Posts

Five Questions for John Brennan

I’m sure I could grill John Brennan for hours. But after a lot of thought, here are the five questions I believe most important that should be asked of him Today.

1) Do you plan to continue lying to Americans?

You have made a number of demonstrable lies to the American people, particularly regarding the drone program and the Osama bin Laden raid. Most egregiously in 2011, you claimed “there hasn’t been a single collateral death” in almost a year from drone strikes; when challenged, you revised that by saying, “the U.S. government has not found credible evidence of collateral deaths,” even in spite of a particularly egregious case of civilian deaths just months earlier. On what basis did you make these assertions? What definition of civilian were you using in each assertion? (More background)

In addition, in a speech purportedly offering transparency on the drone program, you falsely suggested we know the identities of all people targeted by drones. Why did you choose to misrepresent the kind of intelligence we use in some strikes?

2) What was the intelligence supporting the first attempt to kill Anwar al-Awlaki?

The US government’s first attempt to kill Anwar al-Awlaki with a drone strike was December 24, 2009. WikiLeaks cables make it clear that Awlaki was a primary target of that strike, not just intended collateral damage. Yet the Webster report makes clear that on that day — that is, until the Underwear Bomber attempt the next day — the Intelligence Community did not consider Awlaki to be operational. Thus, the strike seems to have been approved before he fulfilled the criteria of the white paper released the other day, which authorizes the targeting of senior operational leaders of groups like AQAP. What was the legal basis for targeting this American citizen at a time when the IC did not believe him to be operational? (More background)

3) Will your close friendships with Saudis cloud your focus on the US interest?

In a fawning profile the other day, Daniel Klaidman nevertheless laid out the following points:

  • You considered Yemen to be a “domestic conflict.”
  • You opposed signature strikes in the country.
  • You nevertheless approved signature strikes in Yemen because of personal entreaties from people you know from when you were stationed on the Arabian peninsula in the 1990s.

In addition, recent reports have confirmed that the drone strike that killed Anwar al-Awlaki was launched from Saudi territory.

Were the personal entreaties you responded to from Yemenis or Saudis (or both)?

What role did the Saudis have in the Awlaki strike? Did they have an operational role?

As someone with such close ties to liaison sources, how have you and will you manage to prioritize the interests of the United States over the interests of friends you have from two decades ago?

To what degree is your intelligence sharing — especially with the Saudis — a stovepipe that creates the same risks of intelligence failures that got us into the Iraq War? (More background)

4) What role did you have in Bush’s illegal wiretap program?

The joint Inspector General report on the illegal wiretap program reported that entities you directed — the Terrorist Threat Integration Center in 2003 and 2004, and the National Counterterrorism Center in 2004 and 2005 — conducted the threat assessments for the program.

What role did you have, as the head of these entities, in the illegal wiretapping of Americans? To what extent did you know the program violated FISA? What role did you have in counseling Obama to give telecoms and other contractors immunity under the program? What influence did you have in DOJ decisions regarding suits about the illegal program, in particular the al-Haramain case that was thrown out even after the charity had proved it had been illegally wiretapped? Did you play any role in decisions to investigate and prosecute whistleblowers about this and other programs, notably Thomas Drake? (More background)

5) Did you help CIA bypass prohibitions on spying domestically with the NYPD intelligence (and other) programs?

In your additional prehearing questions, you admit to knowing about CIA’s role in setting up an intelligence program that profiled Muslims in New York City. What was your role in setting up the program? As someone with key oversight over personnel matters at the time, did you arrange Larry Sanchez’ temporary duty at the NYPD or CIA training for NYPD detectives?

Have you been involved in any similar effort to use CIA resources to conduct domestic spying on communities of faith? You said the CIA provides (among other things) expertise to local groups spying on Americans. How is this not a violation of the prohibition on CIA spying on Americans?  (More background)

Update: I realized that I have left out a caveat in Brennan’s drone lies — he was talking in the previous year. I’ve fixed that.

John Brennan: Not only Drone Assassination Czar, But Eliminate American Privacy Czar

The most interesting line of this WSJ article–describing the dissent to the Administration’s plan to give the National Counterterrorism Center any government database it wants for five years–is this one.

Mr. Brennan considered the arguments. And within a few days, the attorney general, Eric Holder, had signed the new guidelines.

The story suggests that the way the Administration resolved objections from people within Department of Homeland Security (as well as DOJ) to giving NCTC Americans’ flight data in ways they hadn’t been informed of when the data was collected was to have a meeting at the White House Situation Room at which John Brennan would decide whether to heed those objections.

John Brennan. Not the President, not the Attorney General, not even National Security Advisor Tom Donilon, but instead John Brennan (not coincidentally, a former contractor on data mining and before that in charge of targeting for Dick Cheney’s illegal wiretap program).

Much of the rest of the story rehearses what I reported (among other places) here and here and here and here. It describes how the NCTC will have access to any database it claims contains terrorist information.

What’s new in this story is the reason NCTC demanded a policy granting them broad access to these databases–because it had not complied with an agreement made with DHS regarding one of its databases.

Late last year, for instance, NCTC obtained an entire database from Homeland Security for analysis, according to a person familiar with the transaction. Homeland Security provided the disks on the condition that NCTC would remove all innocent U.S. person data after 30 days.

After 30 days, a Homeland Security team visited and found that the data hadn’t yet been removed. In fact, NCTC hadn’t even finished uploading the files to its own computers, that person said. It can take weeks simply to upload and organize the mammoth data sets.

Homeland Security granted a 30-day extension. That deadline was missed, too. So Homeland Security revoked NCTC’s access to the data.

To fix problems like these that had cropped up since the Abdulmutallab incident, NCTC proposed the major expansion of its powers that would ultimately get debated at the March meeting in the White House. [my emphasis]

And it describes how, primarily, former DHS Privacy Officer Mary Ellen Callahan fought the changes.

In May 2011, Ms. Callahan and Ms. Schlanger raised their concerns with the chief of their agency, Janet Napolitano. They fired off a memo under the longwinded title, “How Best to Express the Department’s Privacy and Civil Liberties Concerns over Draft Guidelines Proposed by the Office of the Director of National Intelligence and the National Counterterrorism Center,” according to an email obtained through the Freedom of Information Act. The contents of the memo, which appears to run several pages, were redacted.

The two also kept pushing the NCTC officials to justify why they couldn’t search for terrorism clues less invasively, these people said.

[snip]

To resolve the issue, Homeland Security’s deputy secretary, Jane Holl Lute, requested the March meeting at the White House.

[snip]

Ms. Callahan argued that the rules would constitute a “sea change” because, whenever citizens interact with the government, the first question asked will be, are they a terrorist?

It also describes how all these people who not only championed privacy, but also pointed out our targeting failures in the past came from not investigating quickly, not lacking the data to find those people.

This feels very similar to the same argument that Thomas Drake fought at NSA. He, like these former DHS and DOJ people, fought for a way to find terrorists that didn’t also infringe on the privacy of Americans. And he, like these DHS people, was overruled.

The difference, of course, is that this abuse of privacy came under Barack Obama, who never seems to get criticized for showing the same disdain for privacy that Dick Cheney did.

Though, insofar as John Brennan is making all the decisions in Obama’s war on terror, I’m not sure there’s a real difference between the two.

The Sexy-Time Exception to Retaining Classified Information

Last night, WaPo reported that the FBI is still trying to figure out how Paula Broadwell got classified information they found on her computer and–it looks like–in her home.

The FBI is making a new push to determine how a woman who had an affair with retired Gen. David H. Petraeus when he was CIA director obtained classified files, part of an expanding series of investigations in a scandal that also threatens the career of the United States’ top military commander in Afghanistan.

Senior law enforcement officials said that a late-night seizure on Monday of boxes of material from the North Carolina home of Paula Broadwell, a Petraeus biographer whose affair with him led to his resignation last week, marks a renewed focus by investigators on sensitive material found in her possession.

“The issue of national security is still on the table,” one U.S. law enforcement official said. Both Petraeus and Broadwell have denied to investigators that he was the source of any classified information, officials said.

The surprise move by the FBI follows assertions by U.S. officials that the investigation had turned up no evidence of a security breach — a factor that was cited as a reason the Justice Department did not notify the White House before last week that the CIA director had been ensnared in an e-mail inquiry.

As the WaPo correctly points out, this new investigative push is surprising, because the FBI has already been blabbing for several days that no charges would be filed.

Which is why I find it strange that Matthew Miller made this claim in a column arguing the FBI has handled the Petraeus investigation properly:

In this case, it appears the Department of Justice and Federal Bureau of Investigation handled the matter entirely in keeping with those rules and precedents. And, importantly, they passed the most crucial test faced whenever the department investigates a senior member of the existing administration: They conducted the entire investigation without playing favorites and without a hint of political interference.

While it’s not the central thrust of Miller’s piece (whether or not Congress should have been informed is), it’s too soon to know whether DOJ is playing favorites or not. But up until this latest report from WaPo, it appeared they were playing favorites.

After all, DOJ charged people–like Thomas Drake–for retaining unclassified information, information he had been directed by the Inspector General to retain. DOD charged Bradley Manning with retaining classified information.

Retaining classified information improperly is a crime, even if you have clearance to view the information.

Sure, it’s usually used as a proxy for other crimes for which no evidence exists. Or, in the case of Drake, in an effort to get him to plead guilty to other crimes.

But if DOJ is going to use it as a tool to persecute leakers, there is no reason it should exempt General Petraeus’ one-time mistress.

I’m not saying I want Broadwell to be charged, nor am I saying I think DOJ’s use of such charges in the past is proper. But that’s the problem with witch hunts, isn’t it? They either stick out as arbitrary political prosecutions, or they set a standard that few in the national security establishment could meet.

Update: Ut oh. Broadwell might get herself in trouble after all.

A computer used by Paula Broadwell, the woman whose affair with CIA director General David Petraeus led to his resignation, contained substantial classified information that should have been stored under more secure conditions, law enforcement and national security officials said on Wednesday.

The contents of the classified material and how Broadwell acquired it remain under investigation, said the officials. They spoke on condition of anonymity because they are not authorized to comment publicly.

But the quantity of classified material found on the computer was significant enough to warrant a continuing investigation, the officials told Reuters.

Though it sounds like they’re only contemplating stripping her security clearance.

Law enforcement officials also have said that they believe the continuing FBI probe into the matter is likely to end without criminal charges. If Broadwell is found to have mishandled classified information, she could face action under administrative security regulations.

Which would mean they’re striking a middle ground between treating her as they’ve treated others and retaliating against her for getting the sainted Petraeus in trouble (because of course grown men never get themselves in trouble).

Update: CNN now reporting that Broadwell has had her security clearance revoked.

Did Michael Hayden Pick the Contractor for Mitt’s Voter Turnout Website?

A lot of people are laughing at this account of Mitt Romney’s ORCA–and automated GOTV tracking system. Rather than the efficient new system that would leapfrog Obama’s turnout machine, the system crashed even before the evening rush started.

The entire purpose of this project was to digitize the decades-old practice of strike lists. The old way was to sit with your paper and mark off people that have voted and every hour or so, someone from the campaign would come get your list and take it back to local headquarters. Then, they’d begin contacting people that hadn’t voted yet and encourage them to head to the polls. It’s worked for years.

From the very start there were warning signs. After signing up, you were invited to take part in nightly conference calls. The calls were more of the slick marketing speech type than helpful training sessions. There was a lot of “rah-rahs” and lofty talk about how this would change the ballgame.

Working primarily as a web developer, I had some serious questions. Things like “Has this been stress tested?”, “Is there redundancy in place?” and “What steps have been taken to combat a coordinated DDOS attack or the like?”, among others. These types of questions were brushed aside (truth be told, they never took one of my questions). They assured us that the system had been relentlessly tested and would be a tremendous success.

[snip]

Now a note about the technology itself. For starters, this was billed as an “app” when it was actually a mobile-optimized website (or “web app”). For days I saw people on Twitter saying they couldn’t find the app on the Android Market or iTunes and couldn’t download it. Well, that’s because it didn’t exist. It was a website. This created a ton of confusion. Not to mention that they didn’t even “turn it on” until 6AM in the morning, so people couldn’t properly familiarize themselves with how it worked on their personal phone beforehand.

[snip]

From what I understand, the entire system crashed at around 4PM.

FWIW, Obama’s campaign had two innovations from 2008 this year. For vote trackers–the same purpose as this website was supposed to serve–they had bar code labels for each voter that the tracker would collect on a sheet to be picked up; I assume–but did not see–someone came and picked up those labels and used them later in the day.

Read more

Michael Hayden, Privacy and Counterterrorism Frugality Champion

Of 1,423 words in an article questioning whether deficit hawkery might cut the domestic spying budget, Scott Shane devotes over a sixth–roughly 260–describing what former NSA and CIA Director Michael Hayden thinks about the balances between funding and security.

Remarkably, none of those 260 words disclose that Hayden works for Michael Chertoff’s consulting group, which profits off of big domestic spying. This, in an article that cites Chertoff’s electronic border fence among the expensive counterterrorism duds that were subsequently shut down (Shane mentions “puffer” machines as well, but not the Rapiscan machines that Chertoff’s group lobbied for, which are now being withdrawn as well).

And then there’s a passage of Shane’s article that touches on topics in which Hayden’s own past actions deserve disclosure.

Like other intelligence officials after 2001, Mr. Hayden was whipsawed by public wrath: first, for failing to prevent the Sept. 11 attacks, and then, a few years later, for having permitted the National Security Agency to eavesdrop on terrorism suspects in the United States without court approval.

Perhaps, as a result, he often says that the American people need to instruct the government on where to draw the line. He told an audience at the University of Michigan last month, for instance, that while a plot on the scale of the Sept. 11 attacks was highly unlikely, smaller terrorist strikes, like the shootings by an Army psychiatrist at Fort Hood in Texas in 2009, could not always be stopped.

“I can actually work to make this less likely than it is today,” Mr. Hayden said. “But the question I have for you is: What of your privacy, what of your convenience, what of your commerce do you want to give up?”

To be fair, Shane counters Hayden’s claims by noting that “secrecy … makes it tough for any citizen to assess counterterrorism programs.”

But he doesn’t mention one of the biggest examples where Hayden–where anyone–chose both the most expensive and most privacy invasive technology: the wiretap program Hayden outsourced to SAIC rather than use in-house solutions.

As Thomas Drake has made clear, by outsourcing to SAIC, Hayden spent 300 times as much as he would have with the in-house solution.

One of them was Lieutenant General Michael Hayden, the head of the agency: he wanted to transform the agency and launched a massive modernization program, code named: “Trailblazer.” It was supposed to do what Thin Thread did, and more.

Trailblazer would be the NSA’s biggest project. Hayden’s philosophy was to let private industry do the job. Enormous deals were signed with defense contractors. [Bill] Binney’s Thin Thread program cost $3 million; Trailblazer would run more than $1 billion and take years to develop.

“Do you have any idea why General Hayden decided to go with Trailblazer as opposed to Thin Thread, which already existed?” Pelley asked.

[snip]

Asked to elaborate, Drake said, “Careers are built on projects and programs. The bigger, the better their career.” [my emphasis]

Along the way, Hayden repeatedly blew off Congressional staffer Diane Roark’s inquiries about privacy protection.

When Binney heard the rumors, he was convinced that the new domestic-surveillance program employed components of ThinThread: a bastardized version, stripped of privacy controls. “It was my brainchild,” he said. “But they removed the protections, the anonymization process. When you remove that, you can target anyone.” He said that although he was not “read in” to the new secret surveillance program, “my people were brought in, and they told me, ‘Can you believe they’re doing this? They’re getting billing records on U.S. citizens! They’re putting pen registers’ ”—logs of dialled phone numbers—“ ‘on everyone in the country!’ ”

[snip]

[Former HPSCI staffer Diane Roark] asked Hayden why the N.S.A. had chosen not to include privacy protections for Americans. She says that he “kept not answering. Finally, he mumbled, and looked down, and said, ‘We didn’t need them. We had the power.’ He didn’t even look me in the eye. I was flabbergasted.” She asked him directly if the government was getting warrants for domestic surveillance, and he admitted that it was not. [my emphasis]

So it’s not just disclosure of all the ways Hayden has and does profit off of continued bloated domestic surveillance that Shane owes his readers: he also should refute Hayden’s claims about the relationship between cost, privacy, and efficacy.

Michael Hayden’s SAIC-NSA boondoggle is one case where secrecy no longer hides how much money was wasted for unnecessary privacy violations.

Yet somehow, that spectacular example of the unnecessary waste in domestic spying doesn’t make it into the 260 words granted to Hayden to argue we need continued inflated spending.

Jay Bybee Wrote Memo Permitting Broad Sharing of Intelligence-Related Grand Jury Information

In March 2011, I noted a previously unreleased OLC memo mentioned in Jack Goldsmith’s May 6, 2004 illegal wiretapping memo seemingly giving the President broad authority to learn about grand jury investigations.

For example, this Office has concluded that, despite statutory restrictions upon the use of Title III wiretap information and restrictions on the use of grand jury information under Federal Rule of Criminal Procedure 6(e), the President has an inherent constitutional authority to receive all foreign intelligence information in the hands of the government necessary for him to fulfill his constitutional responsibilities and that statutes and rules should be understood to include an implied exception so as not to interfere with that authority. See Memorandum for the Deputy Attorney General from Jay S. Bybee, Assistant Attorney General, Office of Legal Counsel, Re: Effect of the Patriot Act on Disclosure to the President and Other Federal Officials of Grand Jury and Title III Information Relating to National Security and Foreign Affairs 1 (July 22, 2002)

The Brennan Center has now liberated that memo (though they don’t yet have it linked). And it shows that in July 2002, Jay Bybee interpreted a section of the PATRIOT Act that expanded information-sharing to include sharing grand jury information, with no disclosure, with the President and his close aides.

The notion that grand jury testimony should be secret dates back to at least the seventeenth century. The rules governing disclosure of grand jury proceedings are set by the Federal Rules of Criminal Procedure; prior to the PATRIOT Act, those rules declared that grand jury information could be shared only under certain circumstances, such as when the material was necessary to assist a prosecutor. However, disclosures had to be reported to a judge, and everyone receiving the information had to be told of its confidentiality.

The PATRIOT Act changed these rules significantly. Government lawyers could now share “any grand-jury matter involving foreign intelligence, counterintelligence …, or foreign intelligence information” with nearly any federal official, including those working in law enforcement, intelligence, immigration, national defense, or national security. Even records about a grand jury’s deliberations or a particular grand juror’s vote were apparently fair game. And the standard for sharing the information was not whether the material was “necessary” to the official’s duties; instead, the information need only “assist” the official in some way.

[snip]

First, although the rule expressly requires that disclosures of grand jury information be reported to the court, Bybee advised that disclosures to the president need not be reported lest they “infringe on the presumptively confidential nature of presidential communications.” (OLC had previously decided that similar disclosures to the president would be reportable in some circumstances but not in others.)  In addition, disclosures to the president’s “close advisors” – including the president’s chief of staff, the vice president, and counsel to the president – could be kept secret as well. While only “information that is actually necessary for the President to discharge his constitutional duties” could be secretly disclosed to the president or his advisors, that requirement is highly unlikely to be tested in practice.

Permitting the content of deliberations or a grand juror’s vote to be shared secretly with the vice president is surprising enough.  The memo goes much further, however.  Once an attorney for the government has shared grand jury information with anyone – the president, one of his close advisors, or any other federal official whose duties are listed above – the person receiving the information can share it with anyone else without reporting to the court.  That later disclosure, according to the memo’s crabbed reasoning, is not a disclosure “under” the rule, and therefore is not bound by the reporting requirement.

And there’s more: the recipient of one of those subsequent distributions can use the information for any purpose.  Because these down-the-line releases are not technically disclosures “under” the rule, the “official duties” constraint does not apply.

I’ll have more to say about this once I get the memo.

But imagine how it might be used in, say, the Valerie Plame or the Thomas Drake investigations. They were, after all, investigations about the unauthorized disclosure of foreign intelligence information. They also happened to be investigations into Dick Cheney’s law-breaking, but they were ostensibly about leaks of precisely the kind of information Jay Bybee permitted be shared with the President and … the Vice President. And in the case of the Plame leak, once Cheney got a hold of the information, he could share it with Karl Rove who could do whatever the fuck he wanted with it.

Mind you, once Pat Fitzgerald got put in charge, I doubt such sharing happened on the Plame case–at least not before August 2005, when Jim Comey retired. After that, who’s to say what David Margolis, the master of institutional self-preservation, might have done with grand jury information implicating top White House officials?

And, yes, by all appearances, this memo remains operative.

Update: Here’s the memo. And here’s the operative passage:

 Although the new provision in Rule 6(e) requires that any such disclosures be reported to the district court responsible for supervising the grand jury, disclosures made to the President fall outside the scope of the reporting requirement contained in that amendment, as do related subsequent disclosures made to other officials on the President’s behalf.

Bittersweet Justice for Bradley Birkenfeld

Today, the IRS awarded whistleblower Bradley Birkenfeld $104 million to reward him for having exposed UBS’ methods of helping US tax cheats hide their loot, tax free, in Switzerland.

It’s a bittersweet award, I’m sure. As Birkenfeld’s lawyer, Stephen Kohn, reminded at the ceremony, Birkenfeld was imprisoned by the Obama Administration for fraud in spite of what now is clear confirmation he acted as a whistleblower; he got out early on August 1 from his 40 month sentence.

The IRS reward will help undo the tremendous damage caused by the ill-conceived decision of the U.S. Department of Justice to ignore the whistleblower laws and prosecute Mr. Birkenfeld. Mr. Birkenfeld was the only UBS banker to blow the whistle and the only UBS banker to be prosecuted. By doing so the DOJ sent the wrong message to international bankers. They caused a chilling effect on the willingness of employees in the international banking industry with direct knowledge of illegal offshore banking practices to step forward to report these crimes.

The National Whistleblower Center carefully investigated the basis upon which the DOJ justified its prosecution. The DOJ did not tell the truth about Mr. Birkenfeld. At his sentencing hearing, the DOJ justified its decision to indict Mr. Birkenfeld based on its position that Mr. Birkenfeld had failed to inform the government about the illegal activities of his largest client, billionaire Igor Olenicoff.

But this charge against Mr. Birkenfeld was false and defamatory. The NWC carefully reviewed court records concerning the Olenicoff case, internal emails regarding Mr. Birkenfeld’s disclosures, and a confidential transcript of sworn testimony Mr. Birkenfeld provided to the U.S. Senate in 2007 about the illegal activities of Mr. Olenicoff. These materials absolutely verify that Mr. Birkenfeld did in fact blow the whistle on Mr. Olenicoff, and that the charges made by the DOJ were false. The NWC finds it very troubling that the prosecutor who leveled these charges in court against Mr. Birkenfeld has left his government job and taken a position with a major law firm that defends tax cheats. The DOJ also granted immunity to the top-ranking official at UBS who was responsible for the UBS tax frauds and permitted this official, Martin Liechti, to leave the United States and obtain safe-haven in Switzerland where, to this day, he has escaped justice. Mr. Liechti invoked the 5th amendment in testimony before the U.S. Senate.

There’s even a WikiLeaks cable suggesting we prosecuted Birkenfeld as a favor to the Swiss.

And it’s not just Birkenfeld who has gotten limited justice out of this–though obviously he is by far the worst off. While the IRS got over $5 billion in owed taxes as a result of his whistleblowing, no one else went to prison, not even the several individuals about whom specifically Birkenfeld blew the whistle. And a bunch of rich people–potentially including a Presidential candidate–enjoyed an amnesty that didn’t even require them to admit they had been cheating their country.

In short, like so much else with the Obama Administration, it’s an example where the real criminals go free while the whistleblowers get prosecuted.

Appeals Court Treats Commissary Gatorade Supplies as a “Clear and Present Danger”

Navy v. Egan–the SCOTUS case Executive Branch officials always point to to claim unlimited powers over classification authority–just got bigger.

Berry v. Conyers extends the national security employment veto over commissary jobs

The original 1988 case pertained to Thomas Egan, who lost his job as a laborer at a naval base when he was denied a security clearance. He appealed his dismissal to the Merit Systems Protection Board, which then had to determine whether it had authority to review the decision to fire him based on the security clearance denial. Ultimately, SCOTUS held that MSPB could not review the decision of the officer who first fired Egan.

The grant or denial of security clearance to a particular employee is a sensitive and inherently discretionary judgment call that is committed by law to the appropriate Executive Branch agency having the necessary expertise in protecting classified information. It is not reasonably possible for an outside, nonexpert body to review the substance of such a judgment, and such review cannot be presumed merely because the statute does not expressly preclude it.

Unlike Egan, the plaintiffs in this case did not have jobs that required they have access to classified information. Nevertheless, plaintiffs Rhonda Conyers (who was an accounting clerk whose “security threat” pertained to personal debt) and Devon Haughton Northover (who worked in a commissary and also charged discrimination) were suspended and demoted, respectively, when the government deemed them a security risk.

In a decision written by Evan Wallach and joined by Alan Lourie, the Federal Circuit held that the Egan precedent,

require[s] that courts refrain from second-guessing Executive Branch agencies’ national security determinations concerning eligibility of an individual to occupy a sensitive position, which may not necessarily involve access to classified information.

That is, the Federal government can fire you in the name of national security if you have a “sensitive” job, whether or not you actually have access to classified information.

As Timothy Dyk’s dissent notes, the effect of this ruling is to dramatically limit civil service protections for any position the government deems sensitive, both within DOD–where both Conyers and Northover work–and outside it.

Under the majority’s expansive holding, where an employee’s position is designated as a national security position, see 5 C.F.R. § 732.201(a), the Board lacks jurisdiction to review the underlying merits of any removal, suspension, demotion, or other adverse employment action covered by 5 U.S.C. § 7512.

[snip]

As OPM recognizes, under the rule adopted by the majority, “[t]he Board’s review . . . is limited to determining whether [the agency] followed necessary procedures . . . [and] the merits of the national security determinations are not subject to review.”

In doing so, the dissent continues, it would gut protection against whistleblower retaliation and discrimination.

As the Board points out, the principle adopted by the majority not only precludes review of the merits of adverse actions, it would also “preclude Board and judicial review of whistleblower retaliation and a whole host of other constitutional and statutory violations for federal employees subjected to otherwise appealable removals and other adverse actions.” Board Br. at 35. This effect is explicitly conceded by OPM, which agrees that the agency’s “liability for damages for alleged discrimination or retaliation” would not be subject to review. OPM Br. at 25. OPM’s concession is grounded in existing law since the majority expands Egan to cover all “national security” positions, and Egan has been held to foreclose whistleblower, discrimination, and other constitutional claims.

Tracking Gatorade supplies can now represent a “clear and present danger”

There are a couple of particularly troubling details about how Wallach came to his decision. In a footnote trying to sustain the claim that a commissary employee might be a national security threat, Wallach argues that Northover could represent a threat in the commissary by observing how much rehydration products and sunglasses service members were buying.

The Board goes too far by comparing a government position at a military base commissary to one in a “Seven Eleven across the street.”

[snip]

Commissary employees do not merely observe “[g]rocery store stock levels” or other-wise publicly observable information. Resp’ts’ Br. 20. In fact, commissary stock levels of a particular unclassified item – sunglasses, for example, with shatterproof lenses, or rehydration products – might well hint at deployment orders to a particular region for an identifiable unit. Read more

Using Pensions to “Punish” “Leaks” Will Subject Clearance Holders to Arbitrary Power

The Senate Intelligence Committee’s new anti-leak laws are the part of the Intelligence Authorization that will generate the most attention. Greg Miller already got Dianne Feinstein to admit there’s no reason to think one of the new provisions–permitting only the most senior intelligence officials to do background briefings–will limit leaks.

Feinstein acknowledged that she knew of no evidence tying those leaks or others to background sessions, which generally deal broadly with analysts’ interpretations of developments overseas and avoid discussions of the operations of the CIA or other spy services.

Another of the provisions–requiring intelligence committee heads to ensure that every sanctioned leak be recorded–ought to be named the Judy Miller and Bob Woodward Insta-Leak Recording Act.

(a) RECORD REQUIREMENT.—The head of each element of the intelligence community shall ensure that such element creates and maintains a record of all authorized disclosures of classified information to media personnel, including any person or entity under contract or other binding agreement with the media to provide analysis or commentary, or to any person or entity if the disclosure is made with the intent or knowledge that such information will be made publicly available.

I’m sure someone can think of some downside to this provision, but I can’t think of it at the moment (which is why Obama will probably find some way to eliminate it). It will end some of the asymmetry and abuse of classification as it currently exists.

In addition, there are a bunch of provisions that are just dumb bureaucracy.

But it’s this one that is deeply troubling. Among the other provisions making nondisclosure agreements more rigorous is a provision that would allow an intelligence community head to take away a person’s pension if they “determine” that an individual violated her nondisclosure agreement.

Read more

FAA Extension: The Data Gaps about Our Data Collection

As I noted the other day, part of the point of the language Ron Wyden got declassified the other day seemed to be to call out a misrepresentation in Dianne Feinstein’s Additional Views in the Senate Intelligence Report on the extension of the FISA Amendments Act. DiFi had claimed that “the FISA Court … has repeatedly held that collection carried out pursuant to the Section 702 minimization procedures used by the government is reasonable under the Fourth Amendment.” She neglected to mention that, “on at least one occasion the Foreign Intelligence Surveillance Court held that some collection carried out pursuant to the Section 702 minimization procedures used by the government was unreasonable under the Fourth Amendment.”

But since Wyden pointed back to that language, I wanted to note something else in the paragraph in which DiFi’s misleading claim appears: She suggests there is substantial reporting on the program.

This oversight has included the receipt and examination of over eight assessments and reviews per year concerning the implementation of FAA surveillance authorities, which by law are required to be prepared by the Attorney General, the Director of National Intelligence, the heads of various elements of the intelligence community, and the Inspectors General associated with those elements. In addition, the Committee has received and scrutinized un- redacted copies of every classified opinion of the Foreign Intelligence Surveillance Court (FISA Court) containing a significant construction or interpretation of the law, as well as the pleadings submitted by the Executive Branch to the FISA Court relating to such opinions.

[snip]

Third, the numerous reporting requirements outlined above provide the Committee with extensive visibility into the application of these minimization procedures and enable the Committee to evaluate the extent to which these procedures are effective in protecting the privacy and civil liberties of U.S. persons. [my emphasis]

But in her sentence claiming the FISA Court keeps approving the program, she reveals that the Court is not getting all those reports.

Notably, the FISA Court, which receives many of the same reports available to the Committee, has repeatedly held that collection carried out pursuant to the Section 702 minimization procedures used by the government is reasonable under the Fourth Amendment.

[my emphasis]

The Court receives “many” of the same reports. Which suggests it doesn’t see all of them.

That comment is all the more interesting because of something Pat Leahy said at least week’s Senate Judiciary Committee mark-up of the bill.

Congress has been provided with information related to the implementation of the FISA Amendments Act, along with related documents from the FISA Court. Based on my review of this information, and after a series of classified briefings, I do not believe that there is any evidence that the law has been abused, or that the communications of U.S. persons are being intentionally targeted.

[snip]

My views about the implementation of these surveillance authorities are based on the information we have available now – but there is more that we need to know. For example, important compliance reviews have not yet been completed by the Inspectors General of the Department of Justice or the NSA. Read more