Posts

ACLU to Jim Comey: Welcome. Now Fix This.

Jim Comey has officially been in charge of the FBI for less than two weeks.

Today, in honor of Constitution Day, the ACLU just released a report showing how the FBI’s expanded mandate since 9/11 has led to Constitutional abuses.

Most of the details of the report have been reported here in depth. But the Big Data section includes some details I haven’t covered. It explains:

FBI collects Suspicious Activities Reports that duplicate — but lower the standard for — an existing database

Another major problem is that eGuardian effectively competes with another federal government SAR. The Intelligence Reform and Terrorism Prevention Act of 2004 established the Information Sharing Environment (ISE) to serve as the conduit for terrorism-related information sharing between state and local law enforcement and the federal government.114 A March 2013 Government Accountability Office report found that though the two programs share information between them, eGuardian uses a lower evidentiary threshold for inclusion of SARs, which creates risks and privacy problems.

The Government Accountability Office found that “many fusion centers have decided not to automatically share all of their ISE-SARs with eGuardian” because eGuardian doesn’t meet ISE standards.115 One fusion center said it would never provide SARs to eGuardian because of the fusion center’s privacy policy.116 The Government Accountability Office also found that the two systems “have overlapping goals and offer duplicative services.”117

FBI will soon have the equivalent of 20 pieces of intelligence on every American — and they share this broadly

An FBI budget request for fiscal year 2008 said the FBI had amassed databases containing 1.5 billion records, and two members of Congress described documents predicting the FBI would have 6 billion records by 2012, which they said would represent “20 separate ‘records’ for each man, woman and child in the United States.”119

[snip]

According to a 2012 Systems of Records Notice covering all FBI data warehouses, the information in these systems can be shared broadly, even with foreign entities and private companies, and for a multitude of law enforcement and non-law enforcement purposes.133

There’s far more in the report, chronicling the slow creep of abusive FBI techniques since 9/11.

Sadly, given that this has all been treated as legal, I doubt that Comey will do anything about it, even with ACLU’s demonstration that the dragnet has led FBI to miss real crimes.

DOJ Responds to Non-Intell Committee Member of Opposition Party, But Not Intell Committee Member of President’s Party

On June 20, Rand Paul started seeking more information about how the FBI used drones. On July 9, he sent a second letter to find out about the FBI’s use of drones. After placing a hold on Jim Comey’s nomination to be FBI Director, Paul got results, with an unclassified letter admitting FBI had used drones 10 times, and a classified letter that presumably provided more detail. While Paul wasn’t satisfied with that information — he sent a follow-up asking when the FBI considers drones to impinge on reasonable expectations of privacy — he at least did get a letter. He released his hold and voted against Comey’s nomination.

Compare that to Ron Wyden, a member of the Intelligence Committee and of the President’s own party.

After meeting with Comey on July 18, Wyden sent Comey (care of DOJ’s Legislative Affairs Office) a letter on July 22 asking:

  • Whether the program that led to the hospital confrontation was the Internet metadata program and whether his concerns about it had been adequately address
  • Whether the Comey was satisfied with the way the government carried out surveillance activities during his tenure as Deputy Attorney General or whether he wished he had done more to rein them in
  • Whether the 2001 AUMF allowed the President to collect communications of Americans inside the US without a warrant
  • Whether collection of Americans’ phone record has any impact on their privacy and whether it is justified even if does not provide unique value
  • Whether he commits to giving a straight answer about how much evidence the FBI needs to track geolocation

DOJ’s Office of Legislative Affairs wrote Wyden back on July 29, basically saying, “Mr. Comey is not in a position to respond to the additional questions in your letter” in part because he “is not able to determine whether your questions implicate information that remains classified.”

Of course, several of these questions go to Comey’s fitness to be FBI Director and pertain to activities he knows better than anyone else. Others ask about his belief, something that doesn’t require classified information to share.

Wyden voted “present” for Comey’s nomination.

Mind you, Wyden didn’t wait as long as Paul before he got a far less responsive response. And he didn’t place a hold on Comey’s nomination (though given the almost unanimous support for Comey, a hold really wouldn’t have done much to delay the nomination).

Still, Wyden asked Comey questions that go far more directly to Comey’s own qualifications to be FBI Director. He asked Comey questions that he, as a member of the Intelligence Committee, should be able to get answers on.

And he got squat.

FBI Retirees Warn against Jim Comey, Torture, and Indefinite Detention

When one of the unions that represent FBI Agents floated a trial balloon supporting Mike Rogers to be FBI Director, it got a lot more press attention than the unlikelihood of their request merited.

Let’s see whether this letter — from 5 retired FBI Agents — gets similar press attention. It raises concerns about two parts of Jim Comey’s past: his concurrence with a May 10, 2005 memo authorizing (among other things) torture — which I wrote about here — and his support for the indefinite detention of Jose Padilla.

However, the public record also shows that Mr. Comey concurred with a May 10, 2005 Office of Legal Counsel opinion that justified those same enhanced interrogation techniques for use individually. These techniques include cramped confinement, wallstanding, water dousing, extended sleep deprivation, and waterboarding, all of which constitute torture or cruel, inhuman, or degrading treatment in contravention of domestic and international law. Further, Mr. Comey vigorously defended the Bush administration’s decision to hold Jose Padilla, a United States citizen apprehended on U.S. soil, indefinitely without charge or trial for years in a military brig in Charleston, South Carolina.

Among the signatories is Jack Cloonan, a former member of the Osama bin Laden team who watched as CIA started interrupting successful interrogations to subject the detainee to torture instead. I’d be surprised, too, if he didn’t know Comey from the Southern District of NY days.

The letter suggests that Comey might not guard the FBI’s legacy as nobly as Robert Mueller (!) did.

The FBI, while not a perfect institution, has a proud history of dealing with terrorism suspects in accordance with the law. When other agencies and departments resorted to “enhanced interrogation” techniques, FBI Director Mueller directed FBI agents not to participate and in many cases FBI agents were pulled from the field where there were concerns about complicity with unlawful interrogation approaches. To date, the FBI has played a role in prosecuting within the civilian criminal justice system nearly 500 international terrorism cases–often leading to substantial periods of incarceration—

without having to resort to indefinite detention. Even Jose Padilla was ultimately given a trial in a civilian court, despite claims by Mr. Comey that prosecuting Padilla or otherwise affording him traditional due process protections would compromise national security.

They also tied Comey’s confirmation process to the declassification of the Senate Intelligence Committee’s torture report.

The Agents ask only that Comey “reject” the May 10, 2005 OLC memo. Me, I’d like the Senate to demand a full explanation for the circumstances of it. The memo was retroactive to cover someone who had already been tortured (though of course probably served to authorize Abu Faraj al-Libi’s torture, among others). At the very least the Senate Judiciary Committee could demand that Comey explain the circumstances of that retroactive approval.

Alberto Gonzales and Internet Data Mining

I was going to leave this speculation well enough alone. But George W Bush decided to interrupt his dog painting to defend Obama’s surveillance dragnet.

Bush also defended the surveillance program, which began during his administration after 9/11, saying the programs guarantee civil liberties are protected.

“I put the program in place to protect the country and one of the certainties is civil liberties were guaranteed,” Bush said.

So here goes.

In his book, Jack Goldsmith describes Alberto Gonzales siding against David Addington in a debate just once, only to have George Bush override the then White House Counsel.

Addington’s hard-line nonaccommodation stance always prevailed when the lawyers met to discuss legal policy issues in Alberto Gonzales’ office. During these meetings, Gonzales himself would sit quietly in his wing chair, occasionally asking questions but mostly listening as the querulous Addington did battle with whomever was seeking to “go soft.” It was Gonzales’ responsibility to determine what to advise the president after the lawyers had kicked the legal policy matters around. But I only knew him to disagree with Addington once, on an issue I cannot discuss, and on that issue the president overruled Gonzales and sided with the Addington position. [my emphasis]

The issue Goldsmith could not discuss could be torture or prisoner transfers or something entirely unknown, but the data mining at the heart of the hospital confrontation is clearly one candidate.

There’s no overt evidence Gonzales tried to do the right thing on the illegal surveillance program. After all, even after Bush agreed to put the program right on March 12, 2004, Gonzales still objected to Goldsmith and Jim Comey’s first advice on the program. After Goldsmith laid out his initial advice on March 15, Gonzales wrote a memo saying,

Your memorandum appears to have been based on a misunderstanding of the President’s expectations regarding the conduct of the Department of Justice. While the President was, and remains, interested in any thoughts the Department of Justice may have on alternative ways to achieve effectively the goals of the activities authorized by the Presidential Authorization of March 11, 2004, the President has addressed definitively for the Executive Branch in the Presidential Authorization the interpretation of the law.

This led Comey to write up his resignation letter on March 16. “[A]lthough I believe this has been one of [DOJ’s] finest hours, we have been unable to right that wrong.” Three days later, Bush modified his March 11 Authorization, directing NSA to stop collecting Internet metadata within a week.

Of course, three months later, the Administration resumed collection of Internet metadata using the FISC PR/TT order. That was within days of Goldsmith’s departure, though he had announced his departure a month earlier and Comey, obviously, stuck around for over a year longer.

So still no evidence the Internet data mining was the issue on which Gonzales tried to stand up to Addington.

But let’s jump ahead to the circumstances of Alberto Gonzales’ resignation in August 2007. At the time, his sudden and confusing resignation was attributed to the multiple scandals embroiling him — chiefly the US Attorney firing scandal, but also Gonzales’ Clapper-like lies about the illegal wiretap program before the Senate a month earlier. But for some reason, Gonzales did not benefit from the kind of sinecure every other former Bush official — even James Comey, who went to Lockheed — enjoyed upon departure, which you would have thought he’d get after lying to protect the President.

Then, a year after Gonzales’ departure, we learned that in the weeks before he resigned, White House Counsel Fred Fielding had narced him out for storing a bunch of Top Secret CYA documents in a briefcase in his closet. Read more

The 2009 Draft NSA IG Report Makes No Mention of One Illegal Practice

The 2009 Draft NSA IG Report released by the Guardian last week — and related reporting from Barton Gellman — seem to clarify and confirm what I’ve long maintained (12/19/057/29/07; 7/30/07): that one part of the illegal wiretap program that Jack Goldsmith and Jim Comey found “illegal” in 2004 was data-mining of Americans.

Eight days later on 19 March 2004, the President rescinded the authority to collect bulk Internet metadata and gave NSA one week to stop collection and block access to previously collected bulk Internet metadata. NSA did so on 26 March 2004. To close the resulting collection gap, DoJ and NSA immediately began efforts to recreate this authority in what became the PR/TT order.

Mind you, this bulk collection resumed after Colleen Kollar-Kotelly signed an order permitting NSA to collect the same data under a Pen Register/Trap & Trace order on July 14, 2004.

The FISC signed the first PR/TT order on 14 July 2004. ALthough NSA lost access to the bulk metadata from 26 March 2004 until the order was signed, the order essentially gave NSA the same authority to collect bulk Internet metadata that it had under the PSP, except that it specified the datalinks from which NSA could collect, and it limited the number of people that could access the data.

Indeed, we know the program was expanded again in 2007, to get 2 degrees of separation deep into US person Internet data. The Obama Administration claims it ended this in 2011, though there are also indications it simply got moved under a new shell.

Mystery solved, Scoob!

Not so fast.

It appears the bulk Internet metadata collection and mining is just one of two practices that Goldsmith and Comey forced Bush to at least temporarily halt in 2004. But the second one is not mentioned at all in the NSA IG Report.

I first noted that Bush made two modifications to the program in this post, where I noted that 6 pages (11-17) of Jack Goldsmith’s May 6, 2004 OLC opinion on the program described plural modifications made in March and one other month in 2004 (I correctly surmised that they had actually shifted parts of the program under parts of the PATRIOT Act, and that they had narrowed the scope somewhat, though over-optimistically didn’t realize that still included warrantless collection of known domestic content).

But there’s actually a far better authority than Goldsmith’s heavily redacted opinion that confirms Bush made two modifications to the program in this period.

Dick Cheney.

When his office disclosed to Patrick Leahy in 2007 what documents it had regarding authorizations for the illegal wiretap program, it listed two modifications to the program: the one on March 19 described in detail in the NSA IG Report, plus one on April 2.

[Cheney Counsel Shannen] Coffin’s letter indicates that Bush signed memos amending the program on March 19 and April 2 of that year.

But there’s no hint of a second modification in the NSA IG Report.

That could mean several things. It could mean the April 2 modification didn’t involve the NSA at all (and so might appear in a one of the other Agency IG Reports at the time — say, DNI — or might have been completed by an Agency, like some other part of DOD, that didn’t complete an IG Report). It could mean that part of the program was eliminated entirely on April 2, 2004. Or it could mean that in an effort to downplay illegality of the program, the IG simply didn’t want to talk about the worst prior practice eliminated in the wake of the hospital confrontation.

Goldsmith’s opinion does seem to indicate, however, that the modification pertained to an issue similar to the bulk metadata collection. He introduces that section, describing both modifications, by saying “it is necessary to understand some background concerning how the NSA accomplishes the collection activity authorized under” the program.

That may still pertain to the kind of data mining they were doing with the Internet metadata. After all, the fix of moving Internet metadata collection under the PR/TT order only eliminated the legal problem that the telecoms were basically permitting the government to steal Microsoft and Yahoo Internet content from their equipment. There still may have been a legal problem with the kind of data mining they were doing (perhaps arising out of Congress’ efforts in that year’s NDAA to prohibit funding for Total Information Awareness).

Whatever it is, one thing is clear. Even with the release of the unredacted Draft NSA IG Report, we still aren’t seeing all the details on what made the program so legally problematic.

Maybe it’s something the Senate Judiciary Committee might ask Jim Comey during his FBI Director confirmation hearing?

The 14% Domestic Phone Content Collection under the Illegal Wiretap Program

Screen shot 2013-06-29 at 7.04.51 AMThere’s something funny about the claims the NSC Draft IG Report makes.

On page 8, the report notes:

Domestic Collection. The wording of the first authorization could have been interpreted to allow domestic content collection where both communicants were located in the U.S. or were U.S. persons. General Hayden recalled that when the Counsel to the Vice President pointed this out, General Hayden told him that NSA would not collect domestic communications because 1) NSA was a foreign intelligence agency, 2) NSA infrastructure did not support domestic collection, and 3) his personal standard was so high that there would be no problem getting a FISC order for the domestic collection.

Starting in February 21, 2006, DOJ pushed to get a FISC order for PSP collection, in spite of NSA’s numerous reservations. As an interim solution, they changed the definition of “facility” from that of a specific number of email address “to encompass the gateway or cable head that foreign targets use for communications. Minimization and probable cause standards would then be applied.” After months of trying to finesse this, FISC signed two orders to accomplish this:

The Foreign Content Order

The Domestic Content Order

Remember, domestic content, to the NSA, is content in which both participants are in the US (though at this point NSA may have been distinguishing between citizens and non-citizens). And when they moved to a FISC order, they had a specific order for domestic content. And, as the chart on page 16 shows, 14% of the telephony content was domestic (it was only 2% for Internet, though its number for that collection, 19,000, sure looks awfully round).

Now, apparently, by 2007 when they went to a FISC order, there wasn’t that much domestic collection left.

The Domestic Content Order did not create a similar loss in collection [as the 73% loss on the Foreign Content side] because so few numbers were tasked at that time. It did, however, slow operations because of the documentation required, and it took considerably longer to task under the order than under the PSP. Over time, the scope of the Domestic Content Order gradually decreased to a single selector tasked for collection in January 2009. In January 2009, at NSA’s request, assumed responsibility for the Domestic Content Order and became the declarant before the FISC.

This says they still had these gateway facilities in place 17 months after PAA passed (and NSA likely dumped it off onto FBI at that point to clean up in anticipation of Obama taking over).

The original authorization might seem to authorize domestic collection. And when they shifted to FISC rather than Presidential authorization, it continued to include domestic collection, though not so much, apparently, as when the program started.

 

Telecoms Versus the Toobz: The Source of the Legal Troubles

In this important piece on overbroad surveillance programs under Presidents Bush and Obama, the WaPo reveals that the program James Comey almost resigned over in 2004 involved sucking Internet metadata off telecom switches owned by the telecoms.

Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.

At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.

For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.

This leads me to wonder whether legal leverage from the Internet providers — rather than any squeamishness about the law itself — caused the conflict.

Remember, in the fight over retroactive immunity in 2008, the industry group for the Internet providers — including Microsoft, Yahoo, and Google — argued against retroactive immunity.

The Computer & Communications Industry Association (CCIA) strongly opposes S. 2248, the “FISA Amendments Act of 2007,” as passed by the Senate on February 12, 2008. CCIA believes that this bill should not provide retroactive immunity to corporations that may have participated in violations of federal law. CCIA represents an industry that is called upon for cooperation and assistance in law enforcement. To act with speed in times of crisis, our industry needs clear rules, not vague promises that the U.S. Government can be relied upon to paper over Constitutional transgressions after the fact.

Given the WaPo’s report, this amounts to a demand that Congress allow the Internet companies to hold the telecoms accountable for helping the government seize their data.

As well they should have been able to. To a degree, these companies compete, and in the name of helping the government, the telecoms were helping themselves to Internet suppliers crown jewels.

Microsoft and Google versus AT&T and Verizon. Now that would have been an amusing lawsuit to watch. And probably a lot bigger worry for the people who use all of them to spy on us peons than we peons actually are.

Is Robert Mueller, a Purported Hero of the Hospital Confrontation, Responsible for Section 215 Use?

On March 23, 2004 at noon, less than two weeks after the dramatic hospital confrontation and threats to quit reportedly got the Administration to agree to stop data mining Americans, FBI Director Robert Mueller had a meeting with Dick Cheney, at the Vice President’s request, in the Vice President’s office. In his notes, Mueller doesn’t describe what the VIce President wanted, nor am I aware that it has even been reported in the press.

The next day, the Chief Division Counsel of some Division of the FBI wrote a memo to the FBI General Counsel noting that FBI was using a “new standard” with Section 215 of the PATRIOT Act and indicating that a “recent decision” had been made to bypass the review of the Office of Intelligence Policy and Review on Section 215 applications.

In part, the apparent decision to bypass OIPR, which had rejected the premise of the previous Section 215 orders FBI had submitted in the past, reflected no more than a concerted effort on FBI’s part to make sure it could start using all the PATRIOT authorities it had been granted in 2001 in anticipation of renewal discussions that would take place the following year. Yet the timing of this change is particularly curious, given that we now know Section 215 has been used to collect data that could be used for data mining Americans, precisely the problem that had caused the hospital confrontation 12 days earlier.

At the very least, however, it shows that sometime around the same time as Jim Comey and others at DOJ tried to stop the data mining of Americans under NSA’s illegal program, FBI claimed to have eliminated one review step for Section 215 orders and changed the standard used for them. That reference notwithstanding, DOJ Inspector General at least reported that OIPR continued to have a role. (Note, the office that got cut out of the process, OIPR, is where one of the key whistleblowers on the illegal program, Thomas Tamm worked, though I have asked him if he knew whether they used Section 215 to accomplish the same program and he didn’t know anything about it.)

On May 21, 2004, just as the the confrontation was settling down, FBI got its first Section 215 order approved. MIRACLES! the memo subject line read. “We got our first business record order signed today. It only took two and a half years.”

Now, at least some of the people commenting publicly on the confirmation that Section 215 has been used to compile a database recording details on all calls Americans make say Section 215 has supported that purpose only since 2006. Dianne Feinstein, for example, says the practice has gone on for 7 years.

As far as I know, this is the exact three month renewal of what has been the case for the past seven years. This renewal is carried out by the FISA Court under the business records section of the Patriot Act. Therefore, it is lawful.

Seven years would put its start almost exactly at the March 9, 2006 renewal of the PATRIOT Act, which added new language on Section 215 in the wake of the December 15, 2005 exposure of Bush’s illegal wiretap program. In discussions of this collection program since last week, it has generally been accepted that’s when it all started.

Curiously (particularly given his insistence that PRISM only started in 2008, slides to the contrary notwithstanding), James Clapper made no claims about precisely when this practice started.

The Patriot Act was signed into law in October 2001 and included authority to compel production of business records and other tangible things relevant to an authorized national security investigation with the approval of the FISC. This provision has subsequently been reauthorized over the course of two Administrations – in 2006 and in 2011. It has been an important investigative tool that has been used over the course of two Administrations, with the authorization and oversight of the FISC and the Congress.

It is possible that this program was conducted under a different PATRIOT provision (such as the Pen Register ones) prior to 2006; in fact, Clapper never mentions the term “Section 215” in his purported clarification of the program.

Now, consider one more detail. In a statement before the 2009 debate on PATRIOT Act reauthorization focusing closely on Section 215, Russ Feingold suggested that the debate over reauthorization in 2005, which led to purported initial use of Section 215 to conduct this dragnet, had been stymied by classification of how the PATRIOT had been implemented.

I remain concerned that critical information about the implementation of the Patriot Act has not been made public – information that I believe would have a significant impact on the debate. During the debate on the Protect America Act and the FISA Amendments Acts in 2007 and 2008, critical legal and factual information remained unknown to the public and to most members of Congress – information that was certainly relevant to the debate and might even have made a difference in votes. And during the last Patriot Act reauthorization debate in 2005, a great deal of implementation information remained classified.

[snip]

But there also is information about the use of Section 215 orders that I believe Congress and the American people deserve to know. I do not underestimate the importance of protecting our national security secrets. But before we decide whether and in what form to extend these authorities, Congress and the American people deserve to know at least basic information about how they have been used. So I hope that the administration will consider seriously making public some additional basic information, particularly with respect to the use of Section 215 orders.

There can be no question that statutory changes to our surveillance laws are necessary. Since the Patriot Act was first passed in 2001, we have learned important lessons, and perhaps the most important of all is that Congress cannot grant the government overly broad authorities and just keep its fingers crossed that they won’t be misused, or interpreted by aggressive executive branch lawyers in as broad a way as possible. [my emphasis]

This suggests the plan to use Section 215 may have been explicit in those classified debates.

Read more

When NYT Accused Jim Comey of Approving Torture

[youtube]hxHjWYA50Ds[/youtube]

As you’ve likely heard already, NPR and others have reported that President Obama will nominate Jim Comey to lead the FBI.

I think Comey is a decent choice.

Much of the attention since this news broke has focused on Comey’s role in the hospital confrontation, where he threatened to resign unless the Bush Administration fixed the illegal wiretap program. That will clearly be a highlight of Comey’s confirmation discussion.

But just as much as Comey’s unsent resignation letter, I’m curious how these emails will play in his confirmation process.

They were similar Comey CYA, from the period in May 2005 when Dick Cheney was pushing Alberto Gonzales to reauthorize all the torture CIA had been doing since Jack Goldsmith had withdrawn the Bybee Two memo in 2004. While Comey did buy off on approving the waterboarding that had already been done (he unsuccessfully tried to limit it to one detainee whose treatment occurred after the Bybee Two memo was withdrawn), he also pushed hard — and failed — to get Alberto Gonzales to refuse to approve the techniques in combination, as they had reportedly always been used.

In the emails, he talks about when news of what was being approved broke (details of what freaked Comey out so much still haven’t become public), those pushing for torture would be gone. He regretted how much weaker Gonzales was than John Ashcroft, recalling that hospital bed scene.

I told him the people who were applying pressure now would not be there when the shit hit the fan. Rather they would simply say they had only asked for an opinion.

[snip]

It leaves me feeling sad for the Department and the AG.

[snip]

I just hope that when this all comes out, this institution doesn’t take the hit, but rather the hit is taken by those individuals who occupied positions at OLC and OAG and were too weak to stand up for the principles that undergird the rest of this great institution.

[snip]

People may think it strange to hear me say I miss John Ashcroft, but as intimidated as he could be by the WH, when it came to crunch-time, he stood up, even from an intensive care hospital bed. That backbone is gone.

Comey even tried to scare the torturers with warnings that the torture videos would one day become public — just six months before the torturers destroyed those videos.

There’s far more, which I laid out in this post and this post.

But what’s just as interesting as the actual content of the emails is the spin that NYT reporters Scott Shane and David Johnston gave it, presumably at the behest of the torturers who leaked it to them. They chose to ignore all the details about people like Cheney and Condi Rice pushing for more more more, immediately, and instead to focus on Comey’s assent to the memo effectively approving of the torture — including waterboarding — that had already been done.

Previously undisclosed Justice Department e-mail messages, interviews and newly declassified documents show that some of the lawyers, including James B. Comey, the deputy attorney general who argued repeatedly that the United States would regret using harsh methods, went along with a 2005 legal opinion asserting that the techniques used by the Central Intelligence Agency were lawful.

That opinion, giving the green light for the C.I.A. to use all 13 methods in interrogating terrorism suspects, including waterboarding and up to 180 hours of sleep deprivation, “was ready to go out and I concurred,” Mr. Comey wrote to a colleague in an April 27, 2005, e-mail message obtained by The New York Times.

It’s true. Comey did buy off on that memo. He did buy off on a memo approving 7.5 days of sleep deprivation and waterboarding (though not, as Cheney was pushing so hard to do, together).

During John Brennan’s confirmation hearing, Saxby Chambliss made sure to get John Brennan’s much more complacent involvement in torture into the record. He made sure to get Brennan to admit to having submitted FISA warrant applications that relied on tortured information. Those efforts, I suspect, were designed to make it a lot harder for Brennan to separate the CIA from torture going forward.

The evidence in these emails is in some ways more damning, but in most ways far, far less, than what we know of Brennan’s role in torture.

But I expect the same people who leaked these emails to NYT’s remarkably obedient reporters will try the line again.

And why not? At least one of those credulous reporters is still parroting his sources’ spin.

Jack Goldsmith, Open Source OLC Lawyer, to Obama: You’re Breaking the Law

Eleven days ago, Senate Intelligence Committee member Ron Wyden sent a publicly released letter to John Brennan making two things clear:

  • The Administration has refused to tell grunt (that is, non-Gang of Four) members of the Senate Intelligence Committee whether its targeted killing program–extending even to the killing of US citizens–is authorized under Article II or AUMF power.
  • The Administration has refused to tell grunt members of the Senate Intelligence Committee which countries it uses “lethal counterterrorism authorities” in.

Nine days later, Jack Goldsmith, a man best known for going to some length to force a President to have credible legal justifications for his counterterrorism programs, wrote this column, offering his advice about “What to do about growing extra-AUMF threats?”

Mind you, Goldsmith is addressing the legal problem presented by (and explaining his column by pointing to) our fight against AQIM in North Africa and al-Nusra in Syria. He is not pointing–at least not explicitly–to the troubling revelations of Wyden’s letter.

But Goldsmith’s advice is directly relevant to the topics on which the Administration refuses to brief the grunt Senate Intelligence Committee members. Goldsmith warns that Article II power–on which it increasingly appears the Administration is relying–doesn’t extend as far as AUMF authority would.

One possibility is to rely on the president’s independent Article II power, which authorizes the president to use force, in the absence of congressional authorization, in defense of the nation. This approach faces at least three problems.  First, it is a fraught basis for action because the president must act without the overt support of Congress, which can later snipe at his decisions, or worse.  Relatedly, courts are more inclined to uphold presidential action supported by Congress.  Second, the scope of Article II targeting authorities is less certain than the scope of AUMF targeting authorities, and might be narrower. [my emphasis]

And Goldsmith describes the importance of telling Congress–and he’s talking about telling all of Congress, not just grunt Senate Intelligence Committee members–what groups are actually included among legal counterterrorism targets.

Congress could authorize the President to use force against specified terrorist groups in specified countries (or perhaps just against particular groups without specifying nations).  The Wall Street Journal recently reported that some in the administration are considering asking Congress for just such a statute to address Islamist terrorist threats in some North African countries.  This retail approach is in theory the best option because Congress defines the enemy, and because Congress stays in the loop politically and legally and must debate and approve any expansions of the conflict. The problem with the retail approach is that it is unclear whether Congress can or will, on a continuing basis, authorize force quickly or robustly enough to meet the ever-morphing threat.

Third, Congress could set forth general statutory criteria for presidential uses of force against new terrorist threats but require the executive branch, through an administrative process, to identify particular groups that are targetable.  One model here is the State Department’s “Foreign Terrorist Organization” designation process.  There are at least two problems with this approach.  First, it is unclear whether Congress may constitutionally delegate the war power in this fashion.  And second, it lessens congressional involvement and accountability as compared to the second approach. [my emphasis]

Now, let me be clear: Goldsmith never comes out and directly says that the Obama Administration is, currently, breaking the law (and he makes no comment on whether the Administration is violating National Security Act requirements on briefing Congress). And if he did, he’d probably couch it in language about needing the cover of Congressional sanction–more language about Congress “sniping, or worse.” Nevertheless, the clear implication if you take Wyden’s letter in conjunction with Goldsmith’s Office of Legal Counsel-type advice is that the Obama Administration is conducting counterterrorism ops without legal sanction.

But consider what it means that this solidly conservative lawyer is telling the Obama Administration the same thing he had to tell George Bush when the latter relied on John Yoo’s crappy legal advice.

This suggests that the administration will continue to rely as much as possible on an expansive interpretation of the AUMF and on Article II.  We will see if these authorities suffice to meet the threat.

When Jim Comey, in response Goldsmith’s advice, dramatically stood up to Andy Card and Alberto Gonzales’ bullying in a DC Intensive Care Unit, he did so to convey to them that an “expansive interpretation” of Article II power was not good enough (though according to Tom Daschle’s read of the AUMF discussions, Goldsmith replaced John Yoo’s expansive interpretation of Article II authority with an expansive interpretation of the AUMF).

Goldsmith’s advice, writing without the authority he once had as the confirmed OLC head, and lacking the leverage of an expiring wiretapping authorization or the imposing figure of a 6’8″ Acting Attorney General to deliver his message, may not carry the weight it once did.

But he is offering fundamentally the same warning he did 9 years ago.

Update: This post has been updated for clarity.