The Truth: The NSA Has Been Working on Domestic Spying for Ten-Plus Years

[graphic: Electronic Frontier Foundation via Flickr]

[graphic: Electronic Frontier Foundation via Flickr]

The yapping of national security conservatives, whether self-identified as Republicans or Democrats, obscures the truth when they denigrate Edward Snowden’s flight to Hong Kong and subsequent attempts at whistleblowing.

The truth is this:

•  Others before Snowden tried to go through so-called chain of command or proper channels to complain about the National Security Agency’s domestic spying, or to refuse the NSA’s efforts to co-opt them or their business. These efforts did not work.

•  They were obstructed, harassed, or punished for their efforts. It did not matter whether they were insiders or outsiders, whistleblowers or plaintiffs, the results were the same for:

•  William Binney,
•  Thomas Drake,
•  Mark Klein,
•  Thomas Tamm,
•  Russell Tice,
•  and J. Kirk Wiebe,
•  as well as Joseph Nacchio.

•  The effort to spy on Americans, violating their privacy and taking their communications content, has been underway since before the Bush administration. (Yes, you read that right: BEFORE the Bush administration.)

•  Three presidents have either failed to stop it or encouraged it (Yes, including Bill Clinton with regard to ECHELON).

•  The program has been growing in physical size for more than a decade.

One document in particular [PDF] described the challenge of the NSA , from which this excerpt is drawn: Read more

Seeing Through the Blizzard to Utah: How Much Space Does Metadata Need

In the blizzard of half-truths, dissembling, and prevarications about the nature of the National Security Agency’s surveillance programs, it’s easy to lose sight of the obvious. In this case, the obvious is about one million square feet in size.

First, a few other large scale objects for comparison:

[photo: DeveloperTutorials.com]

[photo: DeveloperTutorials.com]

Here’s Google’s data center in The Dalles, Oregon; note the size of cars in proportion to the size of the buildings on this campus. You’ll find cars are the best tool for estimating approximate physical scale of this and the following examples.

[photo: DataCenterKnowledge.com]

[photo: DataCenterKnowledge.com]

This is Apple’s data center in Maiden, North Carolina. Again, compare the automobiles against the building in the photo for scale.

[photo: DataCenterKnowledge.com]

[photo: DataCenterKnowledge.com]

Microsoft has a data center in Dublin, Ireland. It’s a little harder to estimate physical size in this photo. A key difference is the height of the facility, as if development was limited in footprint.  Read more

What Does NCTC Do with NSA and FBI’s Newly Disclosed Databases?

The discussion about the various “NSA” programs we’ve seen so far have discussed only how NSA works with FBI. FBI requests the dragnet phone information and hands it over to NSA. NSA negotiates direct access to internet companies that allow FBI to make direct queries.

We’ve heard from Keith Alexander about what NSA does — its only use of Section 215, he said, was the phone records.

We heard from Robert Mueller who gave less clear answers about what FBI does and does not do.

But we have yet to have direct testimony from James “least untruthful too cute by half” James Clapper. Mind you, we’ve gotten several fact sheets and Clapper’s hilarious interview with Andrea Mitchell. Just no specific public testimony.

And curiously, in the DNI’s own fact sheets, he doesn’t specify who does what, aside from describing the statutory role his position and the Attorney General play in authorizing FAA 702 orders. He doesn’t say what FBI does, what NSA does … or what his own organization does.

That’s important, because in addition to overseeing all intelligence, Clapper’s office also includes the National Counterterrorism Center. And the NCTC is the entity in charge sharing data. Indeed, it is statutorily required to have access to everything.

[The National Security Act] provides that “[u]nless otherwise directed by the President, the Director of National Intelligence shall have access to all national intelligence and intelligence related to the national security which is collected by any federal department, agency, or other entity, except as otherwise provided by law, or as appropriate, under guidelines agreed upon by the Attorney General and the Director of National Intelligence.

That means, presumably, that NCTC is doing a lot of the work that NSA and FBI are making narrow denials about.

But it also means that NCTC can play with these databases — the dragnet and the access via PRISM to 702 data — as well as any other data in the Federal government, including databases that John Brennan gave it the ability to go get.

So here’s the thing. When Keith Alexander gives you pat reassurances about how limited NSA’s access to Americans’ call data is, that may disclose a whole lot more intrusive data mining over at James Clapper’s shop.

Remember, here is what James Clapper was initially asked.

Wyden: Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?

Clapper: No, sir.

Wyden: It does not?

Clapper: Not wittingly. There are cases where they could, inadvertently perhaps, collect—but not wittingly.” [my emphasis]

His first attempt to walk back that lie went like this:

What I said was, the NSA does not voyeuristically pore through U.S. citizens’ e-mails. [my emphasis]

His second attempt to walk it back went like this:

ANDREA MITCHELL: Senator Wyden made quite a lot out of your exchange with him last March during the hearings. Can you explain what you meant when you said that there was not data collection on millions of Americans?

JAMES CLAPPER: First– as I said, I have great respect for Senator Wyden. I thought, though in retrospect, I was asked– “When are you going to start– stop beating your wife” kind of question, which is meaning not– answerable necessarily by a simple yes or no. So I responded in what I thought was the most truthful, or least untruthful manner by saying no.

And again, to go back to my metaphor. What I was thinking of is looking at the Dewey Decimal numbers– of those books in that metaphorical library– to me, collection of U.S. persons’ data would mean taking the book off the shelf and opening it up and reading it.

ANDREA MITCHELL: Taking the contents?

JAMES CLAPPER: Exactly. That’s what I meant. Now–

ANDREA MITCHELL: You did not mean archiving the telephone numbers?

All of those efforts were, by context at least, limited exclusively to NSA. They don’t address, at all, what NCTC might do with this data (or, for that matter, FBI).

So what does the NCTC do with the data that NSA and FBI have issued careful denials about?

Update: I’m going to replicate a big chunk of this post on the oversight over NCTC’s use of other agencies data, complete with the bit about how the guy in charge of it thought Cheney’s illegal program was the shit.

Back when John Negroponte appointed him to be the Director of National Intelligence’s Civil Liberties Protection Officer, Alexander Joel admitted he had no problem with Cheney’s illegal domestic wiretap program.

Read more

NSA PRISM Slides: Notice Anything Unusual or Missing?

We haven’t seen (and likely will never see) all of the NSA slides former Booz Allen employee Edward Snowden shared with the Guardian-UK and the Washington Post. But the few that we have seen shared by these two news outlets tell us a lot — even content we might expect to see but don’t tells us something.

First, let’s compare what appears to be the title slide of the presentation — the Guardian’s version first, followed by the WaPo’s version. You’d think on the face of it they’d be the same, but they aren’t.

[NSA presentation, title slide via Guardian-UK]

[NSA presentation, title slide, via Guardian-UK]

[NSA presentation, title slide, via Washington Post]

[NSA presentation, title slide, via Washington Post]

Note the name of the preparer or presenter has been redacted on both versions; however, the Guardian retains the title of this person, “PRISM Collection Manager, S35333,” while the WaPo completely redacts both name and title.

This suggests there’s an entire department for this program requiring at least one manager. There are a number of folks who are plugging away at this without uttering a peep.

More importantly, they are working on collection — not exclusively on search.

The boldface reference to “The SIGAD Used Most in NSA Reporting” suggests there are more than the PRISM  in use as SIGINT Activity Designator tools. What’s not clear from this slide is whether PRISM is a subset of US-984XN or whether PRISM is one-for-one the same as US-984XN.

Regardless of whether PRISM is inside or all of US-984XN, the presentation addresses the program “used most” for reporting; can we conclude that reporting means the culled output of mass collection? Read more

James Clapper Hails Checks and Balances While Treating Oversight “Too Cute by Half”

I’ve been citing bits of this interview between James Clapper and Andrea Mitchell here and there, but the whole thing needs to be read to be believed.

But the quick version is this. Mitchell asks Clapper whether “trust us” is enough, given that some future President or Director of National Intelligence might decide to abuse all the programs in question. Clapper responds by celebrating our constitutional system’s checks and balances.

ANDREA MITCHELL:

The president and you and the others in this top-secret world, are saying, “Trust us. We have your best interests, we’re not invading your privacy, we’re going after bad guys. We’re not going after your personal lives.” What happens when you’re gone, when this president or others in our government are gone? There could be another White House that breaks the law.

There could be another D.N.I. who does really bad things– we listened during the Watergate years to those tapes. With the President of the United States saying, “Fire bomb the Brookings Institution.” You know, what do you say to the American people about the next regime who has all of these secrets? Do they– do they live forever somewhere in a computer?

JAMES CLAPPER:

No, they don’t live forever. That’s a valid concern, I think. You know, people come and go, presidents come and go, administrations come and go, D.N.I.’s will come and go. But what is, I think– important about our system is our system of laws, our checks and balances.

You know, the– I think the founding fathers would actually be pretty impressed with how– what they wrote and the organizing principles for this country are still valid and are still used even in you– to– to regulate a technology then, they never foresaw. So that’s timeless. That– those are part of our institutions. Are there people that will abuse those institutions? Yes. But we have a system that sooner or later, mostly sooner these days, those misdeeds are found out. [my emphasis]

But when, earlier in the interview, Mitchell asks him about his lie to Ron Wyden, here’s how he answered.

ANDREA MITCHELL:

Senator Wyden made quite a lot out of your exchange with him last March during the hearings. Can you explain what you meant when you said that there was not data collection on millions of Americans?

JAMES CLAPPER:

First– as I said, I have great respect for Senator Wyden. I thought, though in retrospect, I was asked– “When are you going to start– stop beating your wife” kind of question, which is meaning not– answerable necessarily by a simple yes or no. So I responded in what I thought was the most truthful, or least untruthful manner by saying no.

Read more

Truck-sized Holes: Journalists Challenged by Technology Blindness

[photo: liebeslakritze via Flickr]

[photo: liebeslakritze via Flickr]

Note: The following piece was written just before news broke about Booz Allen Hamilton employee Edward Snowden. With this in mind, let’s look at the reporting we’ve see up to this point; problems with reporting to date may remain even with the new disclosures.

ZDNet bemoaned the failure of journalism in the wake of disclosures this past week regarding the National Security Administration’s surveillance program; they took issue in particular with the Washington Post’s June 7 report. The challenge to journalists at WaPo and other outlets, particularly those who do not have a strong grasp of information technology, can be seen in the reporting around access to social media systems.

Some outlets focused on “direct access.” Others reported on “access,” but were not clear about direct or indirect access.

Yet more reporting focused on awareness of the program and authorization or lack thereof on the part of the largest social media firms cited on the leaked NSA slides.

Journalists are not asking what “access” means in order to clarify what each corporation understands direct and indirect access to mean with regard to their systems.

Does “direct access” mean someone physically camped out on site within reach of the data center?

Does “direct access” mean someone with global administrative rights and capability offsite of the data center? Some might call this remote access, but without clarification, what is the truth?

I don’t know about you but I can drive a Mack truck through the gap between these two questions.

So which “direct access” have the social media firms not permitted? Which “direct access” has been taken without authorization of corporate management? ZDNet focuses carefully on authorization, noting the changes in Washington Post’s story with regard to “knowingly participated,” changed later to read “whose cooperation is essential PRISM operations.”

This begs the same questions with regard to any other form of access which is not direct. Note carefully that a key NSA slide is entitled, “Dates when PRISM Collection Began For Each Provider.” It doesn’t actually say “gained access,” direct or otherwise. Read more

DOD Inspector General Report: SOCOM Purged Their Osama bin Laden Files after Judicial Watch FOIA

I wanted to point to one more detail from the DOD Inspector General’s report on Leon Panetta’s leaks to Zero Dark 30’s filmakers.

The very last page of the report describes how Admiral William McRaven responded after realizing the SEALs who had participated in the raid on Osama bin Laden’s compound had all hung around a Hollywood producer with their name badges exposed.

According to ADM McRaven, the DoD provided the operators and their families an inordinate level of security. ADM McRaven held a meeting with the families to discuss force protection measures and tell the families that additional protective monitoring will be provided, and to call security personnel if they sensed anything. ADM McRaven also directed that the names and photographs associated with the raid not be released. This effort included purging these records to another Government Agency. [my emphasis]

The report doesn’t reveal when SOCOM purged its records and handed the documents to, presumably though not definitely, CIA, though if McRaven directed it, it happened after he took command in August 2011. (Update: That’s probably not right, as he was in command of the operation in any case.)

But it’s a relevant question because Judicial Watch had FOIAed pictures of OBL on May 3, 2011, and sued 10 days later, so before all the leaking and presumably therefore the purging began. On June 26, 2011, just two days after Panetta’s leaky party, the government stalled on the suit, saying Judicial Watch had not exhausted its administrative remedies. By September 26, DOD claimed they had no pictures of OBL (though earlier this year there were reports 7 new photos had been found) and CIA claimed none of the 52 pictures they had could be released. Along with that filing, McRaven submitted a declaration explaining why these photos couldn’t be released, though the interesting parts remain redacted. John Bennett’s declaration for the CIA does not describe when the Agency searched its files for photographs, and therefore doesn’t indicate whether they searched before or after DOD purged its files.

Now, none of this timing would mitigate CIA’s claims about the extremely grave harm that would arise from releasing OBL death porn.

But it is, at the very least, very sketchy — and all that’s before having a really good sense of when the purging and the FOIA response occurred.

Update: I spoke to Judicial Watch’s lawyer for this FOIA, Michael Bekesha, and they have never been informed of this purge. Though it may explain some other details about the progress of the FOIA, including some funkiness with the classification of the photos.

Update: Here’s DOD’s declaration about their search from September 26, 2011.

It’s interesting for two reasons. First, they make claims about SOCOM files that is the exact opposite of what DOD said in the NYT/ACLU FOIA for Anwar al-Awlaki related OLC memos. Whereas in the drone FOIA, they claimed CENTCOM handled SOCOM’s FOIA responses, this one says,

The mission of USSOCOM is to provide Special Operations Forces to defend the United States and its interests. A priority of USSOCOM is to “Deter, Disrupt, and Defeat Terrorist Threats,” and a primary aspect of this priority is to plan and conduct special operations. When a special operation is conducted, the military service Components of USSOCOM (U.S. Army Special Operations Command, Navy Special Warfare Command, U.S. Air Force Special Operations Command, and Marine Corps Special Operations Command) provide Special Operations Forces (personnel and equipment) to the operation. Accordingly, it is DoD FOIA policy that documents created or maintained by these military service Components during or for a joint special operation come under the cognizance of USSOCOM and not the military services for purposes of the FOIA. Therefore, USSOCOM and not the military services, is responsible for the searches of records responsive to plaintiff’s FOIA request at those service components that may have participated in the subject operation.

And like CIA, they don’t date their search description at SOCOM, so don’t say whether it happened pre- or post-purge.

USSOCOM searched the Headquarters and relevant Components, and no records responsive to plaintiff’s request were located. The specific filing systems searched at the Headquarters USSOCOM offices and relevant Components were all hard copy and electronic records including all email records during the inclusive dates of May 1, 2011, through May 31, 2011.

Putin’s Congressional Puppets

I have to give this to Michele Bachmann. Unlike most of the members of Congress she traveled to Russia with last week, she has not (at least not apparently) been suckered by Vladimir Putin to play his patsy.

Jim already described Dana Rohrabacher’s posturing with Steven Seagal while he attempted to replay his glory days palling around with the mujahadeen. Subsequent to that, Rohrabacher defended Putin’s abuse of power in fighting his former soulmates.

“If you are in the middle of an insurrection with Chechnya, and hundreds of people are being killed and there are terrorist actions taking place and kids are being blown up in schools, yeah, guess what, there are people who overstep the bounds of legality,” he said.

While the rule of law is important, Rohrabacher added, “We shouldn’t be describing people who are under this type of threat, we shouldn’t be describing them as if they are Adolf Hitler or they’re back to the old Communism days.”

Meanwhile, both Rohrabacher and Steve King bravely defended Putin’s prosecution of Pussy Riot.

“It’s hard to find sympathy for people who would do that to people’s faith,” King said.

But I’m most amused by the script William Keating (who represents parts of Boston and its southwest suburbs) is speaking from, parroting FSB’s assurances that the Marathon attack could have been prevented if only FBI had been more responsive to the tip they had provided the FBI and CIA.

Keating said the letter contained a lot of details about Tamerlan Tsarnaev, including his birthday, telephone number, cellphone number, where he lived in Cambridge and information about his wife and child. He said it also referenced the possibility that Tsarnaev might be considering changing names.
The Russians also had information about his mother, including her Skype address, Keating said.
Keating told the AP that the Russians believed Tsarnaev wanted to go to Palestine and engage in terrorist activities, but was unable to master the language.
‘‘That was the level of detail they were providing in this letter,’’ Keating said.
Keating said the intelligence officials believed that if Russia and the U.S. had worked together more closely, the bombings might have been averted. He said a top Russian counterintelligence official told the delegation that ‘‘had we had the same level of communication as we do now, the Boston bombing may never have happened.’’

Note Keating doesn’t make clear whether the details from the texts on Palestine were included in what the Russians sent us (the Russians translated the letter for the CODEL), or whether they only now shared it with the CODEL.
Read more

Growing Signs of Intelligence from Intelligence Community, or Just Another Turf War?

On Saturday, I wrote about a remarkable about-face taken by AP’s George Jahn in his reporting on Iran’s nuclear technology. Instead of following his usual routine of parroting leaks from US and Israeli sources meant to put Iranian intentions on nuclear technology in the worst possible light, Jahn instead wrote about how dependent the UN’s IAEA is on US intelligence to develop its evaluation of what is happening in Iran. Further, Jahn highlighted how US credibility on WMD intelligence was forever harmed by the overstated evaluations of Iraqi WMD leading up the invasion of Iraq in 2003. My post was written from the point of view that somehow Jahn had realized how badly he has been played by the intelligence community over the years and has now decided to question the reliability of the information being fed to him.

In comments on the post, Marcy considered whether the reversal could be framed in a different way:

Not to get all 11-dimensional, but any chance his sources asked him to leak this? That is, more stenography, but to justify reversing course?

In what could be yet another framing of what is happening in the intelligence community, Lara Jakes of AP worte an article published Monday in which she described what may be a movement within the intelligence community to promote what appears to be a healthy move toward reasoned debate among the various agencies within the intelligence community. Couching the opening of the article within the uncertainty over whether Osama bin Laden really was at the compound in Abbottabad where he was eventually killed, Jakes describes what appears to be a new movement toward debate:

As the world now knows well, President Barack Obama ultimately decided to launch a May 2011 raid on the Abbottabad compound that killed bin Laden. But the level of widespread skepticism that Cardillo shared with other top-level officials — which nearly scuttled the raid — reflected a sea change within the U.S. spy community, one that embraces debate to avoid “slam-dunk” intelligence in tough national security decisions.

Wow. Here we have a second AP reporter making a reference to the failed Iraq intelligence in 2003 only two days after Jahn’s introspective that cited the same failure. But, when she finally revisits the “slam-dunk” reference many paragraphs later, Jakes elides the most important factor that led to the intelligence failure. Here is her description: Read more

Jahn Does Complete Reversal, Questions Sources Instead of Transcribing Iran Nuke Propaganda

Man Bites Dog

It was a development worthy of the proverbial mythical headline reversing the natural order of the world. For a very long time, I have mercilessly attacked George Jahn of the AP for the role he has played while serving to move anti-Iran propaganda into newspapers across the globe. Here’s how I described his usual role in my most recent post about him:

I have often described the process of “diplomats” close to the IAEA’s Vienna headquarters gaining access to documents and other confidential information relating to Iran’s nuclear activities and then selectively leaking the most damaging aspects of that information to George Jahn of AP. Sometimes, the information also is shared with Fredrik Dahl of Reuters, who, like Jahn, is also based in Vienna. Many believe that Israeli diplomats are most often responsible for these leaks and for shaping the stories to put Iran in the worst possible light.

Another key aspect of Jahn’s role has been his reliance on David Albright of the Institute for Science and International Security, whom Jahn has relied on regularly for adding that special “think-tank aura” to the propaganda that has been funneled to him.

Yesterday, the stage was set for Jahn to transcribe more propaganda into the record. A new IAEA report was available (pdf; I see that there is a typo on the date on the cover page, it is a 2013 report instead of the 2012 appearing there, note 2013 embedded in the document ID code) and David Albright had already taken to the fainting couch, proclaiming the evil portents of the sudden appearance of New Asphalt (!) at the Parchin site in Iran where the US and Israel claim Iran has carried out blast chamber experiments to develop a trigger for a nuclear weapon (and where the suspect building, and presumably the blast chamber itself, itself remains standing, despite a hilarious cat and mouse game Iran has played at the site). But, in true “man bites dog” fashion, Jahn chose not to play the New Asphalt game and instead published an article that puts much of the intelligence gathering of the IAEA into a perspective that calls into question the motives of those who supply the bulk of that intelligence to the UN’s nuclear watchdog agency.

Jahn wastes no time, opening the article by proclaiming that the US supplies the bulk of intelligence on Iran’s nuclear program to the IAEA and that US credibility on weapons intelligence took a huge hit in 2003 with the Iraq fiasco:

The U.N. nuclear agency responsible for probing whether Iran has worked on a nuclear bomb depends on the United States and its allies for most of its intelligence, complicating the agency’s efforts to produce findings that can be widely accepted by the international community.

Much of the world looks at U.S. intelligence on weapons development with a suspicious eye, given American claims a decade ago that Iraq had developed weapons of mass destruction. The U.S. used those claims to justify a war; Iraq, it turned out, had no such weapons.

Jahn even went so far as to get IAEA sources to provide an estimate of how the US and its allies dominate the intelligence that is provided: Read more