dinner.

[snip]

Such concerns are unlikely to slow down Bharara. Considered politically astute by observers in Washington and New York, Bharara made a point of not taking sides in the 2008 Democratic presidential primary that pitted then-senators Barack Obama and Hillary Rodham Clinton. He has been rumored as a possible successor to his boss, Attorney General Eric H. Holder Jr., either in the current administration or the next Democratic one.

But not one word about his failure to hold anyone accountable for the 2008 financial crash (aside from citing last year’s Time magazine story that falsely claimed “This Man Is Busting Wall Street”).

But Chuck Schumer and Preet’s other boosters appear to believe that’s the formula that will get Preet nominated to replace Eric Holder.

Sadly, they’re probably right.

Share this entry

VirginLeak

A number of journalistic outlets are cooperating in a project to describe the contents of 200 gigabytes of financial information from private incorporation agencies in the British Virgin Islands. The International Consortium of Investigative Journalists has links to all the stories using the data. The CBC has some of the most interesting graphics.

But I have yet to see a really good explanation of where this data came from–or why it was leaked in this form. The Guardian has one of the best explanations of what’s out there.

The leak of 2m emails and other documents, mainly from the offshore haven of the British Virgin Islands (BVI), has the potential to cause a seismic shock worldwide to the booming offshore trade, with a former chief economist at McKinsey estimating that wealthy individuals may have as much as $32tn (£21tn) stashed in overseas havens.

[snip]

The whistleblowing group WikiLeaks caused a storm of controversy in 2010 when it was able to download almost two gigabytes of leaked US military and diplomatic files.

The new BVI data, by contrast, contains more than 200 gigabytes, covering more than a decade of financial information about the global transactions of BVI private incorporation agencies. It also includes data on their offshoots in Singapore, Hong Kong and the Cook Islands in the Pacific.

And CBC offered this explanation of why they are shielding the identity of 450 Canadians who are stashing their money offshore.

The documentation provided to CBC News includes the names of some 450 Canadians who have set up these offshore accounts or holdings. We have already reported details concerning one such account-holder and expect to produce more such reports in the weeks and months to come.

At the same time, we are mindful of the reality that holding an offshore account is not evidence of wrongdoing and may not be controversial. So we are not simply reproducing the raw information we have received through the consortium. Our journalists are working through that information in a careful and methodical way to confirm the information received, identify appropriate stories, and complete them with appropriate context.

We shall see — both whether the elite of the world respond to this leak with the outrage they responded to Bradley Manning’s leaks, and whether the thus far selective nature of the stories on this betray whose agenda the leaks are serving.

While this data may just come from an insider releasing the information publicly (but then why not leak it all?), it is not inconceivable that BVI’s competitors in the secrecy business might want to cut into their market.

Share this entry