FISC Already Invented that Database-and-Mining Precedent in Secret

Almost 18 months ago, I suggested that the Amnesty v. Clapper suit challenging the government’s Section 702 collection might invent what I called a “database-and-mining” precedent.

Over at Lawfare, Steve Vladeck noted that this case would likely decide whether and what the “foreign intelligence surveillance” exception to the Fourth Amendment, akin to “special needs” exceptions like border searches and drug testing.

Third, if the Court affirms (or denies certiorari), this case could very well finally settle the question whether the Fourth Amendment’s Warrant Clause includes a “foreign intelligence surveillance exception,” as the FISA Court of Review held in the In re Directives decision in 2008. That’s because on the merits, 50 U.S.C. § 1881a(b)(5) mandates that the authorized surveillance “shall be conducted in a manner consistent with the fourth amendment to the Constitution of the United States.” Thus, although it is hard to see how surveillance under § 1881a could violate the Fourth Amendment, explication of the (as yet unclear) Fourth Amendment principles that govern in such cases would necessarily circumscribe the government’s authority under this provision going forward (especially if In re Directives is not followed…).

I would go further and say that this case will determine whether there is what I’ll call a database-and-mining exception allowing the government to collect domestic data to which no reasonable suspicion attaches, store it, data mine it, and based on the results of that data mining use the data itself to establish cause for further surveillance. Thus, it will have an impact not just for this warrantless wiretapping application, but also for things like Secret PATRIOT, in which the government is collecting US person geolocation data in an effort to be able to pinpoint the locations of alleged terrorists, not to mention the more general databases collecting things like who buys hydrogen peroxide.

Unsurprisingly, the FISA Court already invented that precedent. In secret.

In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans while pursuing not only terrorism suspects, but also people possibly involved in nuclear proliferation, espionage and cyberattacks, officials say.

[snip]

In one of the court’s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the “special needs” doctrine and carved out an exception to the Fourth Amendment’s requirement of a warrant for searches and seizures, the officials said.

The special needs doctrine was originally established in 1989 by the Supreme Court in a ruling allowing the drug testing of railway workers, finding that a minimal intrusion on privacy was justified by the government’s need to combat an overriding public danger. Applying that concept more broadly, the FISA judges have ruled that the N.S.A.’s collection and examination of Americans’ communications data to track possible terrorists does not run afoul of the Fourth Amendment, the officials said.

[snip]

The officials said one central concept connects a number of the court’s opinions. The judges have concluded that the mere collection of enormous volumes of “metadata” — facts like the time of phone calls and the numbers dialed, but not the content of conversations — does not violate the Fourth Amendment, as long as the government establishes a valid reason under national security regulations before taking the next step of actually examining the contents of an American’s communications.

This concept is rooted partly in the “special needs” provision the court has embraced. “The basic idea is that it’s O.K. to create this huge pond of data,” a third official said, “but you have to establish a reason to stick your pole in the water and start fishing.”

Here’s the thing though: it’s not just that the government has done all this in a court with no antagonist. It’s that the government has gone to great lengths to make sure regular courts wouldn’t review these decisions, doing things like:

Effectively, the government has been refusing to let issues that affect a great number of Americans be reviewed in courts with real judicial process.

And then calling the result “law” and “legal” in spite of the fact that almost no Americans know about it.

Edward Snowden’s Extradition Request

Screen shot 2013-07-06 at 9.31.58 AMAs I noted last night, Venezuelan President Nicolás Maduro offered Edward Snowden asylum last night. (The Spanish was “hemos decidido” and “he decidido ofrecerle asilio” which included none of the sense of hypothetical that Nicaragua’s President Daniel Ortega used.)

The government has released the extradition request they’ve sent to the Venezuelan government.

Perhaps the most interesting detail is the date: July 3. Way back when Maduro was (unless I’ve lost track of his chronology), still in Russia or Belarus, and when Bolivian President Evo Morales was making a big stink about being “kidnapped” in Vienna.

Since that time, Maduro finished his visit in Belarus. Flew (presumably with a refueling stop somewhere and possibly a stop at home) to Cochabamba, Bolivia, where at least 6 South American leaders either were personally or had sent a representative (in addition to Morales and Maduro, the Presidents of Ecuador, Suriname, Argentina, and Uruguay were present, Brazils Dilma Rousseff had sent a representative, as had, according to some reports, Peru and Chile).

Then Maduro returned home in time for Venezuela’s Independence Day celebration, where he issued his statement offering asylum.

It appears that after the US issued the extradition request to Venezuela, they issued an arrest warrant to Ireland.

Now, perhaps the US has real intelligence saying that Snowden remains in Russia. But these are the people who were sure he was on Morales’ plane just a few days ago. And they don’t really seem all too sure about where Snowden is.

Update: This is one of the few stories I’ve seen that affirmatively said Snowden was still in Russia after Maduro’s departure, based on a single Russian security source.

Update: And this has more Russian sources stating he remains stuck in Russia.

Europe again stuck saying, “They told us they were sure”

The NATO members who refused overflight privileges for Bolivian President Evo Morales are, in the process of trying to justify what they did, revealing more details of what led them to risk such a diplomatic affront. Among other explanations, the Spanish foreign minister explained that “they” told the Spanish “they were sure” Snowden was on board Morales’ plane.

“They told us they were sure… that he was on board,” Mr Garcia-Margallo told Spanish television, without indicating who “they” are.

“And so the reaction of all the European countries that took measures – whether right or wrong – was because of the information that had been passed on. I couldn’t check if it was true or not at that moment because it was necessary to act straight away.”

In point of fact, it’s not yet clear Snowden wasn’t on the plane. While Austrian authorities checked the passports of the known passengers on the plane, they apparently did not conduct a thorough search. And 3 Spaniards who showed up to conduct a search were denied entry (though Morales did stop in the Canary Islands, which would have provided another opportunity to conduct a search on Spanish territory, but by that point Morales was already making a literal international incident about his treatment).

Then yesterday the heads of state from 5 other South American countries gathered in Cochabamba, Bolivia (why not La Paz?) to bitch about the actions of those NATO countries that had insulted Morales. If Snowden was on Morales’ plane, he may well be in any of 6 other countries by now (Brazil’s Dilma Rousseff sent an advisor — and note several attendees would have had to fly over Brazilian airspace to return home).

Or Snowden could be in Austria, which was one of the countries that had said Snowden would need to be in their country before it could consider an asylum request (there were pictures of Morales and Fischer from Morales’ layover that made them look quite jolly).

Or Snowden could still be in Sheremetyevo, though no one has ever seen him there. Russia’s Deputy Foreign Minister Sergei Ryabkov signaled impatience with Snowden today, even though in the past Putin said he would not extradite the leaker. But who knows whether the Russians, who are enjoying this game, are telling the truth?

So Snowden could foreseeably be in Argentina, Austria, Bolivia, Brazil, Ecuador, Russia, Suriname, Uruguay, or Venezuela. And there’s no reason to believe we’d know one way or another.

Meanwhile Ecuador chose yesterday, in the wake of the Morales slight, to complain about a bug placed in its Embassy in London. A bug they claim to have found last month.

Foreign Minister Ricardo Patino told a news conference in Quito the bug was found last month when Ecuadorean technicians reviewed the embassy’s wiring.

Now, Ecuador reportedly found the bug in connection with Patino’s trip to London June 16. Which ought to raise questions about why they’ve chosen this moment to make a stink about it. Did they leave it in place to sow disinformation? In any case, the bug has given Ecuador reason to raise tensions with England, which has avoided the badgering the other NATO European countries have.

So who knows where Snowden is? But in the meantime, US intelligence (presumably the “they” who were “sure” Snowden was on Morales’ plane) has been exposed in another potential false certainty, and the South American nations skeptical of the Washington consensus have reasons to make fun of Europe for playing Washington’s poodle.

This entire stink is supposed to be about America’s omnipotent SIGINT dragnet (the power of which is presumably one of the reasons the NATO members are being so compliant with US demands). But somehow that SIGINT hasn’t pinpointed Snowden yet, and may have gotten badly embarrassed by listening into one of its own bugs.

Update: Nicolas Maduro has granted Snowden asylum, as has Nicaragua’s Daniel Ortega. Which leaves the logistics of getting Snowden to Venezuela if he is not already there.

 

Happy Birthday, You Rebels!

It’s that day again where we contemplate the great project a bunch of rebels set out on 237 years ago.

In recent years, I’ve focused on what those rebels said about the judicial abuses of King George — language about denying some of Trial by Jury.

But this year, particularly given the coup in Egypt, I want to contemplate this passage.

He has affected to render the Military independent of and superior to the Civil power.

He has combined with others to subject us to a jurisdiction foreign to our constitution, and unacknowledged by our laws; giving his Assent to their Acts of pretended Legislation:

For Quartering large bodies of armed troops among us:

We’re far from the militarized state that existed when the rebels threw off King George. Obama’s Administration is, reportedly, currently investigating two retired Generals for telling secrets the Administration didn’t want told. Most of the country barely contacts the 1% that fights our wars for us.

All that said, we are experiencing a sequester that has had the effect of cutting off funding from our most needy, while not affecting the funding of our military contractors.

We are learning that our military — the NSA — is collecting all of our calls and keeping the emails we try to encrypt.

Before we welcome immigrants, we’re going to make another attempt to wall off our southern border — another attempt for the profiteers to get wealthy while the poor suffer.

Mostly, though, I’m thinking of our foreign policy.

One key strategy of the Obama Administration is to pursue secret trade deals that subvert our sovereignty to the wishes of corporations (and to cut off other countries if they try to do something, offer asylum, that is well established under international law).

Then there’s our use of the military in relations with others. Some months ago, a top General argued the way to restore our relations with Pakistan is to forge even closer ties with its military; already the military has succeeded in vetoing civilian efforts to rein in drone strikes in that country. Similarly, while Egypt has been through two governments in the last several years, we continue to fund their military, and continue to expect and encourage it to broker power.

With Edward Snowden, we appear to have placed demands on NATO countries France, Italy, Spain, and Portugal to deny Evo Morales overflight. But Austria, not a NATO country, offered Morales a place to land. Did we secretly declare Snowden mutual defense threat against NATO, because he revealed how much the government spies on us all?

We don’t have soldiers sleeping in our homes. We’re a long way from that kind of militarization. But we are, increasingly, becoming a military empire at the expense of the Life, Liberty and the pursuit of Happiness of American liberty and — even more so — the liberty of people around the globe.

Happy Birthday, you rebels.

Update: Meanwhile, the NSA wants you to know it’s okay if you go join a RestoreTheFourth protest today.

The Fourth of July reminds us as Americans of the freedoms and rights all citizens of our country are guaranteed by our Constitution. Among those is freedom of speech, often exercised in protests of various kinds. NSA does not object to any lawful, peaceful protest. NSA and its employees work diligently and lawfully every day, around the clock, to protect the nation and its people.

That’s big of the NSA.

SWIFT: Big Brother with a Booz Assist, Only without the Paperwork

As reporting on Edward Snowden reveal the scope of our spying on European friends, I’ve been thinking a lot about SWIFT.

SWIFT, you recall, is the database tracking international online money transfers. After 9/11, the US Government started helping itself to the data to track terrorist financing. But then in 2010 the servers moved entirely to the EU, and the EU forced the US to accede to certain protections: protections for EU citizens, a prohibition on bulk collection (and with it data mining), and two-pronged audit system.

Today, the CEO of SWIFT until 2007, Leonard Schrank, and the former Homeland Security Advisor, Juan Zarate, boast about the controls on SWIFT, suggesting it provides a model for data collection with oversight.

Both the Treasury and Swift ensured that the constraints on the information retrieved and used by analysts were strictly enforced. Outside auditors hired by Swift confirmed the limited scope of use, and Swift’s own representatives (called “scrutineers”) had authority to stop access to the data at any time if there was a concern that the restrictions were being breached. These independent monitors worked on site at government agencies and had real-time access to the system. Every time an analyst queried the system, the scrutineer could immediately review the query. Each query had to have a reason attached to it that justified it as a counterterrorism matter. Over time, the scope of data requested and retained was reduced.

This confirmed that the information was being used in the way we said it was — to save lives.

[snip]

The use of the data was legal, limited, targeted, overseen and audited. The program set a gold standard for how to protect the confidential data provided to the government. Treasury legally gained access to large amounts of Swift’s financial-messaging data (which is the banking equivalent of telephone metadata) and eventually explained it to the public at home and abroad.

It could remain a model for how to limit the government’s use of mass amounts of data in a world where access to information is necessary to ensure our security while also protecting privacy and civil liberties.

This description should already raise concerns about the so-called gold standard for spying. When “scrutineers” cohabit with those they’re supposed to be scrutinizing, it tends to encourage cooperation, not scrutiny.

And somehow, Schrank and Zarate neglect to mention that the vaunted audit process they describe was conducted by none other than Booz Allen Hamilton, the contractor that hired and let Edward Snowden abscond with the spying world’s crown jewels. And, as ACLU noted in a report for the EU in 2006, even during Schrank’s tenure, Booz was neck deep in aggressive surveillance.

But the real problem with highlighting SWIFT as a poster child of massive surveillance done right post-dates Schrank’s tenure (though he must know about this), when the EU’s independent audits for the first time revealed what went on in SWIFT queries. Among other things: the actual requests were oral, and therefore couldn’t be audited.

The report revealed that the Americans have been submitting largely identical requests–but then supplementing them with oral requests.

The oral requests, of course, make it impossible to audit the requests.

At the time of the inspection, Europol had received our requests for SWIFT data. Those four requests are almost identical in nature and request–in abstract terms–broad types of data, also involving EU Member States’ data. Due to their abstract nature, proper verification of whether the requests are in line with the conditions of the Article 4(2) of the TFTP Agreement–on the basis of the available documentation–is impossible. The JSB considers it likely that the information in the requests could be more specific.

Information provided orally–to certain Europol staff by the US Treasury Department, with the stipulation that no written notes are made–has had an impact upon each of Europol’s decisions; however, the JSB does not know the content of that information. Therefore, where the requests lack the necessary written information to allow proper verification of compliance with Article 4(2) of the TFTP Agreement, it is impossible to check whether this deficiency is rectified by the orally provided information. [my emphasis]

In addition, in spite of demands that the program include no bulk downloads, that’s precisely what the US was doing.

“We have given our trust to the other EU institutions, but our trust has been betrayed”, said Sophia in’t Veld (ALDE, NL), rapporteur on the EU-US Passenger Name Record (PNR) agreements. “This should be kept in mind when they want our approval for other agreements”, she declared.

“Somehow I am not surprised”, said Simon Busuttil (EPP, MT), recalling that “at the time of the negotiations last year we were not satisfied with having Europol controlling it – we wanted additional safeguards”. He added that ”the agreement is not satisfactory”, since it involves the transfer of bulk data, and insisted that ”we need an EU TFTP”.

For Claude Moraes (S&D, UK), the US demands are “too general and too abstract”. He also recalled that MEPs had insisted at the time that it must be specified how the US request would be made and that they needed to be “narrowly tailored”. A written explanation should accompany each request, he added.

This agreement is not in line with Member States’ constitutional principles and with fundamental rights, argued Jan Philipp Albrecht (Greens/EFA, DE). He highlighted the problem of bulk data transfer, “which is exactly what we have criticised before“. [my emphasis]

In other words, once an actual independent reviewer — not an embedded contractor like Booz — reviewed the program, it became clear it was designed to be impossible to audit, even while engaging in precisely the bulk downloads the Europeans feared.

Not only is the experience of SWIFT one reason why the Europeans are so quick to object to the scale of US spying on them. But it is actually a poster child for surveillance done wrong.

Contrary to what its boosters want you to believe.

Wyden and Udall: As with Torture, Intelligence Committee Lies about Efficacy

Mark Udall and Ron Wyden have persistently repeated one of the findings from the Senate Intelligence Committee torture report: the CIA gave inaccurate information about the program, and it wasn’t very effective.

So it’s unsurprising that they would go beyond their past questions whether the Section 215 dragnet of US person call records is effective to make it clear they had pushed for the Internet metadata program to be ended because it, too, is ineffective.

We are quite familiar with the bulk email records collection program that operated under the USA Patriot Act and has now been confirmed by senior intelligence officials. We were very concerned about this program’s impact on Americans’ civil liberties and privacy rights, and we spent a significant portion of 2011 pressing intelligence officials to provide evidence of its effectiveness. They were unable to do so, and the program was shut down that year.

[snip]

Intelligence officials have noted that the bulk email records program was discussed with both Congress and the Foreign Intelligence Surveillance Court. In our judgment it is also important to note that intelligence agencies made statements to both Congress and the Court that significantly exaggerated this program’s effectiveness. This experience demonstrates to us that intelligence agencies’ assessments of the usefulness of particular collection programs – even significant ones – are not always accurate. This experience has also led us to be skeptical of claims about the value of the bulk phone records collection program in particular.

We believe that the broader lesson here is that even though intelligence officials may be well-intentioned, assertions from intelligence agencies about the value and effectiveness of particular programs should not simply be accepted at face value by policymakers or oversight bodies any more than statements about the usefulness of other government programs should be taken at face value when they are made by other government officials. It is up to Congress, the courts and the public to ask the tough questions and press even experienced intelligence officials to back their assertions up with actual evidence, rather than simply deferring to these officials’ conclusions without challenging them.

We look forward to continuing the debate about the effectiveness of the ongoing Patriot Act phone records collection program in the days and weeks ahead.

This is actually what the Inspectors General have implied: that it’s not clear these programs are effective.

So why are we collecting dragnets of American communications for no good reason?

On the Meanings of “Dishonor” and “Hack”

The former NSA IG (and current affiliate of the Chertoff Group profiteers, though he didn’t disclose that financial interest) Joel Brenner has taken to the pages of Lawfare to suggest anyone trying to force some truth out of top Intelligence Community officials is dishonorable.

On March 12 of this year, Senator Ron Wyden asked James Clapper, the director of national intelligence, whether the National Security Agency gathers “any type of data at all on millions or hundreds of millions of Americans.”

“No, sir,” replied the director, visibly annoyed. “Not wittingly.”

Wyden is a member of the Senate Select Committee on Intelligence and had long known about the court-approved metadata program that has since become public knowledge. He knew Clapper’s answer was incorrect. But Wyden, like Clapper, was also under an oath not to divulge the story. In posing this question, he knew Clapper would have to breach his oath of secrecy, lie, prevaricate, or decline to reply except in executive session—a tactic that would implicitly have divulged the secret. The committee chairman, Senator Diane Feinstein, may have known what Wyden had in mind. In opening the hearing she reminded senators it would be followed by a closed session and said,  “I’ll ask that members refrain from asking questions here that have classified answers.” Not dissuaded, Wyden sandbagged he [sic] director.

This was a vicious tactic, regardless of what you think of the later Snowden disclosures. Wyden learned nothing, the public learned nothing, and an honest and unusually forthright public servant has had his credibility trashed.

Brenner of course doesn’t mention that Clapper had had warning of this question, so should have provided a better non-answer. Later in his post, he understates how revealing telephone metadata can be (and of course doesn’t mention it can also include location). He even misstates how often the phone metadata collection has been queried (it was queried on 300 selectors, not “accessed only 300 times”).

But the really hackish part of his argument is in pretending this whole exchange started on March 12.

It didn’t. It started over a year ago and continued through last week when Keith Alexander had to withdraw a “fact sheet” purporting to lay out the “Section 702 protections” Americans enjoy (see below for links to these exchanges).

The exchange didn’t start out very well, with two Inspectors General working to ensure that Wyden and Mark Udall would not get their unclassified non-answer about how many Americans are surveilled under Section 702’s back door until after the Intelligence Committee marked up the bill.

But perhaps the signature exchange was this October 10, 2012 Wyden letter (with 3 other Senators) to Keith Alexander and Alexander’s November 5, 2012 response.

On July 27, 2012, Alexander put on a jeans-and-t-shirt costume and went to DefCon to suck up to hackers. After giving a schmaltzy speech including lines like, “we can protect the networks and have civil liberties and privacy,” DefCon founder Jeff Moss asked Alexander about recent Bill Binney allegations that the NSA was collecting communications of all Americans. Wired reported the exchange here.

It was this exchange — Keith Alexander’s choice to make unclassified statements to a bunch of hackers he was trying to suck up to — that underlies Wyden’s question. And Wyden explicitly invoked Alexander’s comments in his March 12 question to Clapper.

In Wyden’s letter, he quoted this, from Alexander.

We may, incidentally, in targeting a bad guy hit on somebody from a good guy, because there’s a discussion there. We have requirements from the FISA Court and the Attorney General to minimize that, which means nobody else can see it unless there’s a crime that’s been committed.

Wyden then noted,

We believe that this statement incorrectly characterized the minimization requirements that apply to the NSA’s FISA Amendments Act collection, and portrays privacy protections for Americans’ communications as being stronger than they actually are.

This is almost precisely the exchange that occurred last week, when Wyden and Udall had to correct Alexander’s public lies about Section 702 protections again. 8 months later and Alexander is reverting to the same lies about protections for US Persons.

In the letter, Wyden quoted from Alexander again,

You also stated, in response to the same question, that “…the story that we have millions or hundreds of millions of dossiers on people is absolutely false. We are not entirely clear what the term “dossier” means in this context, so we would appreciate it if you would clarify this remark.

And asked,

Are you certain that the number of American communications collected is not “millions or hundreds of millions”? If so, then clearly you must have some ability to estimate the scale of this number, at least some range in which you believe it falls. If this is the case, how large could this number possibly be? How small could it possibly be?

Does the NSA collect any type of data at all on “millions or hundreds of millions of Americans”?

This last question was precisely the question Wyden asked Clapper 5 months later on March 12 (Alexander’s response in November didn’t even acknowledge this question — he just blew it off entirely).

As Wyden emphasized, Alexander is the one who chose to make misleading assertions in unclassified form, opening up the door for demands for an unclassified response.

Since you made your remarks in an unclassified forum, we would appreciate an unclassified response to these questions, so that your remarks can be properly understood by Congress and the public, and not interpreted in a misleading way.

In other words, Brenner presents the context of Wyden’s question to Clapper completely wrong. He pretends this exchange was about one cleared person setting up another cleared person to answer a question. But Brenner ignores (Wyden’s clear invocation of it notwithstanding) that this exchange started when a cleared person, General Alexander, chose to lie to the public.

And now that we’ve seen the minimization standards, we know just how egregious a lie Alexander told to the hackers at DefCon. It’s bad enough that Alexander didn’t admit that anything that might possibly have a foreign intelligence purpose could be kept and, potentially, disseminated, a fact that would affect all Americans’ communications.

But Alexander was talking to high level hackers, probably the group of civilians who encrypt their online communications more than any other.

And Alexander knows that the NSA keeps encrypted communications indefinitely, and with his say-so, can keep them even if they’re known to be entirely domestic communications.

In other words, in speaking to the group of American civilians whose communications probably get the least protections from NSA (aside from the encryption they themselves give it), Alexander suggested their communications would only be captured if they were talking to bad guys. But the NSA defines “those who encrypt their communications” as bad guys by default.

He was trying to suck up to the hackers, even as he lied about the degree to which NSA defines most of them as bad guys.

Brenner gets all upset about his colleagues being “forced” to lie in public. But that’s not what’s going on here: James Clapper and, especially, Keith Alexander are choosing to lie to the public.

And if it is vicious for an intelligence overseer to call IC officials on willful lies to the public, then we’ve got a very basic problem with democracy. Read more

Transpartisan Arguments the Government Won’t Want to Succeed

Justin Amash, Paul Broun, Tulsi Gabbard, Morgan Griffith, Rush Holt, Walter Jones, Barbara Lee, Zoe Lofgren, Thomas Massie, Tom McClintock, Eleanor Holmes Norton, Beto O’Rourke, Steve Pearce, Matt Salmon, Mark Sanford, Ted Yoho.

Well, that’s got to be a group of people the Powers That Be don’t want to see joining together?

Captain Tulsi Gabbard, Physics PhD Rush Holt, Appalachian Trail Hiker Mark Sanford, and Paleocon Walter Jones. With my libertarian Congressman, Justin Amash apparently leading the bunch.

All on a court motion together, calling for the court to release the FISC opinion explaining why the government’s Section 702 collection was unconstitutional because without it they can’t do their job. Which includes, in part, informing the American people.

As important, whatever information Members of Congress learn about secret FISC opinions and orders, they are unable publicly to discuss or debate them because any disclosure is still subject to secrecy requirements.

[snip]

In light of recent disclosures regarding the existence of a “classified intelligence program,” related to the “business records” section of FISA, the Director of National Intelligence has acknowledged that “it is important for the American people to understand” the limits of the program and the principles behind it.

[snip]

Notwithstanding the compelling public interest in an open debate about the scope and propriety of government surveillance programs authorized under FISA, even the amici — Members of the U.S. Congress — cannot meaningfully participate in that public debate so long as this Court’s relevant decisions and interpretations of law remain secret. They cannot engage in public discussion on the floor of the Senate and the House about the government’s surveillance programs. And they cannot engage in dialogue with their constituents on these pressing matters of public importance.

[snip]

Informed, public debate is central to Congress’s role as a coequal branch of the federal government. The Constitution acknowledges the unique importance of open debate to Congress’s role in the Speech or Debate Clause. Debate in Congress serves no only the institution’s internal goal of creating sound public policy. Courts have recognized a second crucial purpose of informed, public debate in Congress: to inform the American people about the issues affecting their government.

Now, I think they may overestimate the degree to which this opinion pertains to the Section 215 collection (indeed, if it pertains to Internet metadata collection, it pertains to Section 214 of PATRIOT instead). [Update, 9/13/13: I’m mistaken here–it was exclusively Section 215.]

And I think their Speech or Debate argument has confused people about whether these members of Congress have seen what’s in the opinion. Holt used to be on the House Intelligence Committee, but no longer is, so I assume none of the Members on this brief know what the opinion is. In any case, the House has much more restrictive rules about who can access intelligence secrets than the Senate.

But I am rather fond of the argument that Congress can’t do its job with all the secrecy the Executive is operating under.

Alberto Gonzales and Internet Data Mining

I was going to leave this speculation well enough alone. But George W Bush decided to interrupt his dog painting to defend Obama’s surveillance dragnet.

Bush also defended the surveillance program, which began during his administration after 9/11, saying the programs guarantee civil liberties are protected.

“I put the program in place to protect the country and one of the certainties is civil liberties were guaranteed,” Bush said.

So here goes.

In his book, Jack Goldsmith describes Alberto Gonzales siding against David Addington in a debate just once, only to have George Bush override the then White House Counsel.

Addington’s hard-line nonaccommodation stance always prevailed when the lawyers met to discuss legal policy issues in Alberto Gonzales’ office. During these meetings, Gonzales himself would sit quietly in his wing chair, occasionally asking questions but mostly listening as the querulous Addington did battle with whomever was seeking to “go soft.” It was Gonzales’ responsibility to determine what to advise the president after the lawyers had kicked the legal policy matters around. But I only knew him to disagree with Addington once, on an issue I cannot discuss, and on that issue the president overruled Gonzales and sided with the Addington position. [my emphasis]

The issue Goldsmith could not discuss could be torture or prisoner transfers or something entirely unknown, but the data mining at the heart of the hospital confrontation is clearly one candidate.

There’s no overt evidence Gonzales tried to do the right thing on the illegal surveillance program. After all, even after Bush agreed to put the program right on March 12, 2004, Gonzales still objected to Goldsmith and Jim Comey’s first advice on the program. After Goldsmith laid out his initial advice on March 15, Gonzales wrote a memo saying,

Your memorandum appears to have been based on a misunderstanding of the President’s expectations regarding the conduct of the Department of Justice. While the President was, and remains, interested in any thoughts the Department of Justice may have on alternative ways to achieve effectively the goals of the activities authorized by the Presidential Authorization of March 11, 2004, the President has addressed definitively for the Executive Branch in the Presidential Authorization the interpretation of the law.

This led Comey to write up his resignation letter on March 16. “[A]lthough I believe this has been one of [DOJ’s] finest hours, we have been unable to right that wrong.” Three days later, Bush modified his March 11 Authorization, directing NSA to stop collecting Internet metadata within a week.

Of course, three months later, the Administration resumed collection of Internet metadata using the FISC PR/TT order. That was within days of Goldsmith’s departure, though he had announced his departure a month earlier and Comey, obviously, stuck around for over a year longer.

So still no evidence the Internet data mining was the issue on which Gonzales tried to stand up to Addington.

But let’s jump ahead to the circumstances of Alberto Gonzales’ resignation in August 2007. At the time, his sudden and confusing resignation was attributed to the multiple scandals embroiling him — chiefly the US Attorney firing scandal, but also Gonzales’ Clapper-like lies about the illegal wiretap program before the Senate a month earlier. But for some reason, Gonzales did not benefit from the kind of sinecure every other former Bush official — even James Comey, who went to Lockheed — enjoyed upon departure, which you would have thought he’d get after lying to protect the President.

Then, a year after Gonzales’ departure, we learned that in the weeks before he resigned, White House Counsel Fred Fielding had narced him out for storing a bunch of Top Secret CYA documents in a briefcase in his closet. Read more

James Clapper’s Double Super Secret Correction

Screen shot 2013-07-01 at 9.21.55 AMIf the Director of National Intelligence corrects a lie but nobody hears it, does it make a sound?

Greg Miller returns focus to James Clapper and Keith Alexander and President Obama’s lies that underscore why, at least for some of his leaks, Edward Snowden must count as a whistleblower. He reveals two new details about why Clapper is not headed for prison.

First, Clapper claims his staffers acknowledged to Wyden (presumably not in writing) his error after the Senator demanded a correction.

Sen. Ron Wyden (D-Ore.), who had asked Clapper the question about information collection on Americans, said in a recent statement that the director had failed to clarify the remark promptly despite being asked to do so. Clapper disputed that in his note to the committee, saying his “staff acknowledged the error to Senator Wyden’s staff soon after the hearing.”

And then, more than two weeks after Snowden proved Clapper to be a liar (and 10 days after Wyden called for hearings for the Intelligence Committee to correct their disinformation), Clapper sent the Senate Intelligence Committee a letter apologizing for his “clearly erroneous” comment.

Acknowledging the “heated controversy” over his remark, Clapper sent a letter to the Senate Intelligence Committee on June 21 saying that he had misunderstood the question he had been asked.

“I have thought long and hard to re-create what went through my mind at the time,” Clapper said in the previously undisclosed letter. “My response was clearly erroneous — for which I apologize.” [my emphasis]

Miller also reveals that Clapper presented yet another explanation for why his lie wasn’t really a lie.

He made a new attempt to explain the exchange in his June 21 correspondence, which included a hand-written note to Wyden saying that an attached letter was addressed to the committee chairman but that he “wanted [Wyden] to see this first.”

Clapper said he thought Wyden was referring to NSA surveillance of e-mail traffic involving overseas targets, not the separate program in which the agency is authorized to collect records of Americans’ phone calls that include the numbers and duration of calls but not individuals’ names or the contents of their calls.

Referring to his appearances before Congress over several decades, Clapper concluded by saying that “mistakes will happen, and when I make one, I correct it.”

Note, this particular lie retreats to Administration claims that they no longer collect Internet metadata, at least no via Section 702 collection, at least as far as they’lll tell us.

Of course, that’s only been true (if it is in fact true) since 2011, for what that’s worth.

One thing Miller is missing in this otherwise laudable article is one more detail from Wyden: that he gave Clapper notice he was going to ask the question.

Clapper got the question for the test before taking it, and he still — he says — misunderstood it.

But of course that’s not what happened. The way Clapper has made false statements in public and then “acknowledged errors” in secret is all part of the game by which Clapper mostly sort of tells the truth to Congress, but continues to lie to the American people.

In other news, it has now been almost a week since, caught in another lie, the NSA took down their “Section 702 Protections” document, without replacing them with an accurate description of what  protections, if any, Americans have under Section 702.

Perhaps NSA has finally decided to start telling the truth?

image_print