Though I agree with the general sentiment that Donald Trump should not be trusted with America’s nuclear codes, there’s a lot I loathed in Hillary’s foreign policy speech yesterday.
Her neat espousal of American exceptionalism, with the specter that another country could make decisions about our lives and jobs and safety, is especially rich coming from a woman who has negotiated several trade deals that give corporations the power to make decisions about our lives and jobs and safety.
I believe with all my heart that America is an exceptional country – that we’re still, in Lincoln’s words, the last, best hope of earth. We are not a country that cowers behind walls. We lead with purpose, and we prevail.
And if America doesn’t lead, we leave a vacuum – and that will either cause chaos, or other countries will rush in to fill the void. Then they’ll be the ones making the decisions about your lives and jobs and safety – and trust me, the choices they make will not be to our benefit.
That is not an outcome we can live with.
The rest of her riff on American exceptionalism — with weird claims like, “America’s network of allies is part of what makes us exceptional” and “Allies provide staging areas for our military” — is worth an entirely separate post.
Her cavalier invocation of dead bodies and prolonging depressions exhibits a lack of self-awareness.
I’m frankly baffled by her description of her plan to defeat ISIS, as well as her warnings elsewhere about allowing terrorists in Syria or emboldening ISIS, both of which past Hillary actions have done.
We need to lash up with our allies, and ensure our intelligence services are working hand-in-hand to dismantle the global network that supplies money, arms, propaganda and fighters to the terrorists. We need to win the battle in cyberspace.
And of course we need to strengthen our defenses here at home.
That – in a nutshell – is my plan for defeating ISIS.
Hillary never talks about how she’ll get the Saudis — one of those allies she wants to “lash up with” — to stop fostering terrorism. That seems like a first step.
I’m even more curious what she intends with “strengthening our defenses here at home,” especially coming just lines after she falsely claimed San Bernardino was an ISIS attack? We already arrest scores of people for their support for ISIS, for doing things like RTing ISIS propaganda. To do much more — and to find the San Bernardino couple before they attacked — would have required far more domestic spying. Is that what Hillary has planned?
But here’s the thing that most disturbs me about her hawkish speech. Note how she attacked Trump for his embrace of torture.
He has said that he would order our military to carry out torture and the murder of civilians who are related to suspected terrorists – even though those are war crimes.
So it really matters that Donald Trump says things that go against our deepest-held values. It matters when he says he’ll order our military to murder the families of suspected terrorists. During the raid to kill bin Laden, when every second counted, our SEALs took the time to move the women and children in the compound to safety. Donald Trump may not get it, but that’s what honor looks like.
Two times in a formal, pre-written speech, delivered with tele-prompters, Hillary claimed Trump had said he’d order our military to carry out torture and murder of civilians. But that’s not what he said. He spoke generally, and when speaking of torture he has talked about “interrogators,” without reference to agency. Sure, that could mean DOD (and some DOD interrogators did torture under George Bush). It could also mean the FBI, the agency which currently leads high value interrogations and which John Brennan has said must have its “own processes and procedures and laws that govern its activities,” separate from the techniques permitted in the Army Field Manual.
But the assumption of everyone listening to Donald Trump’s promise to torture was that he’d ask CIA to do the business. Both former CIA Director Michael Hayden and current CIA Director John Brennan thought that’s what he meant, anyway.
While Hillary was Secretary of State, the government killed the son of Anwar al-Awlaki, effectively murdering the family of a suspected (dead) terrorist.
It’s bad enough that she’s lecturing Trump about our deepest-held values. But she’s also not promising to the one thing she appears to be promising: refusing to order the CIA — not the military — not to torture.
Politico has a big piece tied to a Showtime documentary on the living CIA Directors. As should be expected of a collection of paid liars, there are a lot of myths and score settling, most notably with expanded George Tenet claims about the strength of the warnings he gave about 9/11.
But I’m most interested in this insight, which seems very apt given recent intelligence failures and successes.
What’s the CIA’s mission? Is it a spy agency? Or a secret army? “Sometimes I think we get ourselves into a frenzy—into believing that killing is the only answer to a problem,” says Tenet. “And the truth is, it’s not. That’s not what our reason for existence is.” When Petraeus became CIA director, his predecessor, Hayden took him aside. Never before, Hayden warned him, had the agency become so focused on covert military operations at the expense of intelligence gathering. “An awful lot of what we now call analysis in the American intelligence community is really targeting,” Hayden says. “Frankly, that has been at the expense of the broader, more global view. We’re safer because of it, but it has not been cost-free. Some of the things we do to keep us safe for the close fight—for instance, targeted killings—can make it more difficult to resolve the deep fight, the ideological fight. We feed the jihadi recruitment video that these Americans are heartless killers.”
This is, of course, the counterpoint to Hayden’s claim that “we kill people based on metadata.” But it says much more: it describes how we’re viewing the world in terms of targets to kill rather than people to influence or views to understand. Hayden argues that prevents us from seeing the broader view, which may include both theaters where we’re not actively killing people but also wider trends.
Which is why I’m so interested in the big festival the US and UK — David Cameron, especially (of course, he’s in the middle of an effort to get Parliament to rubber stamp the existing British dragnet) — are engaging in with the presumed drone-killing of Mohammed Emwazi, nicknamed Jihadi John by the press.
Given that ISIS has plenty of other fighters capable of executing prisoners, some even that speak British accented English, this drone-killing seems to be more about show, the vanquishing of a public figure rather than a functional leader — contrary to what David Cameron says. As WaPo notes,
“If this strike was successful, and we still await confirmation of that, it will be a strike at the heart of ISIL,” Cameron said, using an acronym for the Islamic State.
Cameron alternated between speaking about Emwazi in the past and the present tenses, describing him as a “barbaric murderer” who was the Islamic State’s “lead executioner.”
“This was an act of self defense. It was the right thing to do,” he said.
But it is not clear that Emwazi had a meaningful role in Islamic State’s leadership structure. Analysts said the impact of his possible death could be limited.
“Implications? None beyond the symbolism,” said a Twitter message from Shiraz Maher, an expert on extremism at King’s College London.
It also might be a way to permanently silence questions about the role that British targeting of Emwazi had in further radicalizing him.
And all this comes just a few weeks after ISIS affiliates in Egypt claim to have brought down a Russian plane — depending on how you count, the largest terrorist attack since 9/11. Clearly, the combined British and US dragnet did not manage to prevent the attack, but there are even indications GCHQ, at least, wasn’t the agency that first picked up chatter about it.
Information from the intelligence agency of another country, rather than Britain’s own, led the Government to conclude that a bomb probably brought down the Russian airliner that crashed in the Sinai.
It was reports from an undisclosed “third party” agency, rather than Britain’s own GCHQ, that revealed the so-called “chatter” among extremists after the disaster that killed all 224 passengers and crew – and ended with the suspension of all British flights to Sharm el-Sheikh, according to authoritative sources.
British officials are said to have asked whether the same information had also been passed to Egypt, and were told that it had.
Sources declined to say which friendly country passed the information. The US and Israel – whose own borders have been threatened by Isis in Sinai – as well as Arab nations in the region all have an interest in monitoring activity in the area.
So while it’s all good that the Americans and Brits took out an ISIS executioner in Syria — thereby avenging the deaths of their country men — it’s not like this great dragnet is doing what it always promises to do: prevent attacks, or even understand them quickly.
Perhaps that’s because, while we approach ever closer to “collect[ing] it all,” we’re targeting rather than analyzing the data?
In a bid to extend a dragnet that has proven useless in the function the Intelligence Community claims it serves, Mitch McConnell is claiming there are secret reasons we need to keep the dragnet.
It’s possible this is just a tactic, to gain leverage to make USA F-ReDux even worse.
It’s possible that McConnell just wants to retain the dragnet to identify people to coerce into becoming informants, the use the FBI has claimed for the dragnet that never got included in its more public assessments of value.
It’s possible McConnell wants to retain a dragnet — and finally expand it to include most Internet metadata — because he can (and all of our Five Eyes allies have done so in the wake of Snowden’s leaks).
But I want to submit another possibility, based on the Stellar Wind IG Report.
In its assessment of the Stellar Wind dragnet — the same section that notes that 1.2% of all tips made a “significant” contribution to finding terrorists (and that measure included deporting suspected terrorists and identifying potential informants, not just identifying actual terrorists) and Internet dragnet tips had made no contribution — the report explained Michael Hayden’s justification.
Hayden also observed that the enemy may not have been as embedded in the United States as much as feared but said that he believes Stellar Wind helped determine this.
Other witnesses, such as General Hayden, said that the value of the program may lie in its ability to help the Intelligence Community determine that the terrorist threat embedded within the country is not as great as once feared. (PDF 647, 664)
Now, remember, to justify operating this program in defiance of the law (and to justify getting FISC to rubber stamp it in 2004 in defiance of common sense), John Brennan and his colleagues would routinely write a “scary memo” to establish that the threat of a terrorist attack on the US was so big that the government needed the program. Probably, they used Khalid Sheikh Mohammed’s claim that he had gotten a Briton to recruit non-existent black Muslims in Montana to start forest fires for the 3 months of 2003 that CIA believed that ruse. We know in 2004, the CIA drummed up fear of an election year plot — seeded by a fabricator and sustained through CIA’s use of torture — to sustain the initial Internet dragnet order.
The point is, for the entire life of the dragnet, the government justified it by talking about scary terrorists embedded in the US.
And then, when challenged in 2009 to explain the value of the dragnet, Hayden explained that it was useful because it proved those claims of scary terrorists embedded in the US turned out to be overblown.
The best Hayden can offer — after years of overseeing a dragnet — is that it proved the IC’s overblown claims in the first place were overblown.
Behind all this dragnettery, then, lies a great deal of masturbatory fear-mongering.
Consider the following redactions.
Starting at PDF 146, the entire section describing what Michael Hayden did in the days immediately after 9/11 is redacted. Here’s what is included in the Snowden version.
(TS//SV/NF) On 14 September 2001, three days after terrorist attacks in the United States, General Hayden approved the targeting of terrorist-associated foreign telephone numbers on communication links between the United States and foreign countries where terrorists were known to be operating. Only specified, pre-approved numbers were allowed to be tasked for collection against U.S.-originating links. He authorized this collection at Special Collection Service and Foreign Satellite sites with access to links between the United States and countries of interest, including Afghanistan. According to the Deputy General Counsel, General Hayden determined by 26 September that any Afghan telephone number in contact with a U.S. telephone number on or after 26 September was presumed to be of foreign intelligence value and could be disseminated to the FBI.
(TS//SV/NF) NSA OGC said General Hayden‘s action was a lawful exercise of his power under Executive Order (E.O.) 12333, United States Intelligence Activities, as amended. The targeting of communication links with one end in the United States was a more aggressive use of E.O. 12333 authority than that exercised by former Directors. General Hayden was operating in a unique environment in which it was a widely held belief that additional terrorist attacks on U.S. soil were imminent. General Hayden said this was a “tactical decision.“
(U//FOUO) On 2 October 2001, General Hayden briefed the House Permanent Select Committee on Intelligence (HPSCI) on this decision and later informed members of the Senate Select Committee on Intelligence (SSCI) by telephone. He had also informed DCI George Tenet.
(TS) At the same time NSA was assessing collection gaps and increasing efforts against terrorist targets immediately after the 11 September attacks, it was responding to Department of Defense (DoD), Director of Central Intelligence Community Management Staff questions about its ability to counter the new threat.
We can tell the discussion in the released version is different, even though it is entirely redacted. That’s because the discussion is longer, appears to include two footnotes, and has some indentations that don’t appear in the Snowden version.
But as it is, the discussion is legally dangerous for the Executive, because it either shows that NSA used the 15-day window permitted under FISA (which would make the Yoo memos all the more problematic), or conducted this spying without any authorization. (There are also “doth protest too much” discussions of how the NSA never spied on Americans before this that we know to be false, so I suspect that’s part of the problem.)
The final report redacts a discussion (PDF 148-149) titled, “Vice President Asked What Other Authorities NSA Needed.” Some related discussion appears in the Snowden version, but clearly not the entire discussion.
Mr. Tenet relayed that the Vice President wanted to know if NSA could be doing more. General Hayden replied that nothing else could be done within existing NSA authorities. In a follow-up telephone conversation, Mr. Tenet asked General Hayden what could be done if he had additional authorities. General Hayden said that these discussions were not documented.
Though it’s possible — perhaps even probable — that what the NSA draft depicts as NSA identifying its own needs is actually Hayden getting people to identify the needs Cheney had already identified for him.
In any case, the final IG report complains that none of this was documented, which suggests there was far more of interest that actually went on in these discussions.
Perhaps most interesting, the NSA redacts almost all of whatever became of this discussion.
Among other things, NSA considered how to tweak transit collection-the collection of communications transiting through but not originating or terminating in the United States. NSA personnel also resurfaced a concept proposed in 1999 to address the Millennium Threat. NSA proposed that it would perform contact chaining on metadata it had collected. Analysts would chain through masked U.S. telephone numbers to discover foreign connections to those numbers, without specifying, even for analysts, the U.S. number involved. In December 1999, the Department of Justice (DoJ), Office of intelligence Policy Review (OIPR) told NSA that the proposal fell within one of the FISA definitions of electronic surveillance and, therefore, was not permissible when applied to metadata associated with presumed U.S. persons (i.e., U.S. telephone numbers not approved for targeting by the FISC).
Though PDF 150 appears to have a footnote that would modify that discussion (but that doesn’t appear in the Snowden version).
According to NSA OGC, DoJ has since agreed with NSA that simply processing communications metadata in this manner does not constitute electronic surveillance under the FISA.
This footnote may refer to the SPCMA decision in 2007 to 2008. Except that’s not what Binney et al proposed back in 1999. On the contrary: SPCMA permits NSA to chain through unmasked US person metadata, whereas Binney had proposed permitting only chaining through masked US person identifiers.
Which suggests the George Ellard may have been misrepresenting what was possible in this sensitive IG Report designed for Congress.
But that would make it easier to come to this conclusion, one not included in the Snowden version:
Under its authorities, NSA had no other options for the timely collection of communications of suspected terrorists when one end of those communications was in the United States and the communications could only be collected from a wire or cable in the United States.
No wonder they redacted the Binney discussion.
On September 14, 2001 — 3 days before signing an expansive Memorandum of Notification that would authorize a suite of covert operations against al Qaeda, and 4 days before signing an AUMF that would give those operations the appearance of Congressional sanction — President Bush declared a National Emergency in response to the 9/11 attack.
The following day, according to a 2002 motion to the FISC to be able to share raw FISA-derived information with CIA and NSA (this was liberated by Charlie Savage), FISC suspended its rules on sharing intelligence derived under FBI-obtained FISA warrants with criminal investigations (see page 26 of this paper for background).
On September 15, 2001, upon motion of the Government, the [FISA] Court suspended the “Court wall,” certification, and caveat requirements that previously had applied to Court-authorized electronic surveillance and physical search of [redacted] related targets, while directing that the FBI continue to apply the standard minimization procedures applicable in each case. As stated in the order resulting from that motion, the Court took this action in light of inter alia:
“the President’s September 14, 2001, declaration of a national emergency and the near war conditions that currently exist;”
“the personal meeting the Court had with the Director of the FBI on September 12, 2001, in which he assured the Court of the collection authority requested from this Court in the face of the nature and scope of the multi-faced response of the United States to the above-referenced attacks;
“the need for the Government to rapidly disseminate pertinent foreign intelligence information to appropriate authorities.”
Ten days after FISC dismantled its role in “the wall” between intelligence and criminal investigations in response to the Executive’s invocation of a National Emergency, on September 25, 2001, John Yoo finished an OLC memo considering the constitutionality of dismantling the wall by replacing “the purpose” in FISA orders with “a purpose.”
A full month later, on October 25, 2001, Congress passed the PATRIOT Act. For over 13 years, analysis of the PATRIOT Act has explained that it eliminated “the wall” between intelligence and criminal investigations by replacing language requiring foreign intelligence be “the purpose” of FISA wiretaps with language requiring only that that be “a significant purpose” of the wiretap. But the FISC suspension had already removed the biggest legal barrier to eliminating that wall.
In other words, the story we’ve been telling about “the wall” for over 13 years is partly wrong. The PATRIOT Act didn’t eliminate “the wall.” “The wall” had already been suspended, by dint of Executive Proclamation and a secret application with the FISC, over a month before the PATRIOT Act was initially introduced as a bill.
FISC suspended it, without congressional sanction, based on the President’s invocation of a National Emergency.
That’s not the only case where the Executive invoked that National Emergency in self-authorizing or getting FISC to authorize expansive new surveillance authorities (or has hidden the authorities under which it makes such claims).
Perhaps most illustratively, on May 6, 2004, Jack Goldsmith pointed to the National Emergency when he reauthorized most aspects of Stellar Wind.
On September 14, 2001. the President declared a national emergency “by reason of the terrorist attacks at the World Trade Center, New York, New York, and the Pentagon, and the continuing and immediate threat of further attacks on the United States.” Proclamation No. 7463, 66 Fed. Reg. 43, !99 (Sept. 14, 2001). The United States also launched a massive military response, both at home and abroad. In the United States, combat air patrols were immediately established over major metropolitan areas and were maintained 24 hours a day until April 2002, The United States also immediately began plans for a military response directed at al Qaeda’s base of operations in Afghanistan.
Only after invoking both the Proclamation and the immediate military response that resulted did Goldsmith note that Congress supported such a move (note, he cited Congress’ September 14 passage of the AUMF, not Bush signing it into law on September 18, thought that may be in part because Michael Hayden authorized the first expansions of surveillance September 14; also remember there are several John Yoo memos that remain hidden) and then point to an article on the friendly-fire death of Pat Tillman as proof that combat operations continued.
On September 14, 2001, both houses of Congress passed a joint resolution authorizing the President “to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks” of September I I. Congressional Authorization § 2(a). Congress also expressly acknowledged that the attacks rendered it “necessary and appropriate” for the United States to exercise its right “to protect United States citizens both at home and abroad,” and acknowledged in particular that the “the President has authority under the Constitution to take action to deter and prevent acts of international terrorism against the United States.” id. pmbl. Acting under his constitutional authority as Commander in Chief, and with the support of Congress, the President dispatched forces to Afghanistan and, with the cooperation of the Northern Alliance, toppled the Taliban regime from power Military operations to seek out resurgent elements of the Taliban regime and al Qaeda fighters continue in Afghanistan to this day. See, e.g., Mike Wise and Josh White, Ex-NFL Player Tillman Killed in Combat, Wash. Post, Apr. 24, 2004, at AI (noting that “there are still more than 10,000 U.S. troops in the country and fighting continues against remains of the Taliban and al Qaeda”).
That is, even in an OLC memo relying on the AUMF to provide legal sanction for President Bush’s systematic flouting of FISA for 2.5 years, Goldsmith relied primarily on the National Emergency Proclamation, and only secondarily on Congress’ sanction of such invocation with the AUMF.
The White Paper released in 2006 largely regurgitating Goldsmith’s opinion for more palatable consumption mentions the AUMF first in its summary, but then repeats Goldsmith’s emphasis on the Proclamation in the background section (see pages 2 and 4).
Paragraphs that may discuss such authorizations get redacted in the 2006 application to move content collection under FISC (see page 6). The entire background section (starting at page 5) of the initial Internet dragnet application is also redacted. While we can’t be sure, given parallel claims made in the same 2004 to 2006 period, it seems likely those memoranda also repeated this formula.
Such a formula was definitely dropped. The 2006 memorandum in support of using Section 215 to create a phone dragnet included no mention of authorities. The 2007 memorandum to compel Yahoo to fulfill Protect American Act orders cites PAA, not Emergency Declarations.
But the formula was retained in all discussions of the Administration’s illegal wiretap program in secret declarations submitted in court in 2006, 2007, and 2009, being repeated again in an unclassified 2013 declaration. While these declarations likely all derive, at least in part, from Goldsmith’s memo, it’s worth noting that the government has consistently suggested it could conduct significant surveillance programs without Congressional sanction by pointing to the that National Emergency Proclamation.
This is the precedent I meant to invoke when I expressed concern about President Obama’s expansive Executive Order of the other day, declaring a National Emergency because of cybersecurity.
Ranking House Intelligence Member Adam Schiff’s comment that Obama’s EO is “a necessary part of responding to the proliferation of dangerous and economically devastating cyber attacks facing the United States,” but that it will be “coupled with cyber legislation moving forward in both houses of Congress” only adds to my alarm (particularly given Schiff’s parallel interest in giving Obama soft cover for his ISIL AUMF while having Congress still involved). It sets up the same structure we saw with Stellar Wind, where the President declares an Emergency and only a month or so later gets sanction for and legislative authorization for actions taken in the name of that emergency.
And we know FISC has been amenable to that formula in the past.
We don’t know that the President has just rolled out a massive new surveillance program in the name of a cybersecurity Emergency (rooted in a hack of a serially negligent subsidiary of a foreign company, Sony Pictures, and a server JP Morgan Chase forgot to update).
We just know the Executive has broadly expanded surveillance, in secret, in the past and has never repudiated its authority to do so in the future based on the invocation of an Emergency (I think it likely that pre FISA Amendments Act authorization for the electronic surveillance of weapons proliferators, even including a likely proliferator certification under Protect America Act, similarly relied on Emergency Proclamations tied to all such sanctions).
I’m worried about the Cyber Intelligence Sharing Act, the Senate version of the bill that Schiff is championing. But I’m just as worried about surveillance done by the executive prior to and not bound by such laws.
Because it has happened in the past.
Update: In his October 23, 2001 OLC memo authorizing the President to suspend the Fourth Amendment (and with it the First), John Yoo said this but did not invoke the September 14, 2001 proclamation per se.
As applied to the present circumstances, the [War Powers Resolution] signifies Congress’ recognition that the President’s constitutional authority alone enables him to take military measures to combat the organizations or groups responsible for the September 11 incidents, together with any governments that may have harbored or supported them, if such actions are, in his judgment, a necessary and appropriate response to the national emergency created by those incidents.
Update: Thanks to Allen and Joanne Leon for the suspend/suspect correction.
We are now in the “final” week of negotiations to set the framework for the P5+1 long-term agreement on Iran’s nuclear technology. With so much in the balance, voices are popping up from every direction to offer their opinions on what constitutes a good or bad deal. While Netanyahu’s address to Congress dominated the headlines in that regard, other sources also have not held back on offering opinions. In the case of Netanyahu, informed observers considering his remarks knew in advance that Netanyahu considers Iran an “existential threat” to Israel and that violent regime change in Iran is his preferred mode of addressing Iran’s nuclear technology. When it comes to other opinions being offered, it is important to also have a clear view of the backgrounds of those offering opinions so that any biases they have can be brought into consideration.
With that in mind, the Washington Post has committed a gross violation of the concept of full disclosure in an Iran op/ed they published yesterday. I won’t go into the “substance” of this hit piece on Iran, suffice it note that the sensationalist headline (The Iran time bomb) warns us that the piece will come from an assumption that Iran seeks and will continue to seek a nuclear weapon regardless of what they agree to with P5+1.
The list of authors for this op/ed is an anti-Iran neocon’s wet dream. First up is Michael Hayden. The Post notes that Hayden led the CIA from 2006-2009 and the NSA from 1999 to 2005. I guess they don’t think it’s important to note that he now is a principal with the Chertoff Group and so stands to profit from situations in world politics that appear headed toward violence.
The third of the three authors is perhaps the least known, but he’s a very active fellow. Here is how Nima Shirazi describes Ray Takeyh:
Takeyh is a mainstay of the Washington establishment – a Council on Foreign Relations Senior Fellow before and after a stint in the Obama State Department and a founding member of the neoconservative-created Iran Strategy Task Force who has become a tireless advocate for the collective punishment of the Iranian population in a futile attempt to inspire homegrown regime change (if not, at times, all-out war against a third Middle Eastern nation in just over a decade). Unsurprisingly, he dismisses out of hand the notion that “the principal cause of disorder in the Middle East today is a hegemonic America seeking to impose its imperial template on the region.”
The Post, of course, doesn’t mention Takeyh’s association with the group Shirazi describes, nor his membership in another Iran Task Force organized by the Jewish Institute for National Security Affairs.
Sandwiched between Hayden and Takeyh, though, is the Post’s biggest failure on disclosure. Olli Heinonen is described by the Post simply as “a senior fellow at Harvard’s Belfer Center for Science and International Affairs and a former deputy director general of the International Atomic Energy Agency”. As such, uninformed readers are likely to conclude that Heinonen is present among the authors to serve as a hefty dose of neutrality,given his background in the IAEA. Nothing could be further from the truth. What the Post fails to disclose is that Heinonen is also a prominent member of the Advisory Board of United Against Nuclear Iran.
Not only is UANI an advocacy group working against Iran, but they are currently embroiled in litigation in which it has been learned that UANI has come into possession of state secrets from the United States. The Department of Justice has weighed in on the UANI case, urging the judge to throw the case out on the grounds that continuing to litigate it will disclose the US state secrets that UANI has obtained. Since the litigation involves UANI actions to “name and shame” companies it accuses of violating US sanctions against Iran, one can only assume that the state secrets leaked to UANI involve Iran.
How in the world could the Washington Post conclude that Heinonen’s role on the Advisory Board for United Against Nuclear Iran would not be something they should disclose in publishing his opinion piece entitled “The Iran time bomb”?
Oh, and lest we come to the conclusion that failing to note Heinonen’s UANI connection is a one-off thing in which Heinonen himself is innocent, noted AP transcriptionist of neocon anti-Iran rhetoric George Jahn used Heinonen in exactly the same way a month ago.
We can only conclude that Heinonen is happily doing the neocons’ bidding in their push for war with Iran.
Both WaPo and Newsweek have stories out on CIA’s role in assassinating Imad Mugniyah in 2008. As described, Michael Hayden loved the idea, but then got a bit squeamish about ordering a hit. Luckily, President Bush was all too happy to approve it. Here’s Newsweek:
“General Hayden, at first, was all for this,” the former official said, “But slowly, or maybe not so slowly, the realization set in for him that he was ordering an assassination, that basically he was putting out a hit. And once he became pretty much cognizant of the fact that he was basically ordering the murder of someone, he got cold feet. He didn’t fancy himself as a Corleone.”
And he wasn’t, really. That role would ultimately fall to the president.
“Obviously [Hayden] had to get authority for this, and authority could come from only one person, and that would be POTUS,” said the participant. “So he went down to see President Bush. It took Bush apparently only about 30 seconds to say, ‘Yes, and why haven’t you done this already? You have my blessing. Go with God.’”
But in late December, with the bomb ready and Mugniyah firmly in their sights, Hayden “started to get really cold feet again,” the participant said. He decided to go see President Bush personally—on Christmas Eve 2007, at Camp David.
“On Christmas Eve morning, he and [Deputy CIA Director Steven] Kappes fly up to Camp David to see POTUS, to say, ‘Okay, look, here’s what we got, everything is in place, do we still have the go-ahead?’ And POTUS basically threw both of them out, saying, ‘Why are you up here wasting my time on Christmas Eve? Get the fuck out and go do this. Not quite in those terms. But it was, ‘Yes, I’ve already given you my approval. Go do this; go with God.’”
“Go with our Christian God,” I guess Bush meant.
Both pieces emphasize how careful the CIA and Mossad were with their terrorist tactics, to make sure only their target was killed. Again, Newsweek:
Finally, the car was in place. But then there were always other people around. Weeks more went by. Hayden’s demands that only Mugniyah be killed, and no one else, with no collateral damage, had to be met.
“It was always either he wasn’t alone, or he had his kids with him, or somebody else with him, or there were casuals in the area, or he was gone, he was in the Bekka [Valley] or someplace else, he wasn’t in his apartment,” the participant said. “The rules of engagement were so tight that he probably walked past the thing dozens of times but they just couldn’t do anything because somebody was there or it just didn’t fit into the rules of engagement.”
“They were keeping watch on this just about all the time,” he added. “They were taking shifts, a station officer and a Mossad officer. The Mossad officer was there just to make the confirmation that, ‘yeah, that’s him.’”
The kill was made all the harder by the way the bomb would be detonated. There was a two-second delay from the time the CIA and Mossad agents in the lookout post pushed the button to when the bomb exploded. Under the plan, the Mossad agent would ID Mugniyah, and the CIA man would press the remote control.
“So you would have to count—one, one thousand; two, one thousand… “ the participant said. “They had about six seconds from the time he came out of the apartment door to the time he moved out of the danger zone. So they had to do it really fast.”
And WaPo notes how tedious it was to get approval to kill a guy whose attacks on the US were years earlier, under Reagan.
Former U.S. officials, all of whom spoke on the condition of anonymity to discuss the operation, asserted that Mughniyah, although based in Syria, was directly connected to the arming and training of Shiite militias in Iraq that were targeting U.S. forces. There was little debate inside the Bush administration over the use of a car bomb instead of other means.
“Remember, they were carrying out suicide bombings and IED attacks,” said one official, referring to Hezbollah operations in Iraq.
The authority to kill Mughniyah required a presidential finding by President George W. Bush. The attorney general, the director of national intelligence, the national security adviser and the Office of Legal Counsel at the Justice Department all signed off on the operation, one former intelligence official said.
The former official said getting the authority to kill Mughniyah was a “rigorous and tedious” process. “What we had to show was he was a continuing threat to Americans,” the official said, noting that Mughniyah had a long history of targeting Americans dating back to his role in planning the 1983 bombing of the U.S. Embassy in Beirut.
“The decision was we had to have absolute confirmation that it was self-defense,” the official said.
(Note, Newsweek says the Finding was signed under Reagan, which actually makes more sense since the Gloves Come Off Memorandum of Notification Bush and Obama have relied on was also a modification of a Finding signed by him.)
This is, presumably, meant to be a big success story for CIA. My hope, however, is that it adds some nuance to debates about our use of drones. If the US kills more collateral casualties using drones than using a classic terrorist technique — in both cases making really attenuated claims about current threats — which is the greatest terror technique?
Update: Kevin Jon Heller argues the US violated the Terrorist Bombing Convention.
The Shadow Factory was published on October 14, 2008.
8 days before that, the NSA notified the Senate Intelligence Committee (just the SSCI at first?!?!) about an impending (it aired on October 9) Brian Ross interview with whistleblowers from James Bamford‘s book on ABC.
The interview included a clip from Michael Hayden’s 2006 CIA Director confirmation hearing before SSCI in which he claimed Americans’ private conversations would never be intercepted.
In testimony before Congress, then-NSA director Gen. Michael Hayden, now director of the CIA, said private conversations of Americans are not intercepted.
“It’s not for the heck of it. We are narrowly focused and drilled on protecting the nation against al Qaeda and those organizations who are affiliated with it,” Gen. Hayden testified.
He was asked by Senator Orrin Hatch (R-UT), “Are you just doing this because you just want to pry into people’s lives?”
“No, sir,” General Hayden replied.
It also included flaccid responses from both then CIA Director Hayden and his spokesperson Mark Mansfield (who was actively involved in pre-emptive leaks to the press on torture) and Keith Alexander (who was Deputy Chief of Staff for Army Intelligence at the time of the violations).
In addition, the ABC report included a quote from then SSCI Chair Jello Jay Rockefeller (who, of course, would have found out about it from the agency days before the report).
The chairman of the Senate Intelligence Committee, Jay Rockefeller (D-WV), called the allegations “extremely disturbing” and said the committee has begun its own examination.
“We have requested all relevant information from the Bush Administration,” Rockefeller said Thursday. “The Committee will take whatever action is necessary.”
It also made clear that Orrin Hatch had been the one to pitch the softball to Hayden in 2006, about which — it is abundantly clear — he lied about.
Finally, it includes an anonymous quote from a “US intelligence official” making it clear that all US government employees might be spied on, contrary to Hayden’s public claims during the confirmation process.
Asked for comment about the ABC News report and accounts of intimate and private phone calls of military officers being passed around, a US intelligence official said “all employees of the US government” should expect that their telephone conversations could be monitored as part of an effort to safeguard security and “information assurance.”
There appear to be several things going on with this.
First, this is ABC News, one of the outlets notorious for laundering intelligence claims; indeed, it is possible this is a limited hangout, an attempt to preempt one of the most alarming revelations in Bamford’s book. While the report doesn’t say it explicitly, it implies the claims of whistleblowers Kinne and Faulk prove Hayden to have lied in his CIA Director confirmation hearing, in response to the softball thrown by Hatch. In any case, the briefing about this disclosure appears to have gone exclusively to SSCI (with follow-up briefings to both intelligence oversight committees afterwards), the committee that got the apparently false testimony (and not for the last time, from Michael Hayden!). But by briefing the Committee, it also gave Jello Jay an opportunity — and probably, explicit permission — to sound all stern about a practice the Committee likely knew about.
In the IOB Report, this is portrayed as a model of oversight. But from what we know about the parties involved, it is just as likely to have been an effort at press management.
Update: The 3Q 2009 report describes the outcome of the report. It found “no targeting of US persons.”
As I noted, the NSA released its quarterly reports to the Intelligence Oversight Board as a FOIA-coal-for-Christmas present. In them, we see how the NSA executed a bit of legal chicanery with respect to Stellar Wind which had previously been revealed in the 2009 Draft IG Report on Stellar Wind.
The report claims that NSA’s Inspector General did not get read into the program until August 2002. The IG Report claims to be mystified as to why NSA operated an illegal program for 9 months before reading in the IG; it offers the suggestion that President Bush didn’t want to read in the IG until NSA had a named IG, rather than an Acting one — but that doesn’t explain why they waited 4 months after Joel Brenner came in in April 2002.
(TS//SI//NF) We could not determine exact reasons for why the NSA IG was not cleared for the PSP until August 2002. According to the NSA General Counsel, the President would not allow the IG to be briefed sooner. General Hayden did not specifically recall why the IG was not brought in earlier, but thought that it had not been appropriate to do so when it was uncertain how long the Program would last and before operations had stabilized. The NSA IG pointed out that he did not take the IG position until April 2002, so NSA leadership or the White House may have been resistant to clearing either a new or an acting IG.
One of the things Brenner instituted — the report claims it started almost a year after he came in and more than 6 months after he got read into the program — was to make the IOB reports technically correct by stating that there might be incidents not noticed to IOB but instead noticed to the President.
(C) Second, in March 2003, the IG advised General Hayden that he should report violations of the Authorization to the President. In February of 2003, the OIG learned of PSP incidents or violations that had not been reported to overseers as required, because none had the clearance to see the report.
(TS//SI//OC/NF) Before March 2003, NSA quarterly reports on intelligence activities sent to the President’s Intelligence Oversight Board (through the Assistant to the Secretary of Defense for Intelligence Oversight) stated that the Director was not aware of any unlawful surveillance activities by NSA other than that described in the report. Beginning in March 2003, at the IG’s direction, NSA quarterly reports stated that except as disclosed to the President, the Director was not aware of any unlawful surveillance activities by NSA. Also beginning in March 2003, PSP violations, including those not previously reported to the Intelligence Oversight Board, were reported in “Presidential Notifications.”
But that’s actually not correct. The change appears in the December 4, 2002 report.
If the remaining chronology is correct — that Brenner had not yet convinced Hayden to tell the President about violations and that there were some February 2003 violations that did not get reported — then the December 2002 report was inaccurate, because the President would not have been noticed.
What I find interesting about it is how signatures were handled before that. In the June 2002 report — at a time when Brenner was not read into the program — he signed the report himself. In the August 27, 2002 report (which was presumably submitted just after Brenner got read into Stellar Wind), Brian McAndrew, who had been Acting IG before Brenner took over, signed for him.
And, in perhaps related metadata, there’s this, from the December 2001 report (that is, the first one after the initiation of Stellar Wind).
I think, though am not certain, this note comes from Michael Hayden (with an “H” in the circle), to whom the memo is addressed. He appears to have asked Robert Deitz to discuss the implications of this notice further before he signed it. And someone amended the notice, to include violations known to affiliated (agency?) directors but not to Hayden.
That is, it seems possible that even Michael Hayden hesitated to say this report included all violations of law without Robert Deitz (who has written some robust defenses of NSA since the Snowden leaks) holding his hand somewhat.
Update: Note that the coversheet with Hayden’s note was initially dated December 7, 2001. But the date on the letter he signed was January 4, 2002. That suggests they could have actually changed the content of the letter in response to Hayden’s concerns, though such a delay appears normal given the other reports.
Of course, this entire structure is premised on the caveat that the President can instruct agency heads not to include violations he doesn’t want them to. And the gaming of some signatures to avoid making false declarations is child’s play compared to what Obama did at the beginning of his Administration, which was basically to let the entire board lapse by not appointing anyone.
Still, the games they were playing with their declarations suggests these men — who’ve made broad comments about how well NSA follows the law — know they were fibbing.
In awesome news, the Federal Trade Commission has hired Ashkan Soltani — the tech expert who helped Bart Gellman on many of his most important Snowden scoops — as its new Chief Technology Officer.
The news has elicited wails from NSA’s mail mouthpieces, Stewart Baker and Michael Hayden.
“I’m not trying to demonize this fella, but he’s been working through criminally exposed documents and making decisions about making those documents public,” said Michael Hayden, a former NSA director who also served as CIA director from 2006 to 2009. In a telephone interview with FedScoop, Hayden said he wasn’t surprised by the lack of concern about Soltani’s participation in the Post’s Snowden stories. “I have no good answer for that.”
Stewart Baker, a former NSA general counsel, said, while he’s not familiar with the role Soltani would play at the FTC, there are still problems with his appointment. “I don’t think anyone who justified or exploited Snowden’s breach of confidentiality obligations should be trusted to serve in government,” Baker said.
I find Hayden’s wails especially disgusting, given the way — it is now clear — the government spent so much effort covering up how he extended the illegal wiretap program in March 2004. I mean, I’m not trying to demonize the fella, but he’s a criminal, and yet he’s complaining about the press reporting on abuses?
That said, I’m curious whether this isn’t the real reason there seems to be organized pushback against Soltani’s hire.
Soltani is scheduled to give a presentation Nov. 19 at the Strata+Hadoop World conference in Barcelona, Spain, on “how commercial tracking enables government surveillance.” According to the conference website, Soltani’s presentation will explore how “the dropping costs of bulk surveillance is aiding government eavesdropping, with a primary driver being how the NSA leverages data collected by commercial providers to collect information about innocent users worldwide.”
At FTC, Soltani will be in a role where he can directly influence the kind of regulatory pressure placed on data collectors to protect user privacy. He understands — probably far more than we know from the WaPo stories — how NSA is capitalizing on already collected data. Which means he may be able to influence how much remains available to the spooks.
So maybe all this wailing is an effort to sustain the big commercial data’s unwitting support for big spooky data?