The NYPD’s Surveillance of Muslims and Occupy Wall Street Converges

I started my morning reading with this AP Q&A on the significance of their series on the NYPD’s spying on Muslims. There are several things missing: why does the NYPD profile only businesses they believe to be owned by Muslims, and not the American chains at which recent immigrants also congregate? Why doesn’t the Q&A discuss how the NYPD-on-the-Hudson got close to, but missed the two most significant plots of recent years; what does that say about the efficacy of all this spying? And why doesn’t the Q&A discuss the many informants the NYPD has deployed?

That said, the AP does get to the core reason why the NYPD’s program abuses the First Amendment:

Bloomberg and his aides have not addressed, however, why police kept intelligence files on innocuous mosque sermons and plans for peaceful protests. They’ve not explained why police noted which restaurants served “devout” Muslims, why police maintained lists of Muslims who changed their names or why innocent people attending Friday prayer services were photographed and videotaped.

Those activities, many Muslims said, make them feel like they’re under scrutiny just because of their religion.

After reading that Q&A, I then read this NYT article, talking about how the NYPD’s intelligence division–the CIA-on-the-Hudson again–has preemptively arrested some Occupy Wall Street protestors before they engaged in protest.

On Nov. 17, Kira Moyer-Sims was near the Manhattan Bridge, buying coffee while three friends waited nearby in a car. More than a dozen blocks away, protesters gathered for an Occupy Wall Street “day of action,” which organizers had described as an attempt to block the streets around the New York Stock Exchange.

Then, Ms. Moyer-Sims said, about 30 police officers surrounded her and the people in the car.

All four were arrested, said Vik Pawar, a lawyer for Ms. Moyer-Sims and two of the others, and taken to a police facility in the East Village. He said officers strip-searched them and ignored their requests for a lawyer.

These are the same tactics–or worse–as used when the NYPD targeted Muslims planning a peaceful protest of cartoons deemed blasphemous. But most troubling is the last anecdote the NYT reports (which the NYT might have known to contextualize if they had been reporting on the NYPD spying on Muslims). In one case, they NYPD and the FBI are targeting an Occupy activist who, as someone who appears to have changed his name from his birth name, would have been targeted closely under the NYPD program. And they appear to be insinuating a tie with Islamic terrorism.

Mark Adams, a 32-year-old engineer from Virginia, said he was arrested in November at an Occupy Wall Street protest in Midtown and was questioned by a police detective and an agent from the Federal Bureau of Investigation, who asked about his involvement with Occupy Wall Street, requested his e-mail address and inquired whether he had ever been to Yemen or met anyone connected to Al Qaeda.

Mr. Adams, a naturalized United States citizen who was born in Pakistan, said he was arrested during another protest in January and questioned by intelligence division detectives. In that instance, he said, the detectives asked him about specific names and addresses, asked about his work history, education and family, and questioned him about a trip he had made to Ireland.

Mr. Adams said he was disturbed that anyone would consider him a threat because of his ethnicity or political views. “It’s scary,” he said. [my emphasis]

As the AP reported last October, the NYPD conducts extensive checks and keeps records on those within the city who change their names from Arabic or Muslim-sounding names to something Americanized.

The NYPD monitors everyone in the city who changes his or her name, according to internal police documents and interviews. For those whose names sound Arabic or might be from Muslim countries, police run comprehensive background checks that include reviewing travel records, criminal histories, business licenses and immigration documents. Read more

First They Came for Russ Feingold, Then They Came for CATO

As I’ve followed all the really interesting commentary on the Koch Brothers’ efforts to take over Cato (Dave Weigel, Jonathan Adler, Jane Mayer, Brad DeLong) I keep thinking back to this Adam Serwer post last year, pointing out one of the most anti-libertarian moves they made: dumping $25,000 to beat the biggest defender of civil liberties in the Senate.

Another way to put this is that the Kochs will happily put their money behind candidates who agree with their economic agenda but disagree with their social agenda. They will never put their money behind candidates of whom the reverse is true.

The best example of this I can think of is the Senate’s lost liberaltarian Russ Feingold. Feingold was the only senator to vote against the PATRIOT Act. He was one of the first senators to endorse marriage equality. He voted against the war in Iraq, against TARP and financial reform, and has consistently sought to rein in the surveillance state. He was, however, also one of the architects of campaign-finance reform along with John McCain and a supporter of the health-care bill and the stimulus.

When Feingold’s candidacy was in danger, the Koch’s poured their money into the coffers of Feingold’s opponent, Ron Johnson. According to the FEC, the Koch brothers each gave him individual contributions of $2,400, while KochPAC gave him $10,000. Charles Koch’s son Chase Koch gave Johnson $5,800, while David’s* wife Julia Koch gave another $2,400. An Elizabeth Koch from the same zip code in Wichita as Charles and Julia gave an additional $2,400. All in all, the Koch family gave Johnson more than $25,000 to send Russ Feingold home. What type of candidate were they supporting?

Johnson is anti-marriage equality, anti-choice, has no problem with open-ended military engagements and he supports the PATRIOT Act with some caveats, but only because “you have Barack Obama in power versus George Bush. I wasn’t overly concerned with George Bush in power.”

[snip]

In other words, faced with one candidate who shares their views on social issues and national security and another who shares their views on economic issues, the Kochs chose the latter.

Libertarianism, which was fostered to offer ideological cover for laissez faire capitalism, is now being actively replaced by its biggest patrons with a TeaParty ideology that has been co-opted over the last three years to offer populist cover for unrestrained capitalism.

So while I am fascinated by Corey Robin’s critique of Julian Sanchez’ presignation,

When the Kochs wield their money at Cato, that’s hegemony. But when they do it in Wisconsin, that’s democracy.

I think Robin’s comments on this year’s Ron Paul debate among the left is far more important.

Our problem—and again by “our” I mean a left that’s social democratic (or welfare state liberal or economically progressive or whatever the hell you want to call it) and anti-imperial—is that we don’t really have a vigorous national spokesperson for the issues of war and peace, an end to empire, a challenge to Israel, and so forth, that Paul has in fact been articulating.  The source of Paul’s positions on these issues are not the same as ours (again more reason not to give him our support).  But he is talking about these issues, often in surprisingly blunt and challenging terms. Would that we had someone on our side who could make the case against an American empire, or American supremacy, in such a pungent way.

This, it’s clear, is why people like Glenn Greenwald say that Paul’s voice needs to be heard.  Not, Greenwald makes clear, because he supports Paul, but because it is a terrible comment—a shanda for the left—that we don’t have anyone on our side of comparable visibility launching an attack on American imperialism and warfare. (Recalling what I said in the context of the death of Christopher Hitchens, I suspect this has something to do with our normalization and acceptance of war as a way of life.) In other words, we need to listen to Paul, not because he’s worthy of our support, and certainly not because the reasons that underlie his positions on foreign policy are ours, but because he reveals what’s not being said, or not being said enough, on our side.

[snip]

Ron Paul is unacceptable, and it’s unacceptable that we don’t have someone on the left who is raising the issues of imperialism, war and peace, and civil liberties in as visible and forceful a way.

Russ Feingold is gone from the Senate. As of last night, Dennis Kucinich will be gone
from the House next year. For what it’s worth, Ron Paul, too, will be gone from the House. In my own neighborhood, we hope Justin Amash, who hopes to assume Paul’s mantle, is gone from the House too.

There are other voices stepping up. But even Ron Wyden, who is a lonely voice criticizing the Obama Administration’s most egregious civil liberties abuses, offered somewhat tempered criticism of Attorney General Holder’s speech on Monday.

Attorney General Holder’s speech today is a welcome step in the right direction, but further steps need to be taken, and they need to be taken soon.

The government–both Republican and Democratic–has spent billions to create a climate of fear. It has succeeded in leading people to accept the assault on civil liberties without even questioning efficacy, much less constitutionality or abuse.

Meanwhile, even more money is being dumped into a reframed ideology of unrestrained capitalism, one with a populist face unembarrassed by its own inconsistency.

So I’ll go even further than Alex Pareene, who lists all the reasons we should care about the Koch takeover attempt on Cato. There is a case to be made for the Constitution and for executive restraint. We on the left need to get more effective at making it. Because the capitalist case is in the process of being bought out.

How Good Are DOJ’s Reasons for Burying Its Case against Anwar al-Awlaki?

Today’s the day Eric Holder explains how his Department decided it was okay to kill a US citizen with no independent legal review, even while he says we should use civilian courts to, uh, give terrorists due process.

Now, at least as of late January, the Administration still planned not to include any real information about its case against Anwar al-Awlaki in Holder’s speech.

As currently written, the speech makes no overt mention of the Awlaki operation, and reveals none of the intelligence the administration relied on in carrying out his killing.

Since much of the evidence that has been used to implicate Awlaki came from Umar Farouk Abdulmutallab, I’m going to return to a question I first raised several weeks ago, why DOJ sat on the information it got from Abdulmutallab implicating Awlaki so long.

In this post, I considered why DOJ published a narrative explicitly describing Anwar al-Awlaki’s role in Umar Farouk Abdulmutallab’s terror plot last month, rather than when it learned the information from Abdulmutallab sometime in 2010. The reason is likely evidentiary. It appears the government never persuaded Abdulmutallab to testify against Awlaki even while he was implicating Awlaki during “plea negotiations,” meaning it’s unclear Abdulmutallab would have repeated the information implicating Awlaki in court. Note, since that post, Abdulmutallab prosecutor Jonathan Tukel confirmed in court that the UndieBomber was offered–but did not accept–a plea agreement.

In this post, I will consider other reasons why DOJ may have buried (and presumably will continue to bury) their case against Awlaki: a desire to hide its signals intelligence, its informants, as well as a desire to win legal cases.

Read more

According to DOD Inspector General Definition, Bradley Manning Did Not “Leak”

The unclassified version of the DOD Inspector General report on leaks within DOD over the last three years (that is, during the Obama Administration) defines “leak” this way.

Unauthorized disclosure of SCI [Secure Compartmented Information] to the public which is defined as: “A communication or physical transfer of [SCI]information to an unauthorized recipient.” DoDD 5210.50, Section 3.2, “Unauthorized Disclosure of Classified Information to the Public,” dated July 22, 2005. [second bracket original]

A leak is a leak of Secure Compartmented Information, not just classified information.

To be sure, the report’s own insertion of that second bracket makes it clear this definition applies to this report. Congress focused on SCI information when it ordered the IG to do the report in a classified annex of this fiscal year’s Defense Appropriation:

The investigation shall contain the following: an inventory of the leaks of SCI data including those attributed to a “senior administration official” from the past three calendar years; the actions taken to investigation each of the events; which of the investigations were referred to the Department of Justice; and what additional actions were taken after the Department of Justice investigation.

The House Appropriations Committee didn’t require the IG to inventory all classified leaks, just the SCI ones.

Nevertheless, as defined, Bradley Manning’s alleged leaks are classified, not SCI.

Whereas this report shows that people from Obama’s Administration, including at least one senior administration official, have been leaking SCI.

We confirmed with DoD components that some unauthorized disclosures of SCI to the public did occur within DoD between December 23, 2008 and December 23, 2011. Among the unauthorized SCI disclosures to the public reported, a DoD Senior Official was directly attributed as a source of unauthorized SCI disclosures to the public. DoD components also reported that they followed established DoD guidance and procedures for forwarding unauthorized disclosure cases to the Department of Justice for action when appropriate.

Now, again, this report is the unclassified version; I’m sure the report provided more detail in the classified version sent to the Chair and Ranking Member of 10 different committees and subcommittees.

But note what this results paragraph doesn’t say. While it confirms at least one of the leaks from a senior administration official was unauthorized, it only cataloged the unauthorized leaks, suggesting there may be more SCI leaks that were authorized (consider, for example, the leaks of a range of compartment names to Bob Woodward, which John Rizzo suggested were part of “one big authorized disclosure,” or reported cooperation between DOD and CIA and Hollywood on the movie about Osama bin Laden’s killing, itself the subject of a different investigation).

Further, while Congress mandated the IG do so, this unclassified report does not explain what happened to these SCI leak referrals at DOJ. Has DOJ been pursuing the SCI leaks by senior administration officials as diligently as it has pursued people like Thomas Drake, who was charged with retaining information, much of it of disputed classification?

One thing’s clear: whether to make political hay or out of genuine concern about the Administration leaks, Congress is honing in on how many of these leaks were authorized and whether DOJ investigated the unauthorized ones. Granted, the most interesting results here remain classified (let’s see whether the 10 committees and subcommittees can withstand the temptation of leaking a classified report on leaking).

But it does begin to show that the Administration that has accused more leakers of “espionage” than all others combined itself leaks far more sensitive information.

(h/t Steven Aftergood who first reported on the IG Report)

Djibouti’s Cable News

Remember back in 2008, when a mysterious cluster of intercontinental cables were cut, knocking parts of the Middle East and South Asia (notably Egypt and Pakistan) off telecom networks?

Well, we’ve got another cluster of cut cables again, this time off of Djibouti, where one of our currently most critical bases is (we operate into Yemen and Somalia from there).

Undersea data cables linking East Africa to the Middle East and Europe were severed in two separate shipping accidents this month, causing telecommunications outages in at least nine countries and affecting millions of Internet and phone users, telecom executives and government officials said.

A ship dragging its anchor off the coast of the Kenyan port city of Mombasa severed a crucial Internet and phone link for the region Saturday, crippling electronic communications from Zimbabwe to Djibouti, according to a public-private consortium that owns the undersea cable.

The Indian Ocean fiber-optic cable, known as The East African Marine Systems, or Teams, is owned by a group of telecom companies and the Kenyan government. It was the fourth cable to be severed in the region since Feb. 17.

The Teams cable had been rerouting data from three other cables severed 10 days ago in the Red Sea between Djibouti and the Middle East. Together, the four fiber-optic cables channel thousands of gigabytes of information per second and form the backbone of East Africa’s telecom infrastructure.

There are, undoubtedly, a number of interesting conversations that would be transiting those telecom lines, not least those between AQAP and al-Shabaab. Not to mention the conversations within East Africa.

But those conversations won’t be traveling by most easily accessible telecommunication channels, at least not until those cables are restored.

And while we’re discussing Internet cables, note that these Djibouti cables, like those off of Egypt that were taken out in 2008, do not appear on State’s cable–classified just Secret–of critical infrastructure around the globe.

 

Jeh Johnson on the “Military’s Domestic Legal Authority”

In addition to suggesting that the 16 year old American citizen Abdulrahman al-Awlaki was a legitimate military target, Jeh Johnson spoke yesterday about the “military’s domestic legal authority.” Now, rest assured, Johnson said the Administration does not rely on aggressive interpretations of such authority.

Against an unconventional enemy that observes no borders and does not play by the rules, we must guard against aggressive interpretations of our authorities that will discredit our efforts, provoke controversy and invite challenge.

He acknowledges that posse comitatus requires express authorization from Congress before extending the reach of the military onto US soil.

As I told the Heritage Foundation last October, over-reaching with military power can result in national security setbacks, not gains.  Particularly when we attempt to extend the reach of the military on to U.S. soil, the courts resist, consistent with our core values and our American heritage – reflected, no less, in places such as the Declaration of Independence, the Federalist Papers, the Third Amendment, and in the 1878 federal criminal statute, still on the books today, which prohibits willfully using the military as a posse comitatus unless expressly authorized by Congress or the Constitution. [my emphasis]

Then he proceeds directly from describing the express authorization required from Congress to a discussion of the AUMF–as the basis for the “military’s domestic legal authority.”

Second: in the conflict against al Qaeda and associated forces, the bedrock of the military’s domestic legal authority continues to be the Authorization for the Use of Military Force passed by the Congress one week after 9/11.[2]  “The AUMF,” as it is often called, is Congress’ authorization to the President to:

use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.

Ten years later, the AUMF remains on the books, and it is still a viable authorization today. [my emphasis]

Then Johnson describes how the Administration–with no express authority from Congress until the NDAA–stretched an authorization limited to those people and groups with ties to 9/11 to include those “associated with” such groups. And, again with no express authorization from Congress, expanded it to include those who “engaged in hostilities” with coalition partners.

In the detention context, we in the Obama Administration have interpreted this authority to include:

those persons who were part of, or substantially supported, Taliban or al-Qaeda forces or associated forces that are engaged in hostilities against the United States or its coalition partners.[3]

This interpretation of our statutory authority has been adopted by the courts in the habeas cases brought by Guantanamo detainees,[4] and in 2011 Congress joined the Executive and Judicial branches of government in embracing this interpretation when it codified it almost word-for-word in Section 1021 of this year’s National Defense Authorization Act, 10 years after enactment of the original AUMF.[5]  (A point worth noting here: contrary to some reports, neither Section 1021 nor any other detainee-related provision in this year’s Defense Authorization Act creates or expands upon the authority for the military to detain a U.S. citizen.)

Johnson doesn’t mention, of course, that the government is using the same interpretation to extend the military’s domestic legal authority to non-detention areas. Those applications are secret, you see.

Note, in this passage, how Johnson gracefully re-specifies that he’s talking about the 2001 AUMF, and not the 2002 AUMF, which also remains in effect?

But, the AUMF, the statutory authorization from 2001, is not open-ended.  It does not authorize military force against anyone the Executive labels a “terrorist.”  Rather, it encompasses only those groups or people with a link to the terrorist attacks on 9/11, or associated forces.

That’s important because the government at least used to–and presumably still does (otherwise they wouldn’t have panicked when Congress considered repealing the AUMF authorizing a war that is supposed to be over)–rely on the Iraq AUMF to target “anyone the Executive labels a ‘terrorist.'”

Given that the Iraq AUMF has been used to go beyond the definitions in the 2001 AUMF, I’ll skip the paragraphs were Johnson talks about how narrow the government’s interpretation of “associated forces” is.

Particularly because this paragraph is my very favorite bit in this entirely disingenuous speech.

Third: there is nothing in the wording of the 2001 AUMF or its legislative history that restricts this statutory authority to the “hot” battlefields of Afghanistan.  Afghanistan was plainly the focus when the authorization was enacted in September 2001, but the AUMF authorized the use of necessary and appropriate force against the organizations and persons connected to the September 11th attacks – al Qaeda and the Taliban — without a geographic limitation.

Pretty comprehensive, huh, Jeh? Neither the wording of the AUMF or the legislative history limits the AUMF, right?

Read more

Will SCOTUS Invent a “Database-and-Mining” Exception to the Fourth Amendment?

As I noted yesterday, the Administration appealed the 2nd Circuit Decision granting review of the FISA Amendments Act to the Supreme Court last week. I wanted to talk about their argument in more detail here.

Over at Lawfare, Steve Vladeck noted that this case would likely decide whether and what the “foreign intelligence surveillance” exception to the Fourth Amendment, akin to “special needs” exceptions like border searches and drug testing.

Third, if the Court affirms (or denies certiorari), this case could very well finally settle the question whether the Fourth Amendment’s Warrant Clause includes a “foreign intelligence surveillance exception,” as the FISA Court of Review held in the In re Directives decision in 2008. That’s because on the merits, 50 U.S.C. § 1881a(b)(5) mandates that the authorized surveillance “shall be conducted in a manner consistent with the fourth amendment to the Constitution of the United States.” Thus, although it is hard to see how surveillance under § 1881a could violate the Fourth Amendment, explication of the (as yet unclear) Fourth Amendment principles that govern in such cases would necessarily circumscribe the government’s authority under this provision going forward (especially if In re Directives is not followed…).

I would go further and say that this case will determine whether there is what I’ll call a database-and-mining exception allowing the government to collect domestic data to which no reasonable suspicion attaches, store it, data mine it, and based on the results of that data mining use the data itself to establish cause for further surveillance. Thus, it will have an impact not just for this warrantless wiretapping application, but also for things like Secret PATRIOT, in which the government is collecting US person geolocation data in an effort to be able to pinpoint the locations of alleged terrorists, not to mention the more general databases collecting things like who buys hydrogen peroxide.

I make a distinction between foreign intelligence surveillance and “database-and-mining” exceptions because the government is, in fact, conducting domestic surveillance under these programs and using it to collect intelligence on US persons (indeed, when asked about Secret PATRIOT earlier this month, James Clapper invoked “foreign or domestic” intelligence in the context of Secret PATRIOT). The government has managed to hide that fact thus far by blatantly misleading the FISA Court of Review in In re Directives and doing so (to a lesser degree) here.

In In re Directives, the government misled the court in two ways. First, according to Russ Feingold, the government didn’t reveal (and the company challenging the order didn’t have access to) information about how the targeting is used. The amendments he tried to pass–and which Mike McConnell and Michael Mukasey issued veto threats in response to–suggest some of the problems Feingold foresaw and the intelligence community refused to fix: reverse targeting, inclusion of US person data in larger data mining samples, and the retention and use of improperly collected information.

The government even more blatantly misled the FISCR with regards to what it did with US person data.

The petitioner’s concern with incidental collections is overblown. It is settled beyond peradventure that incidental collections occurring as a result of constitutionally permissible acquisitions to not render those acquisitions unlawful.9 [citations omitted] The government assures us that it does not maintain a database of incidentally collected information from non-targeted United States persons, and there is no evidence to the contrary. On these facts, incidentally collected communications of non-targeted United States persons do not violate the Fourth Amendment.

9 The petitioner has not charged that the Executive Branch is surveilling overseas persons in order intentionally to surveil persons in the United States. Because the issue is not before us, we do not pass on the legitimacy vel non of such a practice.

The notion that the government doesn’t have this US person data in a database is farcical at this point, as the graphic above showing the relative size of the NSA’s data center in UT–which I snipped from this larger ACLU graphic–makes clear (though the government’s unwillingness to be legally bound to segregate US person data made that clear, as well). Read more

Bill Keller Blames Leak Arrests that Preceded WikiLeaks on WikiLeaks

Bill Keller has another narcissistic column attacking Julian Assange. The whole thing is rubbish not worth your time, but I did want to unpack the complaint with which Keller ends his column.

“A lot of attention has been focused on WikiLeaks and its colorful proprietors,” Aftergood told me. “But the real action, it turns out, is not at the publisher level; it’s at the source level. And there aren’t a lot of sources as prolific or as reckless as Bradley Manning allegedly was.”

For good reason. The Obama administration has been much more aggressive than its predecessors in pursuing and punishing leakers. The latest case, the arrest last month of John Kiriakou, a former C.I.A. terrorist-hunter accused of telling journalists the names of colleagues who participated in the waterboarding of Qaeda suspects, is symptomatic of the crackdown. It is this administration’s sixth criminal case against an official for confiding to the media, more than all previous presidents combined. The message is chilling for those entrusted with keeping legitimate secrets and for whistleblowers or officials who want the public to understand how our national security is or is not protected.

Here’s the paradox the documentaries have overlooked so far: The most palpable legacy of the WikiLeaks campaign for transparency is that the U.S. government is more secretive than ever. [my emphasis]

The Obama Administration has charged 6 people with some kind of espionage charge for leaking:

  • Thomas Drake was indicted on April 10, 2010, just days after the release of the Collateral Murder video and before Bradley Manning first contacted Adrian Lamo; he was charged for purported leaks going back to February 2006
  • Shamai Leibowitz was first investigated in mid-2009, before Manning leaked anything to WikiLeaks; he was charged on December 4, 2009 and sentenced on May 24, 2010, the day the government was first learning about Lamo’s conversations with Manning
  • Stephen Jin-Woo Kim was indicted on August 19, 2010, around the time DOD first started trying to figure out what Manning allegedly sent to WikiLeaks; he is alleged to have leaked in June 2009
  • Manning was arrested on May 29, 2010 and will be formally charged this week for leaks allegedly starting in November 2009
  • Jeffrey Sterling was indicted on December 22, 2010, around the time the government was trying to pressure Manning into testifying about Assange; his leaks allegedly started in 2001
  • John Kiriakou was charged on January 23, 2012 for leaks dating back to 2007

All the non-WikiLeaks leaks allegedly took place before Manning’s. All were formally charged before Manning, and all but two men were arrested before Manning.

And yet Bill Keller, in a demonstration of his typical reporting skill though not Newtonian physics, suggests that WikiLeaks caused the crackdown on leaks.

Read more

The Government Doesn’t Want to Talk about Collecting Domestic Communications under FAA

On Friday, the government appealed the 2nd Circuit’s decision that Amnesty International and other NGOs and individuals have standing to challenge the FISA Amendments Act. I’ll have a post on the implications of their substantive argument shortly. But in the meantime, I wanted to note what they’re not even addressing.

The image to the left is a fragment of the government’s references to statutes and regulation mentioned in its brief; it’s the part of the list referring to the part of the FAA in question. As you can see, it almost–but not quite–lists every clause of the law.

One clause notably missing from the almost-sequential list above is 1881a(b)(4), which reads,

[An acquisition authorized under subsection (a)] may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States;

And while it mentions clauses that refer back to this restriction (for example, 1881a(c)(1), 1881a(d), 1881a(g)(2)(A)(i), etc), it never goes back and includes this language–the requirement that the government not intentionally acquire communications that are located entirely within the US–in its argument. (There are other clauses the brief ignores, a number of which pertain to oversight of the certifications the government has made; I may return to these at a future time.)

Or, to put it another way, the government never admits that the FAA permits the purportedly unintentional collection of entirely domestic communication.

And yet that is a part of this lawsuit. The original complaint in this suit invoked this clause:

An acquisition under section 702(a) may not … “intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States

[snip]

Moreover, the Attorney General and the DNI may acquire purely domestic communications as long as there is uncertainly about the location of one party to the communications.

And the 2nd Circuit opinion (authored by Gerard Lynch) referenced this clause:

“Targeting procedures” are procedures designed to ensure that an authorized acquisition is “limited to targeting persons reasonably believed to be located outside the United States,” and is designed to “prevent the intentional acquisition of any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States.”

[snip]

In addition, the certification must attest that the surveillance complies with statutory limitations providing that it:

[snip]

(4) may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States;

[snip]

Under the FAA, in contrast to the preexisting FISA scheme, the FISC may not monitor compliance with the targeting and minimization procedures on an ongoing basis. Instead, that duty falls to the AG and DNI, who must submit their assessments to the FISC, as well as the congressional intelligence committees and the Senate and House Judiciary Committees.

[snip]

But the government has not asserted, and the statute does not clearly state, that the FISC may rely on these assessments to revoke earlier surveillance authorizations.

Now, to some degree, the government might argue it ignored the clause prohibiting intentional–but not accidental–targeting of domestic communications because the plaintiffs’ primary basis for establishing standing is their frequent communication with likely targets overseas. As I’ll show, the government wants to make this case about a particular definition of a target, and key to that argument is a claim that it is impossible for the plaintiffs to be targets.

Yet therein lies one of the key problems with their argument, given that 1881a(b)(4) only prohibits the plaintiffs from being intentional targets; the FAA very pointedly did not prohibit the government from keeping US person information it “unintentionally” collected. In fact, Mike McConnell and Michael Mukasey started issuing veto threats when Russ Feingold tried to restrict the ongoing use of domestic communications identified as such after the fact.

Finally, in the one case that approved this kind of collection (though under the Protect America Act, not the FAA) used targeting procedures to substitute for particularity required under the Fourth Amendment. Under PAA, those procedures were not mapped out by law; under FAA they are, partly in the clause the government wants to ignore.

And yet, remarkably, the government doesn’t want that clause to be part of its discussion with SCOTUS. Seeing as how even the FISA Court of Review finds that substitute for particularity–the targeting procedures–to be a key part of compliance with the Fourth Amendment, you’d think that would be relevant.

DOJ’s Untracked Email Spying

As Wired reports, DOJ blew off the requirement that it tell Congress how many pen registers and trap and trace devices they used for the entire Bush Administration.

[…]the Justice Department was not following the law and had not provided Congress with the material at least for years 2004 to 2008. On the flip side, Congress was not exercising its watchdog role, thus enabling the Justice Department to skirt any oversight whatsoever on an increasingly used surveillance method that does not require court warrants, according to Justice Department documents obtained via the Freedom of Information Act.

But just as interesting as DOJ’s failure to follow the law on disclosing these surveillance tools are two details from the emails Chris Soghoian liberated to make all this clear.

First, note the December 23, 2009 email from Janet Webb (on PDF 4) revealing that DOJ’s agencies weren’t tracking email pen registers (that is, lists of who was emailing each other), and one of them–they speculate DEA–still wasn’t in 2009.

FBI only began keeping computer intercept stats a couple of years ago. The other agency may be DEA.

From which we might assume DEA is engaging in a ton of email tracking they don’t want to tell anyone about?

Wired suggests why they may not be tracking such information.

Another feature of [the Electronic Communication Privacy Act] had once protected Americans’ electronic communications from the government’s prying eyes, but it has become so woefully outdated that it now grants the authorities nearly carte blanche powers to obtain Americans’ e-mail stored in the cloud, such as in Gmail or Hotmail — without a court warrant.

That is, we probably should assume these email numbers are so small–and DEA isn’t tracking them at all–because they’re just taking them, with no court oversight at all.

The other detail to remember about these reports is they include only criminal surveillance, not intelligence surveillance. Russ Feingold staffer Lara Flint makes that clear in her request, and DOJ staffer Mark Agrast makes it clear in his response. They’re getting that information via other means, presumably NSLs or Section 215.

So while they’re hiding a lot of the cloud computer spying they’re doing in the name of criminal investigations, that doesn’t even scratch the surface of the degree to which they’re tracking who emails whom.

image_print