“An internal and an external review”

I’ll have more to say about WSJ’s report that Obama was unaware that the NSA was wiretapping 35 world leaders tomorrow.

But in my opinion, the most important detail in it reveals in addition to Obama’s James Clapper Committee to Make You Love the Dragnet, he has an internal review.

This summer, President Obama launched two reviews—an internal one and an external one. He highlighted them in a speech in August as part of a series of measures being taken to respond to the domestic uproar over NSA’s extensive spying practices in the U.S.

[snip]

The internal review, among different U.S. national security agencies, will be informed by findings from the external review, which is expected to deliver its final report in December, said White House spokeswoman Caitlin Hayden. [my emphasis]

Frankly, I don’t buy that Obama “highlighted” both these speeches in August. He highlighted his “independent” review, but mentioned nothing else that I can see.

Fourth, we’re forming a high-level group of outside experts to review our entire intelligence and communications technologies. We need new thinking for a new era. We now have to unravel terrorist plots by finding a needle in the haystack of global telecommunications. And meanwhile, technology has given governments — including our own — unprecedented capability to monitor communications.

So I am tasking this independent group to step back and review our capabilities — particularly our surveillance technologies. And they’ll consider how we can maintain the trust of the people, how we can make sure that there absolutely is no abuse in terms of how these surveillance technologies are used, ask how surveillance impacts our foreign policy — particularly in an age when more and more information is becoming public. And they will provide an interim report in 60 days and a final report by the end of this year, so that we can move forward with a better understanding of how these programs impact our security, our privacy, and our foreign policy.

Nor did the White House provide any details on reviews in the readout of the Angela Merkel conversation last week.

In other words, I suspect that for some reason — probably for a variety of them — Obama has decided that The James Clapper Committee to Make You Love the Dragnet is insufficient to the task of restoring confidence in the dragnet, so has people internal to the Administration working on fixes, probably tasked well after the Clapper committee, if not in the last week.

Or maybe he has just invented the existence of an “internal review” so as to explain why he is prepared to admit that 35 world leaders were being wiretapped by the NSA and anything else that proves inconvenient.

The National Security Agency ended a program used to spy on German Chancellor Angela Merkel and a number of other world leaders after an internal Obama administration review started this summer revealed to the White House the existence of the operations, U.S. officials said.

Officials said the internal review turned up NSA monitoring of some 35 world leaders, in the U.S. government’s first public acknowledgment that it tapped the phones of world leaders.

After all, the Guardian reported on the 35 world leaders (which the WSJ notes), and only after that we learn there’s an “internal review” that raised this as a point of concern? (Perhaps, too, this serves as a convenient fiction to accord with whatever Obama has told Angela Merkel on various occasions.)

WSJ spends much of the rest of the story trying to suggest the James Clapper Committee to Make You Love the Dragnet is not, as all evidence indicates, kabuki.

I don’t buy that, nor do I buy that there was really an “internal review” before things got really hot this week.

But I do hope that having been forced to create at least the appearance of a second review, Obama will use it as an opportunity to make more changes than he otherwise had planned on.

Update: Adding to my suspicion that the Administration created an “internal” review in the last few days, National Security Rice is now tweeting about it.

Did Lying Keith Just Accuse Obama of Lying?

I noted the other day the reason the non-denial confirmation that NSA wiretapped Angela Merkel raised the stakes for what President obama told the Chancellor in June about the spying. Did he give assurances she hadn’t been tapped?

If he did, anonymous leakers from the NSA’s vicinity suggest, he knowingly lied.

In Germany, Der Spiegel reported that the NSA’s Special Collection Service (SCS) had listed Merkel’s phone number since 2002. The number was still on the list – marked as “GE Chancellor Merkel” – weeks before Obama visited Berlin in June, raising the possibility that the German leader had been under surveillance for more than a decade. In an SCS document cited by the magazine, the agency said it had a “not legally registered spying branch” in the US embassy in Berlin, the exposure of which would lead to “grave damage for the relations of the United States to another government”.

The White House refused to comment on that report – or others that emerged in Germany overnight, raising questions about how much Obama personally knew about the spy operation.

[snip]

The German tabloid Bild reported that Obama was personally informed about US surveillance against Merkel by the director of the NSA, Keith Alexander, in 2010, and allowed the operation to continue. The newspaper cited “a secret intelligence employee who is familiar with the NSA operation against Merkel”. The Bild article also claimed that intelligence gathered by US spies based in Berlin was not channelled to NSA headquarters in Forte Meade, Maryland, but directly to the White House.

The newspaper Frankfurter Allgemeine Sonntagszeitung reported that when Obama spoke to Merkel over the phone on Wednesday, he assured the German leader he had not previously known her phone had been monitored. [my emphasis]

Much of this is obviously coming from Germany’s own national security establishment. But the Bild leak is clearly identified as a US source. The NSA is now denying it (in language that seems desperate to deny that Alexander was Bild’s source).

NSA chief General Keith Alexander “did not discuss with President Obama in 2010 an alleged foreign intelligence operation involving German Chancellor Merkel, nor has he ever discussed alleged operations involving Chancellor Merkel,”

That said, any certainty about what Obama got briefed would move likely come from ODNI, which is likely just as tired of taking the fall for the Snowden leaks.

Nevertheless, someone at NSA and/or associated with the Embassy in Germany is trying to hang this on the President.

Obama’s public line has already been that his Administration will assess whether we should be doing something, whether or not we can. I’m not all that convinced, particularly given the puffery of his Committee to Make You Love the Dragnet, he really means that. But even the hint that some at NSA want to hang this on the President might make him much more critical of what its doing.

James Clapper versus DOJ (and NSA) on Upstream Collection Transparency

Screen shot 2013-10-26 at 12.31.00 PM

Last week, David Ignatius wrote a column declaring the Director of National Intelligence position under James Clapper “Mission Accomplished!” It’s mostly a beat sweetener, but I’m intrigued by his claim that James Clapper forced the NSA to declassify more of the 2011 John Bates decision than they wanted to.

But there are welcome signs that this jury-rigged structure may finally be starting to work as the DNI responds to budget pressures and the scandals surrounding National Security Agency’s surveillance programs. Clapper has recently taken steps that forced the National Security Agency (NSA) to accept greater transparency and stopped the military agencies from wasteful spending on duplicative satellite imagery.

[snip]

One example is Clapper’s pressure on the NSA to disclose more about its surveillance programs. The NSA initially wanted to “redact” (a fancy word for censor) far more of a 2011 ruling by the Foreign Intelligence Surveillance Court that the agency had engaged in illegally broad surveillance. Clapper thought NSA lawyers were suppressing too much, so he instructed his general counsel, Robert Litt, to go back through the document and make public more information. Clapper ignored NSA and Justice Department protests, including to the White House, and backed Litt’s less-redacted version.

That 2011 opinion is one of the most important disclosures so far (and the more I think about it the more I’m convinced it was a dangerous rubber stamp). So I’m grateful as much of it was released as it was.

But I’m intrigued by what this account says of upstream collection (and the searching on US person data collected under FISA Amendments Act) generally.

As the screen cap above shows, even while the opinion made it clear what “upstream” collection is (and other documents released, Dianne Feinstein’s public comments, and the footnote below have made it clear the telecoms conduct the collection), it kept the actual language describing the process redacted.

Screen shot 2013-10-26 at 12.53.09 PM

 

Assuming Ignatius description that Clapper pushed for this level of disclosure is correct, consider Clapper’s gimmicky efforts to deny or refuse to discuss other upstream collection under EO 12333. That would say Clapper pushed to make more of this FAA upstream collection public, but has gone to some effort to deny the other direct collection under EO 12333.

Meanwhile, remember the way David Kris’ paper, which was reviewed by DOJ, managed to raise Internet metadata and EO 12333, but largely indirectly.

They’re awfully squirrely about the upstream collection, perhaps because they are increasingly targeting US persons using EO 12333. But it’s worth following.

The “Voluntary” Cooperation that Comes from Coercion of Licensing Agreements?

The Guardian today describes how hard GCHQ worked to prevent its intercepts from being discoverable in trials. It did so for two reasons: to prevent a political firestorm about the extent of the collection.

A briefing memo prepared for the board of GCHQ shortly before the decision was made public revealed that one reason the agency was keen to quash the proposals was the fear that even passing references to its wide-reaching surveillance powers could start a “damaging” public debate.

 

Referring to the decision to publish the report on intercept as evidence without classification, it noted: “Our main concern is that references to agency practices (ie the scale of interception and deletion) could lead to damaging public debate which might lead to legal challenges against the current regime.”

And to protect the telecoms, some of whose cooperation (I’m guessing British Telecom and Vodaphone, based on other reporting, but that is a wildarsed guess) goes beyond the requirements of the law.

In an extended excerpt of “the classified version” of a review prepared for the Privy Council, a formal body of advisors made up of current and former cabinet ministers, the document sets out the real nature of the relationship between telecoms firms and the UK government.

“Under RIPA [the Regulation of Investigatory Powers Act 2000], CSPs in the UK may be required to provide, at public expense, an adequate interception capability on their networks,” it states. “In practice all significant providers do provide such a capability. But in many cases their assistance – while in conformity with the law – goes well beyond what it requires.

The story references back to its earlier coverage on Tempora, the UK collection off cables, largely to note how different this description of the telecoms’ cooperation is from what they claimed back in June.

But given this description of their extensive cooperation, this detail from the original Tempora story sure looks more interesting.

The papers seen by the Guardian suggest some companies have been paid for the cost of their co-operation and GCHQ went to great lengths to keep their names secret. They were assigned “sensitive relationship teams” and staff were urged in one internal guidance paper to disguise the origin of “special source” material in their reports for fear that the role of the companies as intercept partners would cause “high-level political fallout”.

The source with knowledge of intelligence said on Friday the companies were obliged to co-operate in this operation. They are forbidden from revealing the existence of warrants compelling them to allow GCHQ access to the cables.

“There’s an overarching condition of the licensing of the companies that they have to co-operate in this. Should they decline, we can compel them to do so. They have no choice.”

Back in June, an anonymous source said the telecoms cooperate because their licensing depends on it. Now we learn that the government considers their cooperation voluntary, some of it beyond what is required.

I don’t know whether telecom law operates in the UK like in the US, but if the government premises licensing based on cooperation, it might get to the question I raised here, when I noted how the government reserved getting Department of Commerce involved in cases where companies didn’t provide the “voluntary” cooperation with cyberdefense the government demanded.

I think it’s quite possible the government (possibly both the US and UK) is/are demanding “voluntary” cooperation from the companies they license (on threat of losing their licenses). But remember, on a lot of this stuff, the government has held that companies can “voluntarily” turn over data (especially stuff facetiously called “foreign” based on false claims about the transit of data) without process if they want to.

So coerce the telecoms (and possibly, broadband) to cooperate under threat of licensing problems, then claim that this “voluntary” cooperation permits data sharing that otherwise would require legal process.

And in doing so, conduct a dragnet so vast that no judge would ever approve it.

Is that how it works?

“Too much transparency defeats the very purpose of democracy”

In truly bizarre testimony he will deliver to the House Intelligence Committee next week, Paul Rosenzweig argues that “too much transparency defeats the very purpose of democracy.” He does so, however, in a piece arguing that the government needs what amounts to be almost full transparency on all its citizens.

The first section of Rosenzweig analysis talks about the power of big data. It doesn’t provide any actual evidence that big data works, mind you. On the contrary, he points to one failure of big data.

When we speak of the new form of “dataveillance,” we are not speaking of the comparatively simple matching algorithms that cross check when a person’s name is submitted for review¾when, for example, they apply for a job. Even that exercise is a challenge for any government, as the failure to list Abdulmutallab in advance of the 2009 Christmas bombing attempt demonstrates.[11] The process contains uncertainties of data accuracy and fidelity, analysis and registration, transmission and propagation, and review, correction, and revision. Yet, even with those complexities, the process uses relatively simple technologically—the implementation is what poses a challenge.

By contrast, other systems of data analysis are far more technologically sophisticated. They are, in the end, an attempt to sift through large quantities of personal information to identify subjects when their identities are not already known. In the commercial context, these individuals are called “potential customers.” In the cyber conflict context, they might be called “Anonymous” or “Russian patriotic hackers.” In the terrorism context, they are often called “clean skins” because there is no known derogatory information connected to their names or identities. In this latter context, the individuals are dangerous because nothing is known of their predilections. For precisely this reason, this form of data analysis is sometimes called “knowledge discovery,” as the intention is to discover something previously unknown about an individual. [my emphasis]

Nevertheless, having not provided evidence big data works, he concludes that “There can be little doubt that data analysis of this sort can prove to be of great value.”

The reference to Abdulmutallab is curious. At the beginning of his testimony he repeats the reference.

In considering this new capability we can’t have it both ways.  We can’t with one breath condemn government access to vast quantities of data about individuals, as a return of “Big Brother”[4] and at the same time criticize the government for its failure to “connect the dots” (as we did, for example, during the Christmas 2009 bomb plot attempted by Umar Farouk Abdulmutallab.

This formulation — and the example of Abdulmutallab even more so — is utterly crazy. Having big data is not the same thing as analyzing it correctly. Criticism that the Intelligence Community failed to connect the dots — with the UndieBomb attack, but even with 9/11 — assumes they had the dots but failed to analyze them or act on that analysis (as the IC did fail, in both cases). Indeed, having big data may actually be an impediment to analyzing it, because it drowns you. And while Rosenzweig suggests the only big data failure with Abdulmutallab involved not placing him on a watch list, that’s false. The NSA had wiretaps on Anwar al-Awlaki which, according to the government, collected information tying Abdulmutallab to an attack.

Yet they didn’t respond to it.

And you know what? We measly citizens don’t know why they didn’t respond to it — though we do know that the FBI agents who were analyzing the Awlaki data were … you guessed it! Overwhelmed.

Before anyone involved in government claims that big data helps — rather than hinders — they should have to explain why a full-time tap on Anwar al-Awlaki didn’t find the guy who was texting him about a terrorist attack. Read more

Did Obama Lie to Merkel in Berlin?

As I noted here and the NYT lays out in more detail, Obama spoke with Angela Merkel about US spying in Germany in June when he was in Berlin.

The first disclosures from Der Spiegel in June almost soured the long-planned meeting between Mr. Obama and Ms. Merkel in her capital, which the president visited as a candidate in 2008, delivering a speech before an estimated 200,000 people.

In June, there were far fewer, carefully screened and invited Germans and Americans on hand to hear Mr. Obama at the Brandenburg Gate, the symbol of Berlin’s unity and freedom since the Berlin Wall fell in 1989.

Shortly beforehand, Mr. Obama and Ms. Merkel stood side by side in her chancellery, fielding questions about American surveillance of foreigners’ phone and e-mail traffic. Pressed personally by Ms. Merkel, the president said that terrorist threats in Germany were among those foiled by intelligence operations around the world, and Ms. Merkel concurred.

A month later, Merkel quipped that she had not been wiretapped.

In July, Ms. Merkel joked with television interviewers asking about the situation, “I know of no case where I was listened to.”

Yet in the last few days, Merkel has discovered this is not true. The White House’s non-denial — “The President assured the Chancellor that the United States is not monitoring and will not monitor the communications of Chancellor Merkel” — makes it fairly clear the United States was monitoring her communications.

All of which raises the stakes for whatever explanation Obama offered in June.

The NSA’s strategy since Edward Snowden first leaked has been to emphasize (as Obama seems to have with Merkel) its use for counterterrorism. It has been increasingly clear NSA badly wants to hide the sheer scale of its spying — that it could effectively be taking everything. But even from the earliest leaks, it has been clear the US was spying on diplomats, particularly from the EU. So it should not be surprising that it is also spying on Merkel.

That said, it sounds like this tap, of Merkel’s private cell phone (which presumably had some kind of security, particularly given the involvement of Germany’s security services to assess whether it had been tapped), was probably a more deliberate tap than the broader spying NSA conducts, probably a TAO exploit. Not something that happens incidentally.

I would imagine Merkel would be pissed in any case, and gravely concerned about the topics of interest. (I’m acutely interested, for example, whether the US has shared any information about the plight of the Euro with the banks that have largely devastated the Euro.)

But there’s also the question of whether Obama gave Merkel assurances that have now turned out to be false.

Note, this article on how leaks are making it harder for the US to tout openness and human rights while secretly doing the opposite is closely related–it’s well worth your read.

NSA Has Conquered Canada and Mexico Now

Screen shot 2013-10-23 at 3.13.35 PMTo accompany its excellent piece on the NSA’s Zombie Lie about having prevented 54 terrorist attacks, ProPublica republished the map NSA released to seed the Zombie Lie (visual aids help with propaganda, I understand).

I noticed for the first time how the NSA has simply incorporated Canada and Mexico into the “Homeland.”

I wouldn’t have mentioned it at all, but one of the events they’re almost certainly including among the 13 is the Manssor Arbabsiar “plot” to kill the Saudi Ambassador. That plot, at least as DEA’s informant crafted the tale, involved targets in Argentina, too (and, of course, the plotting took place in Mexico).

Though perhaps the most telling aspect of the whole map is how the whole terrorism thing goes blank once you get south of Mexico. There, of course (and in Mexico as well), we’re stopping “Narcoterrorists,” not “terrorists.”

Finally, it’s funny that NSA is so inaccurate with their maps, given that some of their spying depends on boundary arbitrage, the placement of collection points outside of the US, so it can collect US person data while pretending not to.

James “Too Cute By Half” Clapper’s Denial

James Clapper made a somewhat unprecedented denial of Le Monde’s report (French, English) about the NSA’s dragnet, denying the eye-popping numbers on the volume of French spying (70.3 million in a month) we do.

October 22, 2013

Recent articles published in the French newspaper Le Monde contain inaccurate and misleading information regarding U.S. foreign intelligence activities.  The allegation that the National Security Agency collected more than 70 million “recordings of French citizens’ telephone data” is false.

While we are not going to discuss the details of our activities, we have repeatedly made it clear that the United States gathers intelligence of the type gathered by all nations.  The U.S. collects intelligence to protect the nation, its interests, and its allies from, among other things, threats such as terrorism and the proliferation of weapons of mass destruction.

The United States values our longstanding friendship and alliance with France and we will continue to cooperate on security and intelligence matters going forward.

Now, for what it’s worth, this seems the product of somewhat bad translation of the English for the Le Monde article, which started as this,

Parmi les milliers de documents soustraits à la NSA par son ex-employé figure un graphique qui décrit l’ampleur des surveillances téléphoniques réalisées en France. On constate que sur une période de trente jours, du 10 décembre 2012 au 8 janvier 2013, 70,3 millions d’enregistrements de données téléphoniques des Français ont été effectués par la NSA.

And then a worse translation back into English, which produced this,

Amongst the thousands of documents extracted from the NSA by its ex-employee there is a graph which describes the extent of telephone monitoring and tapping (DNR – Dial Number Recognition) carried out in France. It can be seen that over a period of thirty days – from 10 December 2012 to 8 January 2013, 70,3 million recordings of French citizens’ telephone data were made by the NSA.

I’m not going to explain this perfectly, but effectively it took a verbal that could mean the tape recording or the data notation of calls and turned it into a gerund that has the connotation in English of a discrete tape recording (note also the really cloddish use of the passive in a situation where you wouldn’t use it in English).

And from that, Clapper pounced on the “recordings” and presented them — in a quotation taken out of context — as discrete phone calls recorded individually. NSA’s not doing that, he says.

But we knew that. What they’re doing is intercepting call data in bulk and then sorting through what they want to keep.

It’s worth noting that the comment on the Boundless Informant screen Le Monde gets this from, however, refers to a more accurate calls “interceptées.” None of that excuses Le Monde’s presentation of it as such, particularly not its weak English translation which Clapper exploited (which isn’t, however, the actual language that has given François Hollande an opportunity to pretend to be shocked, and his English-only gotcha would be useful in refuting this for actual French readers). But that’s one source of the gotcha.

Now, as I said, this is relatively unprecedented. In the recent “interview” with Keith Alexander, NSA issued non-denial denials about info sharing with Israel. But there have been few very specific denials like this one.

And why would there be? Should we now assume all the other facts that have come out, anywhere in the world, are true? That Clapper has gone out of his way to do so, it seems, suggests the IC doesn’t dispute any other facts, which is almost certainly not the case, but nevertheless a fair assumption given their attention to this discrete point.

The one exception to this general rule, though, suggests why Clapper may have used this bad translation to claim gotcha! It just so happens to pertain to the WSJ story on upstream Internet collection, Read more

The Common Commercial Services OLC Memo and Zombie CISPA

Some time last summer, Ron Wyden wrote Attorney General Holder, asking him (for the second time) to declassify and revoke an OLC opinion pertaining to common commercial service agreements. He said at the time the opinion “ha[d] direct relevance to ongoing congressional debates regarding cybersecurity legislation.”

That request would presumably have been made after President Obama’s April 25, 2012 veto threat of CISPA, but at a time when several proposed Cybersecurity bills, with different information sharing structures, were floating around Congress.

Wyden asked for the declassification and withdrawal of the memo again this January as part of his laundry list of requests in advance of John Brennan’s confirmation. Then, after having been silent about this request for 8 months (at least in public), Wyden asked again on September 26.

It appears that Wyden had intended to ask the question of one of the witnesses at an open Senate Intelligence Committee hearing (perhaps Deputy Attorney General James Cole), but — having had warning of his questions (because he sent them to the witnesses in advance) — Dianne Feinstein and Susan Collins ensured there would not be a second round of questions.

As it happens, Wyden made the request for the memo two days after DiFi told The Hill she was preparing to advance her version of CISPA, and the day after Keith Alexander started calling for cybersecurity legislation again.

In a brief interview with The Hill in the U.S. Capitol on Tuesday, Feinstein said she has prepared a draft bill and plans to move it forward.

The legislation would be the Senate’s counterpart to the Cyber Intelligence Sharing and Protection Act, known as CISPA, which cleared the House in April.

CISPA would remove legal barriers that prevent companies from sharing information with each other and the government about cyber attacks. It would also allow the government to share more information with the private sector.

Since then, Alexander has pitched new cybersecurity legislation in an “interview” with the NYT, admitting he needs to be more open about his places for cybersecurity.

Now, the Executive Branch’s unwillingness to actually share the law as it interprets it with us mere citizens prevents us from understanding precisely what relationship this OLC memo has with proposed cybersecurity legislation — but Wyden made it clear in January that it does have one. But here are some things we might surmise about the memo:

  • The Administration is currently relying on this memo. If it weren’t using it, after all, it wouldn’t need to be revoked. That means that since at least January 14, 2011 (before which date Wyden and Russ Feingold first asked it be revoked), the Administration has had a secret interpretation of law relating in some way to cybersecurity.
  • The interpretation would surprise us. As Wyden notes, “this opinion is inconsistent with the public’s understanding of the law” (he doesn’t say what that law is, but I’ll hazard a guess and say it pertains to information sharing). It’s likely, then, that some form of online provider has been sharing cyber-intelligence with the federal government under some strained interpretation of our privacy protections (and, probably, some kind of Attorney General assurances everything’s cool).

Let’s use the lesson we learned during the FISA Amendments Act where the telecoms were clambering for the legislation and the retroactive immunity, but the Internet companies were grateful for “clarity,” but explicitly opposed to retroactive immunity. When we learned the telecoms had been turning over the Internet companies metadata and content, this all made more sense. The Internet Companies wanted the telecoms to be punished for stealing their data.

In this case, in the first round of CISPA (which had broad immunity protections), Facebook and Microsoft were supporters. But in this go-around (which has still generous but somewhat more limited immunity), the big supporters consist of:

  • Telecoms (AT&T, Verizon; interestingly, Sprint did not sign a letter of support)
  • Broadband and other backbone providers (Boeing, Cisco, Comcast, TimeWarner, USTelecom)
  • Banks and financial transfer
  • Power grid operators and other utilities

Now, who knows with which of these entities the government is already relying on this common commercial services memo, which of our providers we believe have made some assurances to us but in fact they’ve made entirely different ones.

But I will say the presence of the telecoms, again, angling for immunity for information sharing, along with their analogues the broadband providers does raise questions. Especially considering Verizon Exec’s trash talking about consumer-centric Internet companies that don’t prioritize national security.

Stratton said that he appreciated that “consumer-centric IT firms” such as Yahoo, Google, Microsoft needed to “grandstand a bit, and wave their arms and protest loudly so as not to offend the sensibility of their customers.”

“This is a more important issue than that which is generated in a press release. This is a matter of national security.”

After all, the telecoms have a history of willingly cooperating with the government, even if it bypassed the protections offered by Internet companies, even if it violated the law. Have they been joined by big broadband?

Well, DOJ could clear all this up by revoking and releasing the memo. Until they do, though, my wildarsed guess is that those operating the Toobz in the country — the telecom and broadband companies — have already started sharing consumers’ data that a plain reading of the law seemingly wouldn’t permit them to do.

Intelligence Committees: Not Informed about Torture, Not Informed about Drone Casualties, Not Informed about US Person Spying

Amnesty International and Human Rights Watch released reports on US drone killings today. For the moment, I’m going to outsource reading the reports to Sarah Knuckey’s excellent post.

Both reports (per Knuckey) point to individual drone strikes on civilians that may or probably violate international law.

Specific US strikes killed civilians in violation of the law and US policy.  These are the first major reports by each organization detailing field investigations into specific strikes.  HRW reviewed six strikes in Yemen (occurring between December 2009 and April 2013). HRW concluded that two of the strikes violated international law (pp. 54, 67), four may have (pp. 30, 39, 43, 60), and none of the six appeared to have complied with Obama’s May 2013 Presidential Policy Guidance (p. 89).  AI reviewed all 45 reported Pakistan strikes between January 2012-August 2013, and investigated nine in detail.  AI’s legal findings include that “evidence indicates” that an October 2012 strike unlawfully killed a grandmother and injured eight children (p. 23), and AI had “serious concerns” that a July 2012 strike that killed 18 and injured 22 (p. 24) may have been a war crime or extrajudicial execution (p. 27).  AI also investigated a number of strikes on apparent rescuers (those who came to the scene of a first strike to help the wounded), which it concluded may have been illegal (pp. 28-30).  Neither report seeks to assess the total number or rate of civilian casualties for all strikes.

[snip]

Investigations and accountability obligations. AI states that the US has legal obligations to investigate any cases where there are “reasonable grounds to indicate that unlawful killings have occurred,” and to prosecute, and remedy where appropriate (pp. 35-37).  HRW similarly states that the US has a duty to investigate violations of the laws of war, and that government secrecy effectively denies victims’ right to redress (p. 87).  Both reports also state the US should provide compensation or condolence payments for any civilian harm, but that neither organization is aware of the US having done this (AI, p. 39; HRW, p. 88).

This documentation of civilian casualties, of course, provides further evidence Dianne Feinstein and Mike Rogers’ claims about civilian casualties are false.

But we knew that.

Which means, in addition to the fact that we’re violating international law with some of our drone killings, we also are seeing a recurrent trend.

Even the CIA’s own lawyer agreed that CIA didn’t properly inform Congress, including the Intelligence Committees, about torture.

We’re learning that vast parts of the NSA’s spying — including spying that collects US person data — remains largely hidden from the Intelligence Committees.

And we have yet more proof they have been misinformed about drone killings.

Is there some dubiously legal program the Intelligence Community has fully informed Congress on?