Did “The Shooter” Take 7 Souvenir Pictures of Osama bin Laden?

On Tuesday, I noted that, between the draft and the final, DOD’s Inspector General removed this language referring to Admiral William McRaven purging SOCOM’s network of pictures of Osama bin Laden after CIA exposed the members of SEAL Team 6.

This effort included purging these records to another Government Agency.

But there was also telling new language introduced in the final (which would have been introduced between late last year and last week). The draft included this sentence.

ADM McRaven also directed that the names and photographs associated with the raid not be released.

The final changed that language to read,

ADM McRaven also directed personnel to forego releasing names of operators and photographs associated with the raid.

The use of the word “personnel” is ambiguous, as it’s not clear whether it refers to the SEAL Team members mentioned earlier in the paragraph or to DOD staffers who handle SOCOM’s archives (or to CIA personnel who now purportedly have the photos).

But I find it telling, given another detail about Judicial Watch’s FOIA for these photos.

Recall that on February 15, 2013, DOJ informed Judicial Watch that CIA had found 7 more photos responsive to their FOIA. That happened just 4 days after Esquire published a splashy story about the guy who claimed to have been the SEAL who actually killed OBL. The current version includes this line.

In the compound, I thought about getting my camera, and I knew we needed to take pictures and ID him.

I had made the connection at the time, and I have a distinct suspicion the language was slightly different in the original (Esquire was making factual corrections along the way but the original is not on Internet Archive), making it clear that the Shooter and possibly others did take pictures, though perhaps not for operational purposes.

What kind of amped up warrior who had just helped kill the bogeyman could resist taking souvenir pictures? Could you blame them, if so?

In any case, I suspected at the time that the reason CIA “located” new photos was because they read about another set of photos in the possession in one of the guys who participated in the op, if not shot the lethal bullet. The ambiguity in the description of McRaven’s order seems to support that.

That is, what SOCOM and CIA appear to be protecting are — in significant part — the personal photos taken by the guys who did the operation.

DOD’s Inspector General Disappears William McRaven’s “Purge”

The day before I got hopelessly buried in the rabbit warren of NSA leaks, I reported that the draft IG Report on the Obama Administration’s leaks to Zero Dark Thirty’s creators seemed to indicate that, on Admiral William McRaven’s orders, SOCOM had purged its networks of Osama bin Laden photos that were the subject of an active Judicial Watch FOIA.

According to ADM McRaven, the DoD provided the operators and their families an inordinate level of security. ADM McRaven held a meeting with the families to discuss force protection measures and tell the families that additional protective monitoring will be provided, and to call security personnel if they sensed anything. ADM McRaven also directed that the names and photographs associated with the raid not be released. This effort included purging these records to another Government Agency.

The other day the final report came out. And while I haven’t yet read the report in depth (short version: it clears the Obama Administration of all the improprieties laid out in the draft), I do notice this interesting edit.

According to ADM McRaven, DoD provided the operators and their families an inordinate level of security. ADM McRaven stated that he previously met with operators’ family members and discussed force protection measures. USSOCOM officials informed family members that protective monitoring will be initiated, and instructed them to call security personnel if security-related incidents arise. ADM McRaven also directed personnel to forego releasing names of operators and photographs associated with the raid.

They took out all mention of the “purge” of photos requested under FOIA.

To be fair, the use of the word “purge” in the original always seemed inapt, as it appears that McRaven ordered the photos on DOD servers to be moved — not destroyed — to CIA’s servers. So it’s not like McRaven ordered evidence be destroyed.

Still, as I’ll eventually get around to describing, it may have affected the outcome of the FOIA.

Which seems worthy of note. But apparently not to the people who protect top military leaders.

 

The Truth: The NSA Has Been Working on Domestic Spying for Ten-Plus Years

[graphic: Electronic Frontier Foundation via Flickr]

[graphic: Electronic Frontier Foundation via Flickr]

The yapping of national security conservatives, whether self-identified as Republicans or Democrats, obscures the truth when they denigrate Edward Snowden’s flight to Hong Kong and subsequent attempts at whistleblowing.

The truth is this:

•  Others before Snowden tried to go through so-called chain of command or proper channels to complain about the National Security Agency’s domestic spying, or to refuse the NSA’s efforts to co-opt them or their business. These efforts did not work.

•  They were obstructed, harassed, or punished for their efforts. It did not matter whether they were insiders or outsiders, whistleblowers or plaintiffs, the results were the same for:

•  William Binney,
•  Thomas Drake,
•  Mark Klein,
•  Thomas Tamm,
•  Russell Tice,
•  and J. Kirk Wiebe,
•  as well as Joseph Nacchio.

•  The effort to spy on Americans, violating their privacy and taking their communications content, has been underway since before the Bush administration. (Yes, you read that right: BEFORE the Bush administration.)

•  Three presidents have either failed to stop it or encouraged it (Yes, including Bill Clinton with regard to ECHELON).

•  The program has been growing in physical size for more than a decade.

One document in particular [PDF] described the challenge of the NSA , from which this excerpt is drawn: Read more

Seeing Through the Blizzard to Utah: How Much Space Does Metadata Need

In the blizzard of half-truths, dissembling, and prevarications about the nature of the National Security Agency’s surveillance programs, it’s easy to lose sight of the obvious. In this case, the obvious is about one million square feet in size.

First, a few other large scale objects for comparison:

[photo: DeveloperTutorials.com]

[photo: DeveloperTutorials.com]

Here’s Google’s data center in The Dalles, Oregon; note the size of cars in proportion to the size of the buildings on this campus. You’ll find cars are the best tool for estimating approximate physical scale of this and the following examples.

[photo: DataCenterKnowledge.com]

[photo: DataCenterKnowledge.com]

This is Apple’s data center in Maiden, North Carolina. Again, compare the automobiles against the building in the photo for scale.

[photo: DataCenterKnowledge.com]

[photo: DataCenterKnowledge.com]

Microsoft has a data center in Dublin, Ireland. It’s a little harder to estimate physical size in this photo. A key difference is the height of the facility, as if development was limited in footprint.  Read more

What Does NCTC Do with NSA and FBI’s Newly Disclosed Databases?

The discussion about the various “NSA” programs we’ve seen so far have discussed only how NSA works with FBI. FBI requests the dragnet phone information and hands it over to NSA. NSA negotiates direct access to internet companies that allow FBI to make direct queries.

We’ve heard from Keith Alexander about what NSA does — its only use of Section 215, he said, was the phone records.

We heard from Robert Mueller who gave less clear answers about what FBI does and does not do.

But we have yet to have direct testimony from James “least untruthful too cute by half” James Clapper. Mind you, we’ve gotten several fact sheets and Clapper’s hilarious interview with Andrea Mitchell. Just no specific public testimony.

And curiously, in the DNI’s own fact sheets, he doesn’t specify who does what, aside from describing the statutory role his position and the Attorney General play in authorizing FAA 702 orders. He doesn’t say what FBI does, what NSA does … or what his own organization does.

That’s important, because in addition to overseeing all intelligence, Clapper’s office also includes the National Counterterrorism Center. And the NCTC is the entity in charge sharing data. Indeed, it is statutorily required to have access to everything.

[The National Security Act] provides that “[u]nless otherwise directed by the President, the Director of National Intelligence shall have access to all national intelligence and intelligence related to the national security which is collected by any federal department, agency, or other entity, except as otherwise provided by law, or as appropriate, under guidelines agreed upon by the Attorney General and the Director of National Intelligence.

That means, presumably, that NCTC is doing a lot of the work that NSA and FBI are making narrow denials about.

But it also means that NCTC can play with these databases — the dragnet and the access via PRISM to 702 data — as well as any other data in the Federal government, including databases that John Brennan gave it the ability to go get.

So here’s the thing. When Keith Alexander gives you pat reassurances about how limited NSA’s access to Americans’ call data is, that may disclose a whole lot more intrusive data mining over at James Clapper’s shop.

Remember, here is what James Clapper was initially asked.

Wyden: Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?

Clapper: No, sir.

Wyden: It does not?

Clapper: Not wittingly. There are cases where they could, inadvertently perhaps, collect—but not wittingly.” [my emphasis]

His first attempt to walk back that lie went like this:

What I said was, the NSA does not voyeuristically pore through U.S. citizens’ e-mails. [my emphasis]

His second attempt to walk it back went like this:

ANDREA MITCHELL: Senator Wyden made quite a lot out of your exchange with him last March during the hearings. Can you explain what you meant when you said that there was not data collection on millions of Americans?

JAMES CLAPPER: First– as I said, I have great respect for Senator Wyden. I thought, though in retrospect, I was asked– “When are you going to start– stop beating your wife” kind of question, which is meaning not– answerable necessarily by a simple yes or no. So I responded in what I thought was the most truthful, or least untruthful manner by saying no.

And again, to go back to my metaphor. What I was thinking of is looking at the Dewey Decimal numbers– of those books in that metaphorical library– to me, collection of U.S. persons’ data would mean taking the book off the shelf and opening it up and reading it.

ANDREA MITCHELL: Taking the contents?

JAMES CLAPPER: Exactly. That’s what I meant. Now–

ANDREA MITCHELL: You did not mean archiving the telephone numbers?

All of those efforts were, by context at least, limited exclusively to NSA. They don’t address, at all, what NCTC might do with this data (or, for that matter, FBI).

So what does the NCTC do with the data that NSA and FBI have issued careful denials about?

Update: I’m going to replicate a big chunk of this post on the oversight over NCTC’s use of other agencies data, complete with the bit about how the guy in charge of it thought Cheney’s illegal program was the shit.

Back when John Negroponte appointed him to be the Director of National Intelligence’s Civil Liberties Protection Officer, Alexander Joel admitted he had no problem with Cheney’s illegal domestic wiretap program.

Read more

NSA PRISM Slides: Notice Anything Unusual or Missing?

We haven’t seen (and likely will never see) all of the NSA slides former Booz Allen employee Edward Snowden shared with the Guardian-UK and the Washington Post. But the few that we have seen shared by these two news outlets tell us a lot — even content we might expect to see but don’t tells us something.

First, let’s compare what appears to be the title slide of the presentation — the Guardian’s version first, followed by the WaPo’s version. You’d think on the face of it they’d be the same, but they aren’t.

[NSA presentation, title slide via Guardian-UK]

[NSA presentation, title slide, via Guardian-UK]

[NSA presentation, title slide, via Washington Post]

[NSA presentation, title slide, via Washington Post]

Note the name of the preparer or presenter has been redacted on both versions; however, the Guardian retains the title of this person, “PRISM Collection Manager, S35333,” while the WaPo completely redacts both name and title.

This suggests there’s an entire department for this program requiring at least one manager. There are a number of folks who are plugging away at this without uttering a peep.

More importantly, they are working on collection — not exclusively on search.

The boldface reference to “The SIGAD Used Most in NSA Reporting” suggests there are more than the PRISM  in use as SIGINT Activity Designator tools. What’s not clear from this slide is whether PRISM is a subset of US-984XN or whether PRISM is one-for-one the same as US-984XN.

Regardless of whether PRISM is inside or all of US-984XN, the presentation addresses the program “used most” for reporting; can we conclude that reporting means the culled output of mass collection? Read more

James Clapper Hails Checks and Balances While Treating Oversight “Too Cute by Half”

I’ve been citing bits of this interview between James Clapper and Andrea Mitchell here and there, but the whole thing needs to be read to be believed.

But the quick version is this. Mitchell asks Clapper whether “trust us” is enough, given that some future President or Director of National Intelligence might decide to abuse all the programs in question. Clapper responds by celebrating our constitutional system’s checks and balances.

ANDREA MITCHELL:

The president and you and the others in this top-secret world, are saying, “Trust us. We have your best interests, we’re not invading your privacy, we’re going after bad guys. We’re not going after your personal lives.” What happens when you’re gone, when this president or others in our government are gone? There could be another White House that breaks the law.

There could be another D.N.I. who does really bad things– we listened during the Watergate years to those tapes. With the President of the United States saying, “Fire bomb the Brookings Institution.” You know, what do you say to the American people about the next regime who has all of these secrets? Do they– do they live forever somewhere in a computer?

JAMES CLAPPER:

No, they don’t live forever. That’s a valid concern, I think. You know, people come and go, presidents come and go, administrations come and go, D.N.I.’s will come and go. But what is, I think– important about our system is our system of laws, our checks and balances.

You know, the– I think the founding fathers would actually be pretty impressed with how– what they wrote and the organizing principles for this country are still valid and are still used even in you– to– to regulate a technology then, they never foresaw. So that’s timeless. That– those are part of our institutions. Are there people that will abuse those institutions? Yes. But we have a system that sooner or later, mostly sooner these days, those misdeeds are found out. [my emphasis]

But when, earlier in the interview, Mitchell asks him about his lie to Ron Wyden, here’s how he answered.

ANDREA MITCHELL:

Senator Wyden made quite a lot out of your exchange with him last March during the hearings. Can you explain what you meant when you said that there was not data collection on millions of Americans?

JAMES CLAPPER:

First– as I said, I have great respect for Senator Wyden. I thought, though in retrospect, I was asked– “When are you going to start– stop beating your wife” kind of question, which is meaning not– answerable necessarily by a simple yes or no. So I responded in what I thought was the most truthful, or least untruthful manner by saying no.

Read more

Truck-sized Holes: Journalists Challenged by Technology Blindness

[photo: liebeslakritze via Flickr]

[photo: liebeslakritze via Flickr]

Note: The following piece was written just before news broke about Booz Allen Hamilton employee Edward Snowden. With this in mind, let’s look at the reporting we’ve see up to this point; problems with reporting to date may remain even with the new disclosures.

ZDNet bemoaned the failure of journalism in the wake of disclosures this past week regarding the National Security Administration’s surveillance program; they took issue in particular with the Washington Post’s June 7 report. The challenge to journalists at WaPo and other outlets, particularly those who do not have a strong grasp of information technology, can be seen in the reporting around access to social media systems.

Some outlets focused on “direct access.” Others reported on “access,” but were not clear about direct or indirect access.

Yet more reporting focused on awareness of the program and authorization or lack thereof on the part of the largest social media firms cited on the leaked NSA slides.

Journalists are not asking what “access” means in order to clarify what each corporation understands direct and indirect access to mean with regard to their systems.

Does “direct access” mean someone physically camped out on site within reach of the data center?

Does “direct access” mean someone with global administrative rights and capability offsite of the data center? Some might call this remote access, but without clarification, what is the truth?

I don’t know about you but I can drive a Mack truck through the gap between these two questions.

So which “direct access” have the social media firms not permitted? Which “direct access” has been taken without authorization of corporate management? ZDNet focuses carefully on authorization, noting the changes in Washington Post’s story with regard to “knowingly participated,” changed later to read “whose cooperation is essential PRISM operations.”

This begs the same questions with regard to any other form of access which is not direct. Note carefully that a key NSA slide is entitled, “Dates when PRISM Collection Began For Each Provider.” It doesn’t actually say “gained access,” direct or otherwise. Read more

DOD Inspector General Report: SOCOM Purged Their Osama bin Laden Files after Judicial Watch FOIA

I wanted to point to one more detail from the DOD Inspector General’s report on Leon Panetta’s leaks to Zero Dark 30’s filmakers.

The very last page of the report describes how Admiral William McRaven responded after realizing the SEALs who had participated in the raid on Osama bin Laden’s compound had all hung around a Hollywood producer with their name badges exposed.

According to ADM McRaven, the DoD provided the operators and their families an inordinate level of security. ADM McRaven held a meeting with the families to discuss force protection measures and tell the families that additional protective monitoring will be provided, and to call security personnel if they sensed anything. ADM McRaven also directed that the names and photographs associated with the raid not be released. This effort included purging these records to another Government Agency. [my emphasis]

The report doesn’t reveal when SOCOM purged its records and handed the documents to, presumably though not definitely, CIA, though if McRaven directed it, it happened after he took command in August 2011. (Update: That’s probably not right, as he was in command of the operation in any case.)

But it’s a relevant question because Judicial Watch had FOIAed pictures of OBL on May 3, 2011, and sued 10 days later, so before all the leaking and presumably therefore the purging began. On June 26, 2011, just two days after Panetta’s leaky party, the government stalled on the suit, saying Judicial Watch had not exhausted its administrative remedies. By September 26, DOD claimed they had no pictures of OBL (though earlier this year there were reports 7 new photos had been found) and CIA claimed none of the 52 pictures they had could be released. Along with that filing, McRaven submitted a declaration explaining why these photos couldn’t be released, though the interesting parts remain redacted. John Bennett’s declaration for the CIA does not describe when the Agency searched its files for photographs, and therefore doesn’t indicate whether they searched before or after DOD purged its files.

Now, none of this timing would mitigate CIA’s claims about the extremely grave harm that would arise from releasing OBL death porn.

But it is, at the very least, very sketchy — and all that’s before having a really good sense of when the purging and the FOIA response occurred.

Update: I spoke to Judicial Watch’s lawyer for this FOIA, Michael Bekesha, and they have never been informed of this purge. Though it may explain some other details about the progress of the FOIA, including some funkiness with the classification of the photos.

Update: Here’s DOD’s declaration about their search from September 26, 2011.

It’s interesting for two reasons. First, they make claims about SOCOM files that is the exact opposite of what DOD said in the NYT/ACLU FOIA for Anwar al-Awlaki related OLC memos. Whereas in the drone FOIA, they claimed CENTCOM handled SOCOM’s FOIA responses, this one says,

The mission of USSOCOM is to provide Special Operations Forces to defend the United States and its interests. A priority of USSOCOM is to “Deter, Disrupt, and Defeat Terrorist Threats,” and a primary aspect of this priority is to plan and conduct special operations. When a special operation is conducted, the military service Components of USSOCOM (U.S. Army Special Operations Command, Navy Special Warfare Command, U.S. Air Force Special Operations Command, and Marine Corps Special Operations Command) provide Special Operations Forces (personnel and equipment) to the operation. Accordingly, it is DoD FOIA policy that documents created or maintained by these military service Components during or for a joint special operation come under the cognizance of USSOCOM and not the military services for purposes of the FOIA. Therefore, USSOCOM and not the military services, is responsible for the searches of records responsive to plaintiff’s FOIA request at those service components that may have participated in the subject operation.

And like CIA, they don’t date their search description at SOCOM, so don’t say whether it happened pre- or post-purge.

USSOCOM searched the Headquarters and relevant Components, and no records responsive to plaintiff’s request were located. The specific filing systems searched at the Headquarters USSOCOM offices and relevant Components were all hard copy and electronic records including all email records during the inclusive dates of May 1, 2011, through May 31, 2011.

Putin’s Congressional Puppets

I have to give this to Michele Bachmann. Unlike most of the members of Congress she traveled to Russia with last week, she has not (at least not apparently) been suckered by Vladimir Putin to play his patsy.

Jim already described Dana Rohrabacher’s posturing with Steven Seagal while he attempted to replay his glory days palling around with the mujahadeen. Subsequent to that, Rohrabacher defended Putin’s abuse of power in fighting his former soulmates.

“If you are in the middle of an insurrection with Chechnya, and hundreds of people are being killed and there are terrorist actions taking place and kids are being blown up in schools, yeah, guess what, there are people who overstep the bounds of legality,” he said.

While the rule of law is important, Rohrabacher added, “We shouldn’t be describing people who are under this type of threat, we shouldn’t be describing them as if they are Adolf Hitler or they’re back to the old Communism days.”

Meanwhile, both Rohrabacher and Steve King bravely defended Putin’s prosecution of Pussy Riot.

“It’s hard to find sympathy for people who would do that to people’s faith,” King said.

But I’m most amused by the script William Keating (who represents parts of Boston and its southwest suburbs) is speaking from, parroting FSB’s assurances that the Marathon attack could have been prevented if only FBI had been more responsive to the tip they had provided the FBI and CIA.

Keating said the letter contained a lot of details about Tamerlan Tsarnaev, including his birthday, telephone number, cellphone number, where he lived in Cambridge and information about his wife and child. He said it also referenced the possibility that Tsarnaev might be considering changing names.
The Russians also had information about his mother, including her Skype address, Keating said.
Keating told the AP that the Russians believed Tsarnaev wanted to go to Palestine and engage in terrorist activities, but was unable to master the language.
‘‘That was the level of detail they were providing in this letter,’’ Keating said.
Keating said the intelligence officials believed that if Russia and the U.S. had worked together more closely, the bombings might have been averted. He said a top Russian counterintelligence official told the delegation that ‘‘had we had the same level of communication as we do now, the Boston bombing may never have happened.’’

Note Keating doesn’t make clear whether the details from the texts on Palestine were included in what the Russians sent us (the Russians translated the letter for the CODEL), or whether they only now shared it with the CODEL.
Read more