“Dear John Brennan: You’re Being Investigated”

A number of people have pointed to Scott Shane’s story on the leak witch hunt for the details it gives on the increasing concern about leak witch hunts among journalists and national security experts.

But this paragraph includes the most interesting news in the article.

The F.B.I. appears to be focused on recent media disclosures on American cyberattacks on Iran, a terrorist plot in Yemen that was foiled by a double agent and the so-called “kill list” of terrorist suspects approved for drone strikes, some of those interviewed have told colleagues. The reports, which set off a furor in Congress, were published by The New York Times, The Associated Press, Newsweek and other outlets, as well as in recent books by reporters for Newsweek and The Times. [my emphasis]

That’s because prior reporting had indicated that the Kill List stories were not being investigated.

Recent revelations about clandestine U.S. drone campaigns against al Qaeda and other militants are not part of two major leak investigations being conducted by federal prosecutors, sources familiar with the inquiries said.

[snip]

The CIA has not filed a “crime report” with the Justice Department over reports about Obama’s drone policy and a U.S. “kill list” of targeted militants, an action which often would trigger an official leak investigation, two sources familiar with the matter said. They

So Shane’s revelation that the Kill List stories are being investigated amounts to the author of one of the Kill List stories reporting that some people who have been interviewed by the FBI told colleagues they got asked about the Kill List. Which might go something like, “Scott, they’re asking about your story, too.”

All without Shane acknowledging that Shane wrote one of the main Kill List Shiny Object stories.

Meanwhile, I find his reference to the outlets involved very interesting. Using the principle of parallelism, the passage seems to suggest the FBI is investigating the NYT for David Sanger’s sources on StuxNet, the AP for Adam Goldman and Matt Apuzzo’s sources on the UndieBomb 2.0 plot, and Newsweek for Daniel Klaidman’s sources on the Kill List. But of course the NYT also wrote a Kill List story, the AP wrote what is probably the most interesting Kill List story (which reported that the Kill List is now run by John Brennan). “And other outlets.” Which might include ABC for revealing that the UndieBomb 2.0 plotter was actually an infiltrator (ABC got the story indirectly from John Brennan, though Richard Clarke). Or the WaPo for Greg Miller’s original story on drone targeting, revealing that we were going to use signature strikes in Yemen. Or the WSJ, reporting that we had started using signature strikes.

In other words, it presents a rather interesting group of potential stories and sources.

Now I don’t know that John Brennan was the source for all this or that he’s really being investigated. I’m not saying Shane is being manipulative by reporting on this (though seriously, it’s another example of the NYT having a reporter report on a story that he is really a part of).

But I do find it rather interesting that a reporter targeted in this leak witch hunt just made news about the scope of the leak witch hunt.

Using Pensions to “Punish” “Leaks” Will Subject Clearance Holders to Arbitrary Power

The Senate Intelligence Committee’s new anti-leak laws are the part of the Intelligence Authorization that will generate the most attention. Greg Miller already got Dianne Feinstein to admit there’s no reason to think one of the new provisions–permitting only the most senior intelligence officials to do background briefings–will limit leaks.

Feinstein acknowledged that she knew of no evidence tying those leaks or others to background sessions, which generally deal broadly with analysts’ interpretations of developments overseas and avoid discussions of the operations of the CIA or other spy services.

Another of the provisions–requiring intelligence committee heads to ensure that every sanctioned leak be recorded–ought to be named the Judy Miller and Bob Woodward Insta-Leak Recording Act.

(a) RECORD REQUIREMENT.—The head of each element of the intelligence community shall ensure that such element creates and maintains a record of all authorized disclosures of classified information to media personnel, including any person or entity under contract or other binding agreement with the media to provide analysis or commentary, or to any person or entity if the disclosure is made with the intent or knowledge that such information will be made publicly available.

I’m sure someone can think of some downside to this provision, but I can’t think of it at the moment (which is why Obama will probably find some way to eliminate it). It will end some of the asymmetry and abuse of classification as it currently exists.

In addition, there are a bunch of provisions that are just dumb bureaucracy.

But it’s this one that is deeply troubling. Among the other provisions making nondisclosure agreements more rigorous is a provision that would allow an intelligence community head to take away a person’s pension if they “determine” that an individual violated her nondisclosure agreement.

Read more

As Mitt Heads to Sheldon Adelson’s Country, CIA Exposes Israel’s Treachery

After visiting his bankster donors in London, Mitt is on his way to visit megadonor Sheldon Adelson’s other country, Israel. Perhaps in a bid to butter up Adelson, Mitt’s staffers put up an Israeli flag on the plane before they remembered he’s running to be President of the United States.

And just as Mitt prepares to suck up to Israel, leak witch hunt targets Matt Apuzzo and Adam Goldman have a piece cataloging how much Israel spies on us. They describe:

  • Someone tampering with the CIA station chief’s secure phone on at least two occasions
  • Someone rearranging the food in a CIA officer’s fridge
  • Leaking details from a key Syrian chem and bioweapons scientist working for the US, which led to his disappearance and presumed death

It also reveals that after it gave up its nuke program, the CIA considered Libya a better counter-terrorism partner than Israel.

During the Bush administration, the CIA ranked some of the world’s intelligence agencies in order of their willingness to help in the U.S.-led fight against terrorism. One former U.S. intelligence official who saw the completed list said Israel, which hadn’t been directly targeted in attacks by al-Qaida, fell below Libya, which recently had agreed to abandon its nuclear weapons program.

Now, it’s not just Mitt who sucks up to the Israelis. Goldman and Apuzzo note the US has given Israel $60 billion since we nabbed Jonathan Pollard and Obama just released an additional $70 million of military aid.

But as Mitt tries to appear less obtuse in Israel than he did in UK, remember that the Israelis are probably stealing our secrets even as he unfurls their flag.

Cheney’s Thugs Win the Prize for Leak Hypocrisy

I wasn’t much interested in Mitt Romney’s latest efforts to change the narrative from the evil things he profited off of at Bain Capital and the tax havens he stashed the money he got as a result. Not only don’t I think journalists will be all that interested in Mitt’s claim that Obama’s White House is a leaky sieve. But I’m not about to defend the Most Fucking Transparent™ White House in Fucking History against such accusations.

Until Cheney’s thugs start leading the attack.

Such as Eric Edelman, who says we need “change” because Obama’s Administration leaked details of the Osama bin Laden raid.

Eric Edelman is this guy:

Shortly after publication of the article in The New Republic, LIBBY spoke by telephone with his then Principal Deputy [Edelman] and discussed the article. That official asked LIBBY whether information about Wilson’s trip could be shared with the press to rebut the allegations that the Vice President had sent Wilson. LIBBY responded that there would be complications at the CIA in disclosing that information publicly, and that he could not discuss the matter on a non-secure telephone line

Four days after Edelman made the suggestion to leak information about Joe Wilson’s trip, Scooter Libby first revealed to Judy Miller that Valerie Plame worked at the CIA.

But Edelman is not the only one of Cheney’s thugs bewailing leakers: (h/t Laura Rozen, who follows BabyDick so I don’t have to)

Romney today at VFW on contemptible conduct of Obama White House leaking classified info for political gain. Must read. http://tinyurl.com/bw4s4lt

Now, to be fair to dear BabyDick, unlike Edelman she has not been directly implicated in her father’s deliberate exposure of a US CIA officer working to stop nuclear proliferation. Unlike Edelman, she was not protected from legal jeopardy by Scooter Libby’s lies.

But she did co-author her father’s book, which was a whitewash of his treachery (even if it did reveal that Cheney had a second interview with Pat Fitzgerald, one treated as a grand jury appearance, just around the time Fitzgerald subpoenaed Judy Miller. BabyDick Cheney is complicit in the lies the Cheney thugs have used to hide what a contemptible leak for political gain the Plame leak was.

And now she thinks she should lecture others about far less treacherous leaks?

DOD’s New Anti-Leak Plan: Turn Michael Vickers into a Blogger

DOD just rolled out its new plan to combat national security leaks. (h/t Jason Leopold) At its core is a “top-down” approach: to have the Under Secretary for Defense of Intelligence, Mike Vickers, to review all major reporting to look for leaks.

To ensure greater accountability and tracking of unauthorized disclosures, Secretary Panetta is directing a new “top down” approach as well.  The Undersecretary of Defense for Intelligence, in consultation with the Assistant Secretary for Public Affairs, will monitor all major, national level media reporting for unauthorized disclosures of defense department classified information.

One one level this seems like a good idea. I mean, I’m a blogger, and I usually have a better idea of who’s leaking than the people overseeing Executive Branch agencies. But hey, I don’t want to shortchange journalists; Walter Pincus performs a nice bit of leak debunkery with this piece, for example.

But there does seem to be one problem with the plan to have Mike Vickers watch for any security breaches. Doesn’t he have a day job? Isn’t he supposed to be watching the Taliban and China and cyberattacks? Have we gotten so paranoid that one of our top intelligence people is going to spend his time watching journalists than watching our military enemies?

On another issue, though, DOD is to be congratulated. Today’s release also revealed that, within the last few months, it has put in place the no-brainer security fixes that it promised in response to the WikiLeaks breach.

Lockdown of removable storage device use on the Defense Secure Network (SIPRNET).  The department has deployed a host-based security system (HBSS) tool to virtually monitor every defense department computer.  HBSS prevents the downloading of information onto removable storage like DVDs, CDs, and memory sticks, with very limited exceptions.  The tool also sends an alarm any time someone tries to write classified information to such removable storage.  For authorized exceptions, the tool audits any downloads of information.

Improved monitoring of DoD networks.  The department issued a cyber identity credential (Public Key Infrastructure certificate) to every person operating on the department unclassified network.  That process is underway for the classified network as well. Department personnel are working with other federal departments and agencies to help them issue the same cyber identity credential to all employees who need to access any of the government’s secret networks.

Improving the auditing of information accesses so as to spot anomalous behavior.  Department information officers are assessing the use of HBSS and other tools to collect and centralize data about information accesses to more quickly improve detection of malicious insiders.

Though of course, DOD promised to impose some controls on removable media in 2008, when someone introduced malware into DOD’s networks via a thumb drive. So after 4 years, DOD should be congratulated for finally closing the Lady Gaga security hole.

Lamar Smith’s Futile Leak Investigation

Lamar Smtih has come up with a list of 7 national security personnel he wants to question in his own leak investigation. (h/t Kevin Gosztola)

House Judiciary Committee Chairman Lamar Smith, R-Texas, told President Obama Thursday he’d like to interview seven current and former administration officials who may know something about a spate of national security leaks.

[snip]

The administration officials include National Security Advisor Thomas Donilon, Director of National Intelligence James Clapper, former White House Chief of Staff Bill Daley, Assistant to the President for Homeland Security and Counterterrorism John Brennan, Deputy National Security Advisor Denis McDonough, Director for Counterterrorism Audrey Tomason and National Security Advisor to the Vice President Antony Blinken.

Of course the effort is sure to be futile–if Smith’s goal is to figure out who leaked to the media (though it’ll serve its purpose of creating a political shitstorm just fine)–for two reasons.

First, only Clapper serves in a role that Congress has an unquestioned authority to subpoena (and even there, I can see the Intelligence Committees getting snippy about their turf–it’s their job to provide impotent oversight over intelligence, not the Judiciary Committees).

As for members of the National Security Council (Tom Donilon, John Brennan, Denis McDonough, Audrey Tomason, and Antony Blinken) and figures, like Bill Daley, who aren’t congressionally approved? That’s a bit dicier. (Which is part of the reason it’s so dangerous to have our drone targeting done in NSC where it eludes easy congressional oversight.)

A pity Republicans made such a stink over the HJC subpoenaing Karl Rove and David Addington and backed Bush’s efforts to prevent Condi Rice from testifying, huh?

The other problem is that Smith’s list, by design, won’t reveal who leaked the stories he’s investigating. He says he wants to investigate 7 leaks.

Smith said the committee intends to focus on seven national security leaks to the media. They include information about the Iran-targeted Stuxnet and Flame virus attacks, the administration’s targeted killings of terrorism suspects and the raid which killed Usama bin Laden.

Smith wants to know how details about the operations of SEAL Team Six, which executed the bin Laden raid in Pakistan, wound up in the hands of film producers making a film for the president’s re-election. Also on the docket is the identity of the doctor who performed DNA tests which helped lead the U.S. to bin Laden’s hideout.

But his list doesn’t include everyone who is a likely or even certain leaker.

Take StuxNet and Flame. Not only has Smith forgotten about the programmers (alleged to be Israeli) who let StuxNet into the wild in the first place–once that happened, everything else was confirmation of things David Sanger and security researchers were able to come up with on their own–but he doesn’t ask to speak to the Israeli spooks demanding more credit for the virus.

Read more

The House Judiciary Committee Preens in Full Ignorance at Leaks Hearing

The headline that has come out of yesterday’s House Judiciary Committee hearing on leaks is that the Committee may subpoena people. As US News correctly reports, one push for subpoenas came from a John Conyers ploy trying to call Republican members’ bluff; he basically asked how they could be sure who leaked the stories in question and if they were they should just subpoena those people to testify to the committee.

It’s a testament to the thin knowledge of these stories that none of the Republicans responded, “John Brennan.” But then, even if they had, the committee would quickly get into trouble trying to subpoena Brennan as National Security Advisors (and Deputy NSAs) have traditionally been excused from Congressional subpoena for deliberation reasons, a tradition reinforced by Bush’s approach with Condi Rice.

Ah well. I’m sure we’re going to have some amusing theater of Jim Sensenbrenner trying to force Conyers to come up with some names now.

The other big push for subpoenas, though, came from Trey Gowdy. Partly because he wanted to create an excuse to call a Special Prosecutor and partly because, just because, he was most interested in subpoenaing some journalists. And in spite of the way that former Assistant Attorney General Ken Wainstein patiently explained why there are good, national security, reasons why DOJ is hesitant to subpoena journalists, Gowdy wouldn’t let up.

But what concerned me more is that no one–not a single person on the House committee that oversees DOJ–explained that DOJ doesn’t need to subpoena journalists to find out who they’ve been talking to. They’ve given themselves the authority to get journalist call records in national security cases without Attorney General approval.

That’s a detail every member of the committee should know, particularly if they’re going to hold hearings about whether DOJ can adequately investigate leaks. And while I expect Trey Gowdy to be ignorant, it seems they all are ignorant of this detail.

There was another display of ignorance I find troubling for a different reason. Dan Lungren suggested that he learned of what we’re doing with StuxNet from David Sanger’s reports. He rightly noted that–as the Chair of the House Homeland Security Subcommittee on Cybersecurity–he ought to learn these things from the government, not the NYT. And while his ignorance of StuxNet’s escape may be due to the timing of his ascension to the Subcommittee Chair (most members of the Gang of Four, except Dianne Feinstein, would not have gotten briefed on early stages of StuxNet, when someone should have told the government what a boneheaded plan it was), the Subcommittee still should be aware that our own recklessness has made us vulnerable in dangerous new ways.

Perhaps the most telling detail of the hearing, though, came from retired Colonel Kenneth Allard. He was brought on, I guess, to label what we did with StuxNet an act of war (without, of course, considering whether that is the problem rather than the exposure that both Republican and Democratic Administrations are engaging in illegal war without telling anyone). In his comments, he went so far as to say that “What Mr. Sanger did is equivalent of having KGB operation run against White House.”

Someone had to accuse the journalists of being enemy spies.

But Allard’s statement reveals where all this comes from: personal pique against the NYT for coverage they’ve done on him. Not only did he complain that David Sanger’s publisher didn’t give the New York Journal of Books, for which he writes reviews, an advance copy, but also that the NYT reported on the scam the Pentagon set up to give select Generals and Colonels inside information to spin favorably on TV.

Third, I have personally experienced what it feels like when the NYT deliberately distorts national security information, even to the point of plagiarism. On April 20, 2008, the NYT published an inflammatory expose: “Behind Analysts, Pentagon’s Hidden Hand” by David Barstow. The Times’ article charged that over 70 retired officers, including me, had misused our positions while serving as military analysts with the broadcast and cable TV networks. Read more

Security Clearance Tyranny

Let’s review three data points on security clearances. They’ll show that our system of security clearances are increasingly becoming an arbitrary system of control that does more to foster cowed national security employees than to foster actual national security.

We’ve already discussed one of these data points: James Clapper’s decision to add an as-yet undefined question to Intelligence Community polygraphs probing unauthorized (but not authorized) disclosure of classified information.

First, those agencies within the IC that have mandatory lie detector tests will add an unspecified question about “unauthorized disclosure of classified information.”

(1) mandating that a question related to unauthorized disclosure of classified information be added to the counterintelligence polygraph used by all intelligence agencies that administer the examination (CIA, DIA, DOE, FBI, NGA, NRO, and NSA).

Not only does this cover just some who might have access to classified information, leaving some agencies, contractors, Congressional employees, and White House employees, not to mention our international intelligence partners, in the clear. But it also brackets off the “authorized” disclosure of classified information.

It’s a bad decision because it doesn’t end the asymmetrical abuse of classified information and it’s a bad decision because polygraphs are unreliable.

But it’s also unreliable because at least one of the IC agencies involved slated for this new question–the National Reconnaissance Office–has already been conducting fishing expeditions during polygraphs to find sensitive information.

The National Reconnaissance Office is so intent on extracting confessions of personal or illicit behavior that officials have admonished polygraphers who refused to go after them and rewarded those who did, sometimes with cash bonuses, a McClatchy investigation found.

The disclosures include a wide range of behavior and private thoughts such as drug use, child abuse, suicide attempts, depression and sexual deviancy. The agency, which oversees the nation’s spy satellites, records the sessions that were required for security clearances and stores them in a database.

As McClatchy reports, the NRO pursued such confessions–which are outside the scope of what they’re supposed to ask–even after they were warned to stop.

What’s particularly troubling is that the NRO is not using this information–or not in the most obvious way, by prosecuting those who reveal past crimes. Read more

Failed Overseers Prepare to Legislate Away Successful Oversight

Before I talk about the Gang of Four’s proposed ideas to crack down on leaks, let’s review what a crop of oversight failures these folks are.

The only one of the Gang of Four who has stayed out of the media of late–Dutch Ruppersberger–has instead been helping Mike Rogers push reauthorization of the FISA Amendments Act through the House Intelligence Committee with no improvements and no dissents. In other words, Ruppersberger has delivered for his constituent–the NSA–in spite of the evidence the government is wiretapping those pesky little American citizens Ruppersberger should be serving.

Then there’s Rogers himself, who has been blathering to the press about how these leaks are the most damaging in history. He supported such a claim, among other ways, by suggesting people (presumably AQAP) would assume for the first time we (or the Saudis or the Brits) have infiltrators in their network.

Some articles within this “parade” of leaks, Rogers said late last week, “included at least the speculation of human source networks that now — just out of good counterintelligence activities — they’ll believe is real, even if its not real. It causes huge problems.”

Which would assume Rogers is unaware that the last time a Saudi infiltrator tipped us off to a plot, that got exposed too (as did at least one more of their assets). And it would equally assume Rogers is unaware that Mustafa Alani and other “diplomatic sources” are out there claiming the Saudis have one agent or informant infiltrated into AQAP regions for every 850 Yemeni citizens.

In short, Rogers’ claim is not credible in the least.

Though Rogers seems most worried that the confirmation–or rather, reconfirmation–that the US and Israel are behind StuxNet might lead hackers to try similar tricks on us and/or that the code–which already escaped–might escape.

Rogers, who would not confirm any specific reports, said that mere speculation about a U.S. cyberattack against Iran has enabled bad actors. The attack would apparently be the first time the U.S. used cyberweapons in a sustained effort to damage another country’s infrastructure. Other nations, or even terrorists or hackers, might now believe they have justification for their own cyberattacks, Rogers said.

This could have devastating effects, Rogers warned. For instance, he said, a cyberattack could unintentionally spread beyond its intended target and get out of control because the Web is so interconnected. “It is very difficult to contain your attack,” he said. “It takes on a very high degree of sophistication to reach out and touch one thing…. That’s why this stuff is so concerning to me.”

Really, though, Rogers is blaming the wrong people. He should be blaming the geniuses who embraced such a tactic and–if it is true the Israelis loosed the beast intentionally–the Israelis most of all.

And while Rogers was not a Gang of Four member when things started going haywire, his colleague in witch hunts–Dianne Feinstein–was. As I’ve already noted, one of the problems with StuxNet is that those, like DiFi, who had an opportunity to caution the spooks either didn’t have enough information to do so–or had enough information but did not do their job.The problem, then, is not leaks; it’s inadequacy of oversight.

In short, Rogers and Ruppersberger and Chambliss ought to be complaining about DiFi, not collaborating with her in thwarting oversight.

Finally, Chambliss, the boss of the likely sources out there bragging about how unqualified they are to conduct intelligence oversight, even while boasting about the cool videogames they get to watch in SCIFs, appears to want to toot his horn rather the conduct oversight.

Which brings me back to the point of this post, before I got distracted talking about how badly the folks offering these “solutions” to leaks are at oversight.

Their solutions:

Discussions are ongoing over just how stringent new provisions should be as the Senate targets leakers in its upcoming Intelligence Authorization bill, according to a government source.

Read more

SCOTUS Conservatives in Anonymous Disarray

I expressed skepticism about the part of Jan Crawford’s story confirming John Roberts flipped his vote on ObamaCare that claimed Roberts had no role in writing the dissent.

Finally, there is Crawford’s not entirely convincing explanation for the relics in the dissent that seem to suggest Roberts had a hand in crafting the dissent, too.

The two sources say suggestions that parts of the dissent were originally Roberts’ actual majority decision for the Court are inaccurate, and that the dissent was a true joint effort.

The fact that the joint dissent doesn’t mention Roberts’ majority was not a sign of sloppiness, the sources said, but instead was a signal the conservatives no longer wished to engage in debate with him.

If true, those relics, which violate normal protocol for referring to other opinions, reflect a very big affront to Roberts’ governing opinion.

Salon now has a single anonymous source disputing Crawford’s two anonymous sources on this point.

Crawford’s sources insist on the claim that the joint dissent was authored specifically in response to Roberts’ majority opinion, without any participation from him at any point in the drafting process that created it. It would, after all, be fairly preposterous for the four dissenters to jointly “author” an opinion that was in large part written originally by the author of the majority opinion to which the joint dissenters were now so flamboyantly objecting.

Yet that, I am told by a source within the court with direct knowledge of the drafting process, is exactly what happened. My source insists that “most of the material in the first three quarters of the joint dissent was drafted in Chief Justice Roberts’ chambers in April and May.” Only the last portion of what eventually became the joint dissent was drafted without any participation by the chief justice.

[snip]

Roberts’ chamber did much of the drafting of the [first 46 pages of the dissent, which don’t mention Roberts’ opinion], and none of the [last 19 pages, which do mention it]. In short, it appears Chief Justice Roberts ended up in large part authoring both the majority opinion and the dissent in National Federation of Independent Business v. Sebelius.

Set aside the fact we’ve got a anonymous leak war going on, with neither side inherently garnering credibility. Set aside what Salon’s report, if correct, would suggest about Roberts.

I want to focus on what it means that comity in the court has broken down in this way. If Crawford’s report comes, as many suspected, from the conservative justices themselves, it would suggest they leaked a transparently illogical cover story (in that it didn’t explain the relics that made everyone suspicious about the dissent in the first place). They not only broke SCOTUS protocol about leaks, but did so and, reportedly, lied in doing so.

Then you’ve got a quick response from someone–could this be a Roberts clerk? one of the other conservatives?–calling out that purported lie.

To what end? To shift the emphasis on Roberts’ fickleness? To try to tone down the confrontational claims at the heart of the Crawford piece? And if another of the conservatives is behind the Salon report, then how do the original leakers feel about the story? What are the political objectives of each side of this anonymous leak war?

And all this is just what we can see through the screen of anonymity. The rancor this expresses must be worse in person.

Even if it’s all anonymous, I gotta say, I’m glad this leak fest has revealed the conservative justices in all their bitchy glory.

Read more