June 16, 2024 / by 

 

10 Years of emptywheel: Key Non-Surveillance Posts 2011-2012

Happy Birthday to me! To us! To the emptywheel community!

On December 3, 2007, emptywheel first posted as a distinct website. That makes us, me, we, ten today.

To celebrate, over the next few days, the emptywheel team will be sharing some of our favorite work from the last decade. I’ll be doing probably 3 posts featuring some of my most important or — in my opinion — resilient non-surveillance posts, plus a separate post bringing together some of my most important surveillance work. I think everyone else is teeing up their favorites, too.

Putting together these posts has been a remarkable experience to see where we’ve been and the breadth of what we’ve covered, on top of mainstays like surveillance. I’m really proud of the work I’ve done, and proud of the community we’ve maintained over the years.

For years, we’ve done this content ad free, relying on donations and me doing freelance work for others to fund the stuff you read here. I would make far more if I worked for some free-standing outlet, but I wouldn’t be able to do the weedy, iterative work that I do here, which would amount to not being able to do my best work.

If you’ve found this work valuable — if you’d like to ensure it remains available for the next ten years — please consider supporting the site.

 

2011

DOJ Points to David Passaro’s Trial as Proof We Investigate Torture, But It Actually Proves John Yoo Should Be Tried

I’v written a lot about the David Passaro case — the only one associated with the CIA (he was a contractor training Afghans) to be prosecuted for abuse. This post summarizes a lot of the problems with his case and its use to claim that the US ever held itself responsible for torture.

One Year After Collateral Murder Release, DOD’s Networks Are Still Glaring Security Problem

I’ve done a ton of posts on how the government complains about leaks even while it fails to close gaping security holes in its networks. This was one of the first. A day later I noted that DOD wasn’t aspiring to fix these problems until 2013; as it would turn out, Edward Snowden managed to download NSA’s crown jewels before they would fix them.

The Drone War on Westphalia

For Independence Day in 2011, I wrote a post arguing that the damage the use of drones will do to sovereignty will pose a real problem, particularly with regard to the consent of the governed. In a follow-up I argued against invoking “national security” to defend policies that weaken the nation.

Pakistani Bounty Claims: Adnan Farhan Abd Al Latif and TD-314/00684-02

In the first of a bunch of posts on Adnan Farhan abd al Latif, I showed that the intelligence report on which his detention relied — which Judge Henry Kennedy had originally deemed unreliable — probably was used to detain a bunch of people turned over with bounties.

49% of Michigan’s African Americans to Lose Their Right to Self-Governance

As the country started focusing on MI’s disastrous policy of  emergency managers, I was the first to note the moment when half of Michigan’s African Americans lost their right to local self-governance.

2012

Why Has the Government Story about Who Ordered the UndieBomber to Attack the US Changed?

As part of an effort to justify drone-killing Anwar al-Awlaki, the government publicly blamed him for all of Umar Farouk Abdulmutallab’s attack on the US, blame which should have been shared with others in AQAP. This was the first post where I made that clear.

“The Gloves Come Off” Memorandum of Notification

I discovered that language the government was trying to keep classified in the ACLU torture FOIA was not (as ACLU mistakenly believed) a description about waterboarding, but instead an admission that torture was authorized by the September 17, 2001 Memorandum of Notification that authorized a bunch of other programs. This was a key post in a series of posts on the MON.

US Climate Inaction: Blame Dick Cheney

I believe the US invaded Iraq as part of a Cheney-backed decision to double down on our petroleum-based hegemonic position in the world, in the apparent belief that we can clean up the damage from climate change at some later time. Even our shift to fracking is more about power than the environment. Given how catastrophic the Iraq war was, and given everything that has occurred since — not least our singular abstention from the Paris Accord — I think it a particularly ironic choice.

Lanny Breuer Covers Up Material Support for Terrorism

I wrote a ton about Obama’s failure to prosecute the banks that blew up the world’s economy. One of the most important ones was the post where I laid out Lanny Breuer’s efforts to hide the fact that HSBC had materially supported al Qaeda. Of course, it got no more than a hand slap even as Pete Seda was in prison for closely related actions (Seda’s case ultimately blew up).

Other Key Post Threads

10 Years of emptywheel: Key Non-Surveillance Posts 2008-2010


10 Years of emptywheel: Key Non-Surveillance Posts 2008-2010

Happy Birthday to me! To us! To the emptywheel community!

On December 3, 2007, emptywheel first posted as a distinct website. That makes us, me, we, ten today.

To celebrate, over the next few days, the emptywheel team will be sharing some of our favorite work from the last decade. I’ll be doing probably 3 posts featuring some of my most important or — in my opinion — resilient non-surveillance posts, plus a separate post bringing together some of my most important surveillance work. I think everyone else is teeing up their favorites, too.

Putting together these posts has been a remarkable experience to see where we’ve been and the breadth of what we’ve covered, on top of mainstays like surveillance. I’m really proud of the work I’ve done, and proud of the community we’ve maintained over the years.

For years, we’ve done this content ad free, relying on donations and me doing freelance work for others to fund the stuff you read here. I would make far more if I worked for some free-standing outlet, but I wouldn’t be able to do the weedy, iterative work that I do here, which would amount to not being able to do my best work.

If you’ve found this work valuable — if you’d like to ensure it remains available for the next ten years — please consider supporting the site.

2008

We Are All Flint, MI Now

During the bailout, I did a post trying to imagine the worst that could happen if GM went bankrupt. One of my biggest worries — that China would start importing Buicks, making it far harder for US manufacturers to compete, has already happened.

This was, of course, before Republican mismanagement poisoned the entire city of Flint, MI. Perhaps the post is even more true now.

2009

Khalid Sheikh Mohammed Was Waterboarded 183 Times in One Month

While most of DC was busily engaged in both sides journalism on the impact of Obama’s decision to release the torture memos in 2009, I (and readers here!) was reading closely. Which is how I noted the reference to the 183 waterboards CIA administered to KSM in one month.

“Affordable” Health Care

Bill Supporters Still Can’t Say “Affordable”

In a series of posts at the end of 2009, I laid out how ObamaCare still required participants to spend too much of their income on health insurance and care, which would lead to lots of people to not use it. That has turned out to be one of the biggest problems with ObamaCare (and one of the reason it wasn’t all that popular until Trump tried to take it away). If Democrats ever wrest control from the Republicans again, this is a problem that still needs to be fixed.

2010

Abu Zubaydah’s Torturers Relied on July 13 Yoo Fax, not Bybee Memo

I found a lot of things (including Gul Rahman’s ID, but I waited on that to protect the identity of the CIA officer who oversaw his killing) in the Office of Professional Management report on John Yoo’s torture memos released in 201. One that remains important — and poorly understood — is that the first torture actually operated under authorization from a freelance fax from Yoo issued weeks before the famous August 1 Bybee memo, rather than the full OLC memo itself.

FDL Book Salon Welcomes Steven Rattner, Author of Overhaul

There were two or three of Bev’s badly missed book salons I hosted that I particularly enjoyed (Bob Woodward is another). But none was better than hosting Steven Rattner, for his very blinkered view of his own role in the auto bailout. The comment thread in it was epic, too, but sadly gone.

Hatfill and Wen Ho Lee and Plame and al-Awlaki and Assange

After a panel on the Scooter Libby case, I meditated on how those with the secrets increasingly use journalists as a stand in for due process. This is not a post I’ve returned to a lot, but particularly given everything that has transpired since, particularly given where Assange has gone since, it strikes a nerve.


The Problems with Rosemary Collyer’s Shitty Upstream 702 Opinion

This post took a great deal of time, both in this go-around, and over the years to read all of these opinions carefully. Please consider donating to support this work. 

It often surprises people when I tell them this, but in general, I’ve got a much better opinion of the FISA Court than most other civil libertarians. I do so because I’ve actually read the opinions. And while there are some real stinkers in the bunch, I recognize that the court has long been a source of some control over the executive branch, at times even applying more stringent standards than criminal courts.

But Rosemary Collyer’s April 26, 2017 opinion approving new Section 702 certificates undermines all the trust and regard I have for the FISA Court. It embodies everything that can go wrong with the court — which is all the more inexcusable given efforts to improve the court’s transparency and process since the Snowden leaks. I don’t think she understood what she was ruling on. And when faced with evidence of years of abuse (and the government’s attempt to hide it), she did little to rein in or even ensure accountability for those abuses.

This post is divided into three sections:

  • My analysis of the aspects of the opinion that deal with the upstream surveillance
    • Describing upstream searches
    • Refusing to count the impact
    • Treating the problem as exclusively about MCTs, not SCTs
    • Defining key terms
    • Failing to appoint (much less consider) appointing an amicus
    • Approving back door upstream searches
    • Imposing no consequences
  • A description of all the documents I Con the Record released — and more importantly, the more important ones it did not release (if you’re in the mood for weeds, start there)
  • A timeline showing how NSA tried to hide these violations from FISC

Opinion

The Collyer opinion deals with a range of issues: an expansion of data sharing with the National Counterterrorism Center, the resolution of past abuses, and the rote approval of 702 certificates for form and content.

But the big news from the opinion is that the NSA discovered it had been violating the terms of upstream FISA collection set in 2011 (after violating the terms of upstream FISA set in 2007-2008, terms which were set after Stellar Wind violated FISA since 2002). After five months of trying and failing to find an adequate solution to fix the problem, NSA proposed and Collyer approved new rules for upstream collection. The collection conducted under FISA Section 702 is narrower than it had been because NSA can no longer do “about” searches (which are basically searching for some signature in the “content” of a communication). But it is broader — and still potentially problematic — because NSA now has permission to do the back door searches of upstream collected data that they had, in reality, been doing all along.

My analysis here will focus on the issue of upstream collection, because that is what matters going forward, though I will note problems with the opinion addressing other topics to the extent they support my larger point.

Describing upstream searches

Upstream collection under Section 702 is the collection of communications identified by packet sniffing for a selector at telecommunication switches. As an example, if the NSA wants to collect the communications of someone who doesn’t use Google or Yahoo, they will search for the email address as it passes across circuits the government has access to (overseas, under EO 12333) or that a US telecommunications company runs (domestically, under 702; note many of the data centers at which this occurs have recently changed hands). Stellar Wind — the illegal warrantless wiretap program done under Bush — was upstream surveillance. The period in 2007 when the government tried to replace Stellar Wind under traditional FISA was upstream surveillance. And the Protect America Act and FISA Amendments Act have always included upstream surveillance as part of the mix, even as they moved more (roughly 90% according to a 2011 estimate) of the collection to US-based providers.

The thing is, there’s no reason to believe NSA has ever fully explained how upstream surveillance works to the FISC, not even in this most recent go-around (and it’s now clear that they always lied about how they were using and processing a form of upstream collection to get Internet metadata from 2004 to 2011). Perhaps ironically, the most detailed discussions of the technology behind it likely occurred in 2004 and 2010 in advance of opinions authorizing collection of metadata, not content, but NSA was definitely not fully forthcoming in those discussions about how it processed upstream data.

In 2011, the NSA explained (for the first time), that it was not just collecting communications by searching for a selector in metadata, but it was also collecting communications that included a selector as content. One reason they might do this is to obtain forwarded emails involving a target, but there are clearly other reasons. As a result of looking for selectors as content, NSA got a lot of entirely domestic communications, both in what NSA called multiple communication transactions (“MCTs,” basically emails and other things sent in bundles) and in single communication transactions (SCTs) that NSA didn’t identify as domestic, perhaps because they used Tor or a VPN or were routed overseas for some other reason. The presiding judge in 2011, John Bates, ruled that the bundled stuff violated the Fourth Amendment and imposed new protections — including the requirement NSA segregate that data — for some of the MCTs. Bizarrely, he did not rule the domestic SCTs problematic, on the logic that those entirely domestic communications might have foreign intelligence value.

In the same order, John Bates for the first time let CIA and NSA do something FBI had already been doing: taking US person selectors (like an email address) and searching through already collected content to see what communications they were involved in (this was partly a response to the 2009 Nidal Hasan attack, which FBI didn’t prevent in part because they were never able to pull up all of Hasan’s communications with Anwar al-Awlaki at once). Following Ron Wyden’s lead, these searches on US person content are often called “back door searches” for the way they let the government read Americans’ communications without a warrant. Because of the newly disclosed risk that upstream collection could pick up domestic communications, however, when Bates approved back door searches in 2011, he explicitly prohibited the back door searching of data collected via upstream searches. He prohibited this for all of it — MCTs (many of which were segregated from general repositories) and SCTs (none of which were segregated).

As I’ve noted, as early as 2013, NSA knew it was conducting “many” back door searches of upstream data. The reasons why it was doing so were stupid: in part, because to avoid upstream searches analysts had to exclude upstream repositories from the search query (basically by writing “NOT upstream” in a Boolean query), which also required them realizing they were searching on a US person selector. For whatever reason, though, no one got alarmed by reports this was going on — not NSA’s overseers, not FISC (which reportedly got notices of these searches), and not Congress (which got notices of them in Semiannual reports, which is how I knew they were going on). So the problem continued; I noted that this was a persistent problem back in August, when NSA and DOJ were still hiding the extent of the problems from FISC.

It became clear the problem was far worse than known, however, when NSA started looking into how it dealt with 704 surveillance. Section 704 is the authority the NSA uses to spy on Americans who are overseas. It basically amounts to getting a FISC order to use EO 12333 spying on an American. An IG Report completed in January 2016 generally found 704 surveillance to be a clusterfuck; as part of that, though, the NSA discovered that there were a whole bunch of 704 backdoor searches that weren’t following the rules, in part because they were collecting US person communications for periods outside of the period when the FISC had authorized surveillance (for 705(b) communication, which is the spying on Americans who are simply traveling overseas, this might mean NSA used EO 12333 to collect on an American when they were in the US). Then NSA’s Compliance people (OCO) did some more checking and found still worse problems.

And then the government — the same government that boasted about properly disclosing this to FISC — tried to bury it, basically not even telling FISC about how bad the problem was until days before Collyer was set to approve new certificates in October 2016. Once they did disclose it, Judge Collyer gave NSA first one and then another extension for them to figure out what went wrong. After 5 months of figuring, they were still having problems nailing it down or even finding where the data and searches had occurred. So, finally, facing a choice of ending “about” collection (only under 702 — they can still accomplish the very same thing under EO 12333) or ending searches of upstream data, they chose the former option, which Collyer approved with almost no accountability for all the problems she saw in the process.

Refusing to count the impact

I believe that (at least given what has been made public) Collyer didn’t really understand the issue placed before her. One thing she does is just operate on assumptions about the impact of certain practices. For example, she uses the 2011 number for the volume of total 702 collection accomplished using upstream collection to claim that it is “a small percentage of NSA’s overall collection of Internet communications under Section 702.” That’s likely still true, but she provides no basis for the claim, and it’s possible changes in communication — such as the increased popularity of Twitter — would change the mix significantly.

Similarly, she assumes that MCTs that involve “a non-U.S. person outside the United States” will be “for that reason [] less likely to contain a large volume of information about U.S. person or domestic communications.” She makes a similar assumption (this time in her treatment of the new NCTC raw take) about 702 data being less intrusive than individual orders targeted at someone in the US, “which often involve targets who are United States persons and typically are directed at persons in the United States.” In both of these, she repeats an assumption John Bates made in 2011 when he first approved back door searches using the same logic — that it was okay to provide raw access to this data, collected without a warrant, because it wouldn’t be as impactful as the data collected with an individual order. And the assumption may be true in both cases. But in an age of increasingly global data flows, that remains unproven. Certainly, with ISIS recruiters located in Syria attempting to recruit Americans, that would not be true at all.

Collyer makes the same move when she makes a critical move in the opinion, when she asserts that “NSA’s elimination of ‘abouts’ collection should reduce the number of communications acquired under Section 702 to which a U.S. person or a person in the United States is a party.” Again, that’s probably true, but it is not clear she has investigated all the possible ways Americans will still be sucked up (which she acknowledges will happen).

And she does this even as NSA was providing her unreliable numbers.

The government later reported that it had inadvertently misstated the percentage of NSA’s overall upstream Internet collection during the relevant period that could have been affected by this [misidentification of MCTs] error (the government first reported the percentage as roughly 1.3% when it was roughly 3.7%.

Collyer’s reliance on assumptions rather than real numbers is all the more unforgivable given one of the changes she approved with this order: basically, permitting the the agencies to conduct otherwise impermissible searches to be able to count how many Americans get sucked up under 702.  In other words, she was told, at length, that Congress wants this number (the government’s application even cites the April 22, 2106 letter from members of the House Judiciary Committee asking for such a number). Moreover, she was told that NSA had already started trying to do such counts.

The government has since [that is, sometime between September 26 and April 26] orally notified the Court that, in order to respond to these requests and in reliance on this provision of its minimization procedures, NSA has made some otherwise-noncompliant queries of data acquired under Section 702 by means other than upstream Internet collection.

And yet she doesn’t then demand real numbers herself (again, in 2011, Bates got NSA to do at least a limited count of the impact of the upstream problems).

Treating the problem as exclusively about MCTs, not SCTs

But the bigger problem with Collyer’s discussion is that she treats all of the problem of upstream collection as being about MCTs, not SCTs. This is true in general — the term single communication transaction or SCT doesn’t appear at all in the opinion. But she also, at times, makes claims about MCTs that are more generally true for SCTs. For example, she cites one aspect of NSA’s minimization procedures that applies generally to all upstream collection, but describes it as only applying to MCTs.

A shorter retention period was also put into place, whereby an MCT of any type could not be retained longer than two years after the expiration of the certificate pursuant to which it was acquired, unless applicable criteria were met. And, of greatest relevance to the present discussion, those procedures categorically prohibited NSA analysts from using known U.S.-person identifiers to query the results of upstream Internet collection. (17-18)

Here’s the section of the minimization procedures that imposed the two year retention deadline, which is an entirely different section than that describing the special handling for MCTs.

Similarly, Collyer cites a passage from the 2015 Hogan opinion stating that upstream “is more likely than other forms of section 702 collection to contain information of or concerning United States person with no foreign intelligence value” (see page 17). But that passage cites to a passage of the 2011 Bates opinion that includes SCTs in its discussion, as in this sentence.

In addition to these MCTs, NSA likely acquires tens of thousands more wholly domestic communications every year, given that NSA’s upstream collection devices will acquire a wholly domestic “about” SCT if it is routed internationally. (33)

Collyer’s failure to address SCTs is problematic because — as I explain here — the bulk of the searches implicating US persons almost certainly searched SCTs, not MCTs. That’s true for two reasons. First, because (at least according to Bates’ 2011 guesstimate) NSA collects (or collected) far more entirely domestic communications via SCTs than via MCTs. Here’s how Bates made that calculation in 2011 (see footnote 32).

NSA ultimately did not provide the Court with an estimate of the number of wholly domestic “about” SCTs that may be acquired through its upstream collection. Instead, NSA has concluded that “the probability of encountering wholly domestic communications in transactions that feature only a single, discrete communication should be smaller — and certainly no greater — than potentially encountering wholly domestic communications within MCTs.” Sept. 13 Submission at 2.

The Court understands this to mean that the percentage of wholly domestic communications within the universe of SCTs acquired through NSA’s upstream collection should not exceed the percentage of MCTs within its statistical sample. Since NSA found 10 MCTs with wholly domestic communications within the 5,081 MCTs reviewed, the relevant percentage is .197% (10/5,081). Aug. 16 Submission at 5.

NSA’s manual review found that approximately 90% of the 50,440 transactions in the same were SCTs. Id. at 3. Ninety percent of the approximately 13.25 million total Internet transactions acquired by NSA through its upstream collection during the six-month period, works out to be approximately 11,925,000 transactions. Those 11,925,000 transactions would constitute the universe of SCTs acquired during the six-month period, and .197% of that universe would be approximately 23,000 wholly domestic SCTs. Thus, NSA may be acquiring as many as 46,000 wholly domestic “about” SCTs each year, in addition to the 2,000-10,000 MCTs referenced above.

Assuming some of this happens because people use VPNs or Tor, then the amount of entirely domestic communications collected via upstream would presumably have increased significantly in the interim period. Indeed, the redaction in this passage likely hides a reference to technologies that obscure location.

If so, it would seem to acknowledge NSA collects entirely domestic communications using upstream that obscure their location.

The other reason the problem is likely worse with SCTs is because — as I noted above — no SCTs were segregated from NSA’s general repositories, whereas some MCTs were supposed to be (and in any case, in 2011 the SCTs constituted by far the bulk of upstream collection).

Now, Collyer’s failure to deal with SCTs may or may not matter for her ultimate analysis that upstream collection without “about” collection solves the problem. Collyer limits the collection of abouts by limiting upstream collection to communications where “the active user is the target of acquisition.” She describes “active user” as “the user of a communication service to or from whom the MCT is in transit when it is acquired (e.g., the user of an e-mail account [half line redacted].” If upstream signatures are limited to emails and texts, that would seem to fix the problem. But upstream wouldn’t necessarily be limited to emails and texts — upstream collection would be particularly valuable for searching on other kinds of selectors, such as an encryption key, and there may be more than one person who would use those other kinds of selectors. And when Collyer says, “NSA may target for acquisition a particular ‘selector,’ which is typically a facility such as a telephone number or e-mail address,” I worry she’s unaware or simply not ensuring that NSA won’t use upstream to search for non-typical signatures that might function as abouts even if they’re not “content.” The problem is treating this as a content/metadata distinction, when “metadata” (however far down in the packet you go) could include stuff that functions like an about selector.

Defining key terms terms

Collyer did define “active user,” however inadequately. But there are a number of other terms that go undefined in this opinion. By far the funniest is when Collyer notes that the government’s March 30 submission promises to sequester upstream data that is stored in “institutionally managed repositories.” In a footnote, she notes they don’t define the term. Then she pretty much drops the issue. This comes in an opinion that shows FBI data has been wandering around in repositories it didn’t belong and indicating that NSA can’t identify where all its 704 data is. Yet she’s told there is some other kind of repository and she doesn’t make a point to figure out what the hell that means.

Later, in a discussion of other violations, Collyer introduces the term “data object,” which she always uses in quotation marks, without explaining what that is.

Failing to appoint (or even consider) amicus

In any case, this opinion makes clear that what should have happened, years ago, is a careful discussion of how packet sniffing works, and where a packet collected by a backbone provider stops being metadata and starts being content, and all the kinds of data NSA might want to and does collect via domestic packet sniffing. (They collect far more under EO 12333.) As mentioned, some of that discussion may have taken place in advance of the 2004 and 2010 opinions approving upstream collection of Internet metadata (though, again, I’m now convinced NSA was always lying about what it would take to process that data). But there’s no evidence the discussion has ever happened when discussing the collection of upstream content. As a result, judges are still using made up terms like MCTs, rather than adopting terms that have real technical meaning.

For that reason, it’s particularly troubling Collyer didn’t use — didn’t even consider using, according to the available documentation — an amicus. As Collyer herself notes, upstream surveillance “has represented more than its share of the challenges in implementing Section 702” (and, I’d add, Internet metadata collection).

At a minimum, when NSA was pitching fixes to this, she should have stopped and said, “this sounds like a significant decision” and brought in amicus Amy Jeffress or Marc Zwillinger to help her think through whether this solution really fixes the problem. Even better, she should have brought in a technical expert who, at a minimum, could have explained to her that SCTs pose as big a problem as MCTs; Steve Bellovin — one of the authors of this paper that explores the content versus metadata issue in depth — was already cleared to serve as the Privacy and Civil Liberties Oversight Board’s technical expert, so presumably could easily have been brought into consult here.

That didn’t happen. And while the decision whether or not to appoint an amicus is at the court’s discretion, Collyer is obligated to explain why she didn’t choose to appoint one for anything that presents a significant interpretation of the law.

A court established under subsection (a) or (b), consistent with the requirement of subsection (c) and any other statutory requirement that the court act expeditiously or within a stated time–

(A) shall appoint an individual who has been designated under paragraph (1) to serve as amicus curiae to assist such court in the consideration of any application for an order or review that, in the opinion of the court, presents a novel or significant interpretation of the law, unless the court issues a finding that such appointment is not appropriate;

For what it’s worth, my guess is that Collyer didn’t want to extend the 2015 certificates (as it was, she didn’t extend them as long as NSA had asked in January), so figured there wasn’t time. There are other aspects of this opinion that make it seem like she just gave up at the end. But that still doesn’t excuse her from explaining why she didn’t appoint one.

Instead, she wrote a shitty opinion that doesn’t appear to fully understand the issue and that defers, once again, the issue of what counts as content in a packet.

Approving back door upstream searches

Collyer’s failure to appoint an amicus is most problematic when it comes to her decision to reverse John Bates’ restriction on doing back door searches on upstream data.

To restate what I suggested above, by all appearances, NSA largely blew off the Bates’ restriction. Indeed, Collyer notes in passing that, “In practice, however, no analysts received the requisite training to work with the segregated MCTs.” Given the persistent problems with back door searches on upstream data, it’s hard to believe NSA took that restriction seriously at all (particularly since it refused to consider a technical fix to the requirement to exclude upstream from searches). So Collyer’s approval of back door searches of upstream data is, for all intents and purposes, the sanctioning of behavior that NSA refused to stop, even when told to.

And the way in which she sanctions it is very problematic.

First, in spite of her judgment that ending about searches would fix the problems in (as she described it) MCT collection, she nevertheless laid out a scenario (see page 27) where an MCT would acquire an entirely domestic communication.

Having laid out that there will still be some entirely domestic comms in the collection, Collyer then goes on to say this:

The Court agrees that the removal of “abouts” communications eliminates the types of communications presenting the Court the greatest level of constitutional and statutory concern. As discussed above, the October 3, 2011 Memorandum Opinion (finding the then-proposed NSA Minimization Procedures deficient in their handling of some types of MCTs) noted that MCTs in which the target was the active user, and therefore a party to all of the discrete communications within the MCT, did not present the same statutory and constitutional concerns as other MCTs. The Court is therefore satisfied that queries using U.S.-person identifiers may now be permitted to run against information obtained by the above-described, more limited form of upstream Internet collection, subject to the same restrictions as apply to querying other forms of Section

This is absurd! She has just laid out that there will be some exclusively domestic comms in the collection. Not as much as there was before NSA stopped collecting abouts, but it’ll still be there. So she’s basically permitting domestic communications to be back door searched, which, if they’re found (as she notes), might be kept based on some claim of foreign intelligence value.

And this is where her misunderstanding of the MCT/SCT distinction is her undoing. Bates prohibited back door searching of all upstream data, both that supposedly segregated because it was most likely to have unrelated domestic communications in it, and that not segregated because even the domestic communications would have intelligence value. Bates’ specific concerns about MCTs are irrelevant to his analysis about back door searches, but that’s precisely what Collyer cites to justify her own decision.

She then applies the 2015 opinion, with its input from amicus Amy Jeffress stating that NSA back door searches that excluded upstream collection were constitutional, to claim that back door searches that include upstream collection would meet Fourth Amendment standards.

The revised procedures subject NSA’s use of U.S. person identifiers to query the results of its newly-limited upstream Internet collection to the same limitations and requirements that apply to its use of such identifiers to query information acquired by other forms of Section 702 collection. See NSA Minimization Procedures § 3(b)(5). For that reason, the analysis in the November 6, 2015 Opinion remains valid regarding why NSA’s procedures comport with Fourth Amendment standards of reasonableness with regard to such U.S. person queries, even as applied to queries of upstream Internet collection. (63)

As with her invocation of Bates’ 2011 opinion, she applies analysis that may not fully apply to the question — because it’s not actually clear that the active user restriction really equates newly limited upstream collection to PRISM collection — before her as if it does.

Imposing no consequences

The other area where Collyer’s opinion fails to meet the standards of prior ones is in resolution of the problem. In 2009, when Reggie Walton was dealing with first phone and then Internet dragnet problems, he required the NSA to do complete end-to-end reviews of the programs. In the case of the Internet dragnet, the report was ridiculous (because it failed to identify that the entire program had always been violating category restrictions). He demanded IG reports, which seems to be what led the NSA to finally admit the Internet dragnet program was broken. He shut down production twice, first of foreign call records, from July to September 2009, then of the entire Internet dragnet sometime in fall 2009. Significantly, he required the NSA to track down and withdraw all the reports based on violative production.

In 2010 and 2011, dealing with the Internet dragnet and upstream problems, John Bates similarly required written details (and, as noted, actual volume of the upstream problem). Then, when the NSA wanted to retain the fruits of its violative collection, Bates threatened to find NSA in violation of 50 USC 1809(a) — basically, threatened to declare them to be conducting illegal wiretapping — to make them actually fix their prior violations. Ultimately, NSA destroyed (or said they destroyed) their violative collection and the fruits of it.

Even Thomas Hogan threatened NSA with 50 USC 1809(a) to make them clean up willful flouting of FISC orders.

Not Collyer. She went from issuing stern complaints (John Bates was admittedly also good at this) back in October…

At the October 26, 2016 hearing, the Court ascribed the government’s failure to disclose those IG and OCO reviews at the October 4, 2016 hearing to an institutional “lack of candor” on NSA’s part and emphasized that “this is a very serious Fourth Amendment issue.”

… to basically reauthorizing 702 before using the reauthorization process as leverage over NSA.

Of course, NSA still needs to take all reasonable and necessary steps to investigate and close out the compliance incidents described in the October 26, 2016 Notice and subsequent submissions relating to the improper use of U.S.-person identifiers to query terms in NSA upstream data. The Court is approving on a going-foward basis, subject to the above-mentioned requirements, use of U.S.-person identifiers to query the results of a narrower form of Internet upstream collection. That approval, and the reasoning that supports it, by no means suggest that the Court approves or excuses violations that occurred under the prior procedures.

That is particularly troubling given that there is no indication, even six months after NSA first (belatedly) disclosed the back door search problems to FISC, that it had finally gotten ahold of the problem.

As Collyer noted, weeks before it submitted its new application, NSA still didn’t know where all the upstream data lived. “On March 17, 2017, the government reported that NSA was still attempting to identify all systems that store upstream data and all tools used to query such data.” She revealed that  some of the queries of US persons do not interact with “NSA’s query audit system,” meaning they may have escaped notice forever (I’ve had former NSA people tell me even they don’t believe this claim, as seemingly nothing should be this far beyond auditability). Which is presumably why, “The government still had not ascertained the full range of systems that might have been used to conduct improper U.S.-person queries.” There’s the data that might be in repositories that weren’t run by NSA, alluded to above. There’s the fact that on April 7, even after NSA submitted its new plan, it was discovering that someone had mislabeled upstream data as PRISM, allowing it to be queried.

Here’s the thing. There seems to be no way to have that bad an idea of where the data is and what functions access the data and to be able to claim — as Mike Rogers, Dan Coats, and Jeff Sessions apparently did in the certificates submitted in March that didn’t get publicly released — to be able to fulfill the promises they made FISC. How can the NSA promise to destroy upstream data at an accelerated pace if it admits it doesn’t know where it is? How can NSA promise to implement new limits on upstream collection if that data doesn’t get audited?

And Collyer excuses John Bates’ past decision (and, by association, her continued reliance on his logic to approve back door searches) by saying the decision wasn’t so much the problem, but the implementation of it was.

When the Court approved the prior, broader form of upstream collection in 2011, it did so partly in reliance on the government’s assertion that, due to some communications of foreign intelligence interest could only be acquired by such means. $ee October 3, 2011 Memorandum Opinion at 31 & n. 27, 43, 57-58. This Opinion and Order does not question the propriety of acquiring “abouts” communications and MCTs as approved by the Court since 2011, subject to the rigorous safeguards imposed on such acquisitions. The concerns raised in the current matters stem from NSA’s failure to adhere fully to those safeguards.

If problems arise because NSA has failed, over 6 years, to adhere to safeguards imposed because NSA hadn’t adhered to the rules for the 3 years before that, which came after NSA had just blown off the law itself for the 6 years before that, what basis is there to believe they’ll adhere to the safeguards she herself imposed, particularly given that unlike her predecessors in similar moments, she gave up any leverage she had over the agency?

The other thing Collyer does differently from her predecessors is that she lets NSA keep data that arose from violations.

Certain records derived from upstream Internet communications (many of which have been evaluated and found to meet retention standards) will be retained by NSA, even though the underlying raw Internet transactions from which they are derived might be subject to destruction. These records include serialized intelligence reports and evaluated and minimized traffic disseminations, completed transcripts and transcriptions of Internet transactions, [redacted] information used to support Section 702 taskings and FISA applications to this Court, and [redacted].

If “many” of these communications have been found to meet retention standards, it suggests that “some” have not. Meaning they should never have been retained in the first place. Yet Collyer lets an entire stream of reporting — and the Section 702 taskings that arise from that stream of reporting — remain unrecalled. Effectively, even while issuing stern warning after stern warning, by letting NSA keep this stuff, she is letting the agency commit violations for years without any disincentive.

Now, perhaps Collyer is availing herself of the exception offered in Section 301 of the USA Freedom Act, which permits the government to retain illegally obtained material if it is corrected by subsequent minimization procedures.

Exception.–If the Government corrects any deficiency identified by the order of the Court under subparagraph (B), the Court may permit the use or disclosure of information obtained before the date of the correction under such minimization procedures as the Court may approve for purposes of this clause.

Except that she doesn’t cite that provision, nor is there any evidence deficiencies have been corrected.

Which should mean, especially given the way Collyer depends on the prior opinions of Bates and Hogan, she should likewise rely on their practice of treating this as a potential violation of 50 USC 1809(a) to ensure the harm to Americans doesn’t persist. She did no such thing, basically sanctioning the illegal use of back door searches to spy on Americans.

Up until this opinion, I was generally willing to argue for the efficacy of the FISC (even while arguing the job could and should be devolved to district courts for more rigorous testing of the law). But not now. This opinion discredits the entire court.

Last April when Collyer became presiding FISC judge, I pointed to what I considered Rosemary Collyer’s worst FISC decision, which was actually a District Court opinion that permitted the NSA to keep aspects of its upstream problems secret from EFF, which is suing over those same issues. I predicted then that, “I fear she will be a crummy presiding judge, making the FISC worse than it already is.”

In my opinion — as a civil libertarian who has been willing to defend the FISC in the past — with this opinion she has done real damage to any credibility or legitimacy the FISC has.

Update: Latter for former fixed in which choice the Administration picked, h/t CS.

The Documents

Here’s what I Con the Record released.

January 7, 2016 IG Report

This heavily redacted report describes a review of NSA’s compliance with 704/705b of Title VII of FISA, the authority NSA uses to spy on Americans who are located overseas (see my report on the 704 problems here). It was conducted from March through August 2015 and reviewed data from January through March 2015. It basically showed there were no compliance mechanisms in place for 704/705b, and NSA couldn’t even reliably identify the queries that had been conducted under the authority. This report is relevant to the reauthorization, because Americans targeted in individual FISA orders are approved (and almost certainly tasked) by default for 702 back door searches. Though the report was obviously done well before the 702 certifications were submitted on September 26, was not noticed to FISC until days before the court would otherwise have approved the certifications in conjunction with the upstream problems.

September 26, 2016 702 Certification Package 

ICTR released much if not all of the materials submitted for 702 reauthorization on September 2016. The package includes:

Certification cover filing: This is basically the application, which the metadata reveals is actually two parts merged. It describes the changes to the certificates from the past year, most notably a request to share raw 702 data directly from NSA or FBI to NCTC, some tweaks to the FBI targeting and minimization procedures, and permission for NSA, FBI, and CIA to deviate from minimization procedures to develop a count of how many US persons get collected under 702.

The report also describes how the government has fulfilled reporting requirements imposed in 2015. Several of the reports pertain to destroying data it should not have had. The most interesting one is the report on how many criminal queries of 702 data FBI does that result in the retrieval and review of US person data; as I note in this post, the FBI really didn’t (and couldn’t, and can’t, given the oversight regime currently in place) comply with the intent of the reporting requirement.

Very importantly: this application did not include any changes to upstream collection, in large part because NSA did not tell FISC (more specifically, Chief Judge Rosemary Collyer) about the problems they had always had preventing queries of upstream data in its initial application. In NSA’s April statement on ending upstream about collection, it boasts, “Although the incidents were not willful, NSA was required to, and did, report them to both Congress and the FISC.” But that’s a load of horse manure: in fact, NSA and DOJ sat on this information for months. And even with this disclosure, because the government didn’t release the later application that did describe those changes, we don’t actually get to see the government’s description of the problems; we only get to see Collyer’s (I believe mis-) understanding of them.

Procedures and certifications accepted: The September 26 materials also include the targeting and minimization procedures that were accepted in the form in which they were submitted on that date. These include:

Procedures and certificates not accepted: The materials include the documents that the government would have to change before approval on April 26. These include,

Note, I include the latter two items because I believe they would have had to be resubmitted on March 30, 2017 with the updated NSA documents and the opinion makes clear a new DIRNSA affidavit was submitted (see footnote 10), but the release doesn’t give us those. I have mild interest in that, not least because the AG/DNI one would be the first big certification to FISC signed by Jeff Sessions and Dan Coats.

October 26, 2016 Extension

The October 26 extension of 2015’s 702 certificates is interesting primarily for its revelation that the government waited until October 24, 2016 to disclose problems that had been simmering since 2013.

March 30, 2017 Submissions

The release includes two of what I suspect are at least four items submitted on March 30, which are:

April 26, 2017 Opinion

This is the opinion that reauthorized 702, with the now-restricted upstream search component. My comments below largely lay out the problems with it.

April 11, 2017 ACLU Release

I Con the Record also released the FOIAed documents released earlier in April to ACLU, which are on their website in searchable form here. I still have to finish my analysis of that (which includes new details about how the NSA was breaking the law in 2011), but these posts cover some of those files and are relevant to these 702 changes:

Importantly, the ACLU documents as a whole reveal what kinds of US persons are approved for back door searches at NSA (largely, but not exclusively, Americans for whom an individual FISA order has already been approved, importantly including 704 targets, as well as more urgent terrorist targets), and reveal that one reason NSA was able to shut down the PRTT metadata dragnet in 2011 was because John Bates had permitted them to query the metadata from upstream collection.

Not included

Given the point I noted above — that the application submitted on September 26 did not address the problem with upstream surveillance and that we only get to see Collyer’s understanding of it — I wanted to capture the documents that should or do exist that we haven’t seen.

  • October 26, 2016 Preliminary and Supplemental Notice of Compliance Incidents Regarding the Querying of Section 702-Acquired Data
  • January 3, 2017: Supplemental Notice of Compliance Incidents Regarding the Querying of Section 702-Acquired Data
  • NSA Compliance Officer (OCO) review covering April through December 2015
  • OCO review covering April though July of 2016
  • IG Review covering first quarter of 2016 (22)
  • January 27, 2017: Letter In re: DNI/AG 702(g) Certifications asking for another extension
  • January 27, 2017: Order extending 2015 certifications (and noting concern with “important safeguards for interests protected by the Fourth Amendment”)
  • March 30, 2017: Amendment to [Certificates]; includes (or is) second explanatory memo, referred to as “March 30, 2017 Memorandum” in Collyer’s opinion; this would include a description of the decision to shut down about searches
  • March 30, 2017 AG/DNI Certification (?)
  • March 30, 2017 DIRNSA Certification
  • April 7, 2017 preliminary notice

Other Relevant Documents

Because they’re important to this analysis and get cited extensively in Collyer’s opinion, I’m including:

Timeline

November 30, 2013: Latest possible date at which upstream search problems identified

October 2014: Semiannual Report shows problems with upstream searches during period from June 1, 2013 – November 30, 2013

October 2014: SIGINT Compliance (SV) begins helping NSD review 704/705b compliance

June 2015: Semiannual Report shows problems with upstream searches during period from December 1, 2013 – May 31, 2014

December 18, 2015: Quarterly Report to the FISC Concerning Compliance Matters Under Section 702 of FISA

January 7, 2016: IG Report on controls over §§704/705b released

January 26, 2016: Discovery of error in upstream collection

March 9, 2016: FBI releases raw data

March 18, 2016: Quarterly Report to the FISC Concerning Compliance Matters Under Section 702 of FISA

May and June, 2016: Discovery of querying problem dating back to 2012

May 17, 2016: Opinion relating to improper retention

June 17, 2016: Quarterly Report to the FISC Concerning Compliance Matters Under Section 702 of FISA

August 24, 2016: Pre-tasking review update

September 16, 2016: Quarterly Report to the FISC Concerning Compliance Matters Under Section 702 of FISA

September 26, 2016: Submission of certifications

October 4, 2016: Hearing on compliance issues

October 24, 2016: Notice of compliance errors

October 26, 2016: Formal notice, with hearing; FISC extends the 2015 certifications to January 31, 2017

November 5, 2016: Date on which 2015 certificates would have expired without extension

December 15, 2016: James Clapper approves EO 12333 Sharing Procedures

December 16, 2016: Quarterly Report to the FISC Concerning Compliance Matters Under Section 702 of FISA

December 29, 2016: Government plans to deal with indefinite retention of data on FBI systems

January 3, 2017: DOJ provides supplemental report on compliance programs; Loretta Lynch approves new EO 12333 Sharing Procedures

January 27, 2017: DOJ informs FISC they won’t be able to fully clarify before January 31 expiration, ask for extension to May 26; FISC extends to April 28

January 31, 2007: First extension date for 2015 certificates

March 17, 2017:Quarterly Report to the FISC Concerning Compliance Matters Under Section 702 of FISA; Probable halt of upstream “about” collection

March 30, 2016: Submission of amended NSA certifications

April 7, 2017: Preliminary notice of more query violations

April 28, 2017: Second extension date for 2015 certificates

May 26, 2017: Requested second extension date for 2015 certificates

June 2, 2017: Deadline for report on outstanding issues


When a White Republican Gets Spied On, Privacy Suddenly Matters

As expected, much of today’s hearing on the Russian hack consisted of members of Congress — from both parties — posturing for the camera.

At first, it seemed that the Republican line of posturing — complaining about the leak that exposed Mike Flynn’s conversations with Ambassador Sergey Kislyak — tracked Donald Trump’s preferred approach, to turn this into a witch hunt for the leakers.

But it was actually more subtle than that. It appears Republicans believe the leaks about Flynn have (finally) made Congress skittish about incidental collection of US person communications as part of FISA collection. And so both Tom Rooney and Trey Gowdy spent much of their early hearing slots discussing how much more difficult the leak of Flynn’s name will make Section 702 reauthorization later this year. In the process, they should have created new fears about how painfully ignorant the people supposedly overseeing FISA are.

Rooney, who heads the subcommittee with oversight over NSA, started by quizzing Mike Rogers about the process by which a masked US person identity can be disclosed. Along the way, it became clear Rooney was talking about Section 702 reauthorization even while he was talking traditional FISA collection, which doesn’t lapse this year.

Rooney: If what we’re talking about is a serious crime, as has been alleged, in your opinion would leaking of a US person who has been unmasked and disseminated by intelligence community officials, would that leaking hurt or help our ability to conduct national security.

Rogers: Hurt.

Rooney: Ok, if it hurts, this leak, which through the 702 tool, which we all agree is vital–or you and I at least agree to that–do you think that that leak actually threatens our national security. If it’s a crime, and if it unmasks a US person, and this tool is so important it could potentially jeopardize this tool when we have to try to reauthorize it in a few months, if this is used against our ability to reauthorize this tool, and we can’t get it done because whoever did this leak, or these nine people that did this leak, create such a stir, whether it be in our legislative process or whatever, that they don’t feel confident a US person, under the 702 program, can be masked, successfully, and not leaked to the press, doesn’t that hurt–that leak–hurt our national security.

Eventually Admiral Rogers broke in to explain to his congressional overseer very basic facts about surveillance, including that Flynn was not and could not have been surveilled under Section 702.

Rogers: FISA collection on targets in the United States has nothing to do with 702, I just want to make sure we’re not confusing the two things here. 702 is collection overseas against non US persons.

Rooney: Right. And what we’re talking about here is incidentally, if a US person is talking to a foreign person that we’re listening to whether or not that person is unmasked.

Nevertheless, Rooney made it very clear he’s very concerned about how much harder the Flynn leak will make it for people like him to convince colleagues to reauthorize Section 702, which is even more of a privacy concern than traditional FISA.

Rooney: But it’s really going to hurt the people on this committee and you in the intelligence community when we try to retain this tool this year and try to convince some of our colleagues that this is really important for national security when somebody in the intelligence community says, you know what the hell with it, I’m gonna release this person’s name, because I’m gonna get something out of it. We’re all gonna be hurt by that. If we can’t reauthorize this tool. Do you agree with that?

A little later, Trey Gowdy got his second chance to complain about the leak. Referencing Rogers’ earlier explanation that only 20 people at NSA can unmask a US person identity, Gowdy tried to figure out how many at FBI could, arguing (this is stunning idiocy here) that by finding a finite number of FBI officials who could unmask US person identities might help assuage concerns about potential leaks of US persons caught in FISA surveillance.

Comey: I don’t know for sure as I sit here. Surely more, given the nature of the FBI’s work. We come into contact with US persons a whole lot more than the NSA does because we may be conducting — we only conduct our operations in the United States to collect electronic surveillance. I can find out the exact number. I don’t know it as I sit here.

Gowdy: I think Director Comey given the fact that you and I agree that this is critical, vital, indispensable. A similar program is coming up for reauthorization this fall with a pretty strong head wind right now, it would be nice to know the universe of people who have the power to unmask a US citizen’s name. Cause that might provide something of a road map to investigate who might have actually disseminated a masked US citizen’s name.

Here’s why this line of questioning from Gowdy is unbelievably idiotic. Both for traditional FISA, like the intercept targeting Kislyak that caught Flynn, and for Section 702, masking and unmasking identities at FBI is not the concern. That’s because the content from both authorities rests in FBI’s databases, and anyone cleared for FISA can access the raw data. And those FBI Agents not cleared for FISA can and are encouraged just to ask a buddy who is cleared to do it.

In other words, every Agent at FBI has relatively easy way to access the content on Flynn, so long as she can invent a foreign intelligence or criminal purpose reason to do so.

Which is probably why Comey tried to pitch something he called “culture” as adequate protection, rather than the very large number of FBI Agents who are cleared into FISA.

Comey: The number is … relevant. What I hope the US–the American people will realize is the number’s important but the culture behind it is in fact more important. The training, the rigor, the discipline. We are obsessive about FISA in the FBI for reasons I hope make sense to this committee. But we are, everything that’s FISA has to be labeled in such a way to warn people this is FISA, we treat this in a special way. So we can get you the number but I want to assure you the culture in the FBI and the NSA around how we treat US person information is obsessive, and I mean that in a good way.

So then Gowdy asks Comey something he really has a responsibility to know: what other agencies have Standard Minimization Procedures. (The answer, at least as the public record stands, is NSA, CIA, FBI, and NCTC have standard minimization procedures, with Main Justice using FBI’s SMPs.)

Gowdy: Director Comey I am not arguing with you and I agree the culture is important, but if there are 100 people who have the ability to unmask and the knowledge of a previously masked name, then that’s 100 different potential sources of investigation. And the smaller the number is, the easier your investigation is. So the number is relevant. I can see the culture is relevant. NSA, FBI, what other US government agencies have the authority to unmask a US citizen’s name?

Comey: Well I think all agencies that collect information pursuant to FISA have what are called standard minimization procedures which are approved by the FISA court that govern how they will treat US person information. So I know the NSA does, I know the CIA does, obviously the FBI does, I don’t know for sure beyond that.

Gowdy: How about Main Justice?

Comey: Main Justice I think does have standard minimization procedures.

Gowdy: Alright, so that’s four. NSA, FBI, CIA, Main Justice. Does the White House has the authority to unmask a US citizen’s name?

Comey: I think other elements of the government that are consumers of our can ask the collectors to unmask. The unmasking resides with those who collected the information. And so if Mike Rogers’ folks collected something, and they send it to me in a report and it says it’s US person #1 and it’s important for the FBI to know who that is, our request will go back to them. The White House can make similar requests of the FBI or NSA but they don’t on their own collect, so they can’t on their own unmask.

That series of answers didn’t satisfy Gowdy, because from his perspective, if Comey isn’t able to investigate and find a head for the leak of Flynn’s conversation with Kislyak — well, I don’t know what he thinks but he’s sure an investigation, possibly even the prosecution of journalists, is the answer.

Gowdy: I guess what I’m getting at Director Comey, you say it’s vital, you say it’s critical, you say that it’s indispensable, we both know it’s a threat to the reauthorization of 702 later on this fall and oh by the way it’s also a felony punishable by up to 10 years. So how would you begin your investigation, assuming for the sake of argument that a US citizen’s name appeared in the Washington Post and the NY Times unlawfully. Where would you begin that investigation?

This whole series of questions frankly mystifies me. I mean, these two men who ostensibly provide oversight of FISA clearly didn’t understand what the biggest risk to privacy is –back door searches of US person content — which at the FBI doesn’t even require any evidence of wrong-doing. That is the biggest impediment to reauthorizing FISA.

And testimony about the intricacies of unmasking a US person identity — particularly when a discussion of traditional FISA serves as stand-in for Section 702 — does nothing more than expose that the men who supposedly oversee FISA closely have no fucking clue — and I mean really, not a single fucking clue — how it works. Devin Nunes, too, has already expressed confusion on how access to incidentally collected US person content works.

Does anyone in the House Intelligence Committee understand how FISA works? Bueller?

In retrospect, I’m really puzzled by what is so damning about the Flynn leak to them. I mean, don’t get me wrong, I’m very sympathetic to the complaint that the contents of the intercepts did get leaked. If you’re not, you should be. Imagine how you’d feel if a Muslim kid got branded as a terrorist because he had a non-criminal discussion with someone like Anwar al-Awlaki? (Of course, in actual fact what happened is the Muslim kids who had non-criminal discussions with Awlaki had FBI informants thrown at them until they pressed a button and got busted for terrorism, but whatever.)

But Rooney and Gowdy and maybe even Nunes seemed worried that their colleagues in the House have seen someone like them — not a young Muslim, but instead a conservative white man — caught up in FISA, which has suddenly made them realize that they too have conversations all the time that likely get caught up in FISA?

Or are they worried that the public discussion of FISA will expose them for what they are, utterly negligent overseers, who don’t understand how invasive of privacy FISA currently is?

If it’s the latter, their efforts to assuage concerns should only serve to heighten those concerns. These men know so little about FISA they don’t even understand what questions to ask.

In any case, after today’s hearing I am beginning to suspect the IC doesn’t like to have public hearings not because someone like me will learn something, but because we’ll see how painfully little most of the so-called overseers have learned in all the private briefings the IC has given them. If these men don’t understand the full implications of incidental collection, two months after details of Flynn’s conversations have been leaked, then it seems likely they’ve been intentionally mis or underinformed.

Or perhaps they’re just not so bright.


The Undie Bomber, Umar Farouk Abdulmutallab, Life Coached “Who Moved My Cheese” Weeks before Jihad

I’m still working on the serious parts of the reports from Umar Farouk Abdulmutallab’s FBI interrogations that Scott Shane liberated. But I wanted to share this detail, because it’s pretty funny.

In his fourth interview with the FBI on January 31, 2010 (the third after he started cooperating), Abdulmutallab told about how he tried to serve as a life coach for someone — perhaps a friend or a family member — back in Nigeria. He relied, according to the interrogation report, on principles he learned not from reading the Quran, but from the pop business book, Who Moved My Cheese.

That was in May 2009. Just two months later (two paragraphs in the interrogation report), Abdulmutallab decided to take set off to find Anwar al-Awlaki to undertake jihad.

In the last few days of July, 2009, UM [Abdulutallab] emailed the headmaster at SIAL [the school he would study at in Yemen]. He obtained the email address from SIAL’s website and sent the message using UM’s [redacted]

[snip]

This decision was entirely UM’s; no one encouraged him to go to Yemen to participate in jihad.

[snip]

For security reasons, UM told no one of his plan to travel to Yemen and participate in jihad.

Perhaps it’s not just funny and schmaltzy. It also demonstrates the degree to which Abdulmutallab was just looking for a path in life. Not long before he left to Yemen, he twice to propose to a woman, but (as he told the FBI, at least), his family wouldn’t permit him to marry yet.

Having been deprived that cheese, perhaps, he set off to martyr himself in the service of Al Qaeda in the Arabian Peninsula.


BuzzFeed Now Looking to Institutional Dems to Police a Phantom Surge of Lefty Fake News

One of my many concerns about the fake fake news scare is that it provides a way to discredit alternative voices, as the PropOrNot effort tried to discredit a number of superb outlets that don’t happen to share PropOrNot’s Neocon approach to Syria. BuzzFeed, in its seemingly unquenchable desire to generate buzz by inflating the threat of fake news, takes that a step further by turning to institutional Democratic outlets — outlets whose credibility got damaged by Hillary’s catastrophic loss — to police an alleged surge of fake news on the left.

First, consider its evidence for a surge in Democrats embracing fake news.

There are new cases daily. Suspicions about his 2020 reelection filing. Theories about the “regime’s” plan for a “coup d’état against the United States” (complete with Day After Tomorrow imagery of New York City buried in snow). Stories based on an unverified Twitter account offering supposed “secrets” from “rogue” White House staffers (followed by more than 650,000 people). Even theories about the Twitter account (“Russian disinformation”).

Since the election, the debunking website Snopes has monitored a growing list of fake news articles aimed at liberals, shooting down stories about a new law to charge protesters with terrorism, a plan to turn the USS Enterprise into a floating casino, and a claim that Vice President Mike Pence put himself through gay conversion therapy.

[snip]

Panicky liberal memes have cascaded across the internet in recent weeks, like an Instagram post regarding Steve Bannon’s powers on the National Security Council shared by a celebrity stylist and actress. Some trolls have even found success making fake news specifically aimed at tricking conservatives.

Let’s take the purported “fake news” story BuzzFeed bases its argument on, one by one:

  • debunking of a Twitter thread (not a finished news piece) of the conclusions about a discovery that Trump, very unusually for a President, filed for reelection immediately after inauguration. There’s no debunking that Trump filed his candidacy, nor that it is unusual, nor, even, that Trump is fundraising off it. That’s not fake news. It’s an attempt to figure out why Trump is doing something unusual, with a fact-checking process happening in the Twitter discussion.
  • An admittedly overblown Medium post about some of the shady things Trump has done, as well as the much rumored claim that the reported sale of 19% of Rosneft confirms the Trump dossier claim that Carter Page would get part of Rosneft if he could arrange the lifting of US sanctions on Russia. The story’s treatment — and especially it’s use of the word “coup” — is silly, but the underlying question of whether Trump will instruct agencies to ignore the law, as already happened in limited form at Dulles over the first weekend of the Muslim ban, as well as the question of how Trump intends to target people of color, is a real one.
  • A story basically talking about the formation of the RoguePotusStaff Twitter account that notes prominently that “there’s no way to verify the authenticity of the newly minted Twitter channel.” BuzzFeed provided no evidence this was being preferentially shared by people on the left.
  • A Twitter thread speculating, based off linguistic analysis, that the RoguePotusStaff account might be Russian disinformation. Again, BuzzFeed made no claims about who was responding to this thread.
  • A debunking of a claim posted in November on a conservative fake news site claiming that protestors would get charged with terrorism.
  • A “debunking” of a satirical story from November posted in the Duffel Blog claiming Trump was going to repurpose an aircraft carrier.
  • A debunking of a fake news story from November claim that Mike Pence had put himself through gay conversion therapy that notes Pence did, indeed, push gay conversation therapy.
  • A liberal trolling effort aimed at conservatives, which started in December, claimed that Trump had removed symbols of Islam from the White House.
  • An instagram post that (BuzzFeed snottily notes) got shared by an actress and a stylist reporting the true fact that Bannon had been added to the National Security Council and noting the arguably true fact that the NSC reviews the kill list including the possibility of targeting Americans (technically, the targeted killing review team installed by Obama is not coincident with the NSC, but it does overlap significantly, and Anwar al-Awlaki was targeted by that process).

Most of these things are not news! Most are not pretending to be news! The only single thing included among BuzzFeed’s “proof” that lefties are resorting to fake news that would support that claim is the Mike Pence story. And to get there, BuzzFeed has to pretend that the Duffel Blog is not explicitly satire, that multiple cases of conservative fake news are lefty fake news, that well-considered discussions on Twitter are fake news, and that we all have to stop following RoguePotusStaff because we don’t know whether its writers are really Rogue POTUS staffers or not.

It’s a shoddy series of claims that BuzzFeed should be embarrassed about making. Effectively, it is calling discussion and satire — including correction — fake news.

To BuzzFeed’s credit, after months of mis-stating what a poll it did revealed — BuzzFeed had been claiming that 75% of people believe fake news, but in reality the poll showed that 75% of those who recall fake news believe it — BuzzFeed finally got that, at least, correct. Bravo BuzzFeed!

But other than that, they’ve got almost nothing here.

Believe it or not, that’s not the most offensive part of this story. Having invented a lefty fake news problem out of satire and Twitter discussions, BuzzFeed then decided it’s important what official Democratic sources thing about it. While one Bernie source said it was best to ignore these things (another said it was a real problem), BuzzFeed framed other responses in terms of left protests of elected officials.

Democratic operatives and staffers at left-leaning media outlets predict that viral anti-Trump conspiracy theories will ultimately distract from real reporting about the administration, undermining legitimate causes for outrage on the left over what the administration is actually doing.

Still, for now, it’s a conversation that exists almost entirely outside the political class itself. Elected officials are not hawking phony stories as true, like Trump’s calls to investigate widespread voter fraud during the election. But that remove poses its own problems for leaders with no obvious way to dismantle widely shared false stories.

“It exists on the left and that’s a problem because it misinforms people,” said Judd Legum, editor in chief of progressive news site ThinkProgress. “That’s harmful in other ways because the time you’re spending talking about that, you could spend talking about other stuff.”

“It contributes to a broader environment of distrust, and it sort of accelerates the post-factual nature of our times,” said Teddy Goff, co-founder of Precision Strategies and a former senior aide to Barack Obama and Hillary Clinton. “Fake news is pretty damaging no matter who it benefits politically. No one on the left should think we ought to be replicating the fake news tactics on the right.”

[snip]

The online energy also raises questions about the party’s relationship with its base. In recent weeks, progressives have pressured lawmakers to adopt a tougher stance toward Trump and join ranks with the millions of protesters who marched over inauguration weekend.

The two top-ranking Democrats in Washington, Chuck Schumer in the Senate and Nancy Pelosi in the House, have both signaled an openness to working on legislation with Trump. Last week, protests formed outside Schumer’s home in Brooklyn. And among progressive activists online, Pelosi was met with vehement push-back after saying the party has a “responsibility to the American people to find our common ground.”

“Elected Democrats are stuck struggling to keep ahead of the anger that the base is feeling right now,” said [Jim] Manley, the former Reid adviser. “It’s very palpable.”

First, BuzzFeed is wrong in saying elected officials are not hawking phony stories as true. One reason the claim that Wikileaks doctored Democratic emails got so much traction is because Dems repeatedly made that claim (and as I’ve noted, Hillary quickly escalated the Alfa News story that most media outlets rejected as problematic).

Worse, BuzzFeed deems Democratic operatives and staffers as somehow chosen to decide what are “legitimate causes for outrage on the left over what the administration is actually doing.” It further suggests there’s a connection between people protesting elected leaders and fake news.

Finally, BuzzFeed shows absolutely no self-awareness about the people it seeks about and the stories they’ve pitched. Consider: Manley is in the very immediate vicinity of the people who got the WaPo to push the claim that CIA had decided Russia hacked the DNC in order to get Trump elected, a conclusion that — we’ve subsequently learned — is the single one any agency in the IC (in this case, the NSA) expressed less confidence in. Moreover, we know that Harry Reid spent months trying to get the FBI to reveal details included in the Trump dossier that no one has been able to confirm. And when the dossier was released, Judd Legum magnified it himself, in much the same way the Medium post did the Rosneft claim.

Oh, and as a reminder: BuzzFeed was the entity that decided it was a good idea to publish an unverified intelligence dossier in the first place!

I mean, if the institutional Dems that BuzzFeed has deemed the arbiters of what is “legitimate” to talk about think the unproven Russian dossier counts, then BuzzFeed has even less in its claim about fake news.

Nevertheless, it thought it was a good idea to assign two journalists to make thinly substantiated claims about a lefty news problem that it then used to police whether lefty protestors are doing the right thing.


Trump Fulfills Another Campaign Promise: Kills 8-Year Old American Girl

Back on December 5, 2015, Donald Trump said that if he were elected President, he would take out the families of terrorists.

The other thing with the terrorists is you have to take out their families, when you get these terrorists, you have to take out their families. They care about their lives, don’t kid yourself. When they say they don’t care about their lives, you have to take out their families,

He repeated the promise to kill terrorists’ families later on the campaign trail.

On Sunday, Trump made good on that campaign promise by killing Nora al-Awlaki, the 8 year old American citizen daughter of Anwar al-Awlaki in a JSOC raid. A SEAL team member, Ryan Owens, was also killed in the raid.

Obama, of course, killed Nora’s then 16-year old brother, Abdulrahman, just weeks after having killed the children’s father in a drone strike.

There are competing stories about the purpose and the outcome of the raid, as NBC lays out here. Thus far, however, there has been little acknowledgment that Donald Trump ran on doing just this, killing the 8 year old children of terrorists, which should raise real questions about how so many (possibly in the 40s?) civilians got killed in the raid. Was that the point?

 

 


Targeted Killing

September 17, 2001: George Bush signs Memorandum of Notification (henceforth, Gloves Come Off MON) authorizing a range of counterterrorism techniques, including torture and targeted killing.

September 18, 2001: Congress passes the Authorization to Use Military Force.

November 3, 2002: US citizen Kamal Derwish killed in drone purportedly targeting Abu Ali al-Harithi.

Late 2008: Ruben Shumpert reported killed in Somalia.

June 24, 2009: Leon Panetta gets briefed on assassination squad program.

June 26, 2009: HPSCI passes a funding authorization report expanding the Gang of Eight briefings.

July 8, 2009: The Administration responds with an insulting appeal to a “fundamental compact” between Congress and the President on intelligence matters.

July 8, 2009: Silvestre Reyes announces CIA lied to Congress.

October 26, 2009: British High Court first orders British government to release language on Binyam Mohamed’s treatment.

October 28, 2009: FBI kills Imam Luqman Asmeen Abdullah during Dearborn, MI arrest raid.

October 29, 2009: Hearing on declassifying mention of Gloves Come Off MON before Judge Alvin Hellerstein; in it, Hellerstein reveals NSA James Jones has submitted declaration to keep mention of MON secret.

November 5, 2009: Nidal Hasan attacks Fort Hood, killing 13.

December 24, 2009: JSOC tries but fails to hit Anwar al-Awlaki. On that day, the IC did not yet believe him to be operational.

December 25, 2009: With Umar Farouk Abdulmutallab attack, FBI develops full understanding of Awlaki’s operational goals.

January 2, 2010: In conversation with David Petraeus, Yemeni President Ali Abdullah Saleh speaks as if Awlaki, whom he refers to as a cleric, not an AQAP member, was a designated target of December 24 attack.

January 13, 2010: ACLU FOIAs for information on drone killing.

6 months before July 16, 2010 memo: First David Barron drone killing memo.

January 18, 2010: DOJ prepares talking points for Eric Holder to brief Obama on targeted killing.

January 19, 2010: Eric Holder meeting with Obama.

January 19, 2010: State adds AQAP and Nasir al-Wuhayshi and Said al-Shihri — but not Anwar al-Awlaki — to FTO.

January 25, February 15, 2010: According to much later decrypted emails British Airways Engineer Rajib Karim and Awlaki discuss attacks on British Airways.

January 26, 2010: Dana Priest reports Awlaki was already on JSOC targeted killing list, CIA considering adding him.

January 28, 2010: AUSA Sean Lane asks Hellerstein for two more weeks (until February 12) to comply with order in torture FOIA case.

January 29, 2010: DOD denies ACLU’s request for expedited processing/waiver. Abdulmutallab starts cooperating with FBI.

February 2010: Date on one of two OLC memos shared with Intelligence Committees in February 2013.

February 1, 2010: FBI informs Senate Intelligence Committee Abdulmutallab now cooperating.

February 3, 2010: Dennis Blair acknowledges drone program in Congress, explaining in part “We target them for taking action that threatens Americans or has resulted in it.”

February 5, 2010: Umar Farouk Abdulmutallab confession still consistent with “Abu Tarak” ordering plot, not Awlaki.

February 9, 2010: Potential Adbulmutallab confirmation Awlaki picked the target.

February 9, 2010: ODAG sends OLC two emails regarding language in January 18 talking points for Holder.

February 10, 2010: British Government releases language revealing they warned that Binyam Mohamed’s pre-OLC memo treatment might constitute torture.

February 17, 2010: Lane asks Hellerstein to stay his order regarding the Gloves Come Off MON language until he decides the ACLU’s motion to reconsider.

February 19, 2010: Second OLC memo authorizing Awlaki kiling.

February 23, 2010: Abdulmutallab says he was not motivated by hatred of the US. This contradicts with his statement at sentencing.

March 1-3, 2010: Hilton submits a new declaration regarding the Gloves Come Off MON language, claiming new factual developments in the case; US Attorney Preet Bharara also submitted a letter urging Hellerstein to reconsider his ruling in light of the new facts.

March 9, 2010: CIA issues Glomar in Drone FOIA.

March 25, 2010: Harold Koh discusses targeted killing, implicitly discussing Awlaki.

March 29-30, 2010: Emails between OLC and attorneys from various agencies on potential statement on legal basis against US citizens in certain circumstances.

April 2010: Anwar al-Awlaki put on CIA kill list.

April 9, 2010: Govt gets extension in Drone FOIA to May 6.

April 16, 2010: Abdulmutallab’s interrogators ask about Awlaki’s martyrdom.

April 29, 2010: End date of earlier March 29 email chain on targeted killing.

Around June 2010: OLC completes Awlaki memo.

June 1, 2010: ACLU files amended complaint in Drone FOIA adding CIA.

June 11, 2010: NYT’s Scott Shane FOIAs DOJ OLC for memos on targeted killings.

June 24, 2010: David Barron announces his departure.

July 2010: According to recent reports, the date on the Barron/Lederman OLC memo.

July 20, 2010: Marty Lederman announces his departure.

July 16, 2010: Treasury puts Awlaki on Specially Designated Terrorist list; drone memo written.

August 2010: Stuart Delery becomes Senior Counselor to Holder.

August 27, 2010: Osama bin Laden questions whether Awlaki should take on greater leadership role without first being tested in battle.

August 30, 2010: Nasser al-Awlaki sues to prevent government from killing Anwar unless he presented imminent threat.

September 13, 2010: Abdulmutallab fires his lawyers, tries to plead guilty.

September 14, 2010: DOJ considers, then decides against, charging Anwar al-Awlaki

October 2, 2010: Hellerstein orders DOJ to release Gloves Come Off MON language.

October 10-11, 2010: Emails between OLC, Attorney General’s Office, and other National Security Lawyers on targeting US citizens.

October 16, 2010: Jabir al-Fayfi returns to Saudi Arabia and provides details of toner cartridge plot, naming others as more central leaders in plot.

October 21, 2010: Govt requests delay on FOIA discussion about MON itself pending decision on MON language.

November 8, 2010: Hearing in Nasser al-Awlaki suit on targeted killing.

December 7, 2010: Judge John Bates dismisses Awlaki suit.

February 2011: Ron Wyden asks DNI Clapper for information on Awlaki targeting.

March 24, 29, 2011: Department of State tries to get Awlaki to come to Embassy in Sanaa with ploy involving passport.

April 2011: Wyden calls Eric Holder and asks that OLC memos be provided to Congress.

May 5, 2011: US drone strike barely misses Awlaki

May 18-20, 2011: Emails between NSC, DOJ, and Legislative Affairs on draft legal analysis pertaining to lethal force against US citizen; one version includes Civil division; most include National Security Council.

May 2011: DOJ provides some information to Wyden, but doesn’t answer his questions.

June 23, 2011: Memo from Mike Mullen to National Security Legal Advisor on effect of US citizenship on targeting enemy belligerents.

September 9, 2011: Judge Rosemary Collyer grants CIA summary judgment in Drone FOIA.

September 16, 2011: John Brennan speech lays out new standard for imminence.

September 23, 2011: Government moves to protect something in Abdulmutallab case apparently tied to Awlaki.

September 30, 2011: Anwar al-Awlaki and Samir Khan killed in drone strike.

October 4, 2011: During jury selection, Abdulmutallab yells out, “Anwar is alive,” suggesting he had been told Awlaki had been killed.

October 5, 2011: Chuck Grassley requests targeted killing memo.

October 7, 2011: NYT’s Charlie Savage FOIAs OLC for memos on targeting killings.

October 8, 2011: Savage publishes detailed description of June 2010 OLC memo.

October 8, October 18, October 20-25, October 30-November 4, November 6-10, 2011: OLC email discussions about lethal force against US citizen, also including other agencies.

October 11, 2011: In opening argument of Abdulmutallab trial, DOJ claims “Abu Tarak” as the director of Abdulmutallab’s attack.

October 12, 2011: Abdulmutallab pleads guilty.

October 14, 2011: Abdulrahman al-Awlaki killed in JSOC drone strike.

October 19, 2011: ACLU FOIAs Anwar al-Awlaki OLC memo, underlying evidence supporting it, and information relating to Samir Khan and Abdullah al-Awalaki; group of OLC personnel meet in Viginia Seitz’ office on response, ostensibly to just NYT.

October 27, 2011: OLC denies both NYT requests under FOIA exemptions (b)(1), (b)(3), and (b)(5), and, in response to Shane’s request, also notes that with regards to other agencies, “neither confirms nor denies the existence of the documents” in the request.

October 27, 2011: DOJ Office of Information Policy grants ACLU’s request for expedited processing but determines the request fell within “unusual circumstances” so it could not meet the statutory deadline.

October 31, 2011: DOD denies ACLU’s request for expedited processing and also claimed “unusual circumstances.”

November 2011, unknown date: Situation Room meeting at which Principals decide to pursue a “half monty” strategy of limited release of information on Awlaki.

November 2, 2011: State sends two emails to AG, OLC, and various NatSec agencies on draft language on targeted killing.

November 3, 2011: Arbitrary end date DOJ’s Office of Information Policy placed on FOIA request for targeted killing documents.

November 4, 2011: NYT appeals its denial.

November 7, 2011: USSOCOM denies ACLU’s request for expedited processing and determined the request fell within “unusual circumstances.”

November 8, 2011: Stuart Delery drafts white paper.

November 8, 2011: In his opening statement for a DOJ Oversight hearing, Pat Leahy complains the Senate Judiciary Committee had not been given “the legal justification underlying drone strikes against an American citizen overseas.”

November 9, 2011: ACLU appeals summary judgment in Drone FOIA.

November 14, 2011: OLC denies ACLU’s request under FOIA exemptions (b)(1), (b)(3), and (b)(5).

November 17, 2011: CIA denies ACLU’s FOIA “pursuant to FOIA exemptions (b)(1) and (b)(3)” and claims that the “fact of the existence or nonexistence of requested records is currently and properly classified.”

December 27, 2011: DOD informs ACLU it could not process the request within statutory timeframe.

January 18, 2012: CIA informs ACLU it would be unable to respond to ACLU’s administrative appeal within statutory timeframe.

February 1, 2012: ACLU sues on Anwar al-Awlaki et al FOIA.

February 8, 2012: Ron Wyden follows up on his earlier requests for information on the targeted killing memo with Eric Holder.

February 10, 2012: In sentencing memo for Abdulmutallab, government releases narrative of Abdulmutallab’s confession.

February 11, 21, 2012: Email discussions about Jeh Johnson’s February 22, 2012 speech.

February 22, 2012: Jeh Johnson speech on targeted killing.

February 27, March 1, 2012: DOD emails discussing content of Eric Holder’s March 5, 2012 speech.

March 2012: Stuart Delery becomes PDAAG and Acting AAG at Civil Division.

March 5, 2012: Eric Holder speech lays out claimed basis for Awlaki killing.

March 7, 2012: Tom Graves (R-GA) asks Robert Mueller whether Eric Holder’s criteria for the targeted killing of Americans applies in the US; Mueller replies he’d have to ask DOJ.

March 8, 2012: Pat Leahy renews his request for the OLC memo at DOJ appropriations hearing.

March 9, 2012: 2nd Circuit hearing on Gloves Come Off MON

March 30, 2012: AUSA Sarah Normand asks ACLU to exclude draft legal analyses, email, and other correspondence from TK FOIA

April 3, 2012: ACLU accepts limit on draft legal analyses, but not email and internal communication.

April 4, 2012: Stephen Preston speech lays out CIA’s legal authorization to engage in targeted killing.

April 9, 2012: Govt requests 10-day extension on TK FOIA.

April 23, 2012: Govt requests 28-day extension on TK FOIA.

April 30, 2012: John Brennan speech admits we use drones to kill terrorists.

May 21, 2012: 2nd Circuit permits govt to keep mention of Gloves Come Off MON secret; In phone conference, Judge Colleen McMahon extends deadline to June 20, 2012.

June 7, 2012: After Jerry Nadler requests the memo, Eric Holder commits to providing the House Judiciary a briefing–but not the OLC memo–within a month.

June 12, 2012: Pat Leahy renews his request for the OLC memo at DOJ oversight hearing.

June 20, 2012: The government responds to NYT and ACLU lawsuits for memo and other documents related to targeted killing (though several of the declarations supporting that motion, including the one from DOJ OIP, were not submitted until June 21).

June 22, 2012: According to House Judiciary Committee letter, the date the 7-month old white paper provided to Committee (Dianne Feinstein says both Senate Judiciary and Intelligence Committees received the memo in June 2012 too).

June 27, 2012: In Questions for the Record following a June 7 hearing, Jerry Nadler notes that DOJ has sought dismissal of court challenges to targeted killing by claiming “the appropriate check on executive branch conduct here is the Congress and that information is being shared with Congress to make that check a meaningful one,” but “we have yet to get any response” to “several requests” for the OLC memo authorizing targeted killing. He also renews his request for the briefing Holder had promised.

July 18, 2012: ACLU, CCR, and Khan and Awlaki families file wrongful death suit.

July 19, 2012: Both Pat Leahy and Chuck Grassley complain about past unanswered requests for OLC memo. (Grassley prepared an amendment as well, but withdrew it in favor of Cornyn’s.) Leahy (but not Grassley) votes to table John Cornyn amendment to require Administration to release the memo.

August 10, 2012: Pat Leahy claims SJC received the white paper in response to his (and Grassley’s) initial requests from the previous year: “the Senators has been provided with a white paper we received back as an initial part of the request I made of this administration.”

October 18, 2012: Abdulmutallab prosecution team wins AG recognition for balancing intelligence collection and prosecution.

December 4, 2012: Jerry Nadler, John Conyers, and Bobby Scott ask for finalized white paper, all opinions on broader drone program (or at least a briefing), including signature strikes, an update on the drone rule book, and public release of the white paper.

January 14, 2013: Wyden writes John Brennan letter in anticipation of his confirmation hearing, renewing his request for targeted killing memos.

January 25, 2012: Rand Paul asks John Brennan if he’ll release past and future OLC memos on targeting Americans. 

February 4, 2013: 11 Senators ask for any and all memos authorizing the killing of American citizens, hinting at filibuster of national security nominees.

February 7, 2013: On morning of Brennan confirmation hearing, Administration provides two OLC memos, withholding 7-8 more.

February 7, 2013Pat Leahy and Chuck Grassley ask that SJC be able to get the memos that SSCI had just gotten. 

February 7, 2013: In John Brennan’s confirmation hearing, Dianne Feinstein and Ron Wyden reveal there are still outstanding memos pertaining to killing Americans, and renew their demand for those memos. 

February 8, 2013: Bob Goodlatte, Trent Franks, and James Sensenbrenner join their Democratic colleagues to renew the December 4, 2012 request.

February 13, 2013: In statement on targeted killings oversight, DiFi describes writing 3 previous letters to the Administration asking for targeted killing memos.

February 20, 2013: Paul sends third letter, repeating his question about whether the President can have American killed inside the US.

February 27, 2013: At hearing on targeted killing of Americans, HJC Chair Bob Goodlatte — and several other members of the Committee — renews request for OLC memos.

March 11, 2013: Barbara Lee and 7 other progressives ask Obama to release “in an unclassified form, the full legal basis of executive branch claims” about targeted killing, as well as the “architecture” of the drone program generally.

April 10, 2013: Bob Goodlatte and John Conyers send Obama a letter threatening a subpoena if they don’t get to see the drone killing memos.

March 27, 2014: Alan Grayson holds hearing with drone victim, calls for more transparency over decision making.

April 4, 2014: Judge throws out wrongful death suit from Awlaki and Khan families.

April 21, 2014: 2nd Circuit orders Administration to release redacted version of OLC memo to ACLU and NYT.

May 5, 2014: Rand Paul issues veto threat for David Barron’s confirmation unless Administration releases OLC memo (already ordered for release by 2nd Circuit).

May 20, 2014: The Most Transparent Administration Evah™ announces it will release (what is certain to be a highly redacted version of) the OLC memo.


Maybe FBI Has Lost Track of Who the Informants Are?

Here are all the informants and undercover employees listed in the criminal complaint against Erick Hendricks, who was arrested for conspiring to materially support ISIL in relation to the Garland, TX attack:

  • CHS-1: a paid informant for the last year and a half with a criminal record of fraud and forgery who has not (yet?) received sentencing benefits for his cooperation; he met with Hendricks in Baltimore.
  • CHS2: a paid informant for the last 4 years with no known criminal history; he posed as someone wanting to join ISIL.
  • CHS-3: a paid informant for the last 4 and a half years with no known criminal history; Hendricks instructed CHS-3 to assess UCE-1 for recruitment.
  • CHS-4: a paid informant for the last 4 years with no known criminal history; Hendricks provided him with jihadist propaganda on social media. He also met with Hendricks in Baltimore, at a later date.
  • UCE-1: an undercover officer had conversations directly with Hendricks that mirrored those Hendricks had with a cooperating witness. UCE-1 also incited and then was present for the Garland attack.

Not mentioned at all in this narrative is the role played by Joshua Goldberg, a Jewish guy who adopted many avatars online to incite all kinds of violence, including, under the name of Australi Witness, Garland. In December Goldberg was deemed incompetent to stand trial, though in June it was decided with more treatment he might become competent enough to stand trial, so they’re going to check again in four months.

So, the cell that committed the Garland attack consisted of the two now-dead perpetrators, four informants, an undercover FBI officer, a mentally ill troll, and Hendricks.

Only now, Hendricks claims he was an informant too!

Hendricks claims to have been a paid informant of the FBI since 2009 who helped the agency identify potential terrorists. Code name: “Ahkie,” a variation of the Muslim term for “brother.”

He also claims to have been an outspoken and longtime opponent of radical Islam.

“I have publicly, privately and consistently denounced Al-Qaeda, ISIS and all extremist groups,” Hendricks said in a statement that Lisa Woods says her son dictated during a Wednesday phone call from the jail.

“I am baffled as to why the FBI (is) accusing me of terrorist ties.”

[snip]

In his statement, Hendricks says the FBI first made contact with him in 2009, when as Mustafa Abu Maryam, Hendricks was the youth coordinator of the Islamic Circle of North America Center in Alexandria, Va.

[snip]

In his jail statement, Hendricks says he was recruited in 2009 by an FBI agent named David to help identify potential terrorists. In 2010, after Hendricks had moved to Columbia, he says he worked with another FBI agent named Steve. Altogether, Hendricks claims to have developed “at least a half-dozen” cases against extremists.

Has the FBI simply lost track of who are real and who are the people it is paying to play a role? Or is it possible someone from another agency, claiming to be FBI, recruited Hendricks (don’t laugh! That’s one potential explanation for Anwar al-Awlaki’s curious ties to US law enforcement, a story that wends its way through a related mosque in VA)?

Sure, maybe Hendricks is making all this up (at the very least, it may necessitate the BoP to protect him in prison since he has now publicly claimed to be a narc). But FBI’s network of informants sure is getting confusing.

 


Drone Rule Book, Working Thread

What ever happened to the inclusions of headers and footers in documents? It used to be, documents would ID what document you were reading on every page, which is really useful if one page walks or gets replaced with a new one. Now even life-and-death documents like the Drone Rule Book liberated by the ACLU lack real headers.

This will be a working thread on that.

(0) Seriously, there’s something funky about the production of this document. Perhaps it’s a reprint of the actual drone rule book with interesting stuff removed. But it’s not even clear the classification description on the front page (to include an original classification authority, a reason for classification, and a date for declassification) is complete. Nor are specific redactions cited by exemption. Given that drones were part of the 2001 Finding which was itself classified by NSC, not CIA, that raises interesting questions about how long they maintained that claim.

Screen Shot 2016-08-07 at 7.10.39 AM

Also note the green line on the first page, which seems to suggest some digital alteration, either at the White House or ACLU. For a variety of reasons, I also wonder whether this has been updated, with no record, which the informal structure of it would seem to invite.

(1) It’s really crazy for a POTUS to be setting what claim to be “procedures,” as opposed to policy. These are mostly policies. But tied to implementing bureaucratic tools. I’ll write later how this hybrid purpose makes the PPG far less valuable than it pretends to be.

(1) Note the applicability: “for when the United Staes takes direct action, which refers to lethal and non-lethal uses of force, including capture operations, against terrorist targets outside the United States.” Obviously, that’s not what this covers. There are a slew of examples where “the US” takes direct action outside the US. Implicitly, this is about amending or replacing the 9/17/01 Finding (and given the timing, and the declassification of the Finding’s role in torture, it could be the latter). But this does raise questions about whether there’s an underlying (perhaps modified) Finding that undergirds this.

(1) They redact the kind of plan they use to make sure it can’t be FOIAed. I bet there are numerous drone strikes that didn’t have them; remember, at about this process, CIA didn’t play by same rules as DOD.

(1) “based on the legal authorities of the nominating department” Interesting relation with covert authorities.

(1) The capture feasibility assessment seems targeted to Congress. I wonder how broadly this was circulated there.

(1) Note the PPG just assumes everyone knows this is about HVTs without saying so. But the PPG as a whole distinguishes between targeting HVTs and others, with incidental death being envisioned in the latter case (see footnote 1 on 2).

(2) First redaction must relate to the “unable or willing to act” formula; that it is redacted suggests it has nothing to do with established intl law (later incidences of it are unredacted use of the unable willing formula).

(2) second redaction may be a caveat about the circumstances in which expert agencies (such as State) get to review.

(2) “when considering potential direct action against a U.S. person under this PPG, there are additional questions that must be answered.” That’s rather weak.

(2) The named plan is 3 words long.

(2) Note the redaction modifying what kind of “direct action operations” this covers. That may be the same redaction as the last one on the page.

(3) Redaction in bullet 3 is interesting.

(3) Does bullet 5 reference foreign partners?

(3) Bullet 7 permits variations from this PPG, which essentially eats up the rule book.

(3) Note that the 3 assessments required before using lethal force all make up subbullets to bullet 8. That implies a logical structure whereby the decision making process happens after the fact.

(4) 1F treats identity here as primarily relating to HVTs.

(5) 1H2 suggests the President may impose her own conditions on such approval. This is a crazy level of involvement from the President, not necessarily all in a good way.

(5) Footnote 1 seems to permit us getting exclusive shot at a detainee before we dump them onto foreign governments.

(5) Footnote 2 seems to give NSS a way to veto DOJ indictment. (Which is of particular interest with Awlaki.)

(6) Note the acknowledgement that the US “provides training, funds, or equipment to enable a foreign government to capture a suspect,” which does not count as us doing so.

(6) Note the nominating agency seems to get to suggest what to do with the detainee long term. That seems problematic.

(7) The redaction of things that must be included in a baseball card doesn’t say much for the due process involved. Note the emphasis, too, on gaps in intelligence/differences in opinion. But DOD or CIA gets to pull this together.

(8) No discussion of difference between Interagency Disposition Planning Group and Restricted Counterterrorism Security Group (though the latter appears to be the analysts and the former appears to be the policy people). If the same people are on both it would have a garbage in garbage out effect.

(9) I’m guessing bullet 2 pertains to foreign partner custody. That’s important because bullet 4 presumes certain things might happen in detention, like torture, that would make prosecution impossible.

(9) A lot implied by that “if appropriate” language on whether the operational plan can be shared with the Deputies Review.

(9) Note the DNSA determines who will be present at a Deputies Committee review. It’d be easy to leave, say, State out.

(10) Note that they consider whether detaining someone would interfere with sources or methods. Not surprising but the implications of that are worth nothing.

(10) The reference to humane treatment in bullet 6 is likely to relate to redacted passages earlier (and must have been introduced in a redacted passage).

(10) Foreign detention should be explored based on NatSec considerations. No mention here of humane treatment.

(10) Interesting Q why the decision to strike in defiance of Principals Committee guidance goes through DNSA, not NSA. If a Brennan or Monaco presents that decision, it’ll lack the larger picture that an NSA might bring.

(11) Only those people present at DC meeting will learn that POTUS has approved a strike over their guidance.

(11) I will probably return to 3A but I think it is a muddle that totally turns this document inside out.

Screen Shot 2016-08-07 at 8.28.41 AM

(11) 3b is written in an odd voice: “lethal action requires” rather than “before taking lethal action.” Also note this comes from within the capture process.

(11) The decision to off someone has to formally come from the GC of the agency that will do the business. Interesting how this might result in two, potentially competing lists.

(11) FN 8: This language seems to provide a time where the DC would reassess feasibility for capture, on expedited process. But the way in which this “procedure” works largely ensures it can be sidestepped.

(12) Here’s how the list of considerations for a capture versus a kill operation look, in completely redacted form.

Kill or Capture Considerations

Given the significant differences in redaction, there doesn’t appear to be much overlap beyond the initial bullet.

(12) It is really bizarre to have to specify that NSS forwards the package to the DC, as if in the past the wrong package got forwarded.

(13) What does this mean: “In all events, the NSS Legal Adviser and the General Counsel of the nominating agency shall consult with DOJ”? Given that they try to avoid paper trails, what does this entail? And when reviewing a USP nomination, there are no requirements about what the DOJ review must include (which might be another bulleted list like the one above if this document weren’t a joke).

(13) Here’s how the Deputies Committee meetings for a capture versus a kill decision differ.

Screen Shot 2016-08-07 at 8.55.09 AM

The redacted agency(ies) present at capture but observant at kill may be involved in detention and/or (FBI) prosecution. If so, that means FBI would only get observant status if the IC had decided to kill someone.

(14) Here’s what the DC considers for a capture versus a kill decision.

Screen Shot 2016-08-07 at 9.33.44 AM

While both consider intelligence implications (sort of) the unredacted section doesn’t consider how a kill decision will affect CT strategy outside of broader regional interests (that it is phrased in that way is particularly interesting given the prominence of side payment strikes in Pakistan).

(14) This seems to permit bypassing the DC altogether.

The Principal of the nominating agency may approve lethal action against the proposed individual if: ( I) the relevant Principals unanimously agree that lethal action should be taken against the proposed individual. and (2) the Principal of the nominating agency has notified the President through a DNSA of his intention to approve lethal action and has received notice from a DNSA that the President has been apprised of that intention. The Principal of the nominating agency may not delegate his authority to approve a nomination.

Note, they don’t even need to get approval from the President to kill someone–she need only be apprised of it. (I’m mindful that this rule book was largely written, though not finalized, by John Brennan). I half wonder whether consideration #6 involves a need to remove him from this earth for secrecy reasons.

(14) Note, the annual review does not explicitly review whether the person still remains a threat.

(15) The redaction describing lethal force here seems longer than the one describing HVT lethal force, though it’s possible this section describes first targeting on patterns and then on infrastructure.

(15) The thing that will be missed in a “fleeting opportunity” attack is contrary intelligence and downsides, yet nevertheless claims to abide by the same “near certainty” criteria.

(16) The “appropriate NSS official shall communicate the President’s decision” would seem to invite that person bypassing the President altogether (as it did with Brennan in fact).

(17) The PPG specifically permits the President to authorize drone strikes because a person presents a threat to other country’s persons. I look forward to legal analysis of this attenuated imminence standard (especially since the government has most jealously guarded its OLC memos on agreements with countries in question).

(17) Since the after action report must be submitted after 48 hours, it can’t consider larger questions, such as whether it helped or hurt overall CT strategy.

(18) This would seem to permit the agency of any principal/deputy to review after action reports.

(18) Only “appropriate” members of Congress get notified, and this doesn’t even list them. This section would appear to permit briefing the Gang of Four before an operation (for secrecy reasons) but then only informing the Gang of Four afterwards, when secrecy concerns were no longer as urgent. In addition, agencies have to get the NSS to approve sharing with Congress, and only applies it to those “required to submit congressional notifications,” which may create some loopholes.

(18) The redaction at 8B is pretty interesting.

(18) As noted above: the reporting requirements of the PPG don’t invite reporting on larger strategic issues on lethal killing, making the review under 8C pretty useless as well.

Copyright © 2024 emptywheel. All rights reserved.
Originally Posted @ https://www.emptywheel.net/page/9/?s=awlaki