DOD Considers Illegal Data Mining Part of Capital Crime

I’ve written two posts on the software that Bradley Manning is alleged to have loaded onto SIPRNet (here, here). Wired has now gotten a little more detail about what the software was: DOD says it was some kind of data mining software, though they won’t say of what kind. Wired goes on to suggest that presence of the software may make it easier for DOD to prove intent with Manning (though I rather suspect the idea is to prove collaboration with WikiLeaks personnel; furthermore, Wired’s tie of the data mining software to Manning’s alleged illegal access of the State cables has one problem–that he probably couldn’t access such things after he got demoted).

But the entire time I read the following passages, I couldn’t help but think of the illegal data mining DOD’s component, NSA, conducted on American citizens in 2004 even after Congress had specifically defunded such activities.

Accused WikiLeaks source Pfc. Bradley Manning installed and used unauthorized “data-mining software” on his SIPRnet workstation during the time he allegedly siphoned hundreds of thousands of documents off that classified network, the Army said Friday in response to inquiries from Threat Level.

Manning’s use of unauthorized software was the basis of two allegations filed against him this year in his pending court martial, but the charge sheet listing those allegations was silent on the nature of that software.

On Friday, an Army spokeswoman clarified the charges. “The allegations … refer to data-mining software,” spokeswoman Shaunteh Kelly wrote in an e-mail. “Identifying at this point the specific software program used may potentially compromise the ongoing criminal investigation.”

[snip]

If Manning installed data-mining software on his SIPRnet workstation, that could potentially strengthen the government’s case against the alleged leaker.

After all, Wired at least suggests data mining is proof of guilt. Yet the agency that may be crafting such arguments not only violated privacy laws for years, but continued to data mine Americans for months after Congress had specifically prohibited funding from being used for such things. And DOD now wants to prosecute the person it alleges engaged in such illegal data mining with a capital crime.

Maybe the whole thing would be more credible if our government hadn’t become such a criminal itself?

Share this entry

Putting “Really Mushy” Functions in a Department that Refuses to Be Audited

Noah Shachtman points to NextGov’s unsuccessful attempt to define how much DOD plans to spend on cybersecurity next year. DOD or its components have offered three different versions:

  • DOD’s mid-February report it would spend $2.3 billion
  • Air Force’s mid-February report it, by itself, would spend $4.6 billion
  • DOD’s March 23 revised report it would spend $3.2 billion

Part of the problem, as Shachtman explains in the NextGov piece, is that the definition of what counts as cybersecurity is not yet well defined.

“All of this stuff is still really mushy,” Shachtman said. Further obscuring visibility into the budget is the fact that some cybersecurity funding is classified at Defense components such as the NSA. Meanwhile, Cyber Command presents a new spending variable, he noted.

“Exactly where the NSA ends and the Cyber Command ends is a very open question,” Shachtman said. “How the Cyber Command is supposed to interact with the services is still being worked out.” He predicted it will take years to untangle the process of budgeting for federal computer security.

While you’re trying to get your head around how the Air Force has a bigger budget than the whole DOD for cybersecurity, remember a couple of things.

First, both the Air Force and DOD generally have stated policies of not telling Congress about Special Access Programs (in the case of Air Force) or clandestine cyberops. So to the extent that this mushy budget is mixed in with cyberops (as distinct from cybersecurity), there’s a decent chance Congress isn’t seeing all of it.

But even if Congress decided to look, to the extent that NSA (or CyberCommand, which General Keith Alexander also commands) has a hand in it, Congress is almost guaranteed to be unable to track it closely. That’s because NSA books can’t be audited and apparently NSA doesn’t intend to fix those problems.

Now all of would be pretty funny except that, insofar as the government can’t distinguish between legitimate cybersecurity (you know, preventing hackers and leakers from using thumb drives to upload malware and download entire databases) and cyberwar financially, there’s a decent chance they can’t do so organizationally either.

Or to put it in more tangible terms, HB Gary’s past governmental work has been about cybersecurity–assessing malware and finding intrusions. But they’ve been proposing collecting information about citizens’ First Amendment activity to use to target those citizens. And the Air Force–that entity with a cybersecurity budget bigger than all of DOD’s cybersecurity budget–is the service that was engaging cybersecurity firms to develop persona management software.

But aside from that, why should we be worried that such dangerous entities are organizationally such a clusterfuck?

Share this entry

How the “Most Transparent Administration Ever” Worsens Transparency with Transparency Effort

The Director of National Intelligence has floated a “shockingly bad” proposal on how much review GAO will be permitted within the intelligence community. According to Steven Aftergood, because the proposal defines the intelligence community broadly, it might result in the loss of GAO review in agencies like DOD and State.

The Director of National Intelligence has prepared a draft intelligence directive on access by the Government Accountability Office (GAO) to intelligence information, but it is “shockingly bad,” a congressional official said.

[snip]

The first draft of the new directive is said to reserve maximum discretion to the DNI, and to offer little practical assurance that GAO will get access to the information it needs.So, for example, the definition of intelligence information that may be withheld from GAO extends broadly to law enforcement, military and intelligence information related to national security.  GAO access is to be denied whenever it concerns information regarding “intelligence budgets or funding, or personnel information that… may reveal intelligence strategy, capabilities, or operations.”

“In other words, GAO cannot look at anything that involves money or people,” the congressional official told Secrecy News.  “Combine that with the sweeping, open-ended definition of intelligence and large chunks of the federal government suddenly vanish from [GAO] oversight– DOD, FBI, DHS, State Department, etc.”

Aftergood points out what I did several weeks ago: the intelligence agencies generally (with the exception of NRO), and NSA in particular, have completely ineffective accounting systems.

But when the Committee looked at NSA’s books in 2009, they were still a complete clusterfuck.

The NSA‘s annual financial report was the exception, in that it showed no apparent improvement. In particular, the Committee was concerned about the failed implementation of NSA‘s new financial system. An NSA Inspector General report found that this system was put into operation before it was adequately tested and that operators were not properly trained to use it. The NSA also made $7 million in duplicative invoice payments, and the agency could not successfully reconcile its financial books at the end of fiscal year 2008. Further, a July 2008 Army Finance Command report, referenced by the NSA IG, found that the NSA‘s accounting system was in violation of public laws, Treasury Department financial manuals, and DoD regulations, and was inconsistent with the Federal Managers Financial Integrity Act.

After SSCI cracked heads, the NSA claimed it had fixed the problems in June 2009. Only they hadn’t.

Share this entry

In Re Sealed Case and the Goldsmith Memo

In addition to what I laid out here, comparing the 2006 White Paper with the May 6, 2004 Goldsmith memo on the warrantless wiretap program made me realize that the White Paper relies more frequently on In re: Sealed Case than Goldsmith does, at least in the unredacted portions. By my count, the White Paper refers to In re Sealed Case 9 times, whereas Goldsmith refers to it just 3 times (see pages 34, 47, 48; though technically one citation includes three quotes from it).

So I wanted to see why that might be–and what it might say about the program generally and the redacted sections of Goldsmith’s memo.

In Re Sealed Case: How Did the Patriot Act Change the “Wall” between Criminal and Intelligence Investigations?

In the PATRIOT Act, Congress expanded the limit on how the information sought in a FISA warrant could be used. It had required that foreign intelligence be the primary purpose of collection; in an attempt to break down the wall between criminal and intelligence investigations, PATRIOT allowed that foreign intelligence only be a “significant” purpose of the collection. In response to that change, Attorney General Ashcroft issued a memo finding that meant law enforcement could be the primary purpose of such collection and holding that criminal prosecutors could consult on the terms of the wiretaps to be used.

The FISA Court, noting that the FBI had misrepresented its goals in FISA collection in a number of recent instances (but citing only those from before 9/11) invoked its role in ensuring FISA collection meet certain minimization guidelines. It ruled that the government had to keep the Office of Intelligence and Policy Review in the loop in conversations between criminal and intelligence personnel, and criminal personnel could not direct wiretaps.

The FISA Court of Review reversed that decision, finding that the two functions were so intertwined as to permit the involvement of criminal personnel in planning wiretaps.

But its ruling also considered whether the change–allowing the government to use FISA to investigate “intelligence crimes”–was Constitutional under the Fourth Amendment. That discussion, while somewhat inconclusive, lays out some guidelines for what might be a reasonable search for a foreign intelligence purpose. It’s that discussion that provides ripe material for Goldsmith’s and the White Paper’s project of trying to claim the warrantless wiretap program was legal. But also, likely, caused big problems for the warrantless program as well.

The In Re Sealed Case Citations

Here’s how the unredacted parts of Goldsmith and the White Paper rely on In re Sealed Case.

Proof that “the wall” was a problem independent of 9/11

In attempts to dismiss the argument that the modifications Congress made to FISA after 9/11 prove Congress still intended the Administration to rely on its, both papers point to the discussion in In re Sealed Case about the problem of a “wall” between criminal investigations and intelligence. (Goldsmith 34, White Paper 28fn)

A claim that the opinion treats foreign wiretapping as an inherent authority

In a discussion of the President’s inherent authority to conduct warrantless searches of foreign intelligence, both papers cite In re Sealed Case on past Circuit discussions of the President’s power to use warrantless wiretaps to obtain foreign intelligence. Goldsmith does so in one discussion.

The Foreign Intelligence Surveillance Court of Review recently noted that all courts to have addressed the issue have “held that the President did have inherent authority to conduct warrantless searches to obtain foreign intelligence information.” In re Sealed Case, 310 F 3rd 717, 742 (Foreign Intel. Surv. Ct. or Rev. 2002). On the basis of that unbroken line of precedent, the Court “[took] for granted that the President does have that authority,” and concluded that, “assuming that is so, FISA could not encroach on the President’s constitutional power.” (Goldsmith 48)

The White Paper cites the first quote on page 31 and again on 37, the second on page 8, and the third on page 35.

In addition to the general use of In re Sealed Case to argue inherent authority, there’s a footnote in In re Sealed Case that dismisses concerns Laurence Silberman raised during the original debate on FISA about the non-adversary process laid out in it; Goldsmith noted that footnote did not extend to Silberman’s larger complaints about inherent power. (Goldsmith 47fn)

Discussion of how “special needs” would permit the use of FISA for criminal wiretaps

The White Paper, unlike Goldsmith in his unredacted discussion of times when “special needs” allow the government to avoid a warrant, relies on In re Sealed Case’s discussion on the topic. The White Paper  includes this quote:

One important factor in establishing “special needs” is whether the Government is responding to an emergency that goes

beyond the need for general crime control. See In re Sealed Case, 310 F.3d at 745-46. (page 38)

It repeats that very reference later on the same page.

In re Sealed Case, 310 F.3d at 745-46 (noting that suspicionless searches and seizures in one sense are a greater encroachment on privacy than electronic surveillance under FISA because they are not based on any particular suspicion, but “[o]n the other hand, wiretapping is a good deal more intrusive than an automobile stop accompanied by

questioning”).

It cites the same passage again, claiming the FISCR had concluded that that passage held that foreign intelligence fit the definition of special needs.

And then borrows from what it claims the FISCR concluded.

As explained by the Foreign Intelligence Surveillance Court of Review, the nature of the “emergency” posed by al Qaeda “takes the matter out of the realm of ordinary crime control.” In re Sealed Case, 310 F.3d at 746. (page 39)

In other words, the unredacted sections of Goldsmith do not rely on In re Sealed Case to claim warrantless wiretapping qualifies as a special need, whereas the White Paper does. Mind you, he does discuss special needs and his discussion covers most of the same cases as the White Paper–notably on page page 39 and to some degree on 105. But he doesn’t cite FISCR.

“The Government … Has Affirmatively Argued that FISA Is Constitutional”

Now, obviously, we can only compare the unredacted parts of Goldsmith’s memo with what the White Paper uses. And there are definitely places in his memo where it appears likely that he discussed In re Sealed Case in currently redacted passage.

For example, two pages following Goldsmith’s use of In re Sealed Case to claim FISCR had endorsed warrantless wiretapping as part of the President’s inherent authority are redacted.

I’m guessing that Goldsmith might have felt obliged to address this part of In re Sealed Case:

The government, recognizing the Fourth Amendment’s shadow effect on the FISA court’s opinion, has affirmatively argued that FISA is constitutional.

Read more

Share this entry

Are 95% of People Investigated Under New FBI Guidelines Innocent, but Entered into Database?

The NYT liberated the specific answer to a question that Russ Feingold asked in March 2009, but which DOJ didn’t respond to until November 2010, when Feingold was a lame duck Senator. At issue were new investigative guidelines Attorney General Michael Mukasey issued in late 2008, on his way out the door, which allowed the FBI to investigate Americans for First Amendment reasons so long as that First Amendment reason was not the only reason they were being investigated.

Here’s how the ACLU described the new guidelines:

Under the new “assessment” authority, FBI agents can investigate anyone they choose, so long as they claim they are acting to prevent crime, protect national security, or collect foreign intelligence, with absolutely no requirement of a factual connection between their authorizing purpose and the conduct of the individuals they are investigating. FBI agents can start “assessments” without any supervisory approval, and without reporting to FBI headquarters or the Department of Justice. The Guidelines do not require the FBI to keep records regarding when “assessments” are opened or closed and “assessments” have no time limitation. The FBI can even start an “assessment” of you simply to determine if you would make a good FBI informant. Innocence no longer protects ordinary Americans from being subjected to a wide range of intrusive investigative techniques. The techniques include:

  • collecting information from online sources, including commercial databases.
  • recruiting and tasking informants to gather information about you.
  • using FBI agents to surreptitiously gather information from you or your friends and neighbors without revealing their true identity or true purpose for asking questions.
  • having FBI agents follow you day and night for as long as they want.

So in response to Feingold’s questions about how many assessments had been initiated and closed, FBI responded:

The FBI has initiated 11,667 Type 1 and Type 2 assessments, 3,062 of which are ongoing. 427 preliminary and full investigations have been opened based upon information developed in these Type 1 and Type 2 assessments. 480 Type 3, 4, 5, and 6 assessments have been initiated, of which 422 remain open.

To do the math, 95% of the Type 1 and 2 assessments that have been closed have resulted in no further investigation, suggesting the FBI was on a wild goose hunt.

But here’s the tricky thing: the FBI records on those people can be entered into FBI’s investigative databases!

Even if information obtained during an assessment does not warrant opening a predicated investigation, the FBI may retain personally identifying information for criminal and national security purposes. In this context, the information may eventually serve a variety of valid analytic purposes as pieces of the overall criminal or intelligence picture are developed to detect and disrupt criminal and terrorist activities. In addition, such information may assist FBI personnel in responding to questions that may subsequently arise as to the nature and extent of the assessment and its results, whether positive or negative. Furthermore, retention of such information about an individual collected in the course of an assessment will alert other Divisions or Field Offices considering conducting an assessment on the same individual that the particular individual is not a criminal or national security threat. As such, retaining personally identifying information collected in the course of an assessment will also serve to conserve resources and prevent the initiation of unnecessary assessments and other investigative activities.

So that says the FBI may be entering those 95% innocent people into a database with personally identifiable information.

Now, to be fair, FBI also mandates that these personally identifying information contain a warning that the person “does not warrant further FBI investigation at this time.”

As a result: (i) when records retained in an assessment specifically identify an individual or group whose possible involvement in criminal or national security threatening activity was checked out through the assessment; and (ii) the assessment turns up no sufficient basis to justify further investigation of the individual or group, then the records must be clearly annotated as follows: “It is noted that the individual or group identified during the assessment does not warrant further FBI investigation at this time. It is recommended that this assessment be closed.”

And, as Charlie Savage notes, the numbers FBI gave Feingold may not be all that accurate.

Some aspects of the statistics are hazy, officials cautioned.

Read more

Share this entry

In 2004, the White House Considered FISA’s Exclusivity Provision to Be Top Secret

As I have noted before, there are a number of paragraphs in the May 6, 2004 Goldsmith memo authorizing warrantless wiretapping that appear to be badly overclassified. Not only were many of the same paragraphs printed, almost verbatim, in unclassified fashion, in the White Paper released in January 2006. But many of those paragraphs contain nothing more than discussions of published statute.

Now, I hope to do a follow-up to this post on whether I’m right about this overclassification. But thus far, in asking around, no one outside of government has been able to see the logic behind the classification markings on some of these paragraphs, and the people who should know were unable to explain it.

The Overclassification of the March 13, 2003 Torture Memo

Now, I’m not just talking outtamyarse about the possibility that this is overclassified; the Bush Administration has a history of improper classification. It was a particular issue with the March 14, 2003 Yoo DOD Torture Memo. Here’s how former head of Information Security Oversight Office Bill Leonard described the classification of the memo at Russ Feingold’s 2008 secret law hearing:

The March 14, 2003, memorandum on interrogation of enemy combatants was written by DoJ’s Office of Legal Counsel (OLC) to the General Counsel of the DoD. By virtue of the memorandum’s classification markings, the American people were initially denied access to it. Only after the document was declassified were my fellow citizens and I able to review it for the first time. Upon doing so, I was profoundly disappointed because this memorandum represents one of the worst abuses of the classification process that I had seen during my career, including the past five years when I had the authority to access more classified information than almost any other person in the Executive branch. The memorandum is purely a legal analysis – it is not operational in nature. Its author was quoted as describing it as “near boilerplate.”! To learn that such a document was classified had the same effect on me as waking up one morning and learning that after all these years, there is a “secret” Article to the Constitution that the American people do not even know about.

Here are Leonard’s specific complaints about the memo:

In this instance, the OLC memo did not contain the identity of the official who designated this information as classified in the first instance, even though this is a fundamental requirement of the President’s classification system. In addition, the memo contained neither declassification instructions nor a concise reason for classification, likewise basic requirements. Equally disturbing, the official who designated this memo as classified did not fulfill the clear requirement to indicate which portions are classified and which portions are unclassified, leading the reader to question whether this official truly believes a discussion of patently unclassified issues such as the President’s Commander-in-Chief authorities or a discussion of the applicability to enemy combatants of the Fifth or Eighth Amendment would cause identifiable harm to our national security. Furthermore, it is exceedingly irregular that this memorandum was declassified by DoD even though it was written, and presumably classified, by DoJ.

Mind you, the Goldsmith memo is not as bad as the March 2003 memo. As we’ll see, every single paragraph includes a classification mark (though I believe some–if not many–of those are specious). But like the March 2003 memo, this one does not describe who classified it, when it could be declassified, nor a reason for declassification. And as I explained, the people who should be able to offer an explanation (like DOJ) are unable to.

When Feingold asked about the improper classification of the March 2003 memo (see PDF 53-54), DOJ explained,

Because none of the attorneys who participated in preparing the March 2003 memorandum remains at the Department of Justice, no current DOJ employees have first-hand knowledge of the circumstances surrounding the classification of that memorandum. We have consulted the Acting General Counsel of the Department of Defense and understand from him that the memorandum was classified under the authority of DoD using that agency’s classification authority because the memorandum related to the guidance of a DoD working group charged with developing recommendations of the Secretary of Defense concerning a range of possible interrogation techniques for use with alien unlawful combatant detained at Guantanamo Bay.

In other words, they claimed the memo was classified under derivative classification of the DOD Detainee Working Group.

Derivative of the Original White House Authorizations

That background helps us at least surmise what is claimed to have happened with this memo.  It says on its front page it was,

Derived from: “Presidential Authorization for Specified Electronic Surveillance Activities During a Limited Period to Detect and Prevent Acts of Terrorism Within the United States,” dated Oct. 4, 2001, and subsequent related Presidential authorizations [at least one line redacted]

In other words, this memo tells us it was derived from the original White House authorization of October 4, 2001 (note, not the John Yoo memo authorizing the program from the same date). From that, it’s a safe bet that, given that OLC is not a classification originator (that is, Jack Goldsmith couldn’t have classified this memo without violating the sometimes-pixie-dusted EO on classification), the White House (you know, someone like Dick Cheney?) must have classified this document as the originator of the documents of which it was a derivative.

Which brings us to what I believe to be either arbitrary, or badly manipulative, determinations of which paragraphs are classified.

Let’s start with one of my favorite examples. Page 20, footnote 17 reads, in its entirety,

17 See also 50 U.S.C. 1810 (providing for civil liability as well). (TS//SI[redacted]//NF)

Someone in government–almost certainly someone in the White House–claimed in 2004 that the mere citation of one clause of the FISA legislation and the admission that its plain language meant violation of FISA called for (in addition to the criminal penalties described in the body of the text, also classified Top Secret) civil penalties was Top Secret and compartmented.

Read more

Share this entry

The White Paper and the Classified Opinion

As has often been noted, the White Paper the Bush Administration released on January 19, 2006 largely repeats the analysis Jack Goldsmith did in his May 6, 2004 OLC opinion on the warrantless wiretap program. So I decided to compare the two documents.

Not only did such a comparison help me see things in both documents I hadn’t seen before. But there are a number of things that appear in the White Paper but not the unredacted parts of the opinion. Some of this, such as Administration statements after the warrantless wiretap program was exposed in 2005, simply serve as the publicly acceptable discussion of the program. Yet in one case–the White Paper’s discussion of how the Hamdi decision affected the program–this probably repeats a discussion in another, still classified, Goldsmith opinion he wrote the day before he left on July 17, 2004. Then there’s a bunch of information that appears (in both redacted and unredacted form) in the Goldsmith opinion but not the WP. As I discuss below, I think there are a number of reasons for this.

I should warn that I did this in about a day or so, so I certainly may have misstated what’s in Goldsmith’s memo. Let me know if you catch anything like that.

General Contents

Goldsmith’s memo is organized this way:

Background (including genesis of program, the scary memo process of reauthorization, two sets of modifications, and prior OLC opinions)

Analysis [of whether the illegal wiretap program is legal under 5 different criteria]

I. Executive Order 12333

II. Statutory Analysis (of FISA and Title III wiretap laws)

III. Completely redacted criterion*

IV. Completely redacted criterion*

V. Fourth Amendment (including extensive discussion of why the current threat makes the illegal program a reasonable search)

*If I had to guess what the two completely redacted criteria are, I’d say one is the Defense Appropriation of 2004, which prohibited data mining of US data, and one is the First Amendment.

The bolded subjects above don’t appear in the WP. The exclusion of some of this–the discussion of how the program works, for example–is dismissed in the WP by saying it cannot be discussed in an unclassified document. The EO 12333 discussion, which presumably pertains in part to the wiretapping of US persons overseas, didn’t seem to be the big public concern after the program was revealed (or maybe the WP didn’t want to admit that limits on wiretapping Americans were just pixie dusted away). And some of these subjects–such as the Defense Authorization, if my guess that it’s one of the totally redacted criteria is right–were no longer operative in 2006 when the WP was issued.

In general, Goldsmith (and the WP) replace John Yoo’s authorization of the program under Article II with what he calls “new analysis” finding that the Afghan AUMF bestowed on the President full Commander in Chief powers, which in the process meant his war powers trumped FISA. The formula isn’t much more sound than what we suspect Yoo to have said, but it gives Goldsmith lots of places to insert wiggle room into interpretations of FISA, for example, arguing that the principle of constitutional avoidance suggests that the purported conflict between the AUMF and FISA must be resolved to make sense constitutionally which, in Goldsmith’s book, means a tie goes to the Commander in Chief.

The focus on the AUMF allows both documents to rehearse a long history of wartime wiretapping that just happens to magically skip the Vietman-era wiretapping that FISA was written to prohibit.

In addition, Goldsmith (and the WP) argues that the importance of the government’s interest in wiretapping al Qaeda makes the warrantless program “reasonable” under the Fourth Amendment. Note, this is almost certainly a departure from John Yoo’s November 2, 2001 Fourth Amendment based argument, given how closely that opinion seems to cling to his October 23, 2001 Fourth Amendment evisceration opinion, and given Goldsmith’s decision not to rely on that opinion on page 100. In the Fourth Amendment discussion, Goldsmith gives very extensive (but entirely redacted) information on the threats that justify such wiretapping; the WP effectively just says “trust us.”

Read more

Share this entry

AT&T Confident Its Partner in Crime Will Let It Take Over T-Mobile

Here’s the last paragraph of a Politico article describing the considerable extent of AT&T’s paid influence in DC.

AT&T said Monday that it is “confident” it can secure federal approval as it presents its case for T-Mobile, and both companies signaled Monday that they hoped to wrap everything up in about a year. AT&T declined to comment on its lobbying and PAC efforts and whether those efforts would be stepped up as it pushes for merger approval.

Now, the Politico piece is worth reading just for a sense of how corrupt the upcoming approval of the merger will no doubt be.

But somehow Politico forgot to mention the other reason AT&T will be granted the right to buy T-Mobile in spite of its clear assault on key principles of competitive capitalism: because the government owes AT&T.

Or, to put it another way, AT&T and the government have become so closely entwined in their joint program spying on Americans that the government cannot be said to be an independent reviewer of AT&T’s business.

Not only that, but by having AT&T take over T-Mobile, the government will get more unfettered access to Americans’ phone records. As Chris Soghoian explains:

While it is little known to most consumers, T-Mobile is actually the most privacy preserving of the major wireless carriers. As I described in a blog post earlier this year, T-Mobile does not have or keep IP address logs for its mobile users. What this means is that if the FBI, police or a civil litigant wish to later learn which user was using a particular IP address at a given date and time, T-Mobile is unable to provide the information.

In comparison, Verizon, AT&T and Sprint all keep logs regarding the IP addresses they issue to their customers, and in some cases, even the individual URLs of the pages viewed from handsets.

While privacy advocates encourage companies to retain as little data about their customers as possible, the Department of Justice wants them to retain identifying IP data for long periods of time. Enough so that T-Mobile was called out (albeit not by name) by a senior DOJ official at a data retention hearing at the House Judiciary Committee back in January:

“One mid-size cell phone company does not retain any records, and others are moving in that direction.”

If and when the Federal government approves this deal, T-Mobile’s customers and infrastructure will likely be folded into the AT&T mothership. As a result, T-Mobile’s customers will lose their privacy preserving ISP, and instead have their online activities tracked by AT&T.

So no wonder AT&T is so confident they’ll get to do what they want, and to hell with the interests of consumers. While this deal offers zero benefit for consumers, it does give the government just what it wants.

Share this entry

Will the US Share Intelligence with Israel’s New Left Wing Intelligence Initiative?

Ha’aretz reports that Israel’s Military Intelligence set up a group several months ago dedicated to collecting intelligence on non-Israeli leftist organizations that criticize Israel.

Military Intelligence is collecting information about left-wing organizations abroad that the army sees as aiming to delegitimize Israel, according to senior Israeli officials and Israel Defense Forces officers.

The sources said MI’s research division created a department several months ago that is dedicated to monitoring left-wing groups and will work closely with government ministries.

[snip]

Military Intelligence officials said the initiative reflects an upsurge in worldwide efforts to delegitimize Israel and question its right to exist.

“The enemy changes, as does the nature of the struggle, and we have to boost activity in this sphere,” an MI official said. “Work on this topic proceeds on the basis of a clear distinction between legitimate criticism of the State of Israel on the one hand, and efforts to harm it and undermine its right to exist on the other.”

The new MI unit will monitor Western groups involved in boycotting Israel, divesting from it or imposing sanctions on it. The unit will also collect information about groups that attempt to bring war crime or other charges against high-ranking Israeli officials, and examine possible links between such organizations and terror groups.

Now aside from thinking generally that this is a bad idea, I’m particularly concerned about whether or not the US will share intelligence with Israel on such issues.

For example, the initiative says it will look for ties between groups critical of Israel and terrorist groups. How is that different from the investigation of a bunch of peace activists’ ties with humanitarian organizations which has suggested the peace activists have ties to Hezbollah? And since we know OLC gave the President and certain Federal Officials the green light to ignore privacy protections on the sharing of grand jury information in the PATRIOT Act, does that mean our government will readily share the information they’re collecting in that grand jury with the Israelis?

And to some degree, the Israelis wouldn’t even have to rely on intelligence sharing, per se. In his book The Shadow Factory, James Bamford spent some time detailing the Israeli ties to key companies in our electronic surveillance, companies like Verint, which intercepts and stores communication, PerSay, which does voice mining, NICE, which does voice content analysis, and Narus, which enables real-time surveillance on telecom lines. Between Verint and Narus, Bamford writes,

Thus, virtually the entire American telecommunications system is bugged by two Israeli-formed companies with possible ties to Israel’s eavesdropping agency–with no oversight by Congress.

And we can find such ties closer to home, too. The company that had been paid by Pennsylvania to track potential threats to critical infrastructure which ended up tracking First Amendment protected speech, the Institute of Terrorism Research and Response, is an Israeli company. Among other groups it tracked (one key focus was anti-fracking groups) were peace organizations–precisely the kind of group that might oppose Israel’s actions in Gaza.

The concern that federal and state entities have been paying companies with Israeli ties to collect information on groups that might include the same peace groups targeted by this new initiative in Israel is one thing.

But think of the other logical possibility. Our federal and state governments usually show some embarrassment when they get caught collecting intelligence on peace groups (though that doesn’t seem to stop it from happening over and over again). What will stop those same government entities from asking Israel to collect such information?

Share this entry

How to Ensure You’ll Always Have War Powers to Fight Eastasia

As we’ve known for years, the May 6, 2004 OLC opinion authorizing the warrantless wiretap program shifted the claimed basis for the program from inherent Article II power to a claim the Afghanistan AUMF trumped FISA.

But one problem with that argument (hard to fathom now that Afghanistan has once again become our main forever war) is to sustain the claim that we were still at war in 2004, given that so many of the troops had been redeployed to Iraq. And to sustain the claim that the threat to the US from al Qaeda was sufficiently serious to justify eviscerating the Fourth Amendment.

So, they used politicized intelligence and (accidentally) propaganda to support it.

Use of the Pat Tillman Propaganda to Support Case of Ongoing War

As I’ve noted, Jack Goldsmith made the unfortunate choice to use an article reporting Pat Tillman’s death as his evidence that the war in Afghanistan was still going on.

Acting under his constitutional authority as Commander in Chief, and with the support of Congress, the President dispatched forces to Afghanistan and, with the cooperation of the Northern Alliance, toppled the Taliban regime from power. Military operations to seek out resurgent elements of the Taliban regime and al Qaeda fighters continue in Afghanistan to this day. See e.g., Mike Wise and Josh White, Ex-NFL Player Tillman Killed in Combat, Wash. Post, Apr. 24, 2004, at A1 (noting that “there are still more than 10,000 U.S. troops in the country and fighting continues against remnants of the Taliban and al Qaeda”).

That article was not really about the ongoing war in Afghanistan; rather, it told a lie, the lie that war hero Pat Tillman had died in combat, rather than in a friendly fire incident.

Pat Tillman, the Arizona Cardinals safety who forfeited a multimillion dollar contract and the celebrity of the National Football League to become a U.S. Army Ranger, was killed in Afghanistan during a firefight near the Pakistan border on Thursday, U.S. officials said yesterday.

Tillman, 27, was killed when the combat patrol unit he was serving in was ambushed by militia forces near the village of Spera, about 90 miles south of Kabul, the Afghan capital. Tillman was hit when his unit returned fire, according to officials at the Pentagon. He was medically evacuated from the scene and pronounced dead by U.S. officials at approximately 11:45 a.m. Thursday. Two other U.S. soldiers were injured and one Afghan solider fighting alongside the U.S. troops was killed.

The death of Tillman, the first prominent U.S. athlete to be killed in combat since Vietnam, cast a spotlight on a war that has receded in the American public consciousness. As Iraq has come into the foreground with daily casualty updates, the military campaign in Afghanistan has not garnered the same attention, though there are still more than 10,000 U.S. troops in the country and fighting continues against remnants of the Taliban and al Qaeda.

Now, I say the choice was unfortunate because, in spite of the fact that Tillman’s commanding officers knew within 24 hours of his death on April 22 that it was a friendly fire incident, in spite of the fact that General Stanley McChrystal sent an urgent memo within DOD on April 29 that the death was probably friendly fire, and in spite of the fact that the White House learned enough about the real circumstances of Tillman’s death by May 1 to make no claims about how he died in a Bush speech, there’s no reason to believe that Jack Goldsmith would have learned how Tillman died until it was publicly announced on May 29, 2004.

In other words, it was just bad luck that Goldsmith happened to use what ultimately became an ugly propaganda stunt as his evidence that the Afghan war was still a going concern.

Producing Scary Memos to Justify Domestic Surveillance

I’m less impressed with the description of the role of threat assessments that we’re beginning to get.

Goldsmith’s memo includes an odd redaction in its description of the threat assessment process.

As the period of each reauthorization nears an end, the Director of Central Intelligence (DCI) prepares a memorandum for the President outlining selected current information concerning the continuing threat that al Qaeda poses for conducting attacks in the United States, as well as information describing the broader context of al Qaeda plans to attack U.S. interests around the world. Both the DCI and the [redacted] review that memorandum and sign a recommendation that the President should reauthorize [redacted name of program] based on the continuing threat posed by potential terrorist attacks within the United States. That recommendation is then reviewed by this Office. Based upon the information provided in the recommendation, and also taking into account information available to the President from all sources, this Office assess whether there is a sufficient factual basis demonstrating a threat of terrorist attacks in the United States for it to continue to be reasonable under the standards of the Fourth Amendment for the President to authorize the warrantless involved in [redacted, probably name of program]. [my emphasis]

Now, there are any number of possibilities for the person who, in addition to the DCI, reviewed the threat assessment: John Brennan and others who oversaw the threat assessment are one possibility, David Addington or Dick Cheney are another.

But the IG Report provides another possibility or two that makes this whole passage that much more interesting:

The CIA initially prepared the threat assessment memoranda that were used to support the Presidential Authorization and periodic reauthorizations of the PSP. The memoranda documented intelligence assessments of the terrorist threats to the United States and to U.S. interests abroad from al Qaeda and affiliated terrorist organizations. These assessments were prepared approximately every 45 days to correspond with the President’s Authorizations of the PSP.

The Director of the Central Intelligence’s (DCI) Chief of Staff was the initial focus point for preparing the threat assessment memoranda. According to the former DCI Chief of Staff, he directed CIA terrorism analysts to prepare objective appraisals of the current terrorist threat, focusing primarily on threats to the U.S. homeland, and to document those appraisals in a memorandum. Initially, the analysts who prepared the threat assessments were not read into the PSP and did not know how the threat assessments would be used. CIA’s terrorism analysts drew upon all sources of intelligence in preparing these threat assessments.

After the terrorism analysts completed their portion of the memoranda, the DCI Chief of Staff added a paragraph at the end of the memoranda stating that the individuals and organizations involved in global terrorism (and discussed in the memoranda) possessed the capability and intention to undertake further attacks within the United States. The DCI Chief of Staff recalled that the paragraph was provided to him initially by a senior White House official. The paragraph included the DCI’s recommendation to the President that he authorize the NSA to conduct surveillance activities under the PSP. CIA Office of General Counsel (OGC) attorneys reviewed the draft threat assessment memoranda to determine whether they contained sufficient threat information and a compelling case for reauthorization of the PSP. If either was lacking, an OGC attorney would request that the analysts provide additional threat information or make revisions to the draft memoranda.

Read more

Share this entry