Vaughn Walker’s Chess Game: Sue the Telecoms Part One

In two earlier posts I laid out where Vaughn Walker seems to be going with the warrantless wiretapping cases. In this post, I’m going to consider his suggestion–made in his ruling rejecting a challenge to retroactive immunity–that the plaintiffs could sue the telecoms for activities after January 17, 2007 (note, Walker said January 7, but it’s almost certain he meant January 17).

Because, however, section 802’s immunity provision may only be invoked with regard to suits arising from actions authorized by the president between September 11, 2001 and January 7, 2007, the dismissal is without prejudice. On May 15, 2009, plaintiffs submitted a “notice of new factual authorities in support of
plaintiffs’ opposition to motion of the United States” to dismiss. Doc #627. In the notice, plaintiffs cite news articles published in 2009 reporting post-FISAAA warrantless electronic surveillance activities by the NSA. Plaintiffs argue that these articles constitute “proof that the certification of former Attorney General Michael Mukasey that is the sole basis for the government’s pending motion to dismiss is not supported by ‘substantial evidence.’” Doc #627 at 3. The court disagrees. The court believes that the Attorney General has adequately and properly invoked section 802’s immunity to the extent that the allegations of the master
consolidated complaints turn on actions authorized by the president between September 11, 2001 and January 7, 2007. The court also believes, however, that plaintiffs are entitled to an opportunity to amend their complaints if they are able, under the ever-morestringent pleading standards applicable in federal courts (see, e g, Ashcroft v Iqbal, ___ US ___, 129 S Ct 1937 (2009)), to allege causes of action not affected by the Attorney General’s successful invocation of section 802’s immunity.

EFF had submitted the recent Lichtblau and Risen article in support of their argument that they could sue for past abuses, and in response, Walker said, "Well, why don’t you sue for more recent abuses?" 

Is Walker serious? Does he really think there is means to do that?

The Recent History of the Wiretap Program and the Immunities

Let’s start by looking at the recent history of the mass wiretap program along with the immunities offered by Congress in 2007 and 2008.

January 10, 2007: FISA Court issues first order covering the program

January 17, 2007: Alberto Gonzales informs Congress FISA Court will now approve wiretap program

May 2007: FISA Court judge rejects Administration’s order for a basket warrant

May 15, 2007, 10 AM: Jim Comey testifies before Senate Judiciary Committee, describes Hospital confrontation

May 15, 2007, 10 AM: US Intelligence meets to discuss collecting more intelligence in case of kidnapped soldiers in Iraq

May 15, 2007, 12:53 PM: US Intelligence decides to wiretap, debates "novel and complicated issues" relating to wiretap

May 15, 2007, ~5 PM: US Intelligence seeks Alberto Gonzales approval for basket warrant

May 15, 2007, 7:38 PM: Wiretap begins 

August 5, 2007: Protect America Act becomes law; it authorizes:

Sec. 105B. (a) Notwithstanding any other law, the Director of National Intelligence and the Attorney General, may for periods of up to one year authorize the acquisition of foreign intelligence information concerning persons reasonably believed to be outside the United States if the Director of National Intelligence and the Attorney General determine, based on the information provided to them, that–

(1) there are reasonable procedures in place for determining that the acquisition of foreign intelligence information under this section concerns persons reasonably believed to be located outside the United States, and such procedures will be subject to review of the Court pursuant to section 105C of this Act;

(2) the acquisition does not constitute electronic surveillance;

(3) the acquisition involves obtaining the foreign intelligence information from or with the assistance of a communications service provider, custodian, or other person (including any officer, employee, agent, or other specified person of such service provider, custodian, or other person) who has access to communications, either as they are transmitted or while they are stored, or equipment that is being or may be used to transmit or store such communications;

(4) a significant purpose of the acquisition is to obtain foreign intelligence information; and

(5) the minimization procedures to be used with respect to such acquisition activity meet the definition of minimization procedures under section 101(h).

This determination shall be in the form of a written certification, under oath, supported as appropriate by affidavit of appropriate officials in the national security field occupying positions appointed by the President, by and with the consent of the Senate, or the Head of any Agency of the Intelligence Community, unless immediate action by the Government is required and time does not permit the preparation of a certification. In such a case, the determination of the Director of National Intelligence and the Attorney General shall be reduced to a certification as soon as possible but in no event more than 72 hours after the determination is made.

It provides for this cooperation from telecoms:

(e) With respect to an authorization of an acquisition under section 105B, the Director of National Intelligence and Attorney General may direct a person to–

(1) immediately provide the Government with all information, facilities, and assistance necessary to accomplish the acquisition in such a manner as will protect the secrecy of the acquisition and produce a minimum of interference with the services that such person is providing to the target; and

(2) maintain under security procedures approved by the Attorney General and the Director of National Intelligence any records concerning the acquisition or the aid furnished that such person wishes to maintain.

It includes this immunity for telecoms:

Notwithstanding any other law, no cause of action shall lie in any court against any person for providing any information, facilities, or assistance in accordance with a directive under this section.

February 18, 2008: PAA expires; orders under PAA may extend for one year

July 10, 2008: FISA Amendments Act becomes law; it authorizes:

(a) Authorization- Notwithstanding any other provision of law, upon the issuance of an order in accordance with subsection (i)(3) or a determination under subsection (c)(2), the Attorney General and the Director of National Intelligence may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.

(b) Limitations- An acquisition authorized under subsection (a)–

(1) may not intentionally target any person known at the time of acquisition to be located in the United States;

(2) may not intentionally target a person reasonably believed to be located outside the United States if the purpose of such acquisition is to target a particular, known person reasonably believed to be in the United States;

(3) may not intentionally target a United States person reasonably believed to be located outside the United States;

(4) may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States; and

(5) shall be conducted in a manner consistent with the fourth amendment to the Constitution of the United States.

It provides for this cooperation from telecoms:

(h) Directives and Judicial Review of Directives-

(1) AUTHORITY- With respect to an acquisition authorized under subsection (a), the Attorney General and the Director of National Intelligence may direct, in writing, an electronic communication service provider to–

(A) immediately provide the Government with all information, facilities, or assistance necessary to accomplish the acquisition in a manner that will protect the secrecy of the acquisition and produce a minimum of interference with the services that such electronic communication service provider is providing to the target of the acquisition; and

(B) maintain under security procedures approved by the Attorney General and the Director of National Intelligence any records concerning the acquisition or the aid furnished that such electronic communication service provider wishes to maintain.

It includes this immunity for telecoms:

(a) Requirement for Certification- Notwithstanding any other provision of law, a civil action may not lie or be maintained in a Federal or State court against any person for providing assistance to an element of the intelligence community, and shall be promptly dismissed, if the Attorney General certifies to the district court of the United States in which such action is pending that–

(1) any assistance by that person was provided pursuant to an order of the court established under section 103(a) directing such assistance;

(2) any assistance by that person was provided pursuant to a certification in writing under section 2511(2)(a)(ii)(B) or 2709(b) of title 18, United States Code;

(3) any assistance by that person was provided pursuant to a directive under section 102(a)(4), 105B(e), as added by section 2 of the Protect America Act of 2007 (Public Law 110-55), or 702(h) directing such assistance;

(4) in the case of a covered civil action, the assistance alleged to have been provided by the electronic communication service provider was–

(A) in connection with an intelligence activity involving communications that was–

(i) authorized by the President during the period beginning on September 11, 2001, and ending on January 17, 2007; and

(ii) designed to detect or prevent a terrorist attack, or activities in preparation for a terrorist attack, against the United States; and

(B) the subject of a written request or directive, or a series of written requests or directives, from the Attorney General or the head of an element of the intelligence community (or the deputy of such person) to the electronic communication service provider indicating that the activity was–

(i) authorized by the President; and

(ii) determined to be lawful; or

(5) the person did not provide the alleged assistance.

(b) Judicial Review-

(1) REVIEW OF CERTIFICATIONS- A certification under subsection (a) shall be given effect unless the court finds that such certification is not supported by substantial evidence provided to the court pursuant to this section.

(2) SUPPLEMENTAL MATERIALS- In its review of a certification under subsection (a), the court may examine the court order, certification, written request, or directive described in subsection (a) and any relevant court order, certification, written request, or directive submitted pursuant to subsection (d).

(c) Limitations on Disclosure- If the Attorney General files a declaration under section 1746 of title 28, United States Code, that disclosure of a certification made pursuant to subsection (a) or the supplemental materials provided pursuant to subsection (b) or (d) would harm the national security of the United States, the court shall–

(1) review such certification and the supplemental materials in camera and ex parte; and

(2) limit any public disclosure concerning such certification and the supplemental materials, including any public order following such in camera and ex parte review, to a statement as to whether the case is dismissed and a description of the legal standards that govern the order, without disclosing the paragraph of subsection (a) that is the basis for the certification.

(d) Role of the Parties- Any plaintiff or defendant in a civil action may submit any relevant court order, certification, written request, or directive to the district court referred to in subsection (a) for review and shall be permitted to participate in the briefing or argument of any legal issue in a judicial proceeding conducted pursuant to this section, but only to the extent that such participation does not require the disclosure of classified information to such party. To the extent that classified information is relevant to the proceeding or would be revealed in the determination of an issue, the court shall review such information in camera and ex parte, and shall issue any part of the court’s written order that would reveal classified information in camera and ex parte and maintain such part under seal.

How to Sue

The timeline shows there are four different categories of activities for which the telecoms might be sued for this program:

  • Surveillance that took place between January 17 and August 5, 2007 that violates FISA or ECPA (Note, Walker probably got the date wrong when he said EFF might sue for stuff after the retroactive immunity period ended on January 7, 2007–he almost certainly meant January 17 [corrected]) 
  • Surveillance that took place between August 5, 2007 and July 10, 2008 that does not comply with PAA 
  • Surveillance that took place after July 10, 2008 that does not comply with FAA
  • Surveillance that took place in one of the transition periods, particularly after PAA expired on February 18, 2008 but before FAA went into effect on July 10, 2008

January 17, 2007 to August 5, 2007

This is by far the most ripe period for suit for two reasons. First, this is a window in which telecoms have neither the retroactive immunity offered by FAA (which extends only to January 17, 2007) nor the immunity included in PAA and FAA for the activities authorized in those laws. Plus, we know there was a period around May 2007 in which the FISA Court did not immediately approve the basket warrant application submitted by the Bush Administration.

The key point to keep in mind, of course, is that a big chunk of the EFF suit against the telecoms pertains to Wiretap and Electronic Communication Privacy Act violations, not just FISA (go here for the relevant excerpts of the law). So the big question for this period is how the government required the telecoms to vacuum and data mine call data? If Walker believes the vacuumed data constitutes "content," then ECPA might require the collection to be tied to a criminal investigation, which it would not be. If Walker believes the vacuumed data is simply meta-data, then it might be enough to have an administrative subpoena (but this would have to be reported to Congress). And I’m not sure it is clear, yet, whether the metadata from emails (which is a lot of what we’re talking about) equates to metadata from phone calls. 

In other words, the surveillance that took place after immunity expired but before PAA and FAA legalized the broader surveillance program may be subject to suit under ECPA.

August 5, 2007 to July 10, 2008

Let’s build backwards from the immunity offered to telecoms to see whether there’s any exposure to liability during the period covered by PAA, because the big question (it seems to me) is whether or not the purported focus on foreign intelligence leaves room for suit. The telecoms get immunity "for providing any information, facilities, or assistance in accordance with a directive under this section." "Any information, facilities, or assistance" is pretty broad and may well cover the data mining of US person data culled directly from the networks, particularly since the authorization itself extends to requiring telecoms to give, "all information, facilities, and assistance necessary to accomplish the acquisition." I’m betting the government would argue that they needed everyone’s data to get the proper targeting of the ultimate targets of the wiretap. 

The question, though, is whether or not restriction against electronic surveillance would moot that? Or whether the ultimate focus on foreign intelligence would lead Judge Walker to narrowly interpret the phrase "any information, facilities, or assistance necessary to accomplish the acquisition?"

And it’s actually worse than that. With FAA, Congress made the immunity for PAA surveillance even broader, described as, "any assistance by that person was provided pursuant to a directive under section 102(a)(4), 105B(e), as added by section 2 of the Protect America Act of 2007." Again, there’s the question of whether the collection of US person data could be considered part of a directive under PAA that purportedly may target only foreign intelligence.

July 10, 2008 to present

The immunity for telecoms built into FAA is parallel to that under PAA–it extends immunity "for providing any information, facilities, or assistance in accordance with a directive under this section." There are just a few differences. First, the authorization in FAA more specifically prohibits the intentional targeting of US persons–though the use of "intentional" throughout is a pretty big loophole. And, more interestingly, the section requires surveillance "shall be conducted in a manner consistent with the fourth amendment to the Constitution of the United States." So there’s the possibility of challenging telecom immunity because the surveillance did not comply with the Fourth Amendment. I’ll explain why that might be important in a moment.

There’s one other new wrinkle with FAA, one that applies to all three of these periods. In the clause that also gives the Attorney General instructions for certifying the telecoms to quality for retroactive immunity, FAA gives the AG instructions for certifying that telecoms qualify for immunity under PAA or FAA. The review process is the same–the same crappy ex parte review that Judge Walker just upheld last week. 

With one difference.

For retroactive immunity, all Walker gets to review is whether the certifications given to the telecoms said the activity was authorized by the President and was legal (whether or not it was, in fact, legal). Walker just gets to review whether the certifications say what they are reported to say.

But for other immunity certifications, it seems that Walker will be able to review the certifications for whether or not they are supported by "substantial evidence." That is, Walker appears to have more extensive means to review whether the certifications actually comply with FAA, PAA, the Wiretap Act, or 18 USC270(b), which reads:

(b) Required Certification.— The Director of the Federal Bureau of Investigation, or his designee in a position not lower than Deputy Assistant Director at Bureau headquarters or a Special Agent in Charge in a Bureau field office designated by the Director, may— (1) request the name, address, length of service, and local and long distance toll billing records of a person or entity if the Director (or his designee) certifies in writing to the wire or electronic communication service provider to which the request is made that the name, address, length of service, and toll billing records sought are relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities, provided that such an investigation of a United States person is not conducted solely on the basis of activities protected by the first amendment to the Constitution of the United States; and

(2) request the name, address, and length of service of a person or entity if the Director (or his designee) certifies in writing to the wire or electronic communication service provider to which the request is made that the information sought is relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities, provided that such an investigation of a United States person is not conducted solely upon the basis of activities protected by the first amendment to the Constitution of the United States.

This is an important difference from the retroactive immunity, it seems to me, because Walker has more leeway to actualy rule on the legal comprehensiveness of those certifications, and not just on whether the certifications say what we know them to say. Plus, this part of FAA means that the Administration can’t invoke state secrets to prevent Walker’s review.

Mind you, Walker couldn’t actually tell us what he finds in his review, aside from whether or not he dismisses a suit. But again, that’s better than where we are with al-Haramain, in which the government claims Walker can’t even tell us whether the suit gets to go forward.

It’s still Kafkaesque. But it’s a better type of Kafkaesque.

I’m going to go ahead and post this, so the lawyers in the crowd can start telling me what a futile pursuit this would be. In the meantime, I’m going to do a last post on some reasons EFF might be able to make a claim.

image_print
30 replies
  1. Peterr says:

    There’s one other new wrinkle with FAA . . .

    That’s a helluva wrinkle, and I’m certain Walker is fully aware of it based on the conclusion to his ruling on retroactive immunity where he said “The court is prohibited by section 802(c)(2) from opining further. The United States’ motion to dismiss must therefore be, and hereby is, GRANTED. However . . .”

    He’s begging them to give him a case on which he can opine further — and I think he has a lot he’d like to say, most of which will displease the DOJ, DOD, NSA, CIA, and the folks at the law firm of Cheney, Addington, Yoo, and Associates.

    • emptywheel says:

      That’s what I’m thinking.

      I’m actually agnostic on which of these three opportunities he sees an opening in. I guess EFF ought to just refile listing how the vacuum violates the law under all three of these regimes, to see what sticks (and they’ve got about 25 more days to do so). I think the govt is VERY exposed during the January 17 through PAA phase.

      It’s also worth noting that EFF and the govt are looking at two different parts of ECPA. EFF is looking at language which requires criminal investigation, the govt is looking at a counterintelligence purpose.

    • klynn says:

      He’s begging them to give him a case on which he can opine further — and I think he has a lot he’d like to say, most of which will displease the DOJ, DOD, NSA, CIA, and the folks at the law firm of Cheney, Addington, Yoo, and Associates.

      That “However…” I think is more of an “informing” not begging… More of a, “By the way folks, this is the bottom line, get ready.”

  2. lurkinlil says:

    question: in 1st paragraph, you say January 17 as what judge meant, but under HOW TO SUE, to say January 27 ??

      • freepatriot says:

        Ah jeebus. I don’t think either one of us can write that date correctly.

        thas why we’re gonna hire ya a “stunt double blogger”

        to handle the dangerous stuff …

        (duckin an runnin)

  3. WilliamOckham says:

    There’s going to be a whole lot riding on the interpretation of this phrase:

    may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States

    [My emphasis]

    I don’t think the legislation writers thought this one through. ‘Intentionally acquire’ does not equal ‘target’ and ‘time of acquisition’ does not equal ‘time of communication’. When you suck up call data records (which are still communication according to FISA) on domestic calls, you are intentionally acquiring communications of folks in the U.S. I can’t wait to see the DOJ argue that 150 million subscribers could have all been overseas at once.

    • emptywheel says:

      I’m not certain the call data is communication per FISA. The definition of “content” and “communication” are clearly going to be at the center of any challenge EFF makes.

      • WilliamOckham says:

        Look at the section you quoted and remember that the words ‘communication’ and ‘acquisition’ are not defined in FISA or FAA. ‘Electronic surveillance’, ‘wire communication’, and ‘radio communication’ are defined very explicitly to only mean ‘communication in transit’, but communications can be stored and acquired from storage. For example, under 703:

        if the acquisition constitutes electronic surveillance or the acquisition of stored electronic communications or stored electronic data that requires an order under this Act, and such acquisition is conducted within the United States.

        The closest thing we have to a definition of communication is the definition of “Contents”:

        “Contents”, when used with respect to a communication, includes any information concerning the identity of the parties to such communication or the existence, substance, purport, or meaning of that communication.

        The definition of ‘communication’ clearly has to include, at the very least, everything in its contents. The plain reading of that definition is that any information concerning the existence of the communication is included.

        The situation is that to violate FISA you have to surveill, or pull information in transit. But acquiring includes access stored electronic data, including metadata. The use of call data doesn’t create a criminal violation of FISA, but it does leave the telecoms open to the kind of suits that are before Walker.

        To tie this back to your post, you say:

        And, more interestingly, the section requires surveillance “shall be conducted in a manner consistent with the fourth amendment to the Constitution of the United States.”

        I say you missed the most interesting part. The section says acquistion, not surveillance. Acquistion is a much broader term.

        • emptywheel says:

          Still thinking about this, but there is a DOD rule going back to the 1980s that says DOD only “collected” after a DOD employee recieves that information.

          So there may be a parse like that on acquisition.

        • emptywheel says:

          Okay, that is interesting, and for another reason as well. I bet they think acquisition is a shiny word that can heal all problems, but I think you might be right–there’s a problem there.

  4. Mary says:

    May or may not be something for the timeline, but interesting to note that Judge Digg-Taylor’s ruling that the program as run outside of the FISCt was unconstitutional was “out there” from Summer/fall of 06 (?date?) to July of 07 when the Sixth shot it down – but only on standing.

    http://www.cnn.com/2007/POLITI…..index.html

    What’s the link on the turn down of the basket warrant app? I remember it happening, but can’t google it up.

    I had some spec during the hearings about whether or not it was possible hat Gonzales might have knowingly violated FISCt rulings in that May surveillance emergency authorization/application and that, rather than the “novel questions’ issue was why the waited so long (and why McNulty and Clement both were so noticeably not consulted to sign off on an emergency FISA statutory authorization and made themselves unavailable).

    Keep in mind that after the emergency app, he had to go back to the FISCt for the follow up on it and I wonder if they bit him (and if that could be a part of the job issue).

    If so, the telecoms might still not be liable (although maybe – if they were proceeding under not a Presidential order, but an AG order, and it referenced use of “the program” that was now subject to court ordered supervision and protections and/or if the telecom had been given notice of those stricutres) but there might be some intersting liability aspects.

    • emptywheel says:

      I suspect it happened in the other direction. That FISC judge said, “hey, we’re not in the business of approving the massive data mining of US person data” in early May, and then Comey testified and on that very same day DOJ wanted to do a wiretap that included the Green Zone or something, and they simply freaked out, as much by Comey’s apparently unexpected testimony as by the purported challenge of the wiretap order itself.

      • Mary says:

        I don’t think I was clear. All this is just baseless spec about a “coulda been” and not a fact based – here’s what I bet happened – but what if (mixing some fact with some spec):

        Back in Jan you had DOJ finding a way to bring “teh program” under FISCt oversight. IIRC, in the phone interview they gave including TPM, it was pretty clear that they had somehow managed to get the court to sign off on the concept of basket warrants – presumably bc of restrictions or “minimizations” that were going to reduce impact on US citizens on US soi. At this point, Judge Taylor had made the ruling on surveillance and, while she did not deal directly with the datamining issue bc of state secrets, her ruling made it clear that a big chunk of surviellance of US citizens on US soil was unconstitutional and left DOJ/NSA/telecoms hanging on the issue of whether or not what they were doing in the data mining constituted a search covered by the first part of the opinion.

        So – here you are in Jan with FISCt having an order in place that brings them under a warrant/order/independent magistrate review umbrella that takes the heat off the telecoms for continuing to cooperate in activity Digg-Taylor has put in jeopardy. BUT – the trade off is they have to follow the FISCt rules

        Then you have a FISCt ruling – either intially as a part of the original order or later, in early May – clarifying that some things DOJ thought it could do under this “program” operating under the FISCt oversight it couldn’t do. Probably something it used to do – maybe something it thought was OK to trade off to get the cover of court orders for surveillance.

        THEN you have the kidnap and a lot of things are already being implemented and done and they are scraping bottom on other options. At this point someone suggests the kind of surveillance that they used to do, but which FISCt rules/orders (either the original ones or a ruling prior to the kidnap) disallows. And they all sit arounds saying – well, yeah, but the court says we can’t do that —- while Cheneyco are perhaps still hammering the old, but THIS IS COMMANDER IN CHIEF territory, the CIC when it comes to a soldier trumps the agreement NSA/DOJ made with FISCt. And someone says, well, you know, we could either just do it without going to the court (and all the lawyers think about what that would mean – bc I’m guessing the court would have spilt blood over it if they found out). So they kick that around a bit – can we make a CIC argument – who has brass ones? etc. Then someone says, or hey, maybe what we do is make an emergency application and authorize it that way. You know, act as if we have the same option under the workaround order that gives FISCt oversight that we do under FISA legislation and make that emergency filing and then when the court comes back at the end and says, “you weren’t allowed to do that” just say “oops, ‘kaythnxbai” And as they try to sell that concept, McNulty and Clement become very unavailable (IIRC, Clement was acting AG and McNulty still DAG and those were the guys who could sign off) OTOH, Gonzales is game to do it, to make Cheney happy and bc he’s thinking, hey – I’m AGAG, what can anyone do to me anyway, I own the DOJ? So when he gets there, they go with it.

        And then comes the day of the FISCt review of that emergency application.

        Which, at that point, is made to use surveillance efforts that the court has already specifically said cannot be used, under some bootstrapping “emergency” FISA provisions. And maybe the court takes action like it has in the past when it was lied to or like it threatened to do with Mueller and Ashcroft over prior less knowing violations of the their firewall orders.

        Maybe even that action is to disallow Gonzales from appearing before the FISCt (which was what they did with Townsend IIRC) Which would mean on a pressing national security front, you would be losing one of the few guys who could sign off, or that you would have to try to have some process of appointing someone else as acting AG for all FISA applications and Congress, who was already not loving on Gonzales, might get wind of it or a newspaper and the already existing pressure to boot him would explode. And that might explain his decision to leave when he did – if FISCt was threatening something with respect to him.

        But that’s just one round of spun out “waht ifs” that might explain, too, the delays that Baker testified made no sense.

        • timbo says:

          Interesting analysis! Something happened to make AGAG go…he held on for six months so inexplicably…

        • emptywheel says:

          RIght, I got that. But I think it may well be a lot simpler.

          They had no idea Comey was going to testify.

          There were things they probably would have done easily on May 14. It just so happens, though, they had to decide whether to do it or not on May 15, at precisely the time Comey was giving some of the most news-sexy testimony in COngress in a very long time. You don’t need anything beyond that to explain why they felt they had to touch base with AGAG that night. Yeah, they were probably pushing the limits (the presence of a goodly number of US persons in the locale is probably all it would take to make them squeamish), but it wouldn’t have taken all taht much for them to insist on buy-off from AGAG himself on that day.

        • emptywheel says:

          Incidentally, this is not my idea originally–it may have come from WO or some other smart person around these parts. But the coincidence of Comey and that wiretap application is all you need to explain the delay, all you need at all.

        • WilliamOckham says:

          I remember very little. I google everything. In this case, it would be

          comey wiretap kidnap iraq site:emptywheel.firedoglake.com

        • Mary says:

          I pretty much google everything (over and over) too. I didn’t know you could do the site:… search element. Thank you.

          It really aggravates me when I’m pretty sure there’s something out there that I’ve seen before and I can’t get it again.

        • Mary says:

          I see that point too, but here’s what makes me disinclined on it.

          You did have soldiers missing.

          You had a program that was now, at least, supposedly home free for the current and future by running through FISCt.

          If what they wanted to do was as simple as conducting a surveillance (or acquistion) that was authorized under the program as it was safe harbored in the FISCt, I don’t think even Comey’s pretty riveting testimony would have made lawyers at DOJ suddenly feel like they couldn’t surveil through the FISCt safe harbor that the program was now in and had been operating in for about 4 mos. A lot of time and effort had gone into getting the safe harbor and I’m picking the phrase “safe harbor” advisedly.

          I have to think that, with life or death on the line AND a by now well established FISCt safe harbor, they wouldn’t just freeze on making an application IF it was within the safe harbor. That’s why I’m thinking that someone wanted to do something outside the safe harbor and that is where the aspects of FISCt recourse against those involved shut down the process.

          It seems the other time we hear much about not signing off was when when Thompson was (likely) being advised by (likely) Kris that the applications might put him crossways with the FISCt.

          So that is just my gut, but I have to think that a legal request to FISCt within the FISCt safe harbor order and involving very possible life or death would have not caused people to sit around stewing all day, but instead would have been done the way Baker describes a lot of other FISCt applications in emergencies being done – 15 minutes maybe.

          Unlike what Comey was describing in his testimony, they were operating wholly within FISCt, which would give lawyers a lot more confidence.

          Unless they were wanting to go outside those safe harbors. At which point, I’d say the Comey testimony would definitely add more trepidation to stepping over that line under the old “CIC powers” rubric.

          But who was willing to sign off on something that everyone else knew was not legal and likely set up violations of FISCt orders – there firewall orders, before?

          I just get a deja vu-ish feel, of a DAG not signing off for fear of consequences with the court and Gonzales blithely ignoring the court out of a higher fealty to his George.

          But it is all just what ifs.

        • emptywheel says:

          First, remember that your “DAG not signing off for fear of consequences” is–again–your speculation. At times convincing, at times not, but still speculation. The existing record–which admittedly may be Comey-serving–says he didn’t sign off bc he discovered the data mining aspect, not for any FISC reasons (which is not to say there weren’t FISC problems, only that the existing record and timing supports a data mining issue, not a FISC alone issue).

          So while it’s possible that there’s all this other drama going on with the Iraq warrant, I think is unnecessary. As I’ve said, there are two clear prior problems: FISC rejecting a warrant that month, and the fact that they were tapping an area with tons of law-abiding US person soldiers in the way who were clearly not agents of a foreign power.

          While there’s no proof that something more complex wasn’t going on, there’s absolutely no indication there was anything more complex, and all the evidence to explain it without those more complex stories.

        • Mary says:

          As to Comey, a DAG not signing off for fear of consequences is my spec –
          As to Thompson, it was reported by someone else (I’m trying to remember if it was Angler of Dark Side or ??)

          I really don’t think it would matter much to the DOJ crew whether or not there were American communications that would be captured IF the DOJ crew thought that they were doing something that was allowed by the FISCt orders bringing the program within the court’s order

          I think we both focus on the fact of the FISCt denying a warrant (order). I guess what you and drational are saying is that you think this had happened earlier and with Comey testifying, no one at DOJ wanted to present any application (although by then they had to have presented a lot that were not denied) for fear it would be denied too and that would make them look bad later on their stats?

          Maybe – I just think it would be something more and that’s why during the hearings I kept wanting someone to ask what seemed to be the legitimate follow up question to the whole AGAG testimony — which was WHAT did the FISCt do with his emergency application at the end of the applicable (or possibly non-applicable) emergency period and the resulting FISCt review. Seems to me the options there would be a thumbs up from the court, a thumbs down from the court, or a thumbs down from the court coupled with other action. But no one in the hearings ever went into that, even tangentially.

  5. dotmafia says:

    Didn’t Bush state that telecom wiretapping was initiated as a result of 9/11, and then it was revealed by a whisteblower who discovered they were doing it almost immediately after Bush took power in Jan. 2001, thereby blowing apart Bush’s claim? Isn’t there any investigation or legal recourse into this?

  6. drational says:

    It was Gonzo himself who confirmed the import:

    Mr. Gonzales was at a meeting in San Antonio the day of Mr. Comey’s surprise testimony. “He didn’t have the decency to notify anyone what he was about to testify,” he said. “That was extremely disappointing.” Mr. Comey declined to comment.

  7. kimocrossman says:

    And I’m not sure it is clear, yet, whether the metadata from emails (which is a lot of what we’re talking about) equates to metadata from phone calls.

    Here is EFF’s prior analysis of email metadate legality:

    http://www.eff.org/deeplinks/2…..tic-spying

    (The article also discusses collection of phone calls, cell phone logs, ip addresses and urls)

    Email
    The infobox incorrectly asserts that the subject lines of email are not “content,” and can be obtained without a warrant. According to the article, “[f]or an email, the[NSA’s] data haul can include the identities of the sender and recipient and the subject line, but not the content of the message.”

    But this is contradicted by the Department of Justice’s own 2002 Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations manual, which states that “[t]he subject headers of e-mails are also contents.” Judges agree. See In Matter of Application of U.S. For an Order Authorizing the Installation and Use of a Pen Register and a Trap & Trace Device on E-Mail Account, 416 F.Supp.2d 13 (D.D.C. 2006) (”the stricture to avoid the contents of e-mail communications should be easy to comply with so long as the pen register and trap and trace processes or devices exclude all information relating to the subject line ….” (emphasis added)); In re United States for an Order Authorizing the Use of a Pen Register & Trap, 396 F.Supp.2d 45, 48 (D. Mass. 2005) (”information contained in the ’subject’ would reveal the contents of the communication and would not be properly disclosed pursuant to a pen register or trap and trace device.”)

    In addition, the law requires legal process for the government to obtain the recipient and sender’s address.

    ….

    Conclusion
    The Wall Street Journal article provides important confirmation of the scope and extent of the Administration’s domestic spying program. As the article confirms:

    telecom companies … are giving the government unlimited access to a copy of the flow of communications, through a network of switches at U.S. telecommunications hubs that duplicate all the data running through it.
    Critically, the article clarifies that the spying is not limited to communications with terrorists overseas: “for instance … the government’s spy systems may be directed to collect and analyze all electronic communications into and out of the city [of Detroit].” As the article notes, “some intelligence officials now say the broader NSA effort amounts to a driftnet.”

    However, the article appears to accept the NSA’s dubious interpretations of what is “content” under the law and those interpretations are just wrong in key ways that impact privacy. Rather than detailing what the government is doing that is legal, then, the article actually demonstrates the massive, illegal surveillance of millions of ordinary Americans, in violation of the law and the Constitution.

    As Judge Walker noted when examining EFF’s allegations of dragnet surveillance: “AT&T cannot seriously contend that a reasonable entity in its position could have believed that the alleged domestic dragnet was legal.” Nor can the NSA seriously contend that it can legally obtain dragnet information about Americans’ online searches, web browsing, email subject line, cell phone locations, et cetera, all without a warrant.

Comments are closed.