The Top Unmentioned Obama Replacement: Robert Mueller

A slew of second-term cabinet speculation articles have come out (National Journal, first posted before the election, and NYT and USAT today).

And while they seem to indicate Jack Lew is likely to replace TurboTaxTimmeh Geithner and Secretary of State will be the subject of active speculation for some time (with intriguing speculation that Howard Berman, who lost to Brad Sherman in CA, might be under consideration), one key role–albeit not of cabinet level–is missing:

FBI Director.

After all, Robert Mueller is already 2 years beyond his sell by date; Obama extended his term to get past the election (he said). And regardless of rank, the FBI Director is one of the most important figures in the increasingly powerful surveillance state.

And there have been some very troubling names mentioned in discussions to replace him, including NYPD’s Ray Kelly, who would really be the second incarnation of J Edgar Hoover’s abusive power. There had been speculation that Patrick Fitzgerald wanted the job, but his decision to join Skadden Arps just before the election suggests he knew he wasn’t going to get that job.

Particularly given Eric Holder’s apparent increasing doubt that he’ll stick around, we have the possibility of seeing something worse–all the capitulation we got from Holder in the first term, plus and FBI Director who has none of the claimed measure of Mueller (though I’ve always had my doubts about those claims).

A new FBI Director (which is guaranteed), particularly if it came with a new Attorney General, could either set a dramatic new course or harden in the old course. And I fear it is most likely to be the latter.

Michael Hayden, Privacy and Counterterrorism Frugality Champion

Of 1,423 words in an article questioning whether deficit hawkery might cut the domestic spying budget, Scott Shane devotes over a sixth–roughly 260–describing what former NSA and CIA Director Michael Hayden thinks about the balances between funding and security.

Remarkably, none of those 260 words disclose that Hayden works for Michael Chertoff’s consulting group, which profits off of big domestic spying. This, in an article that cites Chertoff’s electronic border fence among the expensive counterterrorism duds that were subsequently shut down (Shane mentions “puffer” machines as well, but not the Rapiscan machines that Chertoff’s group lobbied for, which are now being withdrawn as well).

And then there’s a passage of Shane’s article that touches on topics in which Hayden’s own past actions deserve disclosure.

Like other intelligence officials after 2001, Mr. Hayden was whipsawed by public wrath: first, for failing to prevent the Sept. 11 attacks, and then, a few years later, for having permitted the National Security Agency to eavesdrop on terrorism suspects in the United States without court approval.

Perhaps, as a result, he often says that the American people need to instruct the government on where to draw the line. He told an audience at the University of Michigan last month, for instance, that while a plot on the scale of the Sept. 11 attacks was highly unlikely, smaller terrorist strikes, like the shootings by an Army psychiatrist at Fort Hood in Texas in 2009, could not always be stopped.

“I can actually work to make this less likely than it is today,” Mr. Hayden said. “But the question I have for you is: What of your privacy, what of your convenience, what of your commerce do you want to give up?”

To be fair, Shane counters Hayden’s claims by noting that “secrecy … makes it tough for any citizen to assess counterterrorism programs.”

But he doesn’t mention one of the biggest examples where Hayden–where anyone–chose both the most expensive and most privacy invasive technology: the wiretap program Hayden outsourced to SAIC rather than use in-house solutions.

As Thomas Drake has made clear, by outsourcing to SAIC, Hayden spent 300 times as much as he would have with the in-house solution.

One of them was Lieutenant General Michael Hayden, the head of the agency: he wanted to transform the agency and launched a massive modernization program, code named: “Trailblazer.” It was supposed to do what Thin Thread did, and more.

Trailblazer would be the NSA’s biggest project. Hayden’s philosophy was to let private industry do the job. Enormous deals were signed with defense contractors. [Bill] Binney’s Thin Thread program cost $3 million; Trailblazer would run more than $1 billion and take years to develop.

“Do you have any idea why General Hayden decided to go with Trailblazer as opposed to Thin Thread, which already existed?” Pelley asked.

[snip]

Asked to elaborate, Drake said, “Careers are built on projects and programs. The bigger, the better their career.” [my emphasis]

Along the way, Hayden repeatedly blew off Congressional staffer Diane Roark’s inquiries about privacy protection.

When Binney heard the rumors, he was convinced that the new domestic-surveillance program employed components of ThinThread: a bastardized version, stripped of privacy controls. “It was my brainchild,” he said. “But they removed the protections, the anonymization process. When you remove that, you can target anyone.” He said that although he was not “read in” to the new secret surveillance program, “my people were brought in, and they told me, ‘Can you believe they’re doing this? They’re getting billing records on U.S. citizens! They’re putting pen registers’ ”—logs of dialled phone numbers—“ ‘on everyone in the country!’ ”

[snip]

[Former HPSCI staffer Diane Roark] asked Hayden why the N.S.A. had chosen not to include privacy protections for Americans. She says that he “kept not answering. Finally, he mumbled, and looked down, and said, ‘We didn’t need them. We had the power.’ He didn’t even look me in the eye. I was flabbergasted.” She asked him directly if the government was getting warrants for domestic surveillance, and he admitted that it was not. [my emphasis]

So it’s not just disclosure of all the ways Hayden has and does profit off of continued bloated domestic surveillance that Shane owes his readers: he also should refute Hayden’s claims about the relationship between cost, privacy, and efficacy.

Michael Hayden’s SAIC-NSA boondoggle is one case where secrecy no longer hides how much money was wasted for unnecessary privacy violations.

Yet somehow, that spectacular example of the unnecessary waste in domestic spying doesn’t make it into the 260 words granted to Hayden to argue we need continued inflated spending.

The Senate Report on Fusion Center Fails to Ask or Answer the Most Basic Question

As I suggested the other day, there is a lot to recommend the Permanent Subcommittee on Investigations report on fusion centers.

But while it meticulously supports its claims about the waste and inefficacy of fusion centers, it seems to miss what all that evidence suggests. That is that there is no need for fusion centers. The report clearly shows we have spent somewhere between $289 million and $1.4 billion to build a bunch of data sharing centers in the name of terrorism; yet in spite of the investment, the centers appear to never actually have contributed to finding a terrorist.

Fusion centers are supposed to be about counterterrorism

This is made clear in the way the report meticulously lays out the purported purpose of fusion centers, then measures how they fulfill that purpose.

The report notes two moments in DHS’ history when fusion centers were pointedly not authorized: the initial formation of DHS, the 9/11 Commission report. It notes that under Michael Chertoff, DHS aides were pushing for reasons to sell fusion centers to the Feds.

Mr. Riegle said that he did not believe that access to state and local information was really a principal reason for the federal government to support fusion centers, but it was part of the pitch. “It was a selling point to the Feds,” Mr. Riegle said. “I’ve got to tell them what the benefits are.”

Only in 2007, at a time when there were already 37 fusion centers, many in states not likely to be targeted by foreign terrorism, did Congress specifically authorize fusion centers. At that time, Congress emphasized the fusion centers’ counterterrorism function.

The law also directed DHS to detail intelligence personnel to the centers if the centers met certain criteria, several of which required a center to demonstrate a focus on and commitment to a counterterrorism mission. Among the criteria the law suggested were “whether the fusion center . . . focuses on a broad counterterror approach,” whether the center has sufficient personnel “to support a broad counterterrorism mission,” and whether the center is appropriately funded by non-federal sources “to support its counterterrorism mission.”

Fusion centers have not found any terrorists

And on that basis, fusion centers have failed.

The value of fusion centers to the federal government should be determined by tallying the cost of its investment, and the results obtained. Read more

Ford Motor Company Has a TIDE Report

I’ll have plenty to say about the Pemanent Subcommittee on Investigation’s report on how terrible DHS’s fusion centers are. The short version: they’re nearly worthless and a big waste of money.

But since DHS is so crappy, it says something that they find the National Counterterrorism Center’s Terrorist Identities Datamart Environment database to be equally crappy.

While reporting information on an individual who is listed in the TIDE database sounds significant, the Subcommittee found that DHS officials tended to be skeptical about the value of such reporting, because of concerns about the quality of data contained in TIDE.156

156 Although NCTC describes its TIDE database as holding information on the identities of known and suspected terrorists, DHS officials – who interacted with TIDE data on a daily basis, as they reviewed reporting not only from state and local law enforcement encounters but from encounters by DHS components – said they found otherwise. “Not everything in TIDE is KST,” DHS privacy official Ken Hunt told the Subcommittee, using a shorthand term for “known or suspected terrorist.”

Would you buy a Ford?” one DHS Senior Reports Officer asked the Subcommittee staff during an interview, when he was asked how serious it was for someone to be a match to a TIDE record. “Ford Motor Company has a TIDE record.”

The report’s footnote goes on to describe how DHS’s crappy reporting and NCTC’s crappy reporting reinforced each other.

Ole Broughton headed Intelligence Oversight at I&A from September 2007 to January 2012. In an interview with the Subcommittee, Mr. Broughton expressed the concern DHS intelligence officials felt working with TIDE data. In one instance, Mr. Broughton recalled he “saw an individual’s two-year-old son [identified] in an HIR. He had a TIDE record.” Mr. Broughton believed part of the problem was that intelligence officials had routinely put information on “associates” of known or suspected terrorists into TIDE, without determining that that person would qualify as a known or suspected terrorist. “We had a lot of discussion regarding ‘associates’ in TIDE,” Mr. Broughton said.

Mark Collier, who served as a Senior Reports Officer and briefly as chief of the Reporting Branch, recalled another case. An HIR was drafted concerning an incident with a TIDE match, but the TIDE record was based on an FBI inquiry. Later on the FBI ended its inquiry and cleared the individual of any connection to terrorism – but because DHS had filed an HIR on the person, the individual’s record was kept active in TIDE.

This reinforcement process carried over into DHS reports that were quashed on First Amendment grounds. Repeatedly, fusion center staffers submitted reports on speech and religion related activities solely because there was some tie between them and TIDE.

One draft reported on a list of reading suggestions by a Muslim community group, “Ten Book Recommendations for Every Muslim.” The report noted that four of the titles were authored by individuals with records in a U.S. intelligence counterterrorism database, the Terrorist Identities Datamart Environment (TIDE).

[snip]

Another cancelled draft HIR reported on a U.S. citizen visiting and giving a lecture at a mosque. The draft contained no derogatory information on the speaker, or the mosque, although it noted that the speaker was once the head of a U.S. Islamic school that had a record in the TIDE database. “There is concern,” the drafting officer wrote in his initial submission, “that [the subject’s] visit . . . could be to strengthen ties with the . . . mosque as well as to conduct fundraising and recruiting for the sake of foreign terrorist organizations.”

Now, as I said, a civil liberties and privacy review (which I’ll discuss at more length in a later post) quashed these particular reports because they recorded protected speech. But imagine how many similar reports remain in NCTC or FBI’s files, given that they have more leeway to record First Amendment protected activity?

Soon, we’ll have the entire marketing plan of Ford Motor Company in our terrorist databases.

The Trip Wires in the Anwar al-Awlaki Investigation

Congressman Frank Wolf doesn’t believe what the FBI told him during an August 1 hearing on the Webster report. He suspects that Anwar al-Awlaki was an informant for the FBI (or some other agency), something that FBI’d Executive Assistant Director for National Security denied. But evidence from the report about how the FBI dealt with the Awlaki wiretap as a “trip wire” makes it clear that even by 2009 the FBI wasn’t using Awlaki’s contacts as they had other extremists, like Hal Turner, to proactively generate new leads.

Frank Wolf suggests Awlaki was approached to be an informant

Now, Wolf’s questions about Awlaki generally are based, in part, on intelligence sources–like the NYPD and Andrew McCarthy–that are suspect. And he seems confused about the line between loathsome radical speech and evidence of terrorist intent.

But he does ask worthwhile questions, notably the lunexplained treatment of Awlaki after 9/11, particularly about suggestions that Awlaki may have been approached as an informant. Wolf starts by noting that in the last installment of Inspire [safe PDF courtesy of Jihadology], an article attributed to Awlaki revealed he had been approached to be an informant in 1996, shortly after San Diego authorities busted him in a–he claims–trumped up prostitution sting.

However, Aulaqi’s own words could potentially indicate otherwise. In his final column for Inspire, Aulaqi wrote: “I was visited by two men who introduced themselves as officials with the US government (they did not specify which government organization they belonged to) and that they are interested in my cooperation with them. When I asked what cooperation did they expect, they responded by saying that they are interested in having me liaise with them concerning the Muslim community in San Diego.”

Wolf then notes that–at a time when Awlaki was under investigation, was on a terrorist watch list, and had a Diplomatic Security warrant out for his arrest for passport fraud–he was allowed to enter the country in October 2002.

The unclassified version of the Webster Commission report confirmed that around 2001, “WFO opened a full investigation” on Aulaqi, and it remained open until May 2003, after Aulaqi again fled the U.S. for the U.K. and, later, Yemen.

As noted above, NYPD reported that Aulaqi was placed on the federal government’s Terror Watchlist in Summer 2002. Please explain why and how Aulaqi was permitted to board a flight to the U.S. in October 2002 if he was already included on the watchlist?

Additionally, if, as Mr. Giuliano testified, the FBI “knew [Aulaqi] was coming in” before he landed at JFK, what information was communicated to the U.S. attorney’s office that would set off this strange series of events early in the morning of October 10? Please provide for the record the full series of communications between the FBI and the U.S. attorney’s office and the customs office?

During the hearing, I raised the question of whether the FBI requested that Aulaqi be allowed into the country, without detention for the outstanding warrant, due to a parallel investigation regarding Aulaqi’s former colleague al Timimi, a radical imam who was recruiting American Muslims to terrorism. Notably, the Timimi case was being led by the same WFO agent who called the U.S. attorney’s office and customs on the morning of October 10. Did WFO want Aulaqi released to assist in its investigation of Timimi?

Public records demonstrate a nexus between these cases. Read more

Even Liars Get To Invoke State Secrets

As the LAT first reported, Judge Cormac Carney has dismissed a suit, Fazaga v. FBI, brought by Southern California Muslims against the FBI for illegal surveillance. Carney actually made two rulings, one dismissing most of the suit on state secrets grounds and one dismissing part of the suit against the government–but not individual FBI officers–on FISA grounds.

The rulings are interesting for four reasons:

  • Carney has basically accepted the government’s claims in a case that is closely related to one where–three years ago–he called out the government for lying to him personally
  • Carney overstates the degree to which the Administration appears to be adhering to its own state secrets policy
  • The case is an interesting next step in FISA litigation
  • Carney suggests the FBI now investigates people for radicalization

Liars get to invoke state secrets

Three years ago, Carney caught the government lying to him about what documents it had collected on Southern Californian Muslims in this and related investigations. In an unclassified version of his ruling released last year, he revealed part of the government’s breathtaking claim.

The Government argues that there are times when the interests of national security require the Government to mislead the Court. The Court strongly disagrees. The Government’s duty of honesty to the Court can never be excused, no matter what the circumstance. The Court is charged with the humbling task of defending the Constitution and ensuring that the Government does not falsely accuse people, needlessly invade their privacy or wrongfully deprive them of their liberty. The Court simply cannot perform this important task if the Government lies to it. Deception perverts justice. Truth always promotes it.

Yet in finding the government’s state secrets invocation here, he is effectively accepting the government’s word–which in some way claims to have a real predicate for its investigation into Southern Californian mosques–over the word of their former informant, Craig Monteilh, who says he was instructed to collect information indiscriminately because “everybody knows somebody” who knows someone in the Taliban, Hamas, or Hezbollah.

Read more

It’s Not Just Whether Nidal Hasan’s Emails Stuck Out, It’s Whether Abdulmutallab’s Did

I’ve been meaning to return to the Webster report on Nidal Hasan’s conversations with Anwar al-Awlaki. This conversation between Gunpowder & Lead and Intelwire about how alarming those emails were will be a start provides a good place to start.

Hasan’s emails should have raised more concern–but probably didn’t because of the sheer volume of Awlaki intercepts

G&L notes that certain details from the emails–such as his invocation of Hasan Akbar, a Muslim-American soldier who killed two officers in Kuwait–as an example that should have raised more concern than it did.

But more significant, his question to Awlaki didn’t actually deal with the valid question that he raised, the feeling of inner conflict between one’s faith and serving in the U.S. military. Instead, he leaped right to a question that should rightly trigger alarm: if Hasan Akbar died while attacking fellow soldiers, would he be a martyr? Hasan skipped over questions about whether serving in the U.S. military is religiously acceptable; whether going to war against fellow Muslims is a violation of religious principles. Instead, in addressing “some” soldiers who felt conflicted about fighting fellow Muslims, Hasan right away asked whether it was permissible to kill other U.S. soldiers in the way Hasan Akbar.

After a close analysis of a number of the emails, G&L refutes the representation of these emails as “fairly benign.”

I agree with that assessment (and would add that the suggestion, in a February 22, 2009 email, that Hasan was donating to entities that his mosque would not is another troubling detail). But I also agree with Intelwire. These emails, from an Army officer, surely merited more attention. But these emails, as they likely appeared among the stream of Anwar al-Awlaki communications, probably did not stick out.

Based on who Hasan was (a military officer), who he was talking to (a suspected 9/11 accomplice), and the fact he repeatedly tried to get Awlaki’s attention using a variety of stratagems, the case should have been escalated and Hasan’s superiors should have been informed.

But when you place the content of Hasan’s messages alongside all the other raw intelligence that counterterrorism investigations generate, it’s extremely hard to argue from a subjective, non-psychoanalytical reading that they represented a red flag.

Which is why this report has seemed poorly scoped to me. Because not only did Nidal Hasan’s emails fail to trigger further attention, but Umar Farouk Abdulmutallab’s contacts with Awlaki before Fort Hood did too.

In spite of the fact that the FBI had two people spending a significant chunk of each day (they claimed it took 40% or 3 hours of their work day; 88) reviewing communications tied to Awlaki, in spite of the fact that two men about to attack the US were in contact with Awlaki, “the FBI’s full understanding of Aulaqi’s operational ambitions developed only after the attempted bombing of Northwest Airlines Flight 253 on Christmas Day 2009.” (72)

The government also failed to respond to Abdulmutallab intercepts leading up to the Fort Hood attack

Consider: according to the report itself, Robert Mueller formally asked William Webster to conduct this inquiry on December 17, 2009 (though Webster’s appointment was reported over a week before then). Just 8 days later, another terrorist who had been in contact with Awlaki struck the US. Just 5 days after that, sources started leaking details of NSA intercepts from 4 months earlier (so around August) that might have warned about the attack.

Intelligence intercepts from Yemen beginning in early August, when Abdulmutallab arrived in that country, contained “bits and pieces about where he was, what his plans were, what he was telling people his plans were,” as well as information about planning by the al-Qaeda branch in Yemen, a senior administration official said. “At first blush, not all these things appear to be related” to the 23-year-old Nigerian and the bombing attempt, he said, “but we believe they were.”

It’s unclear how many of these intercepts were directly between Abdulmutallab and Awlaki, and therefore presumably reviewed by the FBI team in San Diego. But at least according to the sentencing materials submitted in the Abdulmutallab case (there are reasons to treat this with a bit of skepticism), there were substantive communications between Awlaki and Abdulmutallab.

Defendant provided this individual [who offered to connect him with Awlaki] with the number for his Yemeni cellular telephone. Thereafter, defendant received a text message from Awlaki telling defendant to call him, which defendant did. Read more

If FBI Believes NYPD Spying Violates Americans’ Rights, Why Not Stop It?

It has long been clear that the AP series on the NYPD’s spying on NYC’s Muslims relied, in part, on FBI sources who believed the program to be problematic. Now a new edition of Ronald Kessler’s book on the voices that belief explicitly.

“What never came out is that the FBI considers the NYPD’s intelligence gathering practices since 9/11 not only a waste of money but a violation of Americans’ rights,” wrote Kessler, who in April broke news of Colombian sexcapades by Secret Service agents doing advance work for President Obama.

“We will not be a party to it,” an FBI source told Kessler.

This anonymous leaking comes not from some ACLU hippies–it comes from the FBI. So why don’t these leakers go arrest Ray Kelly?

Aside from the endorsement of the program Robert Mueller and John Brennan have given, I mean?

The White House added its stamp of approval a month later when President Obama’s top counterterrorism adviser John Brennan visited police headquarters.

“I have full confidence that the NYPD is doing things consistent with the law, and it’s something that again has been responsible for keeping this city safe over the past decade,” he said.

Remember, Brennan–who was Deputy Executive Director of CIA when CIA helped to set up the CIA-on-the-Hudson–has boasted of intimate familiarity with the program.

Speaking of John Brennan, today is the 10 year anniversary of the torture memos. You know, torture? Another abuse that has never been prosecuted under Obama?

Defying the Rules of Gravity, Obama Directs Sanctions Solely against Israel’s Enemies

In conjunction with his speech at the Holocaust Museum yesterday and announcement of the Atrocities Prevention Board, President Obama also rolled out sanctions against those who use IT to repress human rights. The Treasury Department named the sanctions GRAHVITY (I think they get it from “GRAve Human rights abuses Via Information TechnologY” or some such Orwellian acronym).

There’s a problem with that. We are all subject to gravity.

But only Israel’s enemies–Iran and Syria–are subject to GRAHVITY.

This exclusive application was set up in yesterday’s speech when Elie Wiesel suggested the point of remembering the Holocaust was to guarantee the strength of Israel and ensure its enemies–in this case, Syria and Iran–are removed from office (and deprived of the same weapons Israel stockpiles against them).

Have you learned anything from it? If so, how is it that Assad is still in power? How is it that the Holocaust Number 1 denier, Ahmadinejad, is still a President, he who threatens to use nuclear weapons–to use nuclear weapons–to destroy the Jewish state?

[snip]

Now, I hope you understand, in this place [the Museum], why Israel is so important, not only to the Jew that I am and the Jewish people, but to the world. Israel cannot not remember. And because it remembers, it must be strong, just to defend its own survival and its own destiny.

Obama’s focus was broader. In his speech, he listed Cambodia, Rwanda, Bosnia, Darfur, Côte d’Ivoire, Libya (with no mention of the civilian casualties NATO caused), the Lords Resistance Army.

But Obama, too, focuses primarily on Syria.

In this speech, the sole reason to ensure internet freedom, according to Obama, is to bring about regime change in Syria.

And when innocents suffer, it tears at our conscience. Elie alluded to what we feel as we see the Syrian people subjected to unspeakable violence, simply for demanding their universal rights. And we have to do everything we can. And as we do, we have to remember that despite all the tanks and all the snipers, all the torture and brutality unleashed against them, the Syrian people still brave the streets. They still demand to be heard. They still seek their dignity. The Syrian people have not given up, which is why we cannot give up.

Read more

“Crackpots don’t make good messengers”

For the record, I have no intention of voting for Ron Paul in the General election (though depending on how the GOP primary rolls out, I might consider crossing over to vote for Paul in the MI primary, for similar reasons as I voted for John McCain in the 2000 primary: because I knew my vote wouldn’t matter in the Democratic primary and I hoped a McCain win might slow down George Bush’s momentum and focus some attention on campaign finance reform, McCain’s signature issue at the time).

I don’t want Ron Paul to be President and, for all my complaints with Obama, he is a less bad presidential candidate than Paul.

But that’s an entirely different question then the one Kevin Drum purports to address with this post:

Should we lefties be happy he’s in the presidential race, giving non-interventionism a voice, even if he has other beliefs we find less agreeable? Should we be happy that his non-mainstream positions are finally getting a public hearing?

Drum doesn’t actually assess the value of having a non-interventionist in the race, or even having a civil libertarian in the race (which he largely dodges by treating it as opposition to the drug war rather than opposition to unchecked executive power), or having a Fed opponent in the race.

Instead, he spends his post talking about what a “crackpot” Paul is, noting (among other things), that Paul thinks climate change is a hoax, thinks the UN wants to confiscate our guns, and is a racist.

Views, mind you, that Paul shares in significant part with at least some of the other crackpots running for the GOP nomination.

Of course, Paul does have views that none of the other Republicans allowed in Presidential debates share. And that’s what Drum would need to assess if he were genuinely trying to answer his own question: given a field of crackpots, several of whom are explicit racists, several of whom make claims about cherished government programs being unconstitutional, most of whom claim to believe climate change doesn’t exist, is it useful that one of the candidates departs from the otherwise universal support for expanded capitulation to banks, authoritarianism, and imperialism? Read more