Further Implications of UndieBomb II Leaker Guilty Plea

As you have likely heard by now, a former FBI agent has agreed to plead guilty to leaking material about the second underwear bomb attempt to reporters in May of 2012. Charlie Savage of the New York Times has the primary rundown:

A former Federal Bureau of Investigation agent has agreed to plead guilty to leaking classified information to The Associated Press about a foiled bomb plot in Yemen last year, the Justice Department announced on Monday. Federal investigators said they identified him after obtaining phone logs of Associated Press reporters.

The retired agent, a former bomb technician named Donald Sachtleben, has agreed to serve 43 months in prison, the Justice Department said. The case brings to eight the number of leak-related prosecutions brought under President Obama’s administration; under all previous presidents, there were three such cases.

“This prosecution demonstrates our deep resolve to hold accountable anyone who would violate their solemn duty to protect our nation’s secrets and to prevent future, potentially devastating leaks by those who would wantonly ignore their obligations to safeguard classified information,” said Ronald C. Machen Jr., the United States attorney for the District of Columbia, who was assigned to lead the investigation by Attorney General Eric H. Holder Jr.

In a twist, Mr. Sachtleben, 55, of Carmel, Ind., was already the subject of a separate F.B.I. investigation for distributing child pornography, and has separately agreed to plead guilty in that matter and serve 97 months. His total sentence for both sets of offenses, should the plea deal be accepted by a judge, is 140 months.

Here is the DOJ Press Release on the case.

Here is the information filed in SDIN (Southern District of Indiana). And here is the factual basis for the guilty plea on the child porn charges Sachtleben is also pleading guilty to.

So Sachtleben is the leaker, he’s going to plead guilty and this all has a nice beautiful bow on it! Yay! Except that there are several troubling issues presented by all this tidy wonderful case wrap up.

First off, the information on the leak charges refers only to “Reporter A”, “Reporter A’s news organization” and “another reporter from Reporter A’s news organization”. Now while the DOJ may be coy about the identities, it has long been clear that the “news organization” is the AP and “Reporter A” and “another reporter” are AP national security reporters Matt Apuzzo and Adam Goldman (I’d hazard a guess probably in that order) and the subject article for the leak is this AP report from May 7, 2012.

What is notable about who the reporters are, and which story is involved, is that this is the exact matter that was the subject of the infamous AP phone records subpoenas that were incredibly broad – over 20 business and personal phone lines. These subpoenas, along with those in the US v. Steven Kim case collected against James Rosen and Fox News, caused a major uproar about the sanctity of First Amendment press and government intrusion thereon.

The issue here is that Attorney General Eric Holder and the DOJ, as a result of the uproar over the Read more

ACLU to Jim Comey: Welcome. Now Fix This.

Jim Comey has officially been in charge of the FBI for less than two weeks.

Today, in honor of Constitution Day, the ACLU just released a report showing how the FBI’s expanded mandate since 9/11 has led to Constitutional abuses.

Most of the details of the report have been reported here in depth. But the Big Data section includes some details I haven’t covered. It explains:

FBI collects Suspicious Activities Reports that duplicate — but lower the standard for — an existing database

Another major problem is that eGuardian effectively competes with another federal government SAR. The Intelligence Reform and Terrorism Prevention Act of 2004 established the Information Sharing Environment (ISE) to serve as the conduit for terrorism-related information sharing between state and local law enforcement and the federal government.114 A March 2013 Government Accountability Office report found that though the two programs share information between them, eGuardian uses a lower evidentiary threshold for inclusion of SARs, which creates risks and privacy problems.

The Government Accountability Office found that “many fusion centers have decided not to automatically share all of their ISE-SARs with eGuardian” because eGuardian doesn’t meet ISE standards.115 One fusion center said it would never provide SARs to eGuardian because of the fusion center’s privacy policy.116 The Government Accountability Office also found that the two systems “have overlapping goals and offer duplicative services.”117

FBI will soon have the equivalent of 20 pieces of intelligence on every American — and they share this broadly

An FBI budget request for fiscal year 2008 said the FBI had amassed databases containing 1.5 billion records, and two members of Congress described documents predicting the FBI would have 6 billion records by 2012, which they said would represent “20 separate ‘records’ for each man, woman and child in the United States.”119

[snip]

According to a 2012 Systems of Records Notice covering all FBI data warehouses, the information in these systems can be shared broadly, even with foreign entities and private companies, and for a multitude of law enforcement and non-law enforcement purposes.133

There’s far more in the report, chronicling the slow creep of abusive FBI techniques since 9/11.

Sadly, given that this has all been treated as legal, I doubt that Comey will do anything about it, even with ACLU’s demonstration that the dragnet has led FBI to miss real crimes.

CIA Joins Obama’s Dissembling on Date Death Squads Sent Into Syria

Please support the Emptywheel fundraiser.

I still don’t quite know what the angle is for this particular obfuscation, but given the efforts first from Obama himself and now from the CIA, both with planted leaks, the Obama administration is continuing its efforts to hide the date on which CIA-trained death squads first began entering Syria. From my first post on this topic, beginning with a quote from the New York Times:

Officials said that in the same conversation, which included Senator Lindsey Graham, the South Carolina Republican, Mr. Obama indicated that a covert effort by the United States to arm and train Syrian rebels was beginning to yield results: the first 50-man cell of fighters, who have been trained by the C.I.A., was beginning to sneak into Syria.

Taken at face value, this version of the story would have us believe that the first group of 50 trained by the CIA was presumably still in the process of “sneaking” into Syria on Monday.

The “Monday” in that context would be September 2. The post goes on to note that rather than September 2, after the disputed August 21 chemical weapon attack, French sources had actually documented that the first group of CIA-trained and armed fighters was as large as 300 (not 50) and entered Syria on August 17, well ahead of the release of chemical agents.

And yes, go back and parse that bit from the New York Times carefully, especially this: “covert effort by the United States to arm and train Syrian rebels”. We aren’t just training these death squads, we are arming them, too. That is what makes last night’s “revelation” in the Washington Post even more important to look at:

The CIA has begun delivering weapons to rebels in Syria, ending months of delay in lethal aid that had been promised by the Obama administration, according to U.S. officials and Syrian figures. The shipments began streaming into the country over the past two weeks, along with separate deliveries by the State Department of vehicles and other gear — a flow of material that marks a major escalation of the U.S. role in Syria’s civil war.

Any doubts that this was a planned and sanctioned leak were wiped away within an hour of the Post putting up this story when Barbara Starr “confirmed” the report on Twitter. But we know from my first post on the topic that the death squads really started rolling into Syria on August 17. If we back up “two weeks” from last night’s report on September 11, we get only to August 28. This is a full week after the disputed chemical weapon attack and much closer to the September 2 date on which Obama leaked that the death squads were then in the process of beginning their entry into Syria.

The timing for the flow of arms to these groups is another way we can pinpoint when they became enmeshed in activities inside Syria. With yesterday’s leak on when the flow of arms began, we have once again seen the US try to shift the date for involvement of the death squads inside Syria from before the chemical weapons attack to after it.

Two completely unnecessary but very public leaks, one from Obama himself and the other from “U.S. officials and Syrian figures” have done their utmost to change the public record on when the CIA-trained groups first entered Syria. Why is it so important to the Obama administration to obscure the entry date?

Imagine the Informants You Can Coerce When You Can Spy on Every Single American

Please consider supporting my fundraiser so I can continue to do this kind of work. 

Two years ago, I noted a chilling exchange from a 2002 FISA suit argued by Ted Olson. Laurence Silberman was trying to come up with a scenario in which some criminal information might not have any relevance to terrorism. When he suggested rape, Olson suggested we might use evidence of a rape to get someone to inform for us.

JUDGE SILBERMAN: Try rape. That’s unlikely to have a foreign intelligence component.

SOLICITOR GENERAL OLSON: It’s unlikely, but you could go to that individual and say we’ve got this information and we’re prosecuting and you might be able to help us.

It’s chilling not just because it suggests rapists have gone free in exchange for trumping up terrorist cases for the government, but because it makes clear the kinds of dirt the government sought using — in this case — traditional FISA wiretaps.

Now consider this passage from the government’s 2009 case that it should be able to sustain the Section 215 dragnet.

Specifically, using contact chaining [redacted] NSA may be able to discover previously unknown terrorist operatives, to identify hubs or common contacts between targets of interest who were previously thought to be unconnected, and potentially to discover individuals willing to become U.S. Government assets.

Remember, while the government downplayed this fact, until Barack Obama won the 2008 election, the government permitted analysts to contact chain off of 27,090 identifiers, going deeper than 3 hops in. That very easily encompasses every single American.

The ability to track the relationships of every single American, and they were using it to find informants.

In the 7 years since this program (now allegedly scaled back significantly, but still very very broad) has existed, the dragnet has only helped, however indirectly, to capture 12 terrorists in the US (and by terrorist, they also include people sending money to protect their country against US-backed invasion).

Which means the real utility of this program has been about something else.

The ability to track the relationships of every single American. And they were using it to find informants.

Even while the number of terrorists this program discovered has been minimal, the number of FBI informants has ballooned, to 15,000. And those informants are trumping up increasingly ridiculous plots in the name of fighting terrorism.

The ability to track the relationships of every single American (or now, a huge subset of Americans, focusing largely on Muslims and those with international ties). And they were (and presumably still are) using it to find informants.

Update: Note how in Keith Alexander’s description of the alert list, the standard to be on it is “the identifier is likely to produce information of foreign intelligence value” that are “associated with” one of the BR targets (Alexander 33). This is very similar to the language Olson used to justify getting data that didn’t directly relate to terrorism.

Also note this language (Alexander 34):

In particular, Section 1.7(c) of Executive Order 12333 specifically authorizes NSA to “Collect (including through clandestine means), process, analyze, produce, and disseminate signals intelligence information for foreign intelligence and counterintelligence purposes to support national and departmental missions.” However, when executing its SIGINT mission, NSA is only authorized to collect, retain or disseminate information concerning United States persons in accordance with procedures approved by the Attorney General.

Again, this emphasizes a foreign intelligence and CI purpose for collection that by law is limited to terrorism. Which could mean they think they can collect info to coerce people to turn informant.

The AG guidelines on informants are, not surprisingly, redacted.

Stupid Smartphones and Their Lying Lies

[Apple iPhone 5s via TheVerge.com]

[Apple iPhone 5c via TheVerge.com]

If you value emptywheel’s insights, donate the equivalent of a couple beers—and thanks for your readership and support.

My Twitter timelines across multiple accounts are buzzing with Apple iPhone 5s announcement news. Pardon me if I can’t get excited about the marvel that is iPhone’s new fingerprint-based biometric security.

Let’s reset all the hype:

There is no smartphone security available on the market we can trust absolutely to keep out the National Security Agency. No password or biometric security can assure the encryption contained in today’s smartphones as long as they are built on current National Institute of Standards and Technology (NIST) standards and/or the Trusted Computing Platform. The NSA has compromised these standards and TCP in several ways, weakening their effectiveness and ultimately allowing a backdoor through them for NSA use, bypassing any superficial security system.

There is nothing keeping the NSA from sharing whatever information they are gleaning from smartphones with other government agencies. Citizens may believe that information gleaned by the NSA ostensibly for counterterrorism may not be legally shared with other government agencies, but legality/illegality of such sharing does not mean it hasn’t and isn’t done. (Remember fusion centers, where government agencies were supposed to be able to share antiterrorism information? Perhaps these are merely window dressing on much broader sharing.)

There is no exception across the best known mobile operating systems to the vulnerability of smartphones to NSA’s domestic spying. Although Der Spiegel’s recent article specifically calls out iOS, Android, and Blackberry smartphones, Windows mobile OS is just as exposed. Think about it: if your desktop, laptop, and your netbook are all running the same Windows OS versions needing patches every month to fix vulnerabilities, the smartphone is equally wide open as these devices all use the same underlying code, and hardware built to the same NIST standards. Additionally, all Windows OS will contain the same Microsoft CryptoAPI believed to be weakened by the NSA.

If any of the smartphone manufacturers selling into the U.S. market say they are secure against NSA domestic spying, ask them to prove it. Go ahead and demand it — though it’s sure to be an exercise in futility. These firms will likely offer some non-denial denials and sputtering in place of a firm, “Yes, here’s proof” with a validated demonstration.

Oh, and the Touch ID fingerprint biometrics Apple announced today? You might think it protects not against the NSA but the crook on the street. But until Apple demonstrates they pass a gummy bear hackability test, don’t believe them.

And watch for smartphone thieves carrying tin snips.

NSA and Compromised Encryption: The Sword Cuts Both Ways

[Snapshot, Ralph Langner presentation re: Stuxnet, outlining payload extraction (c. 2012 via YouTube)]

[Snapshot, Ralph Langner presentation re: Stuxnet, outlining payload extraction (c. 2012 via YouTube)]

If you want fresh and weedy perspectives you won’t find in corporate-owned media, please donate!

A friendly handshake is offered;
Names are swapped after entry;
The entrant delivers a present;
The present is unboxed with a secret key…

And * BOOM *

Payload delivered.

This is cyber weapon Stuxnet‘s operations sequence. At two points in the sequence its identity is masked — at the initial step, when identity is faked by a certificate, and at the third step, when the contents are revealed as something other than expected.

The toxic payload is encrypted and cannot be read until after the handshake, the name swap, and then decrypted when already deep inside the computer.

In the wake of the co-reported story on the National Security Agency’s efforts to crack computer and network encryption systems, the NSA claims they are only doing what they must to protect the country from terrorists, criminals, and cyber attacks generated by individuals, groups, and nation-state actors.

Defense, though, is but one side of the NSA’s sword; it has two lethal edges.

While use of encryption tools may prevent unauthorized access to communications, or allow malicious code to be blocked, the same tools can be used to obstruct legitimate users or shut down entire communications systems.

Encryption APIs (ex: Microsoft CryptoAPI embedded in Windows operating systems) are often used by higher level applications — for example, a random number generator within the API used to create unique keys for access can also be used to create random names or select random event outcomes like a roll of the dice.

In Stuxnet alone we have evidence of encryption-decryption used as cyber warfare, the application planned/written/supported in some way by our own government. This use was Pandora’s Box opened without real forethought to the long-term repercussions, including unintended consequences.

We know with certainty that the repercussions weren’t fully considered, given the idiocy with which members of Congress have bewailed leaks about Stuxnet, in spite of the fact the weapon uncloaked itself and pointed fingers in doing so.

One of the unconsidered/ignored/unintended consequences of using weaponry requiring encryption-decryption is that the blade can cut in the other direction.

Imagine someone within the intelligence community “detonating” a cyber weapon built in the very same fashion as Stuxnet.

A knock at the door with a handshake;
Door open, package shoved in, treated as expected goods;
Encrypted content decrypted.

And then every single desktop computer, laptop, netbook, tablet, and smartphone relying on the same standardized, industry-wide encryption tools “detonates,” obstructing all useful information activities from personal and business work to telecommunications. Read more

Joby Warrick Is the New Judy Miller

Poor Joby Warrick. With Judy Miller so disgraced that Fox News had to issue a “she has nothing to apologize for” press release when they hired her back in 2008, Joby drew the short straw yesterday and was assigned to transcribe the hyped bullshit concerns arising from Israel Syria’s neighbors that Syria might be contemplating use of biological weapons. The entire Warrick article needs to be read to get a full feel for its credulous recitations of completely unfounded speculation being passed off as actual intelligence, but I will stick with just a few paragraphs. Warrick opens by making a completely baseless claim:

Last month’s alleged chemical attack near Damascus has re­focused attention on Syria’s 30-year-old biological weapons research and raised concerns about whether the government there could activate an effort to make a weapon.

Really, Joby? Aside from those “intelligence officials in two Middle East countries” who fed you this material, has anybody else voiced a concern that Syria is contemplating use of bioweapons, or even could produce bioweapons if they wanted to?

Even Warrick has to admit that any work on bioweapons in Syria is now over 30 years old. But that doesn’t deter Warrick and the spooks whispering in his ear:

Syria’s bioweapons program, which U.S. officials believe has been largely dormant since the 1980s, is likely to possess the key ingredients for a weapon, including a collection of lethal bacteria and viruses as well as the modern equipment needed to covert them into deadly powders and aerosols, according to U.S. and Middle Eastern officials and weapons experts.

Wow. the “US and Middle Eastern officials and weapons experts” guiding Warrick’s hands on the keyboard as he types are saying that despite not working on bioweapons for thirty years or so, they have the deadly organisms and equipment that would be needed to make “deadly powders and aerosols”.

Warrick and the spies who feed him have absolutely nothing on which to base this accusation. Let’s check a neutral source on what the real status of biotechnology capability in Syria is and whether it can be rapidly adapted to bioweapons. The Nuclear Threat Initiative provides a report on Syria’s potential bioweapons capability that was last updated in February of this year. They come to very different conclusions than Warrick (emphasis added):

In the past, unclassified statements by U.S. officials occasionally claimed reason to suspect Syria of maintaining an offensive BW program. [2] However, in contrast to discussions of Syrian chemical warfare (CW) capabilities, such claims have not included any details on the size and scale of Syria’s potential BW program, and are not presented alongside supporting evidence. Instead, discussions on this topic have focused on speculative extrapolations of Syrian dual-capable industry and on Syrian political motivations. Such analysis can be neither detailed nor comprehensive. Although the existence of a biotechnology industrial base would suggest that Syria has some indigenous expertise useful for developing a biological weapons capability, it does not imply and cannot confirm the existence of an offensive biological weapons program. Furthermore, given that Israel, a state that is understood to possess a nuclear arsenal and continues to occupy the Golan Heights, remains Syria’s primary security concern, and given the risk of “blowback” when deploying biological weapons, such weapons would be of questionable tactical desirability from a Syrian perspective. While public sources on the nature of Syria’s chemical and nuclear programs are limited, even less exists about Syria’s biological program, and “there is no hint of its existence from open sources.” [3]

The report goes on to detail what Syria’s biological industries do (again, emphasis added): Read more

The Black Budget

Screen shot 2013-08-29 at 2.50.28 PMThe Washington Post just published an excellent package on the FY2013 Black Budget for intelligence. I’m reading through the summary now.

I’ll put working comments below. But one of my first impressions is that all of this is useful information, and in some ways really encouraging information (in others, horrifying).

For that reason, this is one of my favorite parts of the story itself:

Lee Hamilton, an Indiana Democrat who was a former chairman of the House Intelligence Committee and co-chairman of the commission that investigated the Sept. 11 attacks, said that access to budget figures has the potential to enable an informed public debate on intelligence spending for the first time, much as Snowden’s disclosures of NSA surveillance programs brought attention to operations that had assembled data on nearly every U.S. citizen.

“Much of the work that the intelligence community does has a profound impact on the life of ordinary Americans, and they ought not to be excluded from the process,” he said.

“Nobody is arguing that we should be so transparent as to create dangers for the country,” he said. But, he said, “there is a mindset in the national security community — leave it to us, we can handle it, the American people have to trust us. They carry it to quite an extraordinary length so that they have resisted over a period of decades transparency. . . . The burden of persuasion as to keeping something secret should be on the intelligence community, the burden should not be on the American public.”

Hamilton is absolutely right. There’s no reason why information at this level of detail shouldn’t be shared with American taxpayers ponying up the $52.6 billion to pay for it all.


Working comments on Budget Justifications

4: The IC is apparently going to start researching trade disputes. I assume that’ll be primarily targeted at China. But it’s an interesting development.

 

What to Expect When You’re Expecting a Report From James “Least Untruthful” Clapper

It is a time pregnant with possibilities as the world awaits release of the US report on chemical weapon use in Syria. Today’s Washington Post informs us that we may see the report as soon as tomorrow:

The Obama administration believes that U.S. intelligence has established how Syrian government forces stored, assembled and launched the chemical weapons allegedly used in last week’s attack outside Damascus, according to U.S. officials.

The administration is planning to release evidence, possibly as soon as Thursday, that it will say proves that Syrian President Bashar al-Assad bears responsibility for what U.S. officials have called an “undeniable” chemical attack that killed hundreds on the outskirts of the Syrian capital.

The report, being compiled by the Office of the Director of National Intelligence, is one of the final steps that the administration is taking before President Obama makes a decision on a U.S. military strike against Syria, which now appears all but inevitable.

Wait. What?

Marcy already mused on all the talking heads focusing on how a US response to Assad using chemical weapons on Syrian citizens is all about our “credibility“. If the US response is so tied up with credibility, how on earth can it be that the person charged with compiling the report on which we will base military action is the man whose obituary will be obliged to mention his admission that he lied to Congress, but that we should excuse the lies because he gave the “least untruthful” version possible? That is how the US will convince the world that, unlike when we lied about Iraq having WMD’s before we invaded, this time we aren’t lying about Assad?

Note also that Marcy mentioned yesterday that the US, through John Kerry, tried to prevent the UN carrying out its own investigation into the chemical weapon evidence. That move undercuts US efforts at credibility since outside, independent confirmation of findings would be a huge step in providing assurance that the US is being truthful.

The UN effort continues today, with the delegation of inspectors visiting a different Damascus suburb than the one they visited on Monday. (See the map in this BBC article for the sites at which chemical weapons were accused of being used in the attack.)

We get a bit of information from AP on how the UN team is operating:

The U.N. chemical weapons experts conducted their first field testing in the western Damascus suburb of Moadamiyeh on Monday. They collected samples and testimony after a treacherous journey through government and rebel-held territory. Their convoy was hit by snipers but members of the team were unharmed.

The ability of the UN team to interview victims (which is presumably how they got “testimony”) and then to take their own samples is a key part of making their work believable. Both environmental samples at the sites of attack and biological samples from the victims play a role in identifying whether and what chemical agents were used. See this informative piece from FAS on descriptions of symptoms that the investigators would be looking for when interviewing victims.

When Clapper finally releases the US report, one of the most important aspects in that report will be the provenance of any samples the US subjected to chemical analysis. We don’t have acknowledged “boots on the ground” in Syria, so how did the US get samples? What certifications, if any, are there on chain of custody documentation on those samples? As with most other accounts of the chemical attack, the AP article linked above mentions that Doctors Without Borders has documented the number of dead and injured from the attack. Samples and documentation coming from them would be seen as having a much greater level of independence than samples provided by the rebel groups that control the territory where the attacks are said to have taken place.

Even though their main website has been taken down, reportedly by the Syrian Electronic Army, the New York Times is continuing its reporting on the situation in Syria. An article published yesterday afternoon provides some useful background information on the ability of modern forensic methods to detect chemical agent use long after the fact: Read more

Cruise Killing on the Passive Voice

Before I lay out the chronology of the road to war against Syria, check out the language National Security Advisor Susan Rice used to blow off the UN investigation.

Ms. Rice sent the email to Ms. Power and others, officials said. “The investigation is…too late, and will actually tell us what we already know: CW was used,”

While the WSJ quotes Rice claiming to know who actually used the chemical weapons in the next line, ultimately it comes down to this:

“CW was used.”

Jay Carney today also used the passive voice in dismissing the UN investigation.

So the work of that team is redundant, you might say, because it is clearly established already that chemical weapons have been used on a significant scale.

The fucking passive voice.

But before we got to that point consider what happened. First (according to WSJ’s Arab diplomats) the always trustworthy Israelis caught someone moving CW into place.

One crucial piece of the emerging case came from Israeli spy services, which provided the Central Intelligence Agency with intelligence from inside an elite special Syrian unit that oversees Mr. Assad’s chemical weapons, Arab diplomats said. The intelligence, which the CIA was able to verify, showed that certain types of chemical weapons were moved in advance to the same Damascus suburbs where the attack allegedly took place a week ago, Arab diplomats said.

Then after the attack, according to Foreign Policy, US spooks overheard a Syrian Defense official “demanding answers” from an officer in the chemical weapons unit from which the CW would have been used.

Last Monday [sic], in the hours after a horrific chemical attack east of Damascus, an official at the Syrian Ministry of Defense exchanged panicked phone calls with leader of a chemical weapons unit, demanding answers for a nerve agent strike that killed more than 1,000 people. Those conversations were overheard by U.S. intelligence services, The Cable has learned.

FP goes on to point out a lot of the important things we don’t know, such as why and on whose authority, even while laying out the case that CW was used. (Though here are some doubts about whether it was really sarin.)

Meanwhile, according to Gareth Porter, it took until Saturday for the UN to request access to the attack site. Syria granted that access Sunday. At which point John Kerry attempted to personally intervene to stop the investigation.

After the deal was announced on Sunday, however, Kerry pushed Ban in a phone call to call off the investigation completely.

The Wall Street Journal reported the pressure on Ban without mentioning Kerry by name. It said unnamed “U.S. officials” had told the secretary-general that it was “no longer safe for the inspectors to remain in Syria and that their mission was pointless.”

But Ban, who has generally been regarded as a pliable instrument of U.S. policy, refused to withdraw the U.N. team and instead “stood firm on principle”, the Journal reported. He was said to have ordered the U.N. inspectors to “continue their work”.

Meanwhile, the Administration also seems to be delaying the release of its own intelligence report, after promising it would already be out.

Q And there’s a lot of speculation that this intelligence report that presumably would link Assad directly to the chemical weapons attack might be released today. Can you give us an update on the timing?

MR. CARNEY: What I would say is that yesterday I made clear that the intelligence community is working on an assessment and that once we had that assessment we would provide information to the public about it in the coming days. And that remains true. I think that that’s speculation that it would come today rather than some other day. But it will come and I think you can expect it this week.

Do you get the feeling there are some holes in the intelligence report? Such as, if this was ordered by someone in Assad’s chain of command, why a Defense Ministry official would be making “panicked calls” about the strike?

There’s one more thing I find at least interesting about the intelligence.

Recall back in December, when the CW scares first started. We had evidence — as the Israelis claim we have no — of Syria pre-positioning weapons. And then Syria lost its Toobz access. I noted at the time that the utter lack of panic about the latter event suggested that we knew precisely why and how the Toobz came down. That detail may mean nothing about today’s events (though at the time it suggested that the source of the intelligence wasn’t SIGINT, because if the US had just lost its intelligence access it would have been panicking). But it seems notable, given the centrality of the “moving chemicals” intelligence again.

There is, to be sure, a great deal of evidence that (as both Rice and Carney said) “CW were used.”

But the Administration seems increasingly squirrelly allowing time to discover the rest of the occasion, which may be why a Syrian officer release CW without having had received an order from his superiors.