In the Middle of Spying Scandal, Scotland Yard Gives Up on Another One

I’ll be honest. I’ve been thinking about Gareth Williams — the GCHQ spy found dead in a duffle bag in his safe house — since the Snowden leaks started. With each new disclosure, especially about GCHQ (though remember that Williams also worked with NSA closely on busting the liquids plot), I’ve wondered, “Is this the new spying effort that got Williams expertly killed?”

Which is why I find it so interesting that Scotland Yard chose today to announce — to much incredulity on both sides of the Atlantic — that he killed himself by accident.

His spy background and the fact that expensive, unworn women’s clothes were found at his flat provoked a wide range of “weird and wonderful” theories, London Police Deputy Assistant Commissioner Martin Hewitt said, but further investigations now suggested it was more likely he had not been murdered.

“Most probably, it was an accident,” Hewitt told reporters. “I’m convinced that Gareth’s death was in no way linked to his work.”

[snip]

Hewitt denied suggestions Britain’s spies had simply staged an elaborate cover-up.

“I do not believe I have had the wool pulled over my eyes.”

Just as an example, would any of the OPEC countries NSA and GCHQ hacked have reason to be particularly sensitive about it? There were past allegations Russian organized crime did him in — and I pointed out that those claims resembled an application of Gauss which reported tracked Lebanese bank data. Did some other financial institution catch him stealing their data? Did he catch someone stealing other data?

In any case, Williams’ death is a reminder that it wasn’t so outlandish when Snowden suggested he might be murdered for having leaked intelligence.

Share this entry

Lavabit and The Definition of US Government Hubris

Graphic by Darth

Graphic by Darth

Well, you know, if you do not WANT the United States Government sniffing in your and your family’s underwear, it is YOUR fault. Silly American citizens with your outdated stupid piece of paper you call the Constitution.

Really, get out if you are a citizen, or an American communication provider, that actually respects American citizen’s rights. These trivialities the American ethos was founded on are “no longer operative” in the minds of the surveillance officers who claim to live to protect us.

Do not even think about trying to protect your private communications with something so anti-American as privacy enabling encryption like Lavabit which only weakly, at best, even deigned to supply.

Any encryption that is capable of protecting an American citizen’s private communication (or even participating in the TOR network) is essentially inherently criminal and cause for potentially being designated a “selector“, if not target, of any number of searches, whether domestically controlled by the one sided ex-parte FISA Court, or hidden under Executive Order 12333, or done under foreign collection status and deemed “incidental”. Lavabit’s Ladar Levinson knows.

Which brings us to where we are today. Let Josh Gerstein set the stage:

A former e-mail provider for National Security Agency leaker Edward Snowden, Lavabit LLC, filed a legal brief Thursday detailing the firm’s offers to provide information about what appear to have been Snowden’s communications as part of a last-ditch offer that prosecutors rejected as inadequate.

The disagreement detailed in a brief filed Thursday with the U.S. Court of Appeals for the Fourth Circuit resulted in Lavabit turning over its encryption keys to the federal government and then shutting down the firm’s secure e-mail service altogether after viewing it as unacceptably tainted by the FBI’s possession of the keys.

I have a different take on the key language from Lavabit’s argument in their appellate brief though, here is mine:

First, the government is bereft of any statutory authority to command the production of Lavabit’s private keys. The Pen Register Statute requires only that a company provide the government with technical assistance in the installation of a pen- trap device; providing encryption keys does not aid in the device’s installation at all, but rather in its use. Moreover, providing private keys is not “unobtrusive,” as the statute requires, and results in interference with Lavabit’s services, which the statute forbids. Nor does the Stored Communications Act authorize the government to seize a company’s private keys. It permits seizure of the contents of an electronic communication (which private keys are not), or information pertaining to a subscriber (which private keys are also, by definition, not). And at any rate it does not authorize the government to impose undue burdens on the innocent target business, which the government’s course of conduct here surely did.

Second, the Fourth Amendment independently prohibited what the government did here. The Fourth Amendment requires a warrant to be founded on probable cause that a search will uncover fruits, instrumentalities, or evidence of a crime. But Lavabit’s private keys are none of those things: they are lawful to possess and use, they were known only to Lavabit and never used by the company to commit a crime, and they do not prove that any crime occurred. In addition, the government’s proposal to examine the correspondence of all of Lavabit’s customers as it searched for information about its target was both beyond the scope of the probable cause it demonstrated and inconsistent with the Fourth Amendment’s particularity requirement, and it completely undermines Lavabit’s lawful business model. General rummaging through all of an innocent business’ communications with all of its customers is at the very core of what the Fourth Amendment prohibits.

The legal niceties of Lavabit’s arguments are thus:

The Pen Register Statute does not come close. An anodyne mandate to provide information needed merely for the “unobtrusive installation” of a device will not do. If there is any doubt, this Court should construe the statute in light of the serious constitutional concerns discussed below, to give effect to the “principle of constitutional avoidance” that requires this Court to avoid constructions of statutes that raise colorable constitutional difficulties. Norfolk S. Ry. Co. v. City of Alexandria, 608 F.3d 150, 156–57 (4th Cir. 2010).

And, later in the pleading:

By those lights, this is a very easy case. Lavabit’s private keys are not connected with criminal activity in the slightest—the government has never accused Lavabit of being a co-conspirator, for example. The target of the government’s investigation never had access to those private keys. Nor did anyone, in fact, other than Lavabit. Given that Lavabit is not suspected or accused of any crime, it is quite impossible for information known only to Lavabit to be evidence that a crime has occurred. The government will not introduce Lavabit’s private keys in its case against its target, and it will not use Lavabit’s private keys to impeach its target at trial. Lavabit’s private keys are not the fruit of any crime, and no one has ever used them to commit any crime. Under those circumstances, absent any connection between the private keys and a crime, the “conclusion[] necessary to the issuance of the warrant” was totally absent. Zurcher, 436 U.S., at 557 n.6 (quoting, with approval, Comment, 28 U. Chi. L. Rev. 664, 687 (1961)).

What this boils down to is, essentially, the government thinks the keys to Lavabit’s encryption for their customers belong not just to Lavabit, and their respective customers, but to the United States government itself.

Your private information cannot be private in the face of the United States Government. Not just Edward Snowden, but anybody, and everybody, is theirs if they want it. That is the definition of bullshit.

[Okay, big thanks to Darth, who generously agreed to let us use the killer Strangelovian graphic above. Please follow Darth on Twitter]

Share this entry

The New Antiwar Release: “They can’t keep this stuff secret. Nothing is secret anymore.”

Two years ago, Antiwar.com became aware of files relating to the site, that had been requested and were posted in relation to a FOIA on allegations Israelis had observed the 9/11 attack. I wrote about those files here. The files — which started in relation to another investigation on Pakistani terrorism suspects and got picked up because Justin Raimondo had written about the Israeli allegations — were referred to San Francisco for further investigation. But since the FOIA that had returned the documents pertained to the Israeli allegations, it was not immediately clear what happened to the San Francisco investigation.

Antiwar FOIAed then — after FBI wouldn’t give them their file — sued, with the help of ACLU.

What they learned is that:

  1. A complaint Eric Garris made in 2001 was treated as a threat by San Francisco’s FBI office
  2. An investigation drummed up, in part, because of Garris and Raimondo’s antiwar views in 2004 used that misinterpreted complaint as one justification to demand further investigation

The substantive content of what they got includes:

  • 2 pages dating to 1972 (!) on a mock tribunal Garris served on as a judge for representing the Peace and Freedom Party. (Note, the file in question postdates J Edgar Hoover’s death by 4 months, so it can’t be called a genuine Hoover file.)
  • 2 pages pertaining to San Francisco’s utter fuck-up of an investigation into a threat Garris forwarded to them on 9/12/01. Antiwar had received a threatening email, but when Garris forwarded the email to the FBI, the FBI treated it as a cyberthreat to the FBI.
  • 22 pages from a much larger chunk of what was supposed to be a Threat Assessment conducted in Newark and dated 4/30/04 (this is the part that had been revealed before). I believe my comments on that material here remain valid; I’ll explain what’s new below.
  • 3 pages recording (sort of) San Francisco’s response to the Newark referral dated 7/29/04, though the FBI has redacted the results of that response.
  • 2 pages from Pittsburgh (missing a third page between the two) from what appears to be a referral of a lead from the Newark Threat Assessment dated 8/18/04. (Remember, according to a DOJ IG Report, Pittsburgh was one of the worst offenders for harassing anti-war protestors.)
  • 2 pages from some activity from Springfield, IL dated 9/12/05. The tie to Antiwar is tangential, but because it has a file, this office seems to have suggested digging up all the old documents on it. This file notes that “SF declined the recommendation of Newark,” which is how we can surmise San Francisco declined to open a preliminary investigation into them.
  • 2 pages from a referral to St. Louis dated 9/22/05. Given the timing, I suspect it is a follow-up to the Springfield lead, but most of the file is purportedly outside the scope of the FOIA (so unrelated to Antiwar).
  • 2 pages from the main Counterterrorism office referring back to the original Newark Threat Assessment dated 4/22/08 as part of a longer review (the Newark investigation of Antiwar is mentioned on page 6 of the document, and the earlier materials is deemed unrelated).

In other words, there was the San Francisco fuck-up, the Threat Assessment tied to a terrorism case in Newark, and then the effort to use that to drum up further investigation of Antiwar that way.

What’s particularly interesting is the material that had been withheld for privacy reasons in the earlier FOIA release (see pp 62-71) which are now unredacted. In addition to personal information on Garris and Raimundo, it includes observations about what had been written about and by them.

One entry, for example, describes a story about the FBI’s monitoring of peace groups in which Raimundo is quoted.

The Argus, dated 2/18/2003, HEADLINE: Watchlist resurrects ’50s fears; critics say FBI information in many ways is worse than Mc Carthy’s hunt for communists, by Sean Holstege. In this article Justin Raimondo states “They can’t keep this stuff secret. Nothing is secret anymore.”

Perhaps the FBI wouldn’t turn this file over without a lawsuit to prevent us from knowing they thought that was newsworthy?

Based on that, other writings, some of their readers (as laid out in my earlier post) and the fact that Raimondo had posted a very very early terrorist watchlist he had found on the Internet, FBI concluded Garris and Raimondo needed more attention. These two judgments about them were redacted in the earlier FOIA release.

Due to the lack of background information available on Justin Raimondo, it is possible that this name is only a pseudonym used on www.antiwar.com.

Many individuals do view this website including individuals who are currently under investigation and Eric Garris has shown intent to disrupt FBI operations by hacking the FBI website.

And from this the Newark office appears to have tried to get an Antiwar publication investigated.

One more observation. Page 15 and 16 of the current release seems to be the release notice for what I’ve been calling “the Newark investigation.” But in fact, it appears not to be the same files released in the earlier FOIA, because that one had extensive hand lettering (and so I suspect that version of the file were the documents that resided in Newark’s office files). Just as interesting, though, FBI withheld 64 pages (probably actually more) using a “trade secrets” exemption.

Now, I might think that file came from ECAU, the web monitoring part of the FBI at the time that Newark instructed to keep monitoring Antiwar.com. But the B4 exemption suggests it is some private entity. So is that chunk of 64 documents the work of some contractor?

I’d sure like to know. Cause apparently someone has (or had) made it their trade secret to read the writings of peace activists for the FBI.

 

Share this entry

Apparently Criticizing TSA’s Boss Is Anti-Worker

Yasha Levine insinuates I’m responsible for Paul Ciancia’s attack on TSA workers the other day.

The “progressive” blog FireDogLake was perhaps the biggest and loudest leftie media outlet to promote the anti-TSA crusade. The site even launched a “Petition to Investigate the TSA,” adopting right-wing lingo in calling the agency’s pat down procedures “aggressive groping” and getting “sexually assaulted by a government official.” FireDogLake blogger Marcy Wheeler frequently referred to TSA checkpoints procedures as “rape” and “groping.” In December 2010, she warned her readers that anywhere from a quarter-million to 1 million people “had their genitalia groped by a stranger working for the government” in a single week, and the Obama administration simply didn’t care. “That sort of seems like a lot of junk-touching in just one week.”

Two years later, Wheeler was comparing TSA workers to rapists, Tweeting out: “Rape is not about sexual enjoyment. It’s about power. So is this TSA stuff.”

[snip]

But so far the left has been strangely silent about the violent right-wing rhetoric and conspiracy-mongering that inspired the TSA shooting at LAX. I guess that isn’t very surprising, considering the left helped enable it.

I’m not going to respond to this beyond pulling together all the posts where I talk about how asinine the TSA screenings are. If there’s a villain in them, it’s TSA Director John Pistole, the guy setting that asinine policy, not the line workers who implement his policy. There are a number I haven’t included talking about John Pistole’s potential role in the UndieBomb 2.0 leak, some references in “Links” posts, some on relative choices in counterterrorism approaches, and a few on contractors.

Note, especially, the post with the asterisk, where I unpacked the illogic of Levine’s first conspiracy theory on TSA, which might explain why he’s now accusing me of contributing to someone’s death.

That is all.

June 28, 2007: TSA versus Booz Allen

August 15, 2007: Behavior Detection

November 22, 2010: John Pistole Wants Us to Be Afraid of His Shadow

November 22, 2010: White House: Only 170,000 People Have Had Genitalia Groped by Complete Stranger in Last Week

November 23, 2010: Did Just 170,000 Passengers Get Groped by Strangers Last Week? Or a Million?

*November 25, 2010: Correlation Does Not Equal KochNation

December 1, 2010: FBI Entrapment Leads to TSA Pat-Downs

December 9, 2010: John Pistole: “What I Think Is Appropriate in Terms of Privacy”

December 19, 2010: Protecting DC’s Metro from the FBI and Facebook

December 27, 2010: TSA’s Legal Justification for Gate Grope

May 17, 2011: Apparently the Terrorists Can’t Learn How Much Radiation They’ll Get from Going through TSA Security

May 21, 2011: First Mickey Donned Night Vision Goggles, Now Mickey Embraces GateGrope

June 14, 2011: More Security Theater as Play

May 7, 2012: It Takes an Attempted Terrorist Attack to Actually Test Backscatter Machines

August 12, 2012: Racial Profiling Is Wrong, Sometimes

August 7, 2013: The Ooga Booga* Continues to Wear Off 

Share this entry

Angry Mom and First Principles: What is the Nature of a Broken Lock?

This won’t be a cool, calm, collected post like Marcy writes, because it’s me, the angry mom. You might even have seen me Tuesday afternoon in the school parking lot waiting to pick up a kid after sports practice. I was the one gripping the steering wheel too tightly while shouting, “BULLSHIT!” at the top of my lungs at the radio.

The cause? This quote by President Obama and the subsequent interpretation by NPR’s Ari Shapiro.

President Obama to ABC’s new Latino channel, Fusion (1:34): It’s important for us to make sure that as technology develops and expands and the capacity for intelligence gathering becomes a lot greater that we make sure that we’re doing things in the right way that are reflective of our values.

Ari Shapiro (1:46): And, Audie, I think what you’re hearing in that quote is a sense that is widespread in this administration that technological improvements have let the government do all kinds of things they weren’t able to do before. They tapped the German Chancellor’s personal cellphone and nobody really stopped to ask whether these are things they should be doing. And so that question, just because we can do something, well, does it mean we should be doing it, that’s the question that seems to be the focus of this review.

Bullshit, bullshit, bullshit.

Here, let me spell this out in terms a school-aged kid can understand.

photo, left: shannonpatrick17-Flickr; left, Homedit

This is a doorknob with a lock; so is the second closure device on the right.

The lock technology used on the second door is very different; it’s no longer simple analog but digitally enhanced. The second lock’s technology might be more complicated and difficult to understand. But it’s still a lock; its intrinsic purpose is to keep unauthorized persons out.

If one were to pick either lock in any way, with any tools to enter a home that is not theirs and for which they do not have permission to enter, they are breaking-and-entering.

If it’s law enforcement breaching that lock, they’d better have a damned search warrant or a court order, in the absence of a clear emergency or obvious crime in progress.

The argument that information technology has advanced to the point where the NSA blindly stumbles along without asking whether they should do what they are doing, or asking whether they are acting legally is bullshit. They have actively ignored or bypassed the proverbial lock on the door. It matters not where the lock is located, inside or outside the U.S.

The Washington Post’s revelation Wednesday that the NSA cracked Yahoo’s and Google’s SSLsecure sockets layer — is equivalent to evidence of deliberately busted door locks. So is the wholesale undermining of encryption systems on computers, cellphones, and network equipment revealed in reports last month, whether by weakened standards or by willfully placed holes integrated in hardware or software.

The NSA has quite simply broken into every consumer electronic device used for communications, and their attached networks. When the NSA was forced to do offer explanations for their actions, they fudged interpretations of the Constitution and laws in order to continue what they were doing. Their arguments defending their behavior sound a lot like a child’s reasoning. Read more

Share this entry

The White House — Lisa Monaco? — “Cutting Off the Intelligence Community”

Too bad for Obama he has decided the great new way to aggressively prosecute leaks without the bad PR of doing it through the Courts is to have James Clapper’s Inspector General investigate them. Because I’m betting the IC IG will be unenthusiastic about hunting down this admitted leaker.

Some U.S. intelligence officials said they were being blamed by the White House for conducting surveillance that was authorized under the law and utilized at the White House.

“People are furious,” said a senior intelligence official who would not be identified discussing classified information. “This is officially the White House cutting off the intelligence community.”

But I’m a bit more interested in this barb, putting Homeland Security Advisor Lisa Monaco solidly in the line of communication receiving intelligence from wiretaps on foreign leaders.

Any decision to spy on friendly foreign leaders is made with input from the State Department, which considers the political risk, the official said. Any useful intelligence is then given to the president’s counter-terrorism advisor, Lisa Monaco, among other White House officials.

As I have twice noted, Monaco brings dramatically different experience to the position than her predecessor, John Brennan. Rather than being implicated in the illegal program that was the root of many of the problems as the program moved under FISA Court review, she had had to try to clean them up while Assistant Attorney General for National Security, including at least the upstream violations. She also participated in the decision to shut down the Internet dragnet collection program.

After prior bitching about her silence during this scandal, she penned an op-ed last week laying out the evolving White House position.

Today’s world is highly interconnected, and the flow of large amounts of data is unprecedented. That’s why the president has directed us to review our surveillance capabilities, including with respect to our foreign partners. We want to ensure we are collecting information because we need it and not just because we can.

[snip]

Going forward, we will continue to gather the information we need to keep ourselves and our allies safe, while giving even greater focus to ensuring that we are balancing our security needs with the privacy concerns all people share.

The implication, of course, is that the same person voicing this “because we need it and not just because we can” has been implicated by receiving intelligence with Merkel’s and other leaders names on it, and may be responsible for not alerting the President to it. The accuracy of the claim, of course, depends on whether the White House really shut down the collection on Merkel earlier this summer or only in the last week or so; remember tasking priorities are reassessed biannually. Moreover, it’s not like wiretaps on allied leaders would be the primary focus of someone whose job centers on counterterrorism.

The thing is, this attack can backfire, as having received this information puts Monaco in an appropriate position to know whether we were collecting it because we could, not because we need to.

Monaco has, in the past, been part of a team that deemed a program not valuable enough to sustain. Which means she has a little experience for the pushback the IC may be throwing at her in coming days.

Share this entry

Who Is Behind Latest Iran-Pakistan Border Incident? Who Benefits?

Before diving into Friday night’s border incident where fourteen Iranian border guards were killed and Iran retaliated the next morning by hanging sixteen prisoners already in detention, we need to look back at the important events surrounding other such outbreaks of violence at the Iran-Pakistan border.

On January 1 of 2012, Pakistan detained three Iranian border guards whom they claimed had crossed into Pakistan. Details of the event were sketchy, but Iran claimed the guards were chasing drug smugglers and most of the stories on the event brought up the likely involvement of the group known as Jundallah. Less than two weeks later, a prominent Iranian nuclear scientist was assassinated on January 11. Only two days after that event, the famous “false flag” article by Mark Perry appeared in Foreign Policy, making the remarkable claim that Mossad agents were posing as CIA agents while recruiting members of Jundallah for operations including assassinations.  Marcy had a series of three posts (one, two, three) delving into the many implications surrounding the false flag accusation. Another border incident then happened in late January, where six “Pakistanis” were killed by Iranian border agents, but there was a lot of confusion over just who the victims were, including their nationality.

Here is how Reuters first broke the news Saturday on this latest incident:

Fourteen Iranian border guards were killed and three others captured by “bandits” on the southeastern frontier with Pakistan overnight, Iranian media reported on Saturday.

In response, the Iranian judiciary executed 16 people it said were elements of “terrorist” groups, according to the ISNA news agency. There were no further details of who they were or whether or when they had been tried.

A follow-up story by Dawn from Sunday has more details, with the identity of the attackers unknown (but Jundallah is still mentioned prominently in the article):

It was still unclear whether the attackers were drug smugglers or armed opposition groups.

However, Iran’s Deputy Interior Minister Ali Abdollahi called on the Pakistani government to “take measures to control the border more seriously.”

Pakistan’s charge d’affaires was received at the Iranian foreign ministry to receive an official demand that Islamabad “act firmly with officials and members of terrorist groups who have fled to Pakistani territory,” IRNA reported.

The Dawn article also notes a second, separate border incident on Sunday in which one Pakistani was killed and four others were wounded.

Responsibility for the attack has now been claimed by a group known as Jeish Al-Adl:

A little-known Iranian Sunni group says it carried out the killing of 14 border guards on Friday night.

Jaish al-Adl said the attack was in retaliation for an alleged Iranian “massacre” in Syria and the “cruel treatment” of Sunnis in Iran.

Iran is now saying that they are a subgroup within Jundallah:

14 Iranian border guards were killed and 6 more were injured during the terrorist attack in Saravan border region in Southeastern Iran in the early hours of Saturday morning. The terrorists who have reportedly been members of the outlawed Jeish Al-Adl radical Sunni Wahhabi movement affiliated to the terrorist Jundollah group fled into Pakistan after the operation in Iran’s Southeastern Sistan and Balouchestan province.

It seems quite interesting to me that Iran would point out the “radical Sunni Wahhabi” connection of the group they are blaming. Of course, the primary sponsor of “radical Sunni Wahhabi” teachings is Saudi Arabia through their madrassas. But Iran seems to be dancing around an outright referral to Saudi involvement in this attack, even though it would make sense since we know that Bandar is now very upset both with the US “failure” to launch a strike on the Assad regime in Syria and the US diplomatic push toward Iran. This same Fars News article doesn’t name names, but refers to “two countries” providing financial support and “three countries” providing intelligence and equipment to them: Read more

Share this entry

If the Saudis Take Their Toys and Go Home, Have They Still Won the Arab Spring?

David Ignatius adds something to the reporting on the Saudis’ snit that has been missing: situating it in America’s decision in 2011 to let Hosni Mubarak fall.

The bad feeling that developed after Mubarak’s ouster deepened month by month: The U.S. supported Morsi’s election as president; opposed a crackdown by the monarchy in Bahrain against Shiites protesters; cut aid to the Egyptian military after it toppled Morsi and crushed the Brotherhood; promised covert aid to the Syrian rebels it never delivered; threatened to bomb Syria and then allied with Russia, instead; and finally embarked on a diplomatic opening to Iran, Saudi Arabia’s deadly rival in the Gulf.

Of course, Ignatius depicts the Saudi version here, not reality. US condemnation of Bahrain’s crackdown has been muted, and the US has started shipping arms again. This litany doesn’t mention the Saudi-favored policies the US supported: overthrowing long-time Saudi annoyance Muammar Qaddafi, resolving the Yemeni uprising in such a way that largely maintained the status quo. And it’s not the Brotherhood so much troubles the Saudis (indeed, they’re supporting Islamic extremists elsewhere), but the notion of popular legitimacy (which is not to say Morsi had that when he was overthrown).

But it does reflect what I think is genuinely behind Saudi disengagement. After some setbacks in 2011 — notably, Mubarak’s ouster, but also the need to increase its bribes to its own people to ensure stability — the Saudis found a way to use the rhetoric of popular uprising selectively to pursue their own hegemonic interests. They believed they were on their way to do so in Syria, as well.

With the coup in Egypt and Obama’s tepid response to it, however, the cost of popular legitimacy started to rise again. And with the US backing out of its efforts to use “rebels” (including foreign fighters) to oust Assad, Saudi’s feigned support for popular legitimacy disappeared. That notion reverted to being just another force that might endanger the throne. And as the US gets closer to a deal with Iran — a development that significantly threatens Saudi leverage in our “special relationship” in any case — I suspect the Saudis decided a temper tantrum was necessary. More importantly, I worry they disengaged from the UN because they are considering alternative means of pursuing their interests, means that would be loudly condemned in that body.

The Saudis are running out of money and oil to ensure their own stability, and asserting greater hegemony over the Middle East presented a way to retain it. I assume they intend to keep pursuing that greater hegemony with us or against us.

Share this entry

On that Acknowledged Covert Op in Syria

The NYT has a tick-tock of Obama’s Syria policy. I find it fascinating for two reasons.

Obama uses “covert” status as a legal fiction, nothing more

First, consider the coverage of the covert op — one acknowledged explicitly by Chuck Hagel in Senate testimony. NYT says President Obama actually signed the Finding authorizing arming the rebels in April, not June, as Hagel claimed, but Obama did not move to implement it right away.

President Obama had signed a secret order in April — months earlier than previously reported — authorizing a C.I.A. plan to begin arming the Syrian rebels.

Indeed, the story may have been driven by CIA types trying to blame Obama for indolence after first signing that finding.

As to the decision to do this as a covert op, NYT describes it arose — first of all — out of difficulties over using the Armed Forces to overthrow a sovereign government.

But debate had shifted from whether to arm Syrian rebels to how to do it. Discussions about putting the Pentagon in charge of the program — and publicly acknowledging the arming and training program — were eventually shelved when it was decided that too many legal hurdles stood in the way of the United States’ openly supporting the overthrow of a sovereign government.

Those difficulties, of course, were the same ones present that should have prevented Obama from considering bombing a sovereign government in August, which of course weren’t the ones that ultimately persuaded Obama not to bomb.

The big reason to do it as a covert op, however, came from the need to be able to deny we were arming al Qaeda-linked rebels.

Besides the legal worries, there were other concerns driving the decision to make the program a secret.

As one former senior administration official put it, “We needed plausible deniability in case the arms got into the hands of Al Nusra.”

Yet in spite of this explanation — one which you’d think would demand secrecy — the NYT notes that Ben Rhodes went and announced this policy publicly.

But, the NYT notes (perhaps in anticipation for the inevitable FOIA), the President didn’t say anything about it himself.

Where the hell was the IC getting its rosy scenario about Assad’s overthrow?

The other striking thing about the story is how it portrays Obama’s policies to have been driven by (unquestioned by the NYT) overly rosy assessments of Assad’s demise.

Read more

Share this entry

US Isn’t Collecting Only Electronic Data On You — Huge Biometric Database Under Construction, Too

Edward Snowden’s revelations have shed much light on how secret government programs are collecting huge amounts of telephone, email and other electronic data generated by every US citizen even though, as Marcy has shown repeatedly, claims that collecting all of this data have enabled the capture of terrorists turn out to be significantly overblown. Sadly, it’s not just records of our communications that the government is collecting. The FBI is taking the lead in putting together what it calls Next Generation Identification. This program will expand the conventional FBI fingerprint database to include significant amounts of biological, or biometric data. From the FBI’s own description:

The future of identification systems is currently progressing beyond the dependency of a unimodal (e.g., fingerprint) biometric identifier towards multimodal biometrics (i.e., voice, iris, facial, etc.). The NGI Program will advance the integration strategies and indexing of additional biometric data that will provide the framework for a future multimodal system that will facilitate biometric fusion identification techniques. The framework will be expandable, scalable, and flexible to accommodate new technologies and biometric standards, and will be interoperable with existing systems. Once developed and implemented, the NGI initiatives and multimodal functionality will promote a high level of information sharing, support interoperability, and provide a foundation for using multiple biometrics for positive identification.

Wait. See that “etc.” in the “voice, iris, facial, etc”? Given the government’s behavior on electronic data, throwing in an “etc.” on biometric data is pretty unnerving. Impressive work is being done by the Electronic Privacy Information Center to shed light on just what the government is up to with Next Generation Identification. Here is their description of the program:

The Federal Bureau of Investigation is developing a biometric identification database program called “Next Generation Identification” (NGI). When completed, the NGI system will be the largest biometric database in the world. The vast majority of records contained in the NGI database will be of US citizens. The NGI biometric identifiers will include fingerprints, iris scans, DNA profiles, voice identification profiles, palm prints, and photographs. The system will include facial recognition capabilities to analyze collected images. Millions of individuals who are neither criminals nor suspects will be included in the database. Many of these individuals will be unaware that their images and other biometric identifiers are being captured. Drivers license photos and other biometric records collected by civil service agencies could be added to the system. The NGI system could be integrated with other surveillance technology, such as Trapwire, that would enable real-time image-matching of live feeds from CCTV surveillance cameras. The Department of Homeland Security has expended hundreds of millions of dollars to establish state and local surveillance systems, including CCTV cameras that record the routine activities of millions of individuals. There are an estimated 30 million surveillance cameras in the United States. The NGI system will be integrated with CCTV cameras operated by public agencies and private entities.

So just as the government has moved far beyond tapping communications only with a warrant to include the communications of innocent civilians, biometric identifiers of innocent civilians will be included in NGI alongside identifiers of known criminals. And what could possibly go wrong with our information being assembled in this way? Here’s how EPIC says the database will be built and maintained: Read more

Share this entry