The FBI’s Improving Cooperation with FSB

There were a number of questions about security threats to the Sochi Olympics at the Global Threat hearing the other day. One of them provided Jim Comey the opportunity to say this:

National Counterterrorism Center Director Matthew Olsen: So we’re very focused on the problem of terrorism in the run-up to the Olympics. I would add that I traveled to Sochi last December and met with Russian security officials. They understand the threat; they are very focused on this and devoting substantial resources. The biggest issue, from my perspective, is not the games themselves, the venues themselves; there is extensive security at those locations — the sites of the events. The greater threat is to softer targets in the greater Sochi area and in the outskirts, beyond Sochi, where there is a substantial potential for a terrorist attack.

Dianne Feinstein: Thank you very much. Mr. Comey, would you tell us what you can about cooperation between Russia and your organization?

FBI Director Jim Comey: Certainly, Senator. The cooperation between the FSB and the FBI in particular has been steadily improving over the last year. We’ve had exchanges at all levels, particularly in connection with Sochi, including me directly to my counterpart at FSB, and I think that we have a good level of cooperation there. It can always improve; we’re looking for ways to improve it, as are they, but this, as Director Olsen said, remains a big focus of the FBI. [my emphasis]

In the middle of a hearing at which James Clapper railed against Edward Snowden, claiming that counterintelligence threats — by which he largely meant Snowden — presented the second biggest threat to the country, the FBI Director stated that cooperation between his agency and the Russian spy agency has been improving for the last year (I’m guessing he means it has been improving since the Boston attack, because relations were quite chilly before that).

Snowden’s the second biggest threat to this country, and yet our relations with Russia, and specifically with Russia’s spy agency, have been steadily improving over the entire period Snowden has had asylum in Russia.

I don’t pretend to know precisely what that means.

At a minimum, it poses real questions about the unsubstantiated and whispered claims that Snowden has provided Russia great intelligence on NSA’s activities. After all, if Russia was busy exploiting Snowden’s secrets, it presumably would present challenges for this budding new cooperation between the FSB and those investigating Snowden’s leaks.

(The Global Threats report actually raises the case of Jeffrey Paul Delisle, a Canadian intelligence officer who gave Russia Five Eyes secrets for five years, as proof the Russians are soliciting more spies as part of its cyberwar efforts.)

There is, of course, another (remote) possibility: that we worked out a deal with Russia, whereby they’d give Snowden asylum and report back what he had taken. I have no reason to believe Snowden has shared secrets (though don’t doubt Putin will take whatever he can get his hands on), and the thought that Russia would agree to tell us what Snowden got is far-fetched. Still, Putin’s enough of a statist he might do it (and might misinform us along the way). While far-fetched, if that were the case, though, it’d give the US several things: the security in knowing Snowden was in the hands of security forces who would prevent any non-state or weaker states from getting to him, who were also limiting what Snowden could say publicly. Some clue about what Snowden had taken. And a political situation which would help US efforts to propagndize against Snowden.

Alternately, one of the things the FBI has learned as it has worked more closely with the FSB is that Snowden hasn’t shared any secrets with Russia (perhaps, as many have suggested, Russia got enough from Delisle that they would rather use Snowden solely to discomfit us).

I don’t know what it means. But I do find it rather implausible that the FBI would continue to expand cooperation with the FSB even as it extracted NSA’s family jewels from Snowden. Yet that’s the story Snowden’s biggest detractors would like you to believe.

What Michael Flynn’s DIA Imputes to Facts We Know

Before I point to reasons why we should exercise some caution before we believe a DIA report claiming that Edward Snowden’s entire leak was orchestrated by the Russians, let me lay out the following.

First. until such time as we see evidence that the reported documents somehow inordinately benefit Russia (and/or see evidence that our cooperation with Russia isn’t increasing during the period of Snowden’s asylum there), I’m not much interested in the question. I’m still so busy — both between Snowden document reports and documents declassified in response to FOIAs in a false show of transparency — reading about programs Americans should have known, that I don’t have time or interest in this manufactured sideshow.

Second, I don’t know what Snowden’s relationship with Russia is (and suspect 99% of the people commenting don’t either). The claims Mike Rogers, in particular, made on Sunday are full of Clown Show logic problems, some of which Snowden debunked in a limited rebuttal in an interview with Jane Mayer. Some accusers and defenders are conflating what happened while Snowden was working at NSA and what happened after Snowden got stuck in Moscow. All that said, while we have no evidence of cooperation now, I fully expect Vlaidimir Putin tried all he could to get as much out of Snowden as he could.

I don’t know.

What I do know is that DIA under General Michael Flynn’s leadership seems to be developing a pattern of leaking sensational intelligence conclusions based on apparently bad logic at politically opportune moments.

The accusations against Snowden are from a DIA report that DIA’s Director, Michael Flynn, organized.

The Defense Department report was conducted by the Defense Intelligence Agency in coordination with other intelligence agencies across the government, according to two sources familiar with its findings. A spokesperson for the DIA said Lt. Gen. Michael Flynn, the agency’s director, organized a task force “to assess the potential impact to the Department of Defense from the compromise of this information.” But the spokesman did not say what, if any, conclusions the task force had reached about actual damage caused by documents Snowden took, regardless of whether they’ve been disclosed or not.

Admittedly, the conclusions of it got leaked with apparent White House permission. But it got leaked in the worst manner of Obama Administration asymmetric leaking, which have a history of being rather partial and politically self-serving.

Moreover, the entire orchestrated leak feels a lot like the “leak” last year — during heightened tensions between North and South Korea — of DIA’s conclusion that North Korea had the capability of launching a nuclear weapon on a ballistic missile. Republican Congressman Doug Lamborn, protected by Speech and Debate, revealed a detail that “accidentally” wasn’t redacted in a larger declassified finding. The “leak” fed a lot of fearmongering even as the Obama Administration was trying to temper responses.

A week after the initial leak, James Clapper and Flynn happened to testify before the Senate Armed Services Committee (the entire clip is worthwhile, but the particularly important parts start after 4:00). And in response to some Ted Cruz questions about North Korea, both Clapper and Flynn made it clear that the reason DIA had come to different conclusions than the rest of the Intelligence Community was because of the assumptions it had made. This inflammatory finding arose because of “a difference in how we judge assumptions,” Flynn explained. Clapper (who had spent a week trying to batten down the alarmism) said the debate arose from the “facts we know versus what we impute to those facts.”

That is, DIA had imputed conclusions to facts other agencies hadn’t.

According to its Director, DIA has a difference in how it judges assumptions from other intelligence agencies. And in this case, those who have read the DIA report appear to be repeating allegations remarkably divorced from any evidence, relying on wacky theories rather than real evidence.

Michael Flynn seems to be making a habit of this kind of analysis.

Did the Hospital Confrontation Shut Down an Illegal Dragnet against Iraq War Critics?

Screen shot 2014-01-06 at 1.03.11 PM

Several days ago I wrote,

Both Goldsmith’s memo (see PDF 14) and the Draft NSA IG Report (PDF 10) make it clear that, in addition to temporarily shutting down the Internet dragnet, the March 19, 2004 modifications to the program narrowed the program’s focus to exclude the Iraqi Intelligence figures who had previously been included, suggesting that Goldsmith only felt he could approve the program for terrorists.

Wait, what?

I’ve known — and written — about this detail in the past. But I hadn’t really put together what it means.

Post-hospital confrontation changes include the exclusion of Iraqi-related targets

Here’s what the two passages say. Goldsmith’s (still heavily redacted) memo reveals that, along with other modifications George Bush made on March 19, 2004 in response to the DOJ resignation threats (notably, temporarily shutting down the Internet dragnet) he also “clarified” the scope of the program.

In the March 19, 2004 Modification, the President also clarified the scope of the authorization [redacted]. He made clear that the Authorization applied where there were reasonable grounds to believe that a communicant was an agent of an international terrorist group [redacted]

The NSA IG Report explains that “clarification” halted using the Presidential Surveillance Program authority against the Iraqi Intelligence Service.

(TS//SI//NF) Iraqi Intelligence Service. For a limited period of time surrounding the 2003 invasion of lraq, the President authorized the use of PSP authority against the Iraqi Intelligence Service. On 28 March 2003, the DCI determined that, based on then current intelligence, the Iraqi Intelligence service was engaged in terrorist activities and presented a threat to U.S. interests in the United States and abroad. Through the Deputy DCI, Mr. Tenet received the President’s concurrence that PSP authorities could be used against the Iraqi Intelligence Service. NSA ceased using the Authority for this purpose in March 2004. [my emphasis]

There may be a perfectly innocent explanation for this.

At precisely that time, Goldsmith was trying to rein in the government’s rendition program to prevent the rendition of Iraqis protected under international law governing occupation. And, at what appears to have been the same time, DOD was for the first time making a distinction between between Iraqis detained and interrogated as former regime officials and Iraqis detained and interrogated as leaders of the insurgency. Clearly, up until that point, Bush had been using the rules invented to hunt terrorists in his Iraq War, creating all sorts of legal problems. So it would be unsurprising if Goldsmith used the resignation threats to force Bush to stop targeting Iraqi officials as terrorists when they were really legal opponents in a war.

The Iraqi-related illegal wiretapping targets must include US-based collection

Except that doesn’t make sense.

That’s because, whatever violations of international law Bush was committing in Iraq, illegal spying on Iraqis was almost certainly not one of them. Nothing prevented the government from spying on Iraqis, and very little spying on Iraqis in Iraq would involve the kind of US collection that implicated his illegal wiretap program.

Which is why the IG Report’s description of an Iraqi intelligence “threat to U.S. interests in the United States” gives me pause.

The illegal program, after all, was focused on US metadata and content collection to find threats (what it called “terrorists”) in the United States. Both the method and location of collection only make sense if you’re hunting communications with at least one, if not both, sides in the US.

There was no real known threat posed by Iraqi governmental interests in the US, in part because the US military chased the Iraqi government underground so quickly. And yet, for it to be something tied into the resignation threats, some significant spying must have been going on.

The obvious guess — and at this point it is just a guess — would be they used the illegal wiretap program to hunt down people Cheney’s minions claimed helped Iraq’s cause here in the US.

You know? Iraqi intelligence assets? Like anti-war activists?

Some data points that might support Bush’s use of his illegal program against anti-war activists

Again, at this point, this is just a guess, one that would be thoroughly unsurprising but is not supported by hard facts.

But it’s worth remembering that Bush did roll out a domestic spying program to track anti-war activities, CIFA, the database for which was destroyed just weeks before NYT initially exposed Bush’s illegal program. We know there were ties between that program and heavy FBI investigations in the US. Then there’s the Antiwar investigation, started just weeks after the hospital confrontation, that used a counterterrorism purpose (a watchlist Antiwar posted) as the predicate to call for further investigation of Antiwar’s online publications, conducted in multiple cities. The Bush Administration was clearly conducting aggressive spying on anti-war activists, so it would be unsurprising to learn it used the threat of Iraqi involvement in the US to conduct illegal electronic surveillance.

Then there’s the suggestion in this NSA training program (from which the two slides above come — see this post for background) that NSA had a “present example” (in 2009) of an abuse akin to Project Minaret, in which a watchlist of citizens –largely critics of the Vietnam War — were surveilled in the name of tracking any foreign influence on them. Here’s Matthew Aid’s description of recent disclosures about that program.

As the Vietnam War escalated during Lyndon B. Johnson’s presidency, domestic criticism and protest movements abounded. Protesters surrounded the Pentagon in the fall of 1967 and two years later organized demonstrations and the Moratorium to End the War in Vietnam. The scale of the dissent angered Johnson as well as his successor, Richard Nixon. As fervent anti-communists, they wondered whether domestic protests were linked to hostile foreign powers, and they wanted answers from the intelligence community. The CIA responded with Operation Chaos, while the NSA worked with other intelligence agencies to compile watch lists of prominent anti-war critics in order to monitor their overseas communications. By 1969, this program became formally known as “Minaret.”

While the NSA slide describes the present example as “unauthorized targeting of suspected terrorists in the U.S.,” not targeting of anti-war activists, we know the collection shut down in March 2004 must have involved the targeting of people in the US based on a claim that some tie to Iraqi interests made them terrorists. Moreover, such targeting would be an exact parallel with Minaret (and while I haven’t discussed it yet, I am cognizant of Bernie Sanders’ recent questions about the targeting of members of Congress, as happened under Minaret and, for reasons explained in my earlier post, as the training program may allude to).

Again, I want to emphasize: this is just a wildarsed guess. though one consistent with what we know about Bush’s illegal program and his surveillance of anti-war activists generally.

Whatever it was, it was part of the package that almost led a bunch of DOJ officials to quit.

The Civil Liberties Celebration Hangover Wears Off

JusticePicAt the end of last week, I joked a little about privacy and civil liberties advocates having had the “best week ever”. It was indeed a very good week, but only relatively compared to the near constant assault on the same by the government. But the con is being put back in ICon by the Administration and its mouthpieces.

As I noted in the same post, Obama himself has already thrown cold water on the promise of his NSA Review Board report. Contrary to some, I saw quite a few positives in the report and thought it much stronger than I ever expected. Still, that certainly does not mean it was, or is, the particularly strong reform that is needed. And even the measures and discussion it did contain are worthless without sincerity and dedication to buy into them by the intelligence community and the administration. But if Obama on Friday was the harbinger of the walkback and whitewash of real reform, the foot soldiers are taking the field now to prove the point.

Sunday morning brought out former CIA Deputy Director Michael Morrell on CBS Face the Nation to say this:

I think that is a perception that’s somehow out there. It is not focused on any single American. It is not reading the content of your phone calls or my phone calls or anybody else’s phone calls. It is focused on this metadata for one purpose only and that is to make sure that foreign terrorists aren’t in contact with anybody in the United States.

Morrell also stated that there was “no abuse” by the NSA and that Ed Snowden was a “criminal” who has shirked his duties as a “patriot” by running. Now Mike Morrell is not just some voice out in the intelligence community, he was one of the supposedly hallowed voices that Barack Obama chose to consider “reform”.

Which ought to tell you quite a bit about what Barack Obama really thinks about true reform and your privacy interests. Not much. In fact, Morrell suggested (and Obama almost certainly agrees) that the collection dragnet should be expanded from telephony to also include email. Not exactly the kind of “reform” we had in mind.

Then, Sunday night 60 Minutes showed that fluffing the security state is not just a vice, but an ingrained habit for them. Hot on the heels of their John Miller blowjob on the NSA, last night 60 Minutes opened with a completely hagiographic puff piece on and with National Security Advisor Susan Rice. There was absolutely no news whatsoever in the segment, it was entirely a forum for Rice and her “interviewer”, Lesley Stahl, to spew unsupported allegations about Edward Snowden (He “has 1.5 million documents!”), lie about how the DOJ has interacted with the court system regarding the government surveillance programs (the only false statements have been “inadvertent”) and rehab her image from the Benghazi!! debacle. That was really it. Not exactly the hard hitting journalism you would hope for on the heels of a federal judge declaring a piece of the heart of the surveillance state unconstitutional.

Oh, yes, Susan Rice also proudly proclaimed herself “a pragmatist like Henry Kissinger which, as Tim Shorrock correctly pointed out, is not exactly reassuring from the administration of a Democratic President interested in civil liberties, privacy and the rule of law.

So, the whitewashing of surveillance dragnet reform is in full swing, let the giddiness of last week give way to the understanding that Barack Obama, and the Intelligence Community, have no intention whatsoever of “reforming”. In fact, they will use the illusion of “reform” to expand their authorities and power. Jonathan Turley noted:

Obama stacked the task force on NSA surveillance with hawks to guarantee the preservation of the program.

Not just preserve, but to give the false, nee fraudulent, patina of Obama Administration concern for the privacy and civil liberties concerns of the American citizenry when, in fact, the Administration has none. It is yet another con.

Or, as Glenn Greenwald noted:

The key to the WH panel: its stated purpose was to re-establish public confidence in NSA – NOT reform it.

There may be some moving of the pea beneath the shells, but there will be no meaningful reform from the administration of Barack Obama. The vehicle for reform, if there is to be one at all, will have to come from the Article III federal courts. for an overview of the path of Judge Leon’s decision in Klayman through the DC circuit, see this piece by NLJ’s Zoe Tillman.

Lastly, to give just a little hope after the above distressing content, I recommend a read of this excellent article by Adam Serwer at MSNBC on the cagy pump priming for surveillance reform Justice Sotomayor has done at the Supreme Court:

If Edward Snowden gave federal courts the means to declare the National Security Agency’s data-gathering unconstitutional, Sonia Sotomayor showed them how.

It was Sotomayor’s lonely concurrence in U.S. v Jones, a case involving warrantless use of a GPS tracker on a suspect’s car, that the George W. Bush-appointed Judge Richard Leon relied on when he ruled that the program was likely unconstitutional last week. It was that same concurrence the White House appointed review board on surveillance policy cited when it concluded government surveillance should be scaled back.

“It may be necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties,” Sotomayor wrote in 2012. “This approach is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks.”

Give the entire article a read, Adam is spot on. If there is to be reform on the surveillance dragnet, it will almost certainly have to be the handiwork of the courts, and Justice Sotomayor planted the seed. The constant barrage of truth and facts coming from the Snowden materials, what Jay Rosen rightfully terms “The Snowden Effect” is providing the food for Sotomayor’s seed to flower. Hopefully.

Conning the Record, Conning the Courts, Defrauding the People

In the parlance of the once and forever MTV set, civil libertarians just had one of the “Best Weeks Ever”. Here is the ACLU’s Catherine Crump weighing in on the surprising results of President Obama’s Review Board:

Friday, the president’s expressed willingness to consider ending the NSA’s collection of phone records, saying, “The question we’re going to have to ask is, can we accomplish the same goals that this program is intended to accomplish in ways that give the public more confidence that in fact the NSA is doing what it’s supposed to be doing?”

With this comment and the panel’s report coming on the heels of Monday’s remarkable federal court ruling that the bulk collection of telephone records is likely unconstitutional, this has been the best week in a long time for Americans’ privacy rights.

That “federal court ruling” is, of course, that of Judge Richard Leon handed down a mere five days ago on Monday. Catherine is right, it has been a hell of a good week.

But lest we grow too enamored of our still vaporous success, keep in mind Judge Leon’s decision, as right on the merits as it may be, and is, is still a rather adventurous and activist decision for a District level judge, and will almost certainly be pared back to some extent on appeal, even if some substantive parts of it are upheld. We shall see.

But the other cold water thrown came from Obama himself when he gave a slippery and disingenuous press conference Friday. Here is the New York Times this morning capturing spot on the worthless lip service Barack Obama gave surveillance reform yesterday:

By the time President Obama gave his news conference on Friday, there was really only one course to take on surveillance policy from an ethical, moral, constitutional and even political point of view. And that was to embrace the recommendations of his handpicked panel on government spying — and bills pending in Congress — to end the obvious excesses. He could have started by suspending the constitutionally questionable (and evidently pointless) collection of data on every phone call and email that Americans make.

He did not do any of that.
….
He kept returning to the idea that he might be willing to do more, but only to reassure the public “in light of the disclosures that have taken place.”

In other words, he never intended to make the changes that his panel, many lawmakers and others, including this page, have advocated to correct the flaws in the government’s surveillance policy had they not been revealed by Edward Snowden’s leaks.

And that is why any actions that Mr. Obama may announce next month would certainly not be adequate. Congress has to rewrite the relevant passage in the Patriot Act that George W. Bush and then Mr. Obama claimed — in secret — as the justification for the data vacuuming.

Precisely. The NYT comes out and calls the dog a dog. If you read between the lines of this Ken Dilanian report at the LA Times, you get the same preview of the nothingburger President Obama is cooking up over the holidays. As Ken more directly said in his tweet, “Obama poised to reject panel proposals on 702 and national security letters.” Yes, indeed, count on it.

Which brings us to that which begets the title of this post: I Con The Record has made a Saturday before Christmas news dump. And a rather significant one to boot. Apparently because they were too cowardly to even do it in a Friday news dump. Which is par for the course of the Obama Administration, James Clapper and the American Intel Shop. Their raison de’etre appears to be keep America uninformed, terrorized and supplicant to their power grabs. Only a big time operator like Big Bad Terror Voodoo Daddy Clapper can keep us chilluns safe!

So, the dump today is HERE in all its glory. From the PR portion of the “I Con” Tumblr post, they start off with Bush/Cheney Administration starting the “bulk” dragnet on October 4, 2001. Bet that is when it first was formalized, but the actual genesis was oh, maybe, September 12 or so. Remember, there were security daddies agitating for this long before September 11th.

Then the handcrafted Intel spin goes on to say this:

Over time, the presidentially-authorized activities transitioned to the authority of the Foreign Intelligence Surveillance Act (“FISA”). The collection of communications content pursuant to presidential authorization ended in January 2007 when the U.S. Government transitioned the TSP to the authority of the FISA and under the orders of the Foreign Intelligence Surveillance Court (“FISC”). In August 2007, Congress enacted the Protect America Act (“PAA”) as a temporary measure. The PAA, which expired in February 2008, was replaced by the FISA Amendments Act of 2008, which was enacted in July 2008 and remains in effect. Today, content collection is conducted pursuant to section 702 of FISA. The metadata activities also were transitioned to orders of the FISC. The bulk collection of telephony metadata transitioned to the authority of the FISA in May 2006 and is collected pursuant to section 501 of FISA. The bulk collection of Internet metadata was transitioned to the authority of the FISA in July 2004 and was collected pursuant to section 402 of FISA. In December 2011, the U.S. Government decided to not seek reauthorization of the bulk collection of Internet metadata.

After President Bush acknowledged the TSP in December 2005, two still-pending suits were filed in the Northern District of California against the United States and U.S. Government officials challenging alleged NSA activities authorized by President Bush after 9/11. In response the U.S. Government, through classified and unclassified declarations by the DNI and NSA, asserted the state secrets privilege and the DNI’s authority under the National Security Act to protect intelligence sources and methods. Following the unauthorized and unlawful release of classified information about the Section 215 and Section 702 programs in June 2013, the Court directed the U.S. Government to explain the impact of declassification decisions since June 2013 on the national security issues in the case, as reflected in the U.S. Government’s state secrets privilege assertion. The Court also ordered the U.S. Government to review for declassification all prior classified state secrets privilege and sources and methods declarations in the litigation, and to file redacted, unclassified versions of those documents with the Court.

This is merely an antiseptic version of the timeline of lies that has been relentlessly exposed by Marcy Wheeler right here on this blog, among other places. What is not included in the antiseptic, sandpapered spin is that the program was untethered from law completely and then “transitioned” to FISC after being exposed as such.

Oh, and lest anybody think this sudden disclosure today is out of the goodness of Clapper and Obama’s hearts, it is not. As Trevor Timm of EFF notes, most all of the “I Con” releases have been made only after being forced to by relevant FOIA and other court victories and that this one in particular is mostly germinated by EFF’s court order (and Vaughn index) obtained.

So, with that, behold the “I Con” release of ten different declarations previously filed and extant under seal in the Jewel and Shubert cases. Much of the language in all is similar template affidavit language, which you expect from such filings if you have ever dealt with them. As for individual dissection, I will leave that for later and for discussion by all in comments.

The one common theme that I can discern from a scan of a couple of note is that there is no reason in the world minimally redacted versions such as these could not have been made public from the outset. No reason save for the conclusion that to do so would have been embarrassing to the Article II Executive Branch and would have lent credence to American citizens properly trying to exercise and protect their rights in the face of a lawless and constitutionally infirm assault by their own government. The declarations by Mike McConnell, James Clapper, Keith Alexander, Dennis Blair, Frances Fleisch and Deborah Bonanni display a level of too cute by a half duplicity that ought be grounds for sanctions.

The record has been conned. Our federal courts have been conned. All as the Snowden disclosures have proven. And the American people have been defrauded by pompous terror mongers who value their own and institutional power over truth and honesty to those they serve. Clapper, Alexander and Obama have the temerity to call Ed Snowden a traitor? Please, look in the mirror boys.

Lastly, and again as Trevor Timm pointed out above, these are just the declarations for cases the EFF and others are still pursuing. What of the false secret declarations made in al-Haramain v. Obama, which the government long ago admitted were bogus? Why won’t the cons behind “I Con” release those declarations? What about the frauds perpetrated in Mohamed v. Jeppesen that have fraudulently ingrained states secrets cons into the government arsenal?

If the government wants to come clean, here is the opportunity. Frauds have been perpetrated on our courts, in our name. We should hear about that. Unless, of course, Obama and the “I Cons” are really nothing more than simple good old fashioned cons.

[By the way, Christmas is a giving season. If you have extra cheer to spread, our friends like Cindy Cohn, Trevor Timm, Hanni Fakhoury and Kurt Opsahl et al at EFF, and Ben Wizner, Alex Abdo, Catherine Crump et al at the ACLU all do remarkable work. Share your tax deductible love with them this season if you can. They make us all better off.]

Sy Hersh Writing about Politicized Intelligence Again, Syria Edition

Sy Hersh has a long piece in the London Review of Books accusing the Obama Administration of cherry-picking intelligence to present its case that Bashar al-Assad launched the chemical weapons attack on August 21.

To be clear, Hersh does not say that Assad did not launch the attack. Nor does he say al-Nusra carried out the attack. Rather, he shows that:

  • At some unidentified time since the beginning of the Civil War, Assad had discovered and neutralized wiretaps on his inner circle, leaving US intelligence blind to discussions happening among his top aides
  • Sensors planted to detect any movement of Assad’s CW immediately had not been triggered by the August 21 attack
  • By June, some intelligence entity had concluded that an Iraqi member of al-Nusra had the capability to manufacture sarin in quantity

A lot of the story serves to establish that two days after the attack, the US had yet to respond to it, presumably because it did not have any intelligence Syria had launched the attack, in part because nothing had triggered the sensors that had worked in the past. To develop its intelligence on the attack days afterwards, the NSA performed key word searches on already-collected radio communications of lower level Syrian military figures.

‘There are literally thousands of tactical radio frequencies used by field units in Syria for mundane routine communications,’ he said, ‘and it would take a huge number of NSA cryptological technicians to listen in – and the useful return would be zilch.’ But the ‘chatter’ is routinely stored on computers. Once the scale of events on 21 August was understood, the NSA mounted a comprehensive effort to search for any links to the attack, sorting through the full archive of stored communications. A keyword or two would be selected and a filter would be employed to find relevant conversations. ‘What happened here is that the NSA intelligence weenies started with an event – the use of sarin – and reached to find chatter that might relate,’ the former official said. ‘This does not lead to a high confidence assessment, unless you start with high confidence that Bashar Assad ordered it, and began looking for anything that supports that belief.’ The cherry-picking was similar to the process used to justify the Iraq war.

Ultimately, according to one of Hersh’s sources, they used intelligence collected in response to last December’s Syrian exercise on CW as the basis for what the Syrians would have been doing in case of an attack.

The former senior intelligence official explained that the hunt for relevant chatter went back to the exercise detected the previous December, in which, as Obama later said to the public, the Syrian army mobilised chemical weapons personnel and distributed gas masks to its troops. The White House’s government assessment and Obama’s speech were not descriptions of the specific events leading up to the 21 August attack, but an account of the sequence the Syrian military would have followed for any chemical attack. ‘They put together a back story,’ the former official said, ‘and there are lots of different pieces and parts. The template they used was the template that goes back to December.’

The White House presented this cherry-picked intelligence 9 days after the attack to a group of uncritical journalists (Hersh notes Jonathan Landay was excluded).

That’s the damning part of Hersh’s story on the intelligence used to support the Syrian warmongering (it is largely consistent with observations made at the time).

Hersh also describes how the NYT ignored the conclusions of MIT professor Theodore Postol, who determined at least some of the shells used in the attack were locally manufactured and had a much shorter range than publicly described.

Ultimately, though, Hersh’s biggest piece of news describes how someone — he doesn’t say who, but this part of his story relies on a senior intelligence consultant of unidentified nationality — sent Deputy DIA Director David Shedd a report on June 20 concluding that a former Iraqi CW expert with the capability of manufacturing sarin was operating in Eastern Ghouta.

An intelligence document issued in mid-summer dealt extensively with Ziyaad Tariq Ahmed, a chemical weapons expert formerly of the Iraqi military, who was said to have moved into Syria and to be operating in Eastern Ghouta. Read more

When Susan Rice Is Right, She’s Right!

gps31From the No Kidding Files, courtesy of Jason Leopold, comes this gem from vaunted National Security Advisor Susan Rice:

“Let’s be honest: at times we do business with govts that do not respect the rights we hold most dear”

Well, hello there Susan, I couldn’t agree more. Especially on days when I see things like this from the Glenn Greenwald and Pierre Omidyar Snowden file monopoly err, Barton Gellman at the Washington Post:

The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable.
….
The number of Americans whose locations are tracked as part of the NSA’s collection of data overseas is impossible to determine from the Snowden documents alone, and senior intelligence officials declined to offer an estimate. “It’s awkward for us to try to provide any specific numbers,” one intelligence official said in a telephone interview. An NSA spokeswoman who took part in the call cut in to say the agency has no way to calculate such a figure.

It is thoroughly loathsome that Americans must do business with a government that does this, and insane that it is their own government.

It is “awkward” to determine how many innocent Americans are rolled up in the latest out of control security state dragnet the United States government is running globally. Actually, that is not awkward, it is damning and telling. Therefore the American citizenry must not know, at any cost.

Susan Rice is quite right, we are forced to “do business” with a government that does “not respect the rights we hold most dear”

[Here is the full text of the Susan Rice speech today that the above quote was taken from. It is a great speech, or would be if the morals of the United States under Barack Obama matched the lofty rhetoric]

Imran Khan’s PTI Party Retaliates for Drone Strike, Outs Islamabad CIA Station Chief

Recall that back on November 21, John Brennan allowed the CIA to carry out a drone strike that hit a settled area of Pakistan rather than the tribal areas where most strikes occur. I noted that by striking within the province governed by former cricket star Imran Khan’s PTI party, Brennan was setting himself up for some significant blowback.

Today, less than one week after the drone strike, that blowback has hit hurricane force. From The Guardian:

The political party led by the former cricket star Imran Khan claims to have blown the cover of the CIA‘s most senior officer in Pakistan as part of an increasingly high-stakes campaign against US drone strikes.

The Pakistan Tehreek-e-Insaf (PTI) party named a man it claimed was head of the CIA station in Islamabad in a letter to police demanding he be nominated as one of the people responsible for a drone strike on 21 November, which killed five militants including senior commanders of the Haqqani Network.

John Brennan, the CIA director, was also nominated as an “accused person” for murder and “waging war against Pakistan”.

Recall that another station chief was outed in 2010, also in response to a drone strike. He left the country very quickly. If you insist on knowing the name that was revealed, this article mentions it, but the name strikes me as more of a cover name than a real name.

The document that names John Brennan and the Islamabad station chief is an FIR, or First Information Report. Here is how those reports work in Pakistan:

First Information Report (FIR) is a written document prepared by the police when they receive information about the commission of a cognizable offence. It is a report of information that reaches the police first in point of time and that is why it is called the First Information Report. It is generally a complaint lodged with the police by the victim of a cognizable offence or by someone on his/her behalf. Anyone can report the commission of a cognizable offence either orally or in writing to the police. Even a telephonic message can be treated as an FIR. It is a duty of police to register FIR without any delay or excuses. Non-registration of FIR is an offence and can be a ground for disciplinary action against the concerned police officer.

/snip/

A cognizable offence is one in which the police may arrest a person without warrant. They are authorized to start investigation into a cognizable case on their own and do not require any orders from the court to do so.

In the FIR, PTI officials are claiming that the station chief does not have diplomatic immunity and should be blocked from exiting the country. I wonder if John Kerry is going to have to make another surreptitious pick-up like the one he did when he spirited out of Pakistan the unidentified driver who killed a pedestrian on his failed mission to rescue Raymond Davis before his arrest in Lahore.

Khan’s party also has been attempting to shut down NATO supply vehicles passing through Khyber Pakhtunkhwa Province, but they have not been very successful in that regard. Returning to the Guardian article:

Khan responded with a massive rally in the provincial capital of Peshawar and ordered PTI activists to block vehicles carrying supplies to Nato troops in Afghanistan.

However, party workers have struggled to identify Nato cargo amid all the sealed containers plying the roads to Afghanistan. The exercise has received no support from the national government and the police have tried to stop PTI workers blocking lorries.

There also are reports of arrests for damaging shipping containers on trucks and attacking drivers.

Khan has clearly upped the stakes in his battle with Brennan. How will Brennan respond? At a bare minimum, more drone strikes in the province seem like a pretty safe bet.

In the Middle of Spying Scandal, Scotland Yard Gives Up on Another One

I’ll be honest. I’ve been thinking about Gareth Williams — the GCHQ spy found dead in a duffle bag in his safe house — since the Snowden leaks started. With each new disclosure, especially about GCHQ (though remember that Williams also worked with NSA closely on busting the liquids plot), I’ve wondered, “Is this the new spying effort that got Williams expertly killed?”

Which is why I find it so interesting that Scotland Yard chose today to announce — to much incredulity on both sides of the Atlantic — that he killed himself by accident.

His spy background and the fact that expensive, unworn women’s clothes were found at his flat provoked a wide range of “weird and wonderful” theories, London Police Deputy Assistant Commissioner Martin Hewitt said, but further investigations now suggested it was more likely he had not been murdered.

“Most probably, it was an accident,” Hewitt told reporters. “I’m convinced that Gareth’s death was in no way linked to his work.”

[snip]

Hewitt denied suggestions Britain’s spies had simply staged an elaborate cover-up.

“I do not believe I have had the wool pulled over my eyes.”

Just as an example, would any of the OPEC countries NSA and GCHQ hacked have reason to be particularly sensitive about it? There were past allegations Russian organized crime did him in — and I pointed out that those claims resembled an application of Gauss which reported tracked Lebanese bank data. Did some other financial institution catch him stealing their data? Did he catch someone stealing other data?

In any case, Williams’ death is a reminder that it wasn’t so outlandish when Snowden suggested he might be murdered for having leaked intelligence.

Lavabit and The Definition of US Government Hubris

Graphic by Darth

Graphic by Darth

Well, you know, if you do not WANT the United States Government sniffing in your and your family’s underwear, it is YOUR fault. Silly American citizens with your outdated stupid piece of paper you call the Constitution.

Really, get out if you are a citizen, or an American communication provider, that actually respects American citizen’s rights. These trivialities the American ethos was founded on are “no longer operative” in the minds of the surveillance officers who claim to live to protect us.

Do not even think about trying to protect your private communications with something so anti-American as privacy enabling encryption like Lavabit which only weakly, at best, even deigned to supply.

Any encryption that is capable of protecting an American citizen’s private communication (or even participating in the TOR network) is essentially inherently criminal and cause for potentially being designated a “selector“, if not target, of any number of searches, whether domestically controlled by the one sided ex-parte FISA Court, or hidden under Executive Order 12333, or done under foreign collection status and deemed “incidental”. Lavabit’s Ladar Levinson knows.

Which brings us to where we are today. Let Josh Gerstein set the stage:

A former e-mail provider for National Security Agency leaker Edward Snowden, Lavabit LLC, filed a legal brief Thursday detailing the firm’s offers to provide information about what appear to have been Snowden’s communications as part of a last-ditch offer that prosecutors rejected as inadequate.

The disagreement detailed in a brief filed Thursday with the U.S. Court of Appeals for the Fourth Circuit resulted in Lavabit turning over its encryption keys to the federal government and then shutting down the firm’s secure e-mail service altogether after viewing it as unacceptably tainted by the FBI’s possession of the keys.

I have a different take on the key language from Lavabit’s argument in their appellate brief though, here is mine:

First, the government is bereft of any statutory authority to command the production of Lavabit’s private keys. The Pen Register Statute requires only that a company provide the government with technical assistance in the installation of a pen- trap device; providing encryption keys does not aid in the device’s installation at all, but rather in its use. Moreover, providing private keys is not “unobtrusive,” as the statute requires, and results in interference with Lavabit’s services, which the statute forbids. Nor does the Stored Communications Act authorize the government to seize a company’s private keys. It permits seizure of the contents of an electronic communication (which private keys are not), or information pertaining to a subscriber (which private keys are also, by definition, not). And at any rate it does not authorize the government to impose undue burdens on the innocent target business, which the government’s course of conduct here surely did.

Second, the Fourth Amendment independently prohibited what the government did here. The Fourth Amendment requires a warrant to be founded on probable cause that a search will uncover fruits, instrumentalities, or evidence of a crime. But Lavabit’s private keys are none of those things: they are lawful to possess and use, they were known only to Lavabit and never used by the company to commit a crime, and they do not prove that any crime occurred. In addition, the government’s proposal to examine the correspondence of all of Lavabit’s customers as it searched for information about its target was both beyond the scope of the probable cause it demonstrated and inconsistent with the Fourth Amendment’s particularity requirement, and it completely undermines Lavabit’s lawful business model. General rummaging through all of an innocent business’ communications with all of its customers is at the very core of what the Fourth Amendment prohibits.

The legal niceties of Lavabit’s arguments are thus:

The Pen Register Statute does not come close. An anodyne mandate to provide information needed merely for the “unobtrusive installation” of a device will not do. If there is any doubt, this Court should construe the statute in light of the serious constitutional concerns discussed below, to give effect to the “principle of constitutional avoidance” that requires this Court to avoid constructions of statutes that raise colorable constitutional difficulties. Norfolk S. Ry. Co. v. City of Alexandria, 608 F.3d 150, 156–57 (4th Cir. 2010).

And, later in the pleading:

By those lights, this is a very easy case. Lavabit’s private keys are not connected with criminal activity in the slightest—the government has never accused Lavabit of being a co-conspirator, for example. The target of the government’s investigation never had access to those private keys. Nor did anyone, in fact, other than Lavabit. Given that Lavabit is not suspected or accused of any crime, it is quite impossible for information known only to Lavabit to be evidence that a crime has occurred. The government will not introduce Lavabit’s private keys in its case against its target, and it will not use Lavabit’s private keys to impeach its target at trial. Lavabit’s private keys are not the fruit of any crime, and no one has ever used them to commit any crime. Under those circumstances, absent any connection between the private keys and a crime, the “conclusion[] necessary to the issuance of the warrant” was totally absent. Zurcher, 436 U.S., at 557 n.6 (quoting, with approval, Comment, 28 U. Chi. L. Rev. 664, 687 (1961)).

What this boils down to is, essentially, the government thinks the keys to Lavabit’s encryption for their customers belong not just to Lavabit, and their respective customers, but to the United States government itself.

Your private information cannot be private in the face of the United States Government. Not just Edward Snowden, but anybody, and everybody, is theirs if they want it. That is the definition of bullshit.

[Okay, big thanks to Darth, who generously agreed to let us use the killer Strangelovian graphic above. Please follow Darth on Twitter]