Assassination Permission Slips and Hall Passes

Yesterday, Dennis Blair gave the House Intelligence Committee an explanation of the “specially permission” that the Government grants itself before it places a US citizen on its kill list.

The U.S. intelligence community policy on killing American citizens who have joined al Qaeda requires first obtaining high-level government approval, a senior official disclosed to Congress on Wednesday.

Director of National Intelligence Dennis C. Blair said in each case a decision to use lethal force against a U.S. citizen must get special permission.

“We take direct actions against terrorists in the intelligence community,” he said. “If we think that direct action will involve killing an American, we get specific permission to do that.”

He also said there are criteria that must be met to authorize the killing of a U.S. citizen that include “whether that American is involved in a group that is trying to attack us, whether that American is a threat to other Americans. Those are the factors involved.”

If you haven’t already, you should read Glenn Greenwald’s entire piece on why this stance violates US law. Here’s Glenn’s description of the legal background.

The severe dangers of vesting assassination powers in the President are so glaring that even GOP Rep. Pete Hoekstra is able to see them (at least he is now that there’s a Democratic President).  At yesterday’s hearing, Hoekstra asked Adm. Blair about the threat that the President might order Americans killed due to their Constitutionally protected political speech rather than because they were actually engaged in Terrorism.  This concern is not an abstract one.  The current controversy has been triggered by the Obama administration’s attempt to kill U.S. citizen Anwar al-Awlaki in Yemen.  But al-Awlaki has not been accused (let alone convicted) of trying to attack Americans.  Instead, he’s accused of being a so-called “radical cleric” who supports Al Qaeda and now provides “encouragement” to others to engage in attacks —  a charge al-Awlaki’s family vehemently denies (al-Awlaki himself is in hiding due to fear that his own Government will assassinate him).

The question of where First Amendment-protected radical advocacy ends and criminality begins is exactly the sort of question with which courts have long grappled.  In the 1969 case of Brandenburg v. Ohio, the Supreme Court unanimously reversed a criminal conviction of a Ku Klux Klan leader who — surrounded by hooded indivduals holding weapons — gave a speech threatening “revengeance” against any government official who “continues to suppress the white, Caucasian race.”  The Court held that the First Amendment protects advocacy of violence and revolution, and that the State is barred from punishing citizens for the expression of such views.  The Brandenburg Court pointed to a long history of precedent protecting the First Amendment rights of Communists to call for revolution — even violent revolution — inside the U.S., and explained that the Government can punish someone for violent actions but not for speech that merely advocates or justifies violence (emphasis added):

As we [395 U.S. 444, 448] said in Noto v. United States, 367 U.S. 290, 297 -298 (1961), “the mere abstract teaching . . . of the moral propriety or even moral necessity for a resort to force and violence, is not the same as preparing a group for violent action and steeling it to such action.” See also Herndon v. Lowry, 301 U.S. 242, 259 -261 (1937); Bond v. Floyd, 385 U.S. 116, 134 (1966). A statute which fails to draw this distinction impermissibly intrudes upon the freedoms guaranteed by the First and Fourteenth Amendments. It sweeps within its condemnation speech which our Constitution has immunized from governmental control.

From all appearances, al-Awlaki seems to believe that violence by Muslims against the U.S. is justified in retaliation for the violence the U.S. has long brought (and continues to bring) to the Muslim world.  But as an American citizen, he has the absolute Constitutional right to express those views and not be punished for them (let alone killed) no matter where he is in the world; it’s far from clear that he has transgressed the advocacy line into violent action.

I want to go back to just one more problem with this whole state of affairs.

We have been focusing all of our powers of telecom surveillance on Anwar al-Awlaki for at least a year (and probably far longer). Our government has tracked not only what he has said on jihadist websites, but also knows precisely what he has been emailing and presumably saying on the phone.

But none of that stuff, before Christmas Day, even merited an indictment.

Read more

Share this entry

Google Boondoggle With No Such Agency

spy-who-loved-meEllen Nakashima has a startling, but I guess unsurprising, article in this morning’s Washington Post on internet giant Google’s new partnership with the NSA:

Under an agreement that is still being finalized, the National Security Agency would help Google analyze a major corporate espionage attack that the firm said originated in China and targeted its computer networks, according to cybersecurity experts familiar with the matter. The objective is to better defend Google — and its users — from future attack.

Google and the NSA declined to comment on the partnership. But sources with knowledge of the arrangement, speaking on the condition of anonymity, said the alliance is being designed to allow the two organizations to share critical information without violating Google’s policies or laws that protect the privacy of Americans’ online communications. The sources said the deal does not mean the NSA will be viewing users’ searches or e-mail accounts or that Google will be sharing proprietary data.

The article indicates Google initiated the matter by approaching the NSA after the recent discovery of intrusive attacks by Chinese interests last month, which is interesting in light of the fact Google made a point of publicly stating in 2008 they had never cooperated with the NSA on the Terrorist Surveillance Program.

Nakashima also notes that NSA is also soliciting involvement of the FBI and Department of Homeland Security. You have to wonder exactly what the FBI and DHS are going to lend that NSA cannot if this is truly just technical advice, because neither agency is particularly known for its geeky brilliance with computers. You would have to wonder is this is not a step in the direction of the “cyber protection” program the government has been hinting at initiating for some time now.

More from Nakashima and the Post:

“As a general matter,” NSA spokeswoman Judi Emmel said, “as part of its information-assurance mission, NSA works with a broad range of commercial partners and research associates to ensure the availability of secure tailored solutions for Department of Defense and national security systems customers.”

Despite such precedent, Matthew Aid, an expert on the NSA, said Google’s global reach makes it unique.

“When you rise to the level of Google . . . you’re looking at a company that has taken great pride in its independence,” said Aid, author of “The Secret Sentry,” a history of the NSA. “I’m a little uncomfortable with Google cooperating this closely with the nation’s largest intelligence agency, even if it’s strictly for defensive purposes.”

Mr. Aid isn’t the only one a little uncomfortable with this new spirit of cooperation between the world’s most spooky governmental spy agency and the world’s most ubiquitous information technology and database company. And so the descent down the slippery slope picks up a little more speed.

(Image courtesy of SearchEngineWatch.com, a very nice resource by the way)

Share this entry

Holder to Republicans: Stop Being Such WATBs about Miranda Warnings and Mukasey's Decisions

Eric Holder just sent the following letter to a bunch of whiny Republican Senators trying to make an issue about Americans respecting the rule of law. (I’m posting the whole thing bc there’s a lot of excellent smack down in it.)


Dear Senator McConnell:

I am writing in reply to your letter of January 26,2010, inquiring about the decision to charge Umar Farouk Abdulmutallab with federal crimes in connection with the attempted bombing of Northwest Airlines Flight 253 near Detroit on December 25, 2009, rather than detaining him under the law of war. An identical response is being sent to the other Senators who joined in your letter.

The decision to charge Mr. Abdulmutallab in federal court, and the methods used to interrogate him, are fully consistent with the long-established and publicly known policies and practices of the Department of Justice, the FBI, and the United States Government as a whole, as implemented for many years by Administrations of both parties. Those policies and practices, which were not criticized when employed by previous Administrations, have been and remain extremely effective in protecting national security. They are among the many powerful weapons this country can and should use to win the war against al-Qaeda.

I am confident that, as a result of the hard work of the FBI and our career federal prosecutors, we will be able to successfully prosecute Mr. Abdulmutallab under the federal criminal law. I am equally confident that the decision to address Mr. Abdulmutallab’s actions through our criminal justice system has not, and will not, compromise our ability to obtain information needed to detect and prevent future attacks.

There are many examples of successful terrorism investigations and prosecutions, both before and after September 11, 2001, in which both of these important objectives have been achieved — all in a manner consistent with our law and our national security interests. Mr. Abdulmutallab was questioned by experienced counterterrorism agents from the FBI in the hours immediately after the failed bombing attempt and provided intelligence, and more recently, he has provided additional intelligence to the FBI that we are actively using to help protect our country. We will continue to share the information we develop with others in the intelligence community and actively follow up on that information around the world.

1. Detention. I made the decision to charge Mr. Abdulmutallab with federal crimes, and to seek his detention in connection with those charges, with the knowledge of, and with no objection from, all other relevant departments ofthe government. On the evening of December 25 and again on the morning of December 26, the FBI informed its partners in the Intelligence Community that Abdulmutallab would be charged criminally, and no agency objected to this course of action. In the days following December 25 – including during a meeting with the President and other senior members of his national security team on January 5 – high-level discussions ensued within the Administration in which the possibility of detaining Mr. Abdulmutallab under the law of war was explicitly discussed. No agency supported the use of law of war detention for Abdulmutallab, and no agency has since advised the Department of Justice that an alternative course of action should have been, or should now be, pursued.

Since the September 11,2001 attacks, the practice of the U.S. government, followed by prior and current Administrations without a single exception, has been to arrest and detain under federal criminal law all terrorist suspects who are apprehended inside the United States. The prior Administration adopted policies expressly endorsing this approach. Under a policy directive issued by President Bush in 2003, for example, “the Attorney General has lead responsibility for criminal investigations of terrorist acts or terrorist threats by individuals or groups inside the United States, or directed at United States citizens or institutions abroad, where such acts are within the Federal criminal jurisdiction of the United States, as well as for related intelligence collection activities within the United States.” Homeland Security Presidential Directive 5 (HSPD-5, February 28,2003). The directive goes on to provide that “(following a terrorist threat or an actual incident that falls within the criminal jurisdiction of the United States, the full capabilities of the United States shall be dedicated, consistent with United States law and with activities of other Federal departments and agencies to protect our national security, to assisting the Attorney General to identify the perpetrators and bring them to justice.”

Read more

Share this entry

What Glenn Greenwald Said On American Terrorism Cowardice

Just go read it. Because every word Glenn Greenwald wrote in his post today, entitled Nostalgia for Bush/Cheney Radicalism, is the gospel truth. It is rare that you will see a post here just pointing you somewhere else because the other source says it all. This is one of those times. Here is a taste:

How much clearer evidence can there be of how warped and extremist we’ve become on these matters? The express policies of the right-wing Ronald Reagan — “applying the rule of law to terrorists”; delegitimizing Terrorists by treating them as “criminals”; and compelling the criminal prosecution of those who authorize torture — are now considered on the Leftist fringe. Merely advocating what Reagan explicitly adopted as his policy — “to use democracy’s most potent tool, the rule of law against” Terrorists — is now the exclusive province of civil liberties extremists. In those rare cases when Obama does what Reagan’s policy demanded in all instances and what even Bush did at times — namely, trials and due process for accused Terrorists — he is attacked as being “Soft on Terror” by Democrats and Republicans alike. And the mere notion that we should prosecute torturers (as Reagan bound the U.S. to do) — or even hold them accountable in ways short of criminal proceedings — is now the hallmark of a Far Leftist Purist. That’s how far we’ve fallen, how extremist our political consensus has become.

Now go read the rest and weep for your country.

Share this entry

Revisiting the al-Harithi/Derwish Assassination

I wanted to expand on this comment, because the discussion of whether Anwar al-Awlaki is on both the JSOC and CIA kill lists or not has focused new attention on the assassination, on November 3, 2002, of Abu Ali al-Harithi and Kamal Derwish.

Greg Miller mentions the assassination in his story today.

The CIA has carried out Predator attacks in Yemen since at least 2002, when a drone strike killed six suspected Al Qaeda operatives traveling in a vehicle across desert terrain.

The agency knew that one of the operatives was an American, Kamal Derwish, who was among those killed. Derwish was never on the CIA’s target list, officials said, and the strike was aimed at a senior Al Qaeda operative, Qaed Sinan Harithi, accused of orchestrating the 2000 attack on the U.S. destroyer Cole.

Dana Priest mentions the assassination in her story on escalated operations in Yemen.

In November 2002, a CIA missile strike killed six al-Qaeda operatives driving through the desert. The target was Abu Ali al-Harithi, organizer of the 2000 attack on the USS Cole. Killed with him was a U.S. citizen, Kamal Derwish, who the CIA knew was in the car.

And ABC mentions it as well.

An American citizen with suspected al Qaeda ties was killed in Nov. 2002 in Yemen in a CIA predator strike that was aimed at non-American leaders of al Qaeda. The death of the American citizen, Ahmed Hijazi of Lackawanna, NY, was justified as “collateral damage” at the time because he “was just in the wrong place at the wrong time,” said a former U.S. official familiar with the case.

Now, all of these articles were written by journalists with long experience in intelligence reporting, so all must know this detail. Still, I find the inclusion of it in all three stories (including Priest’s, in which the focus is on Yemen, rather than assassination) rather notable. Is it possible that all the guys leaking this story have pointed the journalists to the earlier assassination?

I ask because–for starters–I find it rather interesting that that 2002 assassination was rationalized in the name of killing al-Harithi, accused of organizing the USS Cole bombing. That strike happened not long after the US started torturing a guy–Rahim al-Nashiri–whom we’re about to try in military commission for organizing the USS Cole bombing. (And remember, al-Nashiri had been in custody in Dubai for a month by the time the US took custody.) Who was the mastermind of the Cole bombing, then? al-Harithi, who doesn’t even merit a mention in the 9/11 Commission report (though reports from when he was killed said he was among the 12 most senior al Qaeda figures), or al-Nashiri, who does, and is about to be tried for it? Note, too, that the Bush Administration did not announce it had custody of al-Nashiri until several weeks later in November.

Now compare al-Harithi, with his loosely accused role in the Cole, with Kamal Derwish, whom the US accused of recruiting a number of Lackawanna youth into al Qaeda. Not only was Derwish accused of being an ongoing threat–the standard purportedly used to put Americans on kill lists now. But he was accused of training Americans in al Qaeda. Which is not all that different than what the government is accusing al-Awlaki of now.

And note, too, that Priest and maybe Miller [ed. changed per MD’s comment] both now report that the CIA knew Derwish was in the car when they targeted (they say) al-Harithi. When Miller first reported this in 2002, he didn’t mention Derwish’s presence (nor did Pincus). When Priest broke the story of Derwish’s presence in the car, she stated it was unclear whether CIA knew he was there or not.

It was unclear whether the CIA operatives who fired the missile from hundreds of miles away knew that an American citizen was among their targets. It also was unclear whether that would have made any difference.

I guess I’m suggesting that, first of all, it would seem unnecessary to kill a guy for planning the Cole bombing if you knew you had the guy who–you say–planned the Cole bombing in custody. But that claiming a tie between him and the Cole bombing might provide the excuse to target a car carrying your real target, Derwish.

Share this entry

LAT: The CIA Hasn't Yet Added al-Awlaki to its Kill List

The most interesting thing about Greg Miller’s story on whether Anwar al-Awlaki has been added to the CIA’s list of assassination targets is how it differs from the two stories already written on this subject. Miller says that al-Awlaki has not yet been added to the list.

No U.S. citizen has ever been on the CIA’s target list, which mainly names Al Qaeda leaders, including Osama bin Laden, according to current and former U.S. officials. But that is expected to change as CIA analysts compile a case against a Muslim cleric who was born in New Mexico but now resides in Yemen.

Anwar al Awlaki poses a dilemma for U.S. counter-terrorism officials. He is a U.S. citizen and until recently was mainly known as a preacher espousing radical Islamic views. But Awlaki’s ties to November’s shootings at Ft. Hood and the failed Christmas Day airline plot have helped convince CIA analysts that his role has changed.

That accords with what ABC reported on January 25.

White House lawyers are mulling the legality of proposed attempts to kill an American citizen, Anwar al Awlaki, who is believed to be part of the leadership of the al Qaeda group in Yemen behind a series of terror strikes, according to two people briefed by U.S. intelligence officials.

One of the people briefed said opportunities to “take out” Awlaki “may have been missed” because of the legal questions surrounding a lethal attack which would specifically target an American citizen.

But not with what Dana Priest wrote on January 27.

Both the CIA and the JSOC maintain lists of individuals, called “High Value Targets” and “High Value Individuals,” whom they seek to kill or capture. The JSOC list includes three Americans, including Aulaqi, whose name was added late last year. As of several months ago, the CIA list included three U.S. citizens, and an intelligence official said that Aulaqi’s name has now been added. [Update, February 17, 2010: WaPo has since retracted the report that CIA had US citizens on its kill list.]

I’d suggest Priest’s initial focus on JSOC (though Miller, too, confirms that al-Awlaki is on JSOC’s list) may explain this flurry of articles describing the government’s ultra-secret kill list(s). That is, Priest’s focus on JSOC may suggest the long-brewing turf war between JSOC and CIA on such issues is bubbling up to the surface. That also might explain the spin of the other two article. ABC’s article seems designed to force someone’s hand by painting the CIA as incompetent for missing al-Awlaki in the past. And it might explain CIA spokesperson Paul Gimigliano’s snippiness about the public nature of this debate.

CIA spokesman Paul Gimigliano declined to comment, saying that it is “remarkably foolish in a war of this kind to discuss publicly procedures used to identify the enemy, an enemy who wears no uniform and relies heavily on stealth and deception.”

Now, whatever the differences in the article Miller doesn’t appear to have asked some of the obvious questions any more than Priest or ABC. If we haven’t even tried indicting al-Awlaki yet (particularly with all the increased presence we’ve got in Yemen to pick him up), then how do we have enough information to assassinate him? And why didn’t our vaunted surveillance system pick up this apparently growing threat from al-Awlaki?

As to what new information has come up to merit al-Awlaki’s placement on the kill list (whether CIA’s or JSOC’s)?

But it was his involvement in the two recent cases that triggered new alarms. U.S. officials uncovered as many as 18 e-mails between Awlaki and Nidal Malik Hasan, a U.S. Army major accused of killing 13 people at Ft. Hood, Texas. Awlaki also has been tied to Umar Farouk Abdulmutallab, the Nigerian accused of attempting to detonate a bomb on a Detroit-bound flight.

At least on first report, the emails were not sufficiently damning to concern the FBI. Has that changed? And the phrase “Awlaki has been tied”–you’re going to put someone on a kill list using a passive construction? Really?

Share this entry

OPR Report Altered To Cover Bush DOJ Malfeasance

dbamericasafeMike Isikoff and Dan Klaidman put up a post about an hour ago letting the first blood for the Obama Administration’s intentional tanking of the OPR (Office of Professional Responsibility) Report. In light of Obama’s focused determination to sweep the acts of the Bush Administration, no matter how malevolent, under the rug and “move forward” the report is not unexpected. However, digesting the first leak in what would appear to be a staged rollout is painful:

…an upcoming Justice Department report from its ethics-watchdog unit, the Office of Professional Responsibility (OPR), clears the Bush administration lawyers who authored the “torture” memos of professional-misconduct allegations.

While the probe is sharply critical of the legal reasoning used to justify waterboarding and other “enhanced” interrogation techniques, NEWSWEEK has learned that a senior Justice official who did the final review of the report softened an earlier OPR finding. Previously, the report concluded that two key authors—Jay Bybee, now a federal appellate court judge, and John Yoo, now a law professor—violated their professional obligations as lawyers when they crafted a crucial 2002 memo approving the use of harsh tactics, say two Justice sources who asked for anonymity discussing an internal matter. But the reviewer, career veteran David Margolis, downgraded that assessment to say they showed “poor judgment,” say the sources. (Under department rules, poor judgment does not constitute professional misconduct.) The shift is significant: the original finding would have triggered a referral to state bar associations for potential disciplinary action—which, in Bybee’s case, could have led to an impeachment inquiry.

The news broken in the Newsweek Declassified post is huge, assuming it is accurate, and the sense is that it is. In spite of the weight of the report, the report tucks the substantive content behind the deceptively benign title “Holder Under Fire”. The subject matter is far too significant though for it to have been casually thrown out. Consider this description of the OPR finding on the nature and quality of the critical August 1, 2002 Torture Memo:

The report, which is still going through declassification, will provide many new details about how waterboarding was adopted and the role that top White House officials played in the process, say two sources who have read the report but asked for anonymity to describe a sensitive document. Two of the most controversial sections of the 2002 memo—including one contending that the president, as commander in chief, can override a federal law banning torture—were not in the original draft of the memo, say the sources. But when Michael Chertoff, then-chief of Justice’s criminal division, refused the CIA’s request for a blanket pledge not to prosecute its officers for torture, Yoo met at the White House with David Addington, Dick Cheney’s chief counsel, and then–White House counsel Alberto Gonzales. After that, Yoo inserted a section about the commander in chief’s wartime powers and another saying that agency officers accused of torturing Qaeda suspects could claim they were acting in “self-defense” to prevent future terror attacks, the sources say. Both legal claims have long since been rejected by Justice officials as overly broad and unsupported by legal precedent.

Hard to figure how this finding and conclusion could be determined by David Margolis to warrant the “softening” of the original finding of direct misconduct. Margolis is nearly 70 years old and has a long career at DOJ and is fairly well though of. Margolis was tasked by Jim Comey to shepherd Pat Fitzgerald’s Libby investigation. In short, the man has some bona fides.

Margolis is, however, also tied to the DOJ and its culture for over forty years, not to mention his service in upper management as Associate Attorney General during the Bush Administration when the overt acts of torture and justification by Margolis’ contemporaries and friends were committed. For one such filter to redraw the findings and conclusions of such a critical investigation in order to exculpate his colleagues is unimaginable.

One thing is for sure, with a leak like this being floated out on a late Friday night, the release of the full OPR Report, at least that which the Obama Administration will deem fit for the common public to see, is at hand. Mike Isikoff and Dan Klaidman have made sure the torturers and their enablers can have a comfortable weekend though. So we got that going for us.

Share this entry

ODNI Funded the Author of the "Penis Monologues" to Try to Interest Women in Spying

As Lindsay reported the other day, the TeaBugger who used to work for a college-based intelligence program, Stan Dai, spoofed the Vagina Monologue in college.

In college, Stan Dai co-wrote a satirical work entitled The Penis Monologues, apparently a takeoff on the Vagina Monologues. Here’s a taste:

My Angry Penis

MY PENIS IS ANGRY!!!!!!! You want to know what happened to my penis? Joan happened to my penis! There I was, sleeping peacefully when Joan stormed in and dragged me out for “an educational program.” I thought was going to see Mr. Rogers! But nooooooo! It turned out to be the “Whine-gina Monologues!”

From angry penises to irregular warfare.

Meanwhile, Mark Hosenball has been investigating precisely what the college-based program was. Yesterday, Hosenball reported that the program for which Dai worked was completely funded by the Office of the Director of National Intelligence.

Between August 2007 and October 2008, Stanley Dai served as assistant director of a program called the Intelligence Community Center of Academic Excellence at Trinity Washington University, a small Catholic college in Washington D.C., according to a school official. The official, university vice president Ann Pauley, said that the program was completely funded by the Office of the Director of National Intelligence.

[snip]

Pauley said that she did not know what qualifications Dai had when he was hired to be the program’s assistant director, and she said that he left Trinity when the DNI grant that financed it ended. She said the program was entirely funded by money from the intelligence czar’s office.

And today, Hosenball adds more details about what the program was designed to do: to interest women and minorities into going into the intelligence field.

Ann Pauley, vice president of Trinity Washington University, acknowledged to NEWSWEEK that a key objective of the “Intelligence Community Center of Academic Excellence” at her school was to expose female and minority students to the kind of work spy agencies do and potentially interest them in becoming intelligence officers. Dai was associate director of the program between August 2007 and October 2008. “This program was set up to get minorities and women interested in intelligence careers,” said another person familiar with the program’s operations and goals, who asked for anonymity when discussing the subject because of controversy around the Louisiana case.

As Hosenball points out, it’s ironic that a movement conservative like Dai was involved in what was basically a program to encourage diversity. But I’m a little more shocked that ODNI, under Mike McConnell, was funding Mr. Angry Penis to help recruit women into the field of intelligence.

Share this entry

New ACLU Torture FOIA Docs Working Thread

There are new documents in at the ACLU from their ongoing FOIA effort on the torture tape destruction matter. Here is the ACLU press release with link:

We’ve received some new documents in our DoD torture FOIA lawsuit, related to the CIA’s destruction of interrogation videotapes. They are posted here: http://www.aclu.org/national-security/aclu-v-department-defense, at the end of the section titled Documents Relating to CIA Contempt, with the date of 01/08/2010.

One thing we found interesting – there are a number of documents that focus on “lessons for the future,” some of those from as early as 8/2002, as though the documents memorialize what the CIA is learning as its interrogation program marches on.

Jeff Kaye has already spotted this one:

I think this is first evidence of actual approval from HQ for tape

destruction. Compare this with previous ACLU timeline (as of 11/09):

http://www.aclu.org/files/assets/20091124_Chronology_of_Videotapes.pdf

We knew about the 11/8 request, but not that permission was granted on

that day. If I’m wrong about this, please set me straight.

Share this entry

China Google Attack and the Terrorist Surveillance Program

thumb.phpAs you may know, there was quite a lot of buzz this week about Google potentially leaving China over the hacking of Google’s system. From MSNBC/Reuters:

Google, the world’s top search engine, said on Tuesday it might shut down its Chinese site, Google.cn, after an attack on its infrastructure it believed was primarily aimed at accessing the Google mail accounts of Chinese human rights activists.

Unlike ordinary viruses that are released into cyberspace and quickly spread from computer to computer, the type of attack launched against Google and at least 20 other companies were likely handcrafted uniquely for each targeted organization.

It appears to be a problem that is quite deep according to an in depth article in MacWorld:

Google, by implying that Beijing had sponsored the attack, has placed itself in the center of an international controversy, exposing what appears to be a state-sponsored corporate espionage campaign that compromised more than 30 technology, financial and media companies, most of them global Fortune 500 enterprises.

The U.S. government is taking the attack seriously. Late Tuesday, U.S. Secretary of State Hillary Clinton released a statement asking the Chinese government to explain itself, saying that Google’s allegations “raise very serious concerns and questions.”

But the Macworld article goes on to explain why the United States government may be taking this much more seriously than they let on:

“First, this attack was not just on Google. As part of our investigation we have discovered that at least twenty other large companies from a wide range of businesses – including the Internet, finance, technology, media and chemical sectors – have been similarly targeted,” wrote Google Chief Legal Officer David Drummond in a Tuesday blog posting.

“Second, we have evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists.”

Drummond said that the hackers never got into Gmail accounts via the Google hack, but they did manage to get some “account information (such as the date the account was created) and subject line.”

That’s because they apparently were able to access a system used to help Google comply with search warrants by providing data on Google users, said a source familiar with the situation, who spoke on condition of anonymity because he was not authorized to speak with the press.

“Right before Christmas, it was, ‘Holy s***, this malware is accessing the internal intercept [systems],'” he said.

Uh, “account information”, “subject line”, “search warrants” and “intercept systems”. That ring a bell? This appears to indicate that the state-sponsored Chinese hackers have hacked into the portion of the Google infrastructure that deals with government warrants, intercepts, national security letters and other modalities pertinent to the Terrorist Surveillance Program. That, if true, could be very problematic, one would think.

Now, this is based upon information and belief, but it is my understanding that Google doesn’t store any gmail data in China, which means that this search warrant/intercept machine was located in the US, likely in Mountain View California

That is, if Google’s Mountain View HQ search warrant search interface/computer was hacked, we are probably talking about the same computer used by the Google Legal Department to perform queries in response to DOJ warrants, subpoenas, national security letters, and FISA orders.

Yeah, if that is the case it could be a problem.

Share this entry