Jack Goldsmith conducted fascinating interview with NYT Executive Editor Dean Baquet about the latter’s decision to name Michael D’Andrea and two other top CIA officials whose identities the CIA was trying to suppress.
He attributes his decision to three factors: The CIA has increasingly taken on a new military role that demands some accountability, the CIA admitted these three figures were widely known anyway, and the CIA (and NSA’s) explanations in the past have proven lame.
There are some interesting points, but I think Baquet — and Goldsmith — miss two aspects of accountability that the NYT article permitted.
Baquet reveals that even the CIA didn’t claim these men were secret, even if it still pretends they are under cover.
DB: These guys may technically be undercover. But even the CIA admitted when they called – and this was a big factor in the decision – that they are widely known, and they were known to the governments where they were stationed. The CIA’s pitch was not that these guys are secret or that people don’t know about them. The CIA’s pitch to me was, “Look, its one thing to be widely known, and to be known to governments and to be on web sites; but when they appear on the front page of the New York Times, that has a larger meaning.” So they were known anyway. The gentleman at the very top [of the CTC] runs a thousand-person agency, and makes huge decisions, personally, that have tremendous repercussions for national security. I’m not making judgments about him, but that’s the reality.
Later in the interview Goldsmith appears to totally ignore this point when he worries that these men don’t have the same kind of security as their counterparts running drone programs in the military. He suggests they might come under new threat because their names have been published on the front page of the NYT.
But that assumes our adversaries are too dumb to look in the places where these men’s names have been published before — just like CIA’s successful attempt to suppress Raymond Davis’ association with the CIA even after it was broadly known in Pakistan. It assumes our adversaries who seek out this information are not going to find where it’s hiding in plain sight.
The CIA isn’t keeping these secrets from our adversaries. They already know them. Which makes CIA’s efforts to keep them from the US public all the more problematic.
Baquet’s argument about CIA’s squandered credibility is two fold. First, he notes that the CIA always claims people are under cover, which makes their claims less credible as a result.
JG: Let me ask you a different question. What do you think about the claim by Bob Litt, the General Counsel of the DNI, that you’ve put these guys’ lives and their families’ lives in jeopardy, and also the people they worked with undercover abroad? How do you assess that? How do you weigh that?
DB: I guess I would say a couple of things. I wish the CIA did not say that about everybody and everything. They hurt their case.
JG: They say it a lot?
DB: They say it all the time. I wish they were a little more measured in saying that. Sometime it’s a little difficult to deal with the Agency. When somebody says that and has a track record of rarely saying that, it really gives me pause. But they [the CIA] say it whenever we want to mention a [covert] CIA operative or CIA official.
But — perhaps more importantly for a guy who has taken heat for killing important stories in the past — Baquet also mentions the times agencies convince him to kill stories that turn out to get published anyway. Baquet uses sitting on the detail that the US used a drone base in Saudi Arabia to kill Anwar al-Awlaki as his example.
DB: I’ll give you an example. When Al-Awlaki was killed by a drone strike, we were on deadline, and I was the Managing Editor. The Acting Director of the CIA called up because we were going to say in the middle of the story that the drone that killed Al-Awlaki took off from a base in Saudi Arabia. (I can give you twenty examples, but this is just one.) He called up and said, “If you say that the drone took off from a base in Saudi Arabia, we are going to lose that base. The Saudis are going to go nuts, they don’t want people to know that we are flying drones from their base.” And so I took it out. And I think we made it something like, “The drones took off from a base in the Arabian Peninsula,” something vague. Sure enough, the next day, everybody other than us said it was Saudi Arabia. When I thought hard about it, [I concluded] that was not a good request. And I later told the CIA it was not a good request. And they should have admitted that was not a good request. Everyone knew they had a base. It was for geopolitical reasons, not really national security reasons. I think that’s one where they shouldn’t have asked and I shouldn’t have said “yes” so automatically. So now I am tougher. Now I just say to them, “Give me a compelling reason, really really tell me.” Because to not publish, in my way of thinking, is almost a political act. To not publish is a big deal. So I say, “Give me a compelling reason.” And I don’t think I said that hard enough earlier on. That influences me now. It does make me want to say to the CIA, and the NSA, and other agencies involved in surveillance and intelligence: “Guys, make the case. You can’t just say that it hurts national security. You can’t just say vaguely that it’s going to get somebody killed. You’ve got to help me, tell me.” In cases where they have actually said to me something really specific, I have held it. There is still stuff that’s held, because it is real. But I think I am tougher now and hold them to higher standards. And part of that is that secrecy now is part of the story. It’s not just a byproduct of the story. It’s part of the story. I think there is a discussion in the country about secrecy in government post-9/11. It was provoked partly by Snowden, it was provoked partly by the secrecy of the drone program. And I think that secrecy is now part of it. And that puts more pressure on me to reveal details when I have them.
But I find his invocation of Snowden (and the mention of the NSA which he makes 4 times) all the more interesting.
Remember, in 2006, Mark Klein brought the story, with documents to prove the case, that the NSA had tapped into AT&T’s Folsom Street switch to Baquet when the latter was at the LAT. Baquet killed the story, only to have the NYT publish the story shortly thereafter.
Back in 2006, former AT&T employee Mark Klein revealed information that proved the communications giant was allowing the NSA to monitor Internet traffic “without any regard for the Fourth Amendment.” Klein initially brought the story to The Los Angeles Times, but it never made it to print under Baquet, who recently replaced the fired Jill Abramson as executive editor of The New York Times.
Klein told HuffPost Live’s Alyona Minkovski that he gave 120 pages of AT&T documents to an LA Times reporter who “was promising a big front-page expose” on the story. But the reporter eventually told Klein there was a “hangup,” and the story was abandoned shortly after with no explanation.
Months later, producers from ABC’s “Nightline” who were working on the story contacted editors at the LA Times to ask if they had, in fact, decided not to print it. The producers were told that Baquet killed the story, Klein said.
“That’s when Dean Baquet came out with this lame excuse that he just couldn’t figure out my technical documents, so he didn’t think they had a story. I don’t think anybody really believed that argument because, as I said, a few weeks after the LA Times killed the story, I went to The New York Times and they had no trouble figuring it out,” Klein said.
Any question of the clarity in the documents Klein produced “was just Dean Baquet’s lame cover story for capitulating to the government’s threats,” Klein alleged.
And while Baquet still claims he didn’t kill the story due to pressure from the government, the claim has always rung hollow.
The CIA and NSA have not only cried wolf once too often, they have cried wolf with Baquet personally.
There are two things that are, sadly, missing from this discussion.
First, no one actually believes that Michael D’Andrea, who (as I pointed out yesterday) the CIA helped Hollywood turn into one of the heroes of the Osama bin Laden hunt) is really under cover. But it’s important to look at what suppressing his actual name does for accountability. And the torture report is the best exhibit for that.
If you can’t connect all the things that D’Andrea — or Alfrea Bikowsky or Jonathan Fredman — have done in their role with torture, you can’t show that certain people should have known better. After KSM led Bikowsky to believe, for 3 months, that he had sent someone to recruit black Muslims in Montana to start forest fires, any further unfathomable credulity on her part can no longer be deemed an honest mistake; it’s either outright incompetence, or a willful choice to chase threats that are not real. Hiding D’Andrea’s name, along with the others, prevents that kind of accountability.
But there’s one other crucial part of accountability that’s core to the claim that our representative government adequately exercises oversight over CIA.
A key part of the NYT story (and Baquet emphasized this) was challenging whether the Intelligence Committees were exercising adequate oversight over the drone strikes. The NYT included really damning details about Mike Rogers and Richard Burr pushing to kill Americans.
Yet the article was most damning, I think, for Dianne Feinstein, though it didn’t make the case as assertively as they could have. Consider the implications of this:
In secret meetings on Capitol Hill, Mr. D’Andrea was a forceful advocate for the drone program and won supporters among both Republicans and Democrats. Congressional staff members said that he was particularly effective in winning the support of Senator Dianne Feinstein, the California Democrat who was chairwoman of the Senate Intelligence Committee until January, when Republicans assumed control of the chamber.
The confidence Ms. Feinstein and other Democrats express about the drone program, which by most accounts has been effective in killing hundreds of Qaeda operatives and members of other militant groups over the years, stands in sharp contrast to the criticism among lawmakers of the now defunct C.I.A. program to capture and interrogate Qaeda suspects in secret prisons.
But both programs were led by some of the same people.
The implication — which should be made explicit — is that Dianne Feinstein has been protecting and trusting a guy who also happens to have been a key architect of the torture program (Feinstein did the same with Stephen Kappes).
Feinstein can complain about torture accountability all she wants. But she has the ability to hold certain people to a higher standard, and instead, in D’Andrea’s case and in Kappes, she has instead argued that they should maintain their power.
And that’s the kind of the thing the public can and should try to hold Feinstein accountable for. Rogers and Burr, at least, are not hypocrites. They like unchecked and ineffective CIA power, unabashedly. But Feinstein claims to have concerns about it … sometimes, but not others.
The public may not be able to do much to hold the CIA accountable. But we can call out Feinstein for failing to do the things she herself has power to do to get accountability for torture and other CIA mismanagement. And that, at least, is a key value of having named names.
At a panel on secrecy yesterday, Bob Litt proclaimed that the NYT “disgraced itself” for publishing names, some of which were widely known, of the people who were conducting our equally widely known secret war on drones.
Did the NYT “disgrace itself” for publishing a column by Maureen Dowd that covers over some of the more unsavory female CIA officers — notably, Alfreda Bikowsky — who have nevertheless been celebrated by the Agency?
I’d submit that, yes, the latter was a far more disgraceful act, regardless of the credit some of the more sane female CIA officers deserve, because it was propaganda delivered on demand, and delivered for an agency that would squawk Espionage Act had the NYT published the same details in other circumstances.
Keep that in mind as you read this post from Jack Goldsmith, claiming — without offering real evidence — that this reflects a new “erosion of norms” against publishing classified information.
I mean, sure, I agree the NYT decision was notable. But it’s only notable because comes after a long series of equally notable events — events upping the tension underlying the secrecy system — that Goldsmith doesn’t mention.
There’s the norm — broken by some of the same people the NYT names, as well as Jose Rodriguez before them — that when you take on the most senior roles at CIA, you drop your cover. By all appearances, as CIA has engaged in more controversial and troubled programs, it has increasingly protected the architects of those programs by claiming they’re still undercover, when that cover extends only to the public, and not to other countries, even adversarial ones. That is, CIA has broken the old norm to avoid any accountability for its failures and crimes.
Then there’s the broken norm — exhibited most spectacularly in the Torture Report — of classifying previously unclassified details, such as the names of all the lawyers who were involved in the torture program.
There’s the increasing amounts of official leaking — up to and including CIA cooperating with Zero Dark Thirty to celebrate the work of Michael D’Andrea — all while still pretending that D’Andrea was still under cover.
Can we at least agree that if CIA has decided a Hollywood propagandistic version of D’Andrea’s is not classified, then newspapers can treat his actual career as such? Can we at least agree that as soon as CIA has invited Hollywood into Langley to lionize people, the purportedly classified identities of those people — and the actual facts of their career — will no longer be granted deference?
And then, finally, there’s CIA’s (and the Intelligence Community generally) serial lying. When Bob Litt’s boss makes egregious lies to Congress to cover up for the even more egregious lies Keith Alexander offered up when he played dress-up hacker at DefCon, and when Bob Litt continues to insist that James Clapper was not lying when everyone knows he was lying, then Litt’s judgement about who “disgraced” themselves or not loses sway.
All the so-called norms Goldsmith nostalgically presents without examination rest on a kind of legitimacy that must be earned. The Executive has squandered that legitimacy, and with it any trust for its claims about the necessity of the secrets it keeps.
Goldsmith and Litt are asking people to participate with them in a kind of propagandistic dance, sustaining assertions as “true” when they aren’t. That’s the habit of a corrupt regime. They’d do well to reflect on what kind of sickness they’re actually asking people to embrace before they start accusing others of disgraceful behavior.
There’s an interesting passage in the DOJ IG discussion of Jack Goldsmith’s efforts to rewrite the Stellar Wind OLC memos (PDF 456).
The first passage describes Jim Comey permitting a lower standard of review to apply for activities already in process.
In explaining the rationale for the revise opinion, Comey described to the OIG his view of two approaches or standards that could be used to undertake legal analysis of government action. If the government is contemplating taking a particular action, OLC’s legal analysis will be based on a “best view of the law” standard. However, if the government already is taking the action, the analysis should instead focus on whether reasonable legal arguments can be made to support the continuation of the conduct.137
137 Goldsmith emphasized to us that this second situation almost never presents itself, and that OLC rarely is asked to furnish legal advise on an ongoing program because the pressure “to say ‘yes’ to the President” invariably would result in applying a lower standard of review. Goldsmith stated that OLC’s involvement in Stellar Wind was “unprecedented” because OLC is always asked to review the facts and formulate its advice “up front.”
If it was unprecedented on March 1, 2004, it quickly became common.
After all, Goldsmith was asked to consider how the Geneva Convention applied to various types of detainees in Iraq, after the Administration had already been and continued to render people out of that occupied country. And he was also in the midst of a review of the torture program.
Indeed, Daniel Levin, who would go on to reconsider torture approvals until Cheney booted him out of the way to have Steven Bradbury rubberstamp things, would have been a part of those discussions.
So when, in fall 2004, he was asked to reconsider torture, that lower standard of review would have been in his mind.
You could even say that this standard of review gave CIA an incentive to start and continue torturing Janat Gul, on whom they pinned their need to resume torture, even after they accepted he was not, as a fabricator had claimed, planning election year plots in the US. So long as they tortured Gul, Levin would be permitted to apply a lower standard to that torture.
In any case, if this was unprecedented then, I suspect it’s not anymore. After all, by the time David Barron first considered the drone killing memo for Anwar al-Awlaki, the Administration had apparently already tried to kill him once. And the Libyan war had already started when OLC started reviewing it (though they made a heroic effort to rule it illegal, which is a testament to just how illegal it was).
With regards to the Stellar Wind OLC, the discussion of what Goldsmith found so problematic is mostly redacted. Which is why I’m interested in his opinion that “‘we can get there’ as to [redacted] albeit by using an aggressive legal analysis.” That says that one of the things his opinion would approve — either the content collection of one-end foreign communications or the dragnet collection of telephone metadata — involved “aggressive legal analysis” even to meet this lower standard.
It’d sure be nice to know which practice was considered so marginally legal.
As I noted, one interesting aspect of reading the Stellar Wind IG Reports is tracking the things that show up in the Snowden-leaked draft IG Report that are completely redacted in the DOJ-released report.
One thing that is completely redacted is that Stellar Wind was used to spy on Iraqi targets (or US targets alleged to be Iraqi targets during the war?), as explained here.
(TS//SI//NF) Iraqi Intelligence Service. For a limited period of time surrounding the 2003 invasion oflraq, the President authorized the use of PSP authority against the Iraqi Intelligence Service. On 28 March 2003, the DCI determined that, based on then current intelligence, the Iraqi Intelligence service was engaged in terrorist activities and presented a threat to U.S. interests in the United States and abroad. Through the Deputy DCI, Mr. Tenet received the President’s concurrence that PSP authorities could be used against the Iraqi Intelligence Service. NSA ceased using the Authority for this purpose in March 2004.
Given the timing, this almost certainly is one of the things Jack Goldsmith shut down in the first set of modifications in March 2004 (there appears to have been a parallel effort in 2004 to stop treating Iraqi prisoners as terrorists who could be tortured).
And while the officially released IG Reports hide all mention of this, there is one detail that says volumes. Amid the section describing all the things Patrick Philbin found to be problematic in Yoo’s OLC memos authorizing the program, this footnote appears (at PDF 442).
See Presidential Authorization of April 22, 2003 at para. 4(b)(i) & (ii). The April 22, 2003, Authorization was the only Authorization personally approved as to form and legality by Yoo. He approved the Authorization on April 18, 2003; five days before the date of his talking points memorandum.
John Yoo, not Attorney General Ashcroft, signed the Authorization that went into effect on April 22, 2003.
This Authorization was the first issued after Tenet declared Iraq terrorists on March 28, 2003 (I’ve added the Authorization dates here).
As it happens, that Authorization was also the last or second-to-last one signed while Yoo remained at DOJ. He left in June 2003 because Ashcroft had refused to let him assume the OLC AAG position after Jay Bybee moved onto his sinecure on the 9th Circuit.
That’s not the last crazy thing Yoo did while at OLC: at roughly the same time he was free-lancing “Legal Principles” documents pretend-authorizing torture techniques that the original Bybee memo had not approved.
But I find it interesting that one of the last things Yoo did was sign an authorization to use a program purportedly focused on terrorists to surveil targets (who must in some part be in the US) related to a war of choice.
In an column explicitly limited to the phone dragnet, Conor Friedersdorf pointed to a post I wrote about Section 215 generally and suggested I thought the phone dragnet was about to get hidden under a new authority.
Marcy Wheeler is suspicious that the Obama Administration is planning to continue the dragnet under different authorities.
But my post was about more that just the phone dragnet. It was about two things: First, the way that, rather than go “cold turkey” after it ended the Internet dragnet in 2011 as the AP had claimed, NSA had instead already started doing the same kind of collection using other authorities that — while they didn’t collect all US traffic — had more permissive rules for the tracking they were doing. That’s an instructive narrative for the phone dragnet amid discussions it might lapse, because it’s quite possible that the Intelligence Community will move to doing far less controlled tracking, albeit on fewer Americans, under a new approach.
In addition, I noted that there are already signs that the IC is doing what Keith Alexander said he could live with a year ago: ending the phone dragnet in exchange for cybersecurity information sharing. I raised that in light of increasing evidence that the majority of Section 215 orders are used for things related to cybersecurity (though possibly obtained by FBI, not NSA). If that’s correct, Alexander’s comment would make sense, because it would reflect that it is working cybersecurity investigations under protections — most notably, FISC-supervised minimization — all involved would rather get rid of.
Those two strands are important, taken together, for the debate about Section 215 expiration, because Section 215 is far more than the dragnet. And the singular focus of everyone — from the press to activists and definitely fostered by NatSec types leaking — on the phone dragnet as Section 215 sunset approaches makes it more likely the government will pull off some kind of shell game, moving the surveillances they care most about (that is, not the phone dragnet) under some new shell while using other authorities to accomplish what they need to sustain some kind of phone contact and connection chaining.
So in an effort to bring more nuance to the debate about Section 215 sunset, here is my best guess — and it is a guess — about what they’re doing with Section 215 and what other authorities they might be able to use to do the same collection.
Here are the known numbers on how Section 215 orders break out based on annual reports and this timeline.
Since its transfer under Section 215 in 2006, the phone dragnet has generally made up 4 or 5 orders a year (Reggie Walton imposed shorter renewal periods in 2009 as he was working through the problems in the program). 2009 is the one known year where many of the modified orders — which generally involve imposed minimization procedures — were phone dragnet orders.
We know that the government believes that if Section 215 were to sunset, it would still have authority to do the dragnet. Indeed, it not only has a still-active Jack Goldsmith memo from 2004 saying it can do the dragnet without any law, it sort of waved it around just before the USA Freedom Act debate last year as if to remind those paying attention that they didn’t necessarily think they needed USAF (in spite of comments from people like Bob Litt that they do need a new law to do what they’d like to do).
But that depends on telecoms being willing to turn over the dragnet data voluntarily. While we have every reason to believe AT&T does that, the government’s inability to obligate Verizon to turn over phone records in the form it wants them is probably part of the explanation for claims the current dragnet is not getting all the cell records of Americans.
A number of people — including, in part, Ron Wyden and other SSCI skeptics in a letter written last June — think the government could use FISA’s PRTT authority (which does not sunset) to replace Section 215, and while they certainly could get phone records using it, if they could use PRTT to get what it wants, they probably would have been doing so going back to 2006 (the difference in authority is that PRTT gets actual activity placed, whereas 215 can only get records maintained (and Verizon isn’t maintaining the records the government would like it to, and PRTT could not get 2 hops).
For calls based off a foreign RAS, the government could use PRISM to obtain the data, with the added benefit that using PRISM would include all the smart phone data — things like address books, video messaging, and location — that the government surely increasingly relies on. Using PRISM to collect Internet metadata is one of two ways the government replaced the PRTT Internet dragnet. The government couldn’t get 2 hops and couldn’t chain off of Americans, however.
I also suspect that telecoms’ embrace of supercookies may provide other options to get the smart phone data they’re probably increasingly interested in.
For data collected offshore, the government could use SPCMA, the other authority the government appears to have replaced the PRTT Internet dragnet with. We know that at least one of the location data programs NSA has tested out works with SPCMA, so that would offer the benefit of including location data in the dragnet. If cell phone location data is what has prevented the government from doing what they want to do with the existing phone dragnet, SPCMA’s ability to incorporate location would be a real plus for NSA, to the extent that this data is available (and cell phone likely has more offshore availability than land line).
The government could obtain individualized data using NSLs — and it continues to get not just “community of interest” (that is, at least one hop) from AT&T, but also 7 other things that go beyond ECPA that FBI doesn’t want us to know about. But using NSLs may suffer from a similar problem to the current dragnet, that providers only have to provide as much as ECPA requires. Thus, there, too, other providers are probably unwilling to provide as much data as AT&T.
Telecoms might be willing to provide data the government is currently getting under 215 under CISA and CISA collection won’t be tied in any way to ECPA definitions, though its application is a different topic, cybersecurity (plus leaks and IP theft) rather than terrorism. So one question I have is whether, because of the immunity and extended secrecy provisions of CISA, telecoms would be willing to stretch that?
In addition to the phone dragnet, FBI and other IC agencies seem to operate other dragnets under Section 215. It’s probably a decent guess that the 8-13 other 215 orders prior to 2009 were for such things. NYT and WSJ reported on a Western Union dragnet that would probably amount to 4-5 orders a year. Other items discussed involve hotel dragnets and explosives precursor dragnets, the latter of which would have been expanded after the 2009 Najibullah Zazi investigation. In other words, there might be up to 5 dragnets, each representing 4-5 orders a year (assuming they work on the same 90-day renewal cycle), so a total of around 22 of the roughly 175 orders a year that aren’t the phone dragnet (the higher numbers for 2006 are known to be combination orders both obtaining subscription data for PRTT orders and location data with a PRTT order; those uses stopped in part with the passage of PATRIOT reauthorization in 2006 and in part with FISC’s response to magistrate rulings on location data from that year).
Some of these dragnets could be obtained, in more limited fashion, with NSLs (NSLs currently require reporting on how many US persons are targeted, so we will know if they move larger dragnets to NSLs). Alternately, the FBI may be willing to do these under grand jury subpoenas or other orders, given the way they admitted they had done a Macy’s Frago Elite pressure cooker dragnet after the Boston Marathon attack. The three biggest restrictions on this usage would be timeliness (some NSLs might not be quick enough), the need to have a grand jury involved for some subpoenas, and data retention, but those are all probably manageable hurdles.
Finally, there is the Internet content — which we know makes up for a majority of Section 215 orders — that moved to that production from NSLs starting in 2009. It’s probably a conservative bet that over 100 of current dragnet orders are for this kind of content. And we know the modification numbers for 2009 through 2011 — and therefore, probably still — are tied to minimization procedure requirements imposed by the FISC.
A recent court document from a Nicholas Merrill lawsuit suggests this production likely includes URL and data flow requests. And the FBI has recently claimed –for what that’s worth — that they rely on Section 215 for cybersecurity investigations.
Now, for some reason, the government has always declined to revise ECPA to restore their ability to use NSLs to obtain this collection, which I suspect is because they don’t want the public to know how extensive the collection is (which is why they’re still gagging Merrill, 11 years after he got an NSL).
But the data here strongly suggests that going from NSL production to Section 215 production has not only involved more cumbersome application processes, but also added a minimization requirement.
And I guarantee you, FBI or NSA or whoever is doing this must hate that new requirement. Under NSLs, they could just horde data, as we know both love to do, the FBI even more so than the NSA. Under 215s, judges made them minimize it.
As I noted above, this is why I think Keith Alexander was willing to do a CISA for 215 swap. While CISA would require weak sauce Attorney General derived “privacy guidelines,” those would almost certainly be more lenient than what FISC orders, and wouldn’t come with a reporting requirement. Moreover, whereas at least for the phone dragnet, FISC has imposed very strict usage requirements (demanding that a counterterrorism dragnet be used only for counterterrorism purposes), CISA has unbelievably broad application once that data gets collected — not even requiring that terrorist usages be tied to international terrorism, which would seem to be a violation of the Keith Supreme Court precedent).
All of this is to suggest that for cybersecurity, IP theft, and leak investigations, CISA would offer FBI their ideal collection approach. It would certainly make sense that Alexander (or now, Admiral Mike Rogers and Jim Comey) would be willing to swap a phone dragnet they could largely achieve the same paltry results for using other authorities if they in exchange got to access cybersecurity data in a far, far more permissive way. That’d be a no-brainer.
There’s just one limitation on this formula, potentially a big one. CISA does not include any obligation. Providers may share data, but there is nothing in the bill to obligate them to do so. And to the extent that providers no longer provide this data under NSLs, it suggests they may have fought such permissive obligation in the past. It would seem that those same providers would be unwilling to share it willingly.
But my thoughts on CISA’s voluntary nature are for another post.
One final thought. If the government is contemplating some or all of this, then it represents an effort — one we saw in all versions of dragnet reform to greater (RuppRoge) or lesser degrees (USAF) — to bypass FISC. The government and its overseers clearly seem to think FISC-ordered minimization procedures are too restrictive, and so are increasingly (and have been, since 2009) attempting to replace the role played by an utterly dysfunctional secret court with one entirely within the Executive.
This is the reason why Section 215 sunset can’t be treated in a vacuum: because, to the extent that the government could do this in other authorities, it would largely involve bypassing what few restrictions exist on this spying. Sunsetting Section 215 would be great, but only if we could at the same time prevent the government from doing similar work with even fewer controls.
On September 14, 2001 — 3 days before signing an expansive Memorandum of Notification that would authorize a suite of covert operations against al Qaeda, and 4 days before signing an AUMF that would give those operations the appearance of Congressional sanction — President Bush declared a National Emergency in response to the 9/11 attack.
The following day, according to a 2002 motion to the FISC to be able to share raw FISA-derived information with CIA and NSA (this was liberated by Charlie Savage), FISC suspended its rules on sharing intelligence derived under FBI-obtained FISA warrants with criminal investigations (see page 26 of this paper for background).
On September 15, 2001, upon motion of the Government, the [FISA] Court suspended the “Court wall,” certification, and caveat requirements that previously had applied to Court-authorized electronic surveillance and physical search of [redacted] related targets, while directing that the FBI continue to apply the standard minimization procedures applicable in each case. As stated in the order resulting from that motion, the Court took this action in light of inter alia:
“the President’s September 14, 2001, declaration of a national emergency and the near war conditions that currently exist;”
“the personal meeting the Court had with the Director of the FBI on September 12, 2001, in which he assured the Court of the collection authority requested from this Court in the face of the nature and scope of the multi-faced response of the United States to the above-referenced attacks;
“the need for the Government to rapidly disseminate pertinent foreign intelligence information to appropriate authorities.”
Ten days after FISC dismantled its role in “the wall” between intelligence and criminal investigations in response to the Executive’s invocation of a National Emergency, on September 25, 2001, John Yoo finished an OLC memo considering the constitutionality of dismantling the wall by replacing “the purpose” in FISA orders with “a purpose.”
A full month later, on October 25, 2001, Congress passed the PATRIOT Act. For over 13 years, analysis of the PATRIOT Act has explained that it eliminated “the wall” between intelligence and criminal investigations by replacing language requiring foreign intelligence be “the purpose” of FISA wiretaps with language requiring only that that be “a significant purpose” of the wiretap. But the FISC suspension had already removed the biggest legal barrier to eliminating that wall.
In other words, the story we’ve been telling about “the wall” for over 13 years is partly wrong. The PATRIOT Act didn’t eliminate “the wall.” “The wall” had already been suspended, by dint of Executive Proclamation and a secret application with the FISC, over a month before the PATRIOT Act was initially introduced as a bill.
FISC suspended it, without congressional sanction, based on the President’s invocation of a National Emergency.
That’s not the only case where the Executive invoked that National Emergency in self-authorizing or getting FISC to authorize expansive new surveillance authorities (or has hidden the authorities under which it makes such claims).
Perhaps most illustratively, on May 6, 2004, Jack Goldsmith pointed to the National Emergency when he reauthorized most aspects of Stellar Wind.
On September 14, 2001. the President declared a national emergency “by reason of the terrorist attacks at the World Trade Center, New York, New York, and the Pentagon, and the continuing and immediate threat of further attacks on the United States.” Proclamation No. 7463, 66 Fed. Reg. 43, !99 (Sept. 14, 2001). The United States also launched a massive military response, both at home and abroad. In the United States, combat air patrols were immediately established over major metropolitan areas and were maintained 24 hours a day until April 2002, The United States also immediately began plans for a military response directed at al Qaeda’s base of operations in Afghanistan.
Only after invoking both the Proclamation and the immediate military response that resulted did Goldsmith note that Congress supported such a move (note, he cited Congress’ September 14 passage of the AUMF, not Bush signing it into law on September 18, thought that may be in part because Michael Hayden authorized the first expansions of surveillance September 14; also remember there are several John Yoo memos that remain hidden) and then point to an article on the friendly-fire death of Pat Tillman as proof that combat operations continued.
On September 14, 2001, both houses of Congress passed a joint resolution authorizing the President “to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks” of September I I. Congressional Authorization § 2(a). Congress also expressly acknowledged that the attacks rendered it “necessary and appropriate” for the United States to exercise its right “to protect United States citizens both at home and abroad,” and acknowledged in particular that the “the President has authority under the Constitution to take action to deter and prevent acts of international terrorism against the United States.” id. pmbl. Acting under his constitutional authority as Commander in Chief, and with the support of Congress, the President dispatched forces to Afghanistan and, with the cooperation of the Northern Alliance, toppled the Taliban regime from power Military operations to seek out resurgent elements of the Taliban regime and al Qaeda fighters continue in Afghanistan to this day. See, e.g., Mike Wise and Josh White, Ex-NFL Player Tillman Killed in Combat, Wash. Post, Apr. 24, 2004, at AI (noting that “there are still more than 10,000 U.S. troops in the country and fighting continues against remains of the Taliban and al Qaeda”).
That is, even in an OLC memo relying on the AUMF to provide legal sanction for President Bush’s systematic flouting of FISA for 2.5 years, Goldsmith relied primarily on the National Emergency Proclamation, and only secondarily on Congress’ sanction of such invocation with the AUMF.
The White Paper released in 2006 largely regurgitating Goldsmith’s opinion for more palatable consumption mentions the AUMF first in its summary, but then repeats Goldsmith’s emphasis on the Proclamation in the background section (see pages 2 and 4).
Paragraphs that may discuss such authorizations get redacted in the 2006 application to move content collection under FISC (see page 6). The entire background section (starting at page 5) of the initial Internet dragnet application is also redacted. While we can’t be sure, given parallel claims made in the same 2004 to 2006 period, it seems likely those memoranda also repeated this formula.
Such a formula was definitely dropped. The 2006 memorandum in support of using Section 215 to create a phone dragnet included no mention of authorities. The 2007 memorandum to compel Yahoo to fulfill Protect American Act orders cites PAA, not Emergency Declarations.
But the formula was retained in all discussions of the Administration’s illegal wiretap program in secret declarations submitted in court in 2006, 2007, and 2009, being repeated again in an unclassified 2013 declaration. While these declarations likely all derive, at least in part, from Goldsmith’s memo, it’s worth noting that the government has consistently suggested it could conduct significant surveillance programs without Congressional sanction by pointing to the that National Emergency Proclamation.
This is the precedent I meant to invoke when I expressed concern about President Obama’s expansive Executive Order of the other day, declaring a National Emergency because of cybersecurity.
Ranking House Intelligence Member Adam Schiff’s comment that Obama’s EO is “a necessary part of responding to the proliferation of dangerous and economically devastating cyber attacks facing the United States,” but that it will be “coupled with cyber legislation moving forward in both houses of Congress” only adds to my alarm (particularly given Schiff’s parallel interest in giving Obama soft cover for his ISIL AUMF while having Congress still involved). It sets up the same structure we saw with Stellar Wind, where the President declares an Emergency and only a month or so later gets sanction for and legislative authorization for actions taken in the name of that emergency.
And we know FISC has been amenable to that formula in the past.
We don’t know that the President has just rolled out a massive new surveillance program in the name of a cybersecurity Emergency (rooted in a hack of a serially negligent subsidiary of a foreign company, Sony Pictures, and a server JP Morgan Chase forgot to update).
We just know the Executive has broadly expanded surveillance, in secret, in the past and has never repudiated its authority to do so in the future based on the invocation of an Emergency (I think it likely that pre FISA Amendments Act authorization for the electronic surveillance of weapons proliferators, even including a likely proliferator certification under Protect America Act, similarly relied on Emergency Proclamations tied to all such sanctions).
I’m worried about the Cyber Intelligence Sharing Act, the Senate version of the bill that Schiff is championing. But I’m just as worried about surveillance done by the executive prior to and not bound by such laws.
Because it has happened in the past.
Update: In his October 23, 2001 OLC memo authorizing the President to suspend the Fourth Amendment (and with it the First), John Yoo said this but did not invoke the September 14, 2001 proclamation per se.
As applied to the present circumstances, the [War Powers Resolution] signifies Congress’ recognition that the President’s constitutional authority alone enables him to take military measures to combat the organizations or groups responsible for the September 11 incidents, together with any governments that may have harbored or supported them, if such actions are, in his judgment, a necessary and appropriate response to the national emergency created by those incidents.
Update: Thanks to Allen and Joanne Leon for the suspend/suspect correction.
In the interest of describing why CIA’s efforts to invent a reason to torture Janat Gul are so important, I wanted to do a very quick summary of what I understand CIA’s legal means of avoiding criminal prosecution was.
Torture began — certainly at surrogates overseas — long before anyone even thought of having OLC write memos for it. At that point, the legal cover for the torture would have been only the Presidential Finding signed September 17, 2001 (which said nothing explicit about torture; but then, it probably also said nothing about killing US citizens with drones though it did cover the use of killing high value Al Qaeda figures with drones).
I believe Ali Soufan’s complaints about the methods used at the Thai black site created a problem with that arrangement. When he — an FBI Agent — came away saying what they were doing was “borderline torture,” it created legal problems for the CIA, because an FBI Agent had witnesses a crime. I think Soufan’s reaction to the coffin-like box they intended to use with Abu Zubaydah caused particular problems.
All that came to a head in July 2002, when lawyers responding to “an issue that had come up” asked for a pre-declination memo from Chertoff, even while they were trying, among other things, to get approval to use “mock burial.” I don’t know that Criminal Chief Michael Chertoff was all that squeamish about torture, except with Soufan’s complaint about the coffin, it made mock burial (and with it, I suspect, mock execution) unsupportable by DOJ.
On July 13, 2002, three things happened. John Rizzo presented the torture techniques to people at DOJ. Having had that presentation, Chertoff refused to pre-decline to prosecute. So John Yoo wrote a fax that CTC would ultimately use in crafting the legal direction to torturers (and in recommending against prosecution in the future).
Three days later, David Addington appears to have told Yoo to include presidential immunity language in more public OLC memos. All the important work was being negotiated via back channels (remember, Jay Bybee was busy protecting Cheneys’ Energy Task Force from any oversight); the front channels involving Condi Rice were in a large part show.
But that led to the position where CIA was working off a two page fax that Yoo had freelanced to produce which provided absolutely no description of or limitation on techniques. But DOJ held CIA it to the August 1, 2002 memo.
Within short order, CIA was using techniques that had never been approved. Importantly, they hosed down Gul Rahman before he froze to death, not waterboarding, per se, but an additional technique not approved by DOJ.
When Inspector General John Helgerson started investigating in early 2003, DOJ told him he could develop the fact pattern to determine if any crimes had been committed. So CTC worked with Jennifer Koester and John Yoo to develop their own legal guidelines that not only would include some more of the torture techniques they had used but not approved, but also include a “shock the conscience” analysis. That’s what the IG used to assess whether any crimes had been committed, which is important, because he found that torture as executed did humiliate detainees (and therefore violated the Constitution), but could point to (invalid) legal analysis pre-approving this. (Remember, Dick Cheney got an early review of all this.)
The problem was, DOJ’s OLC refused to accept that document. In June 2003, Patrick Philbin refused. And in May 2004, Jack Goldsmith did again.
So it was not just that Goldsmith withdrew the Bybee Memos (though said CIA could use all the torture techniques except waterboarding while he worked on a replacement). It’s that DOJ refused to accept CIA’s own legal analysis as DOJ’s official opinion. CIA was more anxious about getting some document judging the torture didn’t violate the Constitution. That’s what (as I’ll show) CIA was demanding when they raised the case of Janat Gul to get the Principals to reauthorize the use of torture in July 2004.
Just on the case of Janat Gul — who was detained based off a fabricated claim of election year plotting — CIA got OLC’s Daniel Levin to authorize all the old techniques (including waterboarding) as well as the 4 that CIA had used but not approved. Significantly, that included water dousing, the “technique” that had contributed to Gul Rahman’s death.
But that left two other concerns: the constitutional problem, and the use of techniques in combination, which (among other things) had led to severe hallucinations in 2004. That’s what the 2005 memos were meant to do: use the torture Hassan Ghul and Janat Gul had survived in 2004 to provide a rubber stamp on both the combination issue and the Constitutional one, and provide it roughly in time to be able to use to torture Abu Faraj al-Libi (though the third 2005 memo actually got signed after al-Libi’s torture began).
Neither Hassan Ghul (who was very cooperative before torture) nor Janat Gul should have been tortured. The latter probably was largely just to have one tortured body, any body, on which to hang new OLC memos.
As Josh Rogin first reported, Tom Cotton and 46 other Senators have written a letter to the “leaders of the Islamic Republic of Iran.” They want to warn them that without Senate ratification, the agreement they’re working to sign with President Obama will just be an executive agreement that a future President could just revoke with the stroke of a pen.
Now, much as I’d like the Executive to be reined in in other areas, foreign affairs is the area where they’re supposed to act like an Executive. That was the whole point of moving from a confederation to a federation. So this intervention is improper in that sense, on top of serving the purported interests of Israeli right-wingers more than serving American interests.
The entire production ought to focus more attention on something I’ve been trying to get people to look at: the fundraiser held directly after Congress willingly acted like Bibi Netanyahu’s trained seal, also reported by Josh Rogin. Did Sheldon Adelson pay off all of Bibi’s trained seals? On what scale?
Plus, Jack Goldsmith catches the Senators in an error about what the Constitution actually says (Tom Cotton as a JD from Harvard Law School, where Goldsmith teaches).
The letter states that “the Senate must ratify [a treaty] by a two-thirds vote.” But as the Senate’s own web page makes clear: “The Senate does not ratify treaties. Instead, the Senate takes up a resolution of ratification, by which the Senate formally gives its advice and consent, empowering the president to proceed with ratification” (my emphasis). Or, as this outstanding 2001 CRS Report on the Senate’s role in treaty-making states (at 117): “It is the President who negotiates and ultimately ratifies treaties for the United States, but only if the Senate in the intervening period gives its advice and consent.” Ratification is the formal act of the nation’s consent to be bound by the treaty on the international plane. Senate consent is a necessary but not sufficient condition of treaty ratification for the United States. As the CRS Report notes: “When a treaty to which the Senate has advised and consented … is returned to the President,” he may “simply decide not to ratify the treaty.”
This is a technical point that does not detract from the letter’s message that any administration deal with Iran might not last beyond this presidency. (I analyzed this point here last year.) But in a letter purporting to teach a constitutional lesson, the error is embarrassing.
Me, I’ve got another concern for these poor Senators.
Iran’s leaders are, according to the Senators’ own claims, evil terrorist-supporting murderers. Indeed, our own government considers them as such, not only imposing sanctions but — according to Dianne Feinstein and Keith Alexander — also treating Iran as one of the few “terrorist groups” association with which the NSA can use to contact chain on its dragnets of American communications.
In short, the government believes that anyone conducting communications with such people are terrorist suspects themselves, and should be dumped into a big database to have all their collected metadata analyzed for further signs of terrorism.
Tom Cotton and his 46 collaborators are now just 1-degree of separation from what they consider some badass terrorists. We’ve seen people be put on the No-Fly list for far less.
I don’t think that’s right, mind you. There’s a problem with metadata analysis.
That’s a problem the Senators might do better looking to correct, rather than working to keep the Middle East unstable for Israel’s interests.
Update: As the screen capture above makes clear, Tom Cotton has now placed himself at one degree of separation from the terrorist sponsor Ayatollah Khamenei via dead tree and Twitter.
The second-to-last witness in the government’s case against Jeffrey Sterling, FBI Special Agent Ashley Hunt, introduced a number of things she had collected over the course of her 7.5 year investigation into James Risen’s chapter on Operation Merlin. That included a few things — most notably two lines from Risen’s credit card records from 2004 — that in no conceivable way incriminated Sterling.
On November 17, 2004, Risen charged €158.00 at the Hotel Inter-Continental in Vienna, Austria on his credit card (the provider of which DOJ included in its exhibit). On November 21, 2004, Risen put another €215.30 in Inter-Continental charges on his credit card.
What Agent Hunt had proven by highlighting these two details was that James Risen traveled to Vienna as background for a book chapter set in Vienna, and even went to the hotel where Merlin had stayed. None of that did a thing to prove that Sterling leaked Merlin’s travel information — or anything else — to Risen. But the government decided to gratuitously enter into evidence that they had seized years of Risen’s credit card records, and in doing so obtained details of where Risen had traveled (and also, on what days his daughter sent something via FedEx). It wasn’t enough that we knew that already from court filings. DOJ still saw the need to introduce gratuitous notice that they had all of Risen’s credit card statements into the court record.
“We own you,” seemed to be the message to Risen from this flaunting of his credit card records.
But don’t worry, Eric Holder generously decided not to call Risen to testify against Sterling after having hounded him — in this and the warrantless wiretap investigation — for 6 years already, both Jack Goldsmith and Ben Wittes insist.
Both men seem to vastly underestimate how DOJ’s actions in the last decade impact journalism. And both men seem to misunderstand what just happened in the Jeffrey Sterling trial, where DOJ succeeded in exposing a man to 40 years in prison, based largely on metadata, without even having the key pieces of evidence at issue in the case (almost certainly because of CIA’s doing, not Sterling’s).
Uncharacteristically, Wittes’ post is less annoying that Goldsmith’s. Sure, as he did with Laura Poitras, Wittes appointed himself the arbiter of what the NYT should and shouldn’t tolerate from journalists it pays. I will remember that Wittes believes an employee’s intemperate rants on Twitter should get close scrutiny by their employers the next time Wittes makes factually flawed defenses of his torturer buddies on Twitter or complains when Chris Soghoian tweets about Keith Alexander’s operational security sloppiness when he rides on Amtrak.
But Goldsmith writes two paragraphs about leak prosecutions that — while they may bolster Goldsmith’s questionable claims about how journalism functions to rein in the Executive — entirely miss the point. I’ll take them in detail here:
Third, Holder could have called Risen to testify in the Sterling case – the law was clearly on his side, and DOJ attorneys wanted him to do it. But Holder directed his lawyers to let Risen off the hook. It is simply wrong to say (as Risen did) that Holder was doing the “bidding of the intelligence community” or sending “a message to dictators around the world that it is okay to crack down on the press and jail journalists.” Quite the contrary.
The notion that the trial Holder’s DOJ just staged in Eastern District of Virginia was not about “doing the bidding of the intelligence community” makes me tear up I’m laughing so hard. A very key part of the trial was putting Bob S on the stand so he could make claims about Operation Merlin — which turned out not to be backed up by the documentary evidence or his asset’s memory — so as to be able to claim, “We have demonstrated we did this very carefully.” This was a clusterfuck of an operation, but nevertheless DOJ gave Bob S a day and a half to try to claim it wasn’t. DOJ offered CIA this favor while playing their classification games (this was, after all, EDVA, an improper venue for almost all of the charges, but a very good place to get favorable treatment for security theater) so as to avoid explaining — except when it became handy for Condi to blurt something out — why this operation went from being a clandestine information collection operation to something far more sensitive, which is probably the real reason someone other than Sterling leaked the information as the government was trumping up war against Iraq, the next country that got the Merlin treatment.
It’s EDVA, Goldsmith!!! The same place Holder went to have John Durham pretend to investigate CIA’s obstruction of justice until the statute of limitations expired! The same place Holder went to keep investigating and investigating until DOJ could deliver a head, any head, to punish Gitmo defense attorneys’ crazy notion that they might have good reason to want to learn how and who anally raped their clients in the name of rehydration such that they’re still bleeding, 12 years later.
EDVA has become, under Holder, where DOJ goes to obtain arbitrary judgments that ensure CIA and other agencies will never be held accountable for crimes, but some low-level leaker will be delivered up anytime CIA’s crimes or incompetence get exposed.
Fourth, Risen’s complaints about Holder rest in part on the fact that Holder has presided over many more leak prosecutions than any prior Attorney General. I suspect that any Attorney General would have ramped up the leak prosecutions in light of the unprecedented cascade of deep secrets from the government in the last decade.
Here Goldsmith makes the same nonsensical claim that Steven Aftergood made for The Intercept’s profile of Stephen Kim. The investigation into James Risen’s stories has been going on for twelve years. The investigation into Risen’s reporting on Operation Merlin started over four years before Chelsea Manning even joined the Army, much less started the torrent of leaks Goldsmith claims justifies all these investigations.
And the ratio of leak prosecutions to leaks remains tiny.
This line comes right out of Holder’s defense of his leak prosecutions the other day. And it’s true. But it’s a big part of the problem. Thus far, after all, James Cartwright has not been indicted for allegedly leaking a far more sensitive counter-proliferation program targeting Iran than Sterling purportedly leaked. No one is even considering prosecuting Leon Panetta for leaking details of the Osama bin Laden raid (or classified details in his memoir). I doubt David Petraeus will be indicted either for letting his mistress have access to all his most intimate secrets.
The people who get prosecuted — Jeffrey Sterling, John Kiriakou, Donald Sachtleben, Stephen Kim — they’re not the problem behind this system of leaking and in several cases it’s very clear they’re not even the key leakers: instead, they’re the human detritus the government can dispose of so others will see just how arbitrary the secrecy system really is, by design.
But in any event, it must be true that these prosecutions have had a chilling effect on leakers (i.e. sources) and in that sense made journalists’ jobs harder. Of course chilling criminal leaks is the whole point of the prosecutions. They do not “wreck” the First Amendment if they are consistent with the First Amendment, which they are, especially since the prosecutions have not had any noticeable macro effect on the steady flow of secrets out of the government.
I suspect Risen would say this is not the case. I suspect a number of the other journalists targeted by DOJ would say the same. That is, the point is not about stopping leaks (though I think the Insider Threat system will make it easier to pick and choose which human detritus will be the next sacrificed to feed this arbitrary system of control), but often as not burning certain journalists or others who don’t play the game.
We own you, investigative journalist, and know what you did in Vienna back in 2004.
Note also that Risen and other journalists tend not to talk about the countervailing norms that have moved dramatically in journalists’ favor in the last decade. (I have written about this extensively, here and here and here and here.) Not only has the government significantly raised the bar for going after journalists’ sources, but it has also made clear what was not clear a decade ago: it will not prosecute journalists for publishing classified information in clear violation of 18 USC 798.
I think here Goldsmith misses the novel theory the government used to convict Sterling, the one Holder has deemed the model to go after others.
Under this theory, journalists will be treated as empty vehicles, and the “cause to leak” language in the Espionage Act will be blown up, so that even completely unclassified conversations may be deemed the cause of an investigative journalist with sources throughout the CIA publishing a story. And the jurisdiction, too, will be blown up, so that so long as a single hairdresser buys a book in EDVA — or maybe MD, who cares, really?!?! — then DOJ can stage their witch hunt in EDVA with all its trappings of security theater.
There are some interesting theories behind the successful prosecution of Sterling for a bunch of metadata. And Goldsmith might at least familiarize himself with where Holder’s DOJ is taking the Espionage Act, because it deserves more scrutiny before the Sterling prosecution is deemed to have done no damage to the journalistic process.
Given this change in norms and the structural factors pushing secrets out (size of bureaucracy, digitalization of secrets, and the like), it is very hard to conclude that the advantage on secrecy versus transparency has shifted to the government under Holder.
Again, the underlying problem is the asymmetry involved. The government keeps hiding more and more stuff — the top officials behind its trust-building CVE program, even! — behind a veil of secrecy. That amid increasingly absurd claims of secrecy — and increasingly persistent evidence the secrecy often serves to hide law-breaking or incompetence, as it did with the Merlin caper — more secrets get out should be no great celebration. It’s the structure of it all — the paranoia, the arbitrariness, and the incompetence behind it all — that really sours any claim to democratic governance. Goldsmith may take solace we’re getting more secrets out, but until we reverse the slide into arbitrariness it heralds, I’m not so sanguine.
During the hearing just after the defense closed in the Sterling trial, there was a fascinating discussion, largely about how DOJ planned to blow up the “cause” language in the Espionage Act to further criminalize just talking to journalists, to criminalize publishing a book and deigning to distribute it in EDVA. The conversation kept coming back to how DOJ had gone from treating Risen as a criminal weeks earlier to treating him as an innocent naif who channeled Sterling’s spying to the unwitting citizens of EDVA. Judge Leonie Brinkema at one point said, “If Risen were not protected by the newsman’s privilege, I suspect he would have been named as a co-conspirator.” “There is no newsman’s privilege,” defense attorney Edward MacMahon pointed out, laughing at the absurdity of claiming there was after the 3 year battle over just that topic. But the exchange hung there, pregnantly, because ultimately branding Risen a criminal — or, barring that, branding having even unclassified conversations with Risen as criminal — was a big part of the point of this trial.
What this prosecution did — what, I believe, it was designed to do — was two-fold. First, burn Risen, burn Risen over 12 long years of investigation during which the counterpart investigation even reportedly seized his phone records. But also, to herald a new interpretation of the Espionage Act that will criminalize even having phone calls with a journalist who has reported on completely unclassified stories involving you in the past.
Update: Year on Risen’s credit card records corrected per Rich.
At the request of some on Twitter, I’m bringing together a Twitter rant of some facts on torture here.
1) Contrary to popular belief, torture was not authorized primarily by the OLC memos John Yoo wrote. It was first authorized by the September 17, 2001 Memorandum of Notification (that is, a Presidential Finding) crafted by Cofer Black. See details on the structure and intent of that Finding here. While the Intelligence Committees were briefed on that Finding, even Gang of Four members were not told that the Finding authorized torture or that the torture had been authorized by that Finding until 2004.
2) That means torture was authorized by the same Finding that authorized drone killing, heavily subsidizing the intelligence services of countries like Jordan and Egypt, cooperating with Syria and Libya, and the training of Afghan special forces (the last detail is part of why David Passaro wanted the Finding for his defense against abuse charges — because he had been directly authorized to kill terror suspects by the President as part of his role in training Afghan special forces).
3) Torture started by proxy (though with Americans present) at least as early as February 2002 and first-hand by April 2002, months before the August 2002 memos. During this period, the torturers were operating with close White House involvement.
4) Something happened — probably Ali Soufan’s concerns about seeing a coffin to be used with Abu Zubaydah — that led CIA to ask for more formal legal protection, which is why they got the OLC memos. CIA asked for, but never got approved, the mock burial that may have elicited their concern.
5) According to the OPR report, when CIA wrote up its own internal guidance, it did not rely on the August 1, 2002 techniques memo, but rather a July 13, 2002 fax that John Yoo had written that was more vague, which also happened to be written on the day Michael Chertoff refused to give advance declination on torture prosecutions.
6) Even after CIA got the August 1, 2002 memo, they did not adhere to it. When they got into trouble — such as when they froze Gul Rahman to death after hosing him down — they went to John Yoo and had him freelance another document, the Legal Principles, which pretend-authorized these techniques. Jack Goldsmith would later deem those Principles not an OLC product.
7) During both the August 1, 2002 and May 2005 OLC memo writing processes, CIA lied to DOJ (or provided false documentation) about what they had done and when they had done it. This was done, in part, to authorize the things Yoo had pretend-authorized in the Legal Principles.
8) In late 2002, then SSCI Chair Bob Graham made initial efforts to conduct oversight over torture (asking, for example, to send a staffer to observe interrogations). CIA got Pat Roberts, who became Chair in 2003, to quash these efforts, though even he claims CIA lied about how he did so.
9) CIA also lied, for years, to Congress. Here are some details of the lies told before 2004. Even after CIA briefed Congress in 2006, they kept lying. Here is Michael Hayden lying to Congress in 2007
10) We do know that some people in the White House were not fully briefed (and probably provided misleading information, particularly as to what CIA got from torture). But we also know that CIA withheld and/or stole back documents implicating the White House. So while it is true that CIA lied to the White House, it is also true that SSCI will not present the full extent of White House (read, David Addington’s) personal, sometimes daily, involvement in the torture.
11) The torturers are absolutely right to be pissed that these documents were withheld, basically hanging them out to dry while protecting Bush, Cheney, and Addington (and people like Tim Flanigan).
12) Obama’s role in covering up the Bush White House’s role in torture has received far too little attention. But Obama’s White House actually successfully intervened to reverse Judge Alvin Hellerstein’s attempt to release to ACLU a short phrase making it clear torture was done pursuant to a Presidential Finding. So while Obama was happy to have CIA’s role in torture exposed, he went to great lengths, both with that FOIA, with criminal discovery, and with the Torture Report, to hide how deeply implicated the Office of the President was in torture.
Bonus 13) John Brennan has admitted to using information from the torture program in declarations he wrote for the FISA Court. This means that information derived from torture was used to scare Colleen Kollar-Kotelly into approving the Internet dragnet in 2004.