The Senate Report on Fusion Center Fails to Ask or Answer the Most Basic Question

As I suggested the other day, there is a lot to recommend the Permanent Subcommittee on Investigations report on fusion centers.

But while it meticulously supports its claims about the waste and inefficacy of fusion centers, it seems to miss what all that evidence suggests. That is that there is no need for fusion centers. The report clearly shows we have spent somewhere between $289 million and $1.4 billion to build a bunch of data sharing centers in the name of terrorism; yet in spite of the investment, the centers appear to never actually have contributed to finding a terrorist.

Fusion centers are supposed to be about counterterrorism

This is made clear in the way the report meticulously lays out the purported purpose of fusion centers, then measures how they fulfill that purpose.

The report notes two moments in DHS’ history when fusion centers were pointedly not authorized: the initial formation of DHS, the 9/11 Commission report. It notes that under Michael Chertoff, DHS aides were pushing for reasons to sell fusion centers to the Feds.

Mr. Riegle said that he did not believe that access to state and local information was really a principal reason for the federal government to support fusion centers, but it was part of the pitch. “It was a selling point to the Feds,” Mr. Riegle said. “I’ve got to tell them what the benefits are.”

Only in 2007, at a time when there were already 37 fusion centers, many in states not likely to be targeted by foreign terrorism, did Congress specifically authorize fusion centers. At that time, Congress emphasized the fusion centers’ counterterrorism function.

The law also directed DHS to detail intelligence personnel to the centers if the centers met certain criteria, several of which required a center to demonstrate a focus on and commitment to a counterterrorism mission. Among the criteria the law suggested were “whether the fusion center . . . focuses on a broad counterterror approach,” whether the center has sufficient personnel “to support a broad counterterrorism mission,” and whether the center is appropriately funded by non-federal sources “to support its counterterrorism mission.”

Fusion centers have not found any terrorists

And on that basis, fusion centers have failed.

The value of fusion centers to the federal government should be determined by tallying the cost of its investment, and the results obtained. Read more

Share this entry

Barack Obama (and the Three Musketeers of Selective Leaking) Says Barack Obama Wanted an OBL Trial

The AP made some news yesterday with this Barack Obama quote from Mark Bowden’s new book, The Finish.

Frankly, my belief was if we had captured him, that I would be in a pretty strong position, politically, here, to argue that displaying due process and rule of law would be our best weapon against al-Qaida, in preventing him from appearing as a martyr.

It’s a quote repeated and expanded in this exclusive piece from Vanity Fair, which will have an excerpt of the book in its next edition.

Now, both of these excerpts make it clear: This is a direct quote of an Obama claim, made after the fact. But if that didn’t already make you suspect the political efficacy of telling this story just weeks before the election, check out Bowden’s acknowledgements, above.

Not only does Bowden thank the Three Musketeers of Obama’s selective leaking, John Brennan, Tom Donilon, and Denis McDonough.

But it also thanks Obama personally.

(It also thanks CIA Director David Petraeus, a man who never met press coverage he didn’t like.)

Look, I’d love to imagine that Obama would have made the political effort to give Osama bin Laden a trial had he been captured alive. I’ve even rationalized how much easier that would be, given that we presumably would avoid the whole torture phase that has made trying Khalid Sheikh Mohammed.

There are both political and legal reasons why it serves Obama’s interests to say he considered the possibilities of a live capture followed by a trial. And given how closely Bowden worked with those trying to make the most of Obama’s OBL killing, I don’t see any reason to treat the claim as credible.

And this book–with Obama’s top aides identified as sources so clearly–is yet another reason why I think Mark Bissonnette won’t experience any legal troubles for publishing a book covering the same topic.

Share this entry

Romney Foreign Policy Advisor’s Wife Joins Dance on Ambassador Stevens’ Grave

Next up in the campaign to turn the Benghazi attack into Obama’s Jimmy Carter? Danielle Pletka, one of the architects of the false claims that got us into Iraq War.

She draws a parallel between the Obama Administration’s treatment of the Benghazi attack and Spanish Prime Minister José Maria Aznar’s attempts to blame the March 11, 2004 Madrid bombing on ETA rather than al Qaeda. Of course, in Pletka’s version, Aznar’s willingness to get suckered into Bush’s–and Pletka’s–illegal war in Iraq bore no role in Aznar’s loss at all; just his attempts to hide the real culprits.

Why did Aznar insist it was ETA? Simple. He didn’t want the Spanish people to believe that the terrorist attack in Madrid was related to Spain’s involvement in Iraq and Afghanistan, fearing they would punish him at the polls. Ironically, however, it was not the bombings themselves that doomed Aznar and his party in elections held three days later; rather it was the handling, the appearance of a cover-up, and the widespread belief that all of the above was done in the aid of Aznar’s political fortunes rather than policy.

Of course, last I checked, Obama had admitted this was a terrorist attack, so the parallel falls apart unless you’re one of the people trying to turn the September 11 death of a talented Ambassador–one who called for light security himselfinto an electoral opportunity.

I’m sure this effort to win political advantage from Stevens’ death has no connection with the fact that Pletka’s husband, Stephen Rademaker, is a Romney foreign policy advisor. (h/t Ali Gharib) I mean, given Pletka’s history, she’d be willing to politicize an Ambassador’s death all on her own, without the obvious conflict of interest of her husband’s political investments and career possibilities.

Again: there are legitimate reasons to have Congress investigate this. Which is why it would be nice if the Romney campaign would stop this celebration and allow people without obvious conflicts of interest–someone like Mike Rogers–to conduct that investigation.

Share this entry

The Libyan Left Behind Novels

I confess I’m skeptical every time a set of documents gets “left behind” in Libya. First there were the intelligence documents showing how the US and UK collaborated in the rendition and torture of Libyan opposition figures. Then there was Ambassador Chris Stevens’ journal, in apparently undamaged condition. And now there are the documents a WaPo reporter found at the still unsecured compound.

Documents detailing weapons collection efforts, emergency evacuation protocols, the full internal itinerary of Ambassador J. Christopher Stevens’s trip and the personnel records of Libyans who were contracted to secure the mission were among the items scattered across the floors of the looted compound when a Washington Post reporter and a translator visited Wednesday.

[snip]

At least one document found amid the clutter indicates that Americans at the mission were discussing the possibility of an attack in early September, just two days before the assault took place. The document is a memorandum dated Sept. 9 from the U.S. mission’s security office to the 17th February Martyrs Brigade, the Libyan-government-sanctioned militia that was guarding the compound, making plans for a “quick reaction force,” or QRF, that would provide security.

“In the event of an attack on the U.S. Mission,” the document states, “QRF will request additional support from the 17th February Martyrs Brigade.”

Other the documents detail — with names, photographs, phone numbers and other personal information — the Libyans contracted to provide security for the mission from a British-based private firm, Blue Mountain. Some of those Libyans say they now fear for their lives, and the State Department has said it shares concerns about their safety.

Not only do I find it a remarkable coinkydink that only in Libya do documents have a way of conveniently appearing. But all the documents in question are documents that address a specifically relevant subject matter at a convenient time. Moreover, given earlier reports that documents showing contacts were looted, I’m doubly skeptical an itinerary of Chris Stevens’ meetings would be left lying around, particularly given all the questions about what he was doing in Benghazi. And I’ll come back to my thoughts about the Libyan security contractors in a later post.

Ah well. None of that takes away from the laudable work of the reporters that continue to unearth this stuff.

Which brings me to the real question raised by the discovery of these documents. Thus far, at least 3 media teams have spent significant time at the compound.

And yet the FBI haven’t shown up for a visit once.

Perhaps that’s a factor of the FBI having chased their Arabic Agents out of the Bureau (I haven’t heard of similar problems with Agents of North African descent); it’d be a lot easier to at least do a few evidence collection visits if the FBI officers didn’t look and sound like Ken and Barbie. But in the WaPo’s case, at least, a reporter and a translator made it safely in and out of the compound.

Maybe the FBI can deputize the press to conduct this investigation?

Share this entry

About That FBI Investigation of the Benghazi Attack…

The NYT’s Eric Schmitt reports that JSOC is preparing target packages for those who attacked the Benghazi consulate.

The American military’s top-secret Joint Special Operations Command is preparing detailed information that could be used to kill or capture some of the militants suspected in the attack last month in Libya that killed Ambassador J. Christopher Stevens and three other Americans, senior military and counterterrorism officials said on Tuesday.

[snip]

It remained unclear precisely how many of the “target packages” are being prepared — perhaps a dozen or more — but military and counterterrorism officials said that the Libyan authorities had identified several suspected assailants based on witness accounts, video and other photographs from the scene.

“They are putting together information on where these individuals live, who their family members and their associates are, and their entire pattern of life,” said one American official who has been briefed on the target planning now under way.

American intelligence-gathering assets — spies, satellite imagery, electronic-eavesdropping devices, among others — are finite, so counterterrorism authorities preparing the “target packages” must prioritize which militants in Benghazi — or elsewhere if they have fled the area since the attack — need to be monitored on a nearly hour-by-hour, if not minute-by-minute, basis.

To help with this effort since the attacks, the Pentagon has increased the frequency of surveillance drones that fly over eastern Libya, collecting electronic intercepts, imagery and other information that could help planners compile their target lists. American intelligence agencies have assigned additional analysts to concentrate on the suspects. [my emphasis]

Schmitt doesn’t breathe a word about this in yesterday’s article, but four days before he wrote that JSOC article, he contributed to this article describing the FBI’s difficulties investigating the attack.

Sixteen days after the death of four Americans in an attack on a United States diplomatic mission here, fears about the near-total lack of security have kept F.B.I. agents from visiting the scene of the killings and forced them to try to piece together the complicated crime from Tripoli, more than 400 miles away.

[snip]

The Libyan government has advised the F.B.I. that it cannot ensure the safety of the American investigators in Benghazi. So agents have been conducting interviews from afar, relying on local Libyan authorities to help identify and arrange meetings with witnesses to the attack and working closely with the Libyans to gauge the veracity of any of those accounts.

“There’s a chance we never make it in there,” said a senior law enforcement official.

Read more

Share this entry

Why Can’t Darrell Issa Read the Wall Street Journal?

In addition to the rather amusing fact that Darrell Issa is conducting an investigation that Mike Rogers should be conducting, there’s another oddity about his “investigation.” The answers to the questions he asks Hillary Clinton have been available for over 10 days in this WSJ front page article.

In his letter, Issa asks,

  1. Was State Department headquarters in Washington aware of all the above incidents? If not, why not?
  2. If so, what measures did the State Department take to match the level of security provided to the U.S. Mission in Libya to the level of threat?
  3. Please detail any requests made by Embassy Tripoli to State Department headquarters for additional security, whether in general or in light of specific attacks mentioned above. How did the Department respond to each of these requests.

In the September 21 article, the WSJ listed several of the attacks in Issa’s letter (as well as an April 10 attack on the UN’s envoy). More importantly, it provided anonymous explanations from senior State Department officials describing their thinking about security in Benghazi.

The State Department chose to maintain only limited security in Benghazi, Libya, despite months of sporadic attacks there on U.S. and other Western missions. And while the U.S. said it would ask Libya to boost security there, it did so just once, for a one-week period in June, according to Libyan officials.

[snip]

State Department officials said security for the consulate was frequently reviewed and was deemed sufficient to counter what U.S. officials considered to be the most likely threat at the time: a limited hit-and-run attack with rocket-propelled grenades or improvised explosive devices, or IEDs.

There was a string of attacks in Benghazi in the months before Sept. 11, including a June 6 IED explosion outside the consulate compound. “These types of incidents were the ones that were our principal concerns,” a senior State Department official said. Based on the outcome of the June 6 attack, in which a perimeter wall was damaged but no Americans hurt, a second State Department official added: “Our security plan worked.”

[snip]

[After the Brits pulled out of their consulate in Benghazi] The U.S. deemed the security level sufficient and decided to stay, “given the very important mission that we have in eastern Libya to support U.S. national security interests,” said a senior State Department official. He said “robust” security improvements had been made to the compound since the Americans moved into it in May 2011, including cement barriers and barbed wire.

More importantly, the article describes who made the decision to opt for a light security approach over something more aggressive: Ambassador Stevens.

Current and former officials said the security choices in Benghazi reflected efforts by Mr. Stevens to maintain a low-profile security posture and show faith in Libya’s new leaders, despite questions about their ability to rein in heavily armed bands of militants. Read more

Share this entry

Why Is Darrell Issa Doing Mike Rogers’ Job?

In his latest of a series of posts on the Benghazi strike, Eli Lake reveals that Darrell Issa and Jason Chaffetz have written a letter to Hillary Clinton suggesting State ignored intelligence about terrorists in Benghazi.

In the five months leading up to this year’s 9/11 anniversary, there were two bombings on the U.S. consulate in Benghazi and increasing threats to and attacks on the Libyan nationals hired to provide security at the U.S. missions in Tripoli and Benghazi.

Details on these alleged incidents stem in part from the testimony of a handful of whistleblowers who approached the House Committee on Oversight and Government Reform in the days and weeks following the attack on the Benghazi consulate. The incidents are disclosed in a letter to be sent Tuesday to Hillary Clinton from Rep. Darrell Issa, the chairman of the House Committee on Oversight and Government Reform, and Rep. Jason Chaffetz, the chairman of the oversight committee’s subcommittee that deals with national security.

The State Department did not offer comment on the record last night.

The new information disclosed in the letter obtained by The Daily Beast strongly suggests the U.S. consulate in Benghazi and the late Ambassador Chris Stevens were known by U.S. security personnel to be targets for terrorists. Indeed, the terrorists made their threats openly on Facebook.

Curiously, Lake doesn’t ask a really obvious question: why would a slew of “whistleblowers” go to Darrell Issa with their complaints about missed intelligence rather than Mike Rogers, Chair of the House Intelligence Committee? After all, if there was an intelligence failure, then it is HPSCI’s job to do something about it.

The question is all the more curious given that Issa’s Committee does not have the clearance for some levels of intelligence (the kind that sources who could well be these very same whistleblowers have already been sharing with Lake).

Meaning this letter will have an utterly predictable result: State will respond that they can’t share the information that Issa is seeking. And then Issa will escalate this, turning his “investigation” into Son of Fast and Furious.

Moreover, this intelligence should have already been shared with the House (and Senate) Intelligence Committees (note that Peter King, a leaky sieve, sits on both committees). If it hasn’t been, then Mike Rogers has all the more reason to escalate this issue. The only possible reasons for Issa to investigate this, then, is if 1) Rogers is failing to do his job and/or 2) this is just a stunt to turn a legitimate intelligence issue, the Benghazi attack, into a political attack on Obama.

Back in May, Mitt made it clear he was hoping for a hostage situation he could use as an electoral opportunity. Yesterday, Craig Unger confirmed what was already clear; Mitt intends to use the Benghazi attack as his “Jimmy Carter” strategy against Obama.

According to a highly reliable source, as Mitt Romney and President Barack Obama prepare for the first presidential debate Wednesday night, top Republican operatives are primed to unleash a new two-pronged offensive that will attack Obama as weak on national security, and will be based, in part, on new intelligence information regarding the attacks in Libya that killed U.S. ambassador Chris Stevens on September 11.

The source, who has first-hand knowledge of private, high-level conversations in the Romney camp that took place in Washington, DC last week, said that at various times the GOP strategists referred to their new operation as the Jimmy Carter Strategy or the October Surprise.

He added that they planned to release what they hoped would be “a bombshell” that would make Libya and Obama’s foreign policy a major issue in the campaign. “My understanding is that they have come up with evidence that the Obama administration had positive intelligence that there was going to be a terrorist attack on the intelligence.”

Since the presumed time of the meeting last week, Lake has written four stories about Benghazi.

But Unger’s source wouldn’t reveal what the second-prong of this attack was.

The source said that “there was quite a bit more” to the operation than simply revealing the intelligence regarding Libya. He declined to discuss what he described as the second phase of the operation.

According to Lake, Issa plans to hold an October 10 hearing on the Benghazi attack, even while Congress is out of session. That would put the hearing the day before the VP debate, and in plenty of time for Issa to create his scandal before the Presidential foreign policy debates on October 16 and 22.

I think it’s fairly clear what the second prong of this strategy is.

But the whole strategy is premised on a very flawed premise: one that says Oversight should investigate things it doesn’t have clearance for and that are solidly HPSCI’s responsibility.

I actually do want to know what happened here, and I was suggesting it was a planned al Qaeda attack longer than Lake has been. But it’s blatantly obvious Issa’s investigation is not designed to find out what happened.

Share this entry

Why Is Jose Rodriguez Hanging Out John Brennan NOW?

I’m no fan of either Jose Rodriguez or John Brennan. So I take no pleasure that the former is blaming the latter for a big intelligence scam carried out against the CIA back in the day.

As head of the multi-agency Terrorist Threat Integration Center in 2003 and 2004, Brennan disseminated to the Bush White House a stream of CIA intelligence from a bogus source, former CIA officials say. Ridiculed by some with the CIA, the bogus intelligence nevertheless led to disruption in the U.S. and abroad, including an orange terror alert and the cancellation of dozens of international flights.

[snip]

At the CIA, the information was controversial from the beginning, and many agency officials said at the time that it should not have been distributed. Jose Rodriguez, who was directing the CIA’s Counterterrorism Center, said the CTC viewed the intelligence as “crazy.”

“We were very skeptical,” Rodriguez recalled.

[snip]

“It was briefed by John. He was the guy who was bringing it there,” said Rodriguez, who added that he believes Brennan was trying to build up his own profile. “My own view is he saw this, he took this, as a way to have relevance, to take something important to the White House.”

But I am interested in why Rodriguez is doing this now–particularly since, as Defense News points out, he chose not to do so in his own book.

I can think of three possible reasons this is coming out now–they’re all wildarsed guesses. It’s possible that Brennan’s star is fading, so he’s vulnerable now in a way he wasn’t before.

It’s possible that some story behind the underlying scam this guy–Dennis Montgomery–carried out against the government is about to unfold. Read more

Share this entry

Maybe Congress Doesn’t Want Constituents to Know Surveillance Has Spiked Under Obama?

The ACLU sued the government to get it to release the reports on how much DOJ has used Pen Registers and Trap and Trace devices to get criminal suspects’ phone and email call records.

The records show a sharp increase in the use of PR/TT requests. Of particularly note, three times as many people have had their records turned over to DOJ under Obama.

In its post on the topic, ACLU notes that whereas, under Bush, neither Congress nor the public were getting these records, Obama’s Administration has submitted the reports in timely fashion, but Congress has not released the reports.

When no reports surfaced in 2010 and 2011, the ACLU filed a FOIA request to obtain them. After our request received no response, we filed suit to enforce it.

Although the Justice Department has in the past repeatedly failed to submit the annual reports to Congress, it appears that it has now cleaned up its act. Both the 2010 and 2011 reports were submitted to Congress in compliance with the reporting requirement. Unfortunately, Congress has done nothing at all to inform the public about the federal government’s use of these invasive surveillance powers. Rather than publishing the reports online, they appear to have filed them away in an office somewhere on Capitol Hill.

This is unacceptable. Congress introduced the pen register reporting requirement in order to impose some transparency on the government’s use of a powerful surveillance tool. For democracy to function, citizens must have access to information that they need to make informed decisions—information such as how and to what extent the government is spying on their private communications. Our representatives in Congress know this, and created the reporting requirement exactly for this reason.

It shouldn’t take a FOIA lawsuit by the ACLU to force the disclosure of these valuable reports. There is nothing stopping Congress from releasing these reports, and doing so routinely. They could easily be posted online, as the ACLU has done today.

Of course, Congress didn’t require DOJ to share this information with actual citizens; it only required DOJ share the information with Congress. Republicans have no incentive to turn over records that show Obama’s DOJ has investigated crime (in particularly the drug trafficking these records are most often used to investigate) more aggressively than Bush did. And Democrats have no incentive to show their President has trampled privacy. And given the likelihood these records are being used in creative new ways, neither party has an incentive giving people more reason to question how PR/TT are being used (I’ve long noted that their used started to rise after Bush’s illegal wiretap program got exposed, and suspect there may be a connection).

In short, Congress is complicit in hiding the extent to which increasing numbers of Americans are being surveilled by the government.

But that shouldn’t be a surprise at this point.

Share this entry

No Easy Day, WikiLeaks, and Mitt’s 47%: Three Different Approaches to Illicitly-Released Information

[youtube]nYXXkOLgMqQ[/youtube]

Last week, DOD issued a guidance memo instructing DOD personnel what they are–and are not–permitted to do with the Matt Bissonnettte book, No Easy Day, that they claim has sensitive and maybe even classified information. DOD personnel,

  • are free to purchase NED;
  • are not required to store NED in containers or areas approved for the storage of classified information, unless classified statements in the book have been identified;
  • shall not discuss potentially classified and sensitive unclassified information with persons who do not have an official need to know and an appropriate security clearance;
  • who possess either firsthand knowledge of, or suspect information within NED to be classified or sensitive, shall not publically speculate or discuss potentially classified or sensitive unclassified information outside official U.S. Government channels (e.g., Chain-of-Command, Public Affairs, Security, etc.);
  • are prohibited from using unclassified government computer systems to discuss potentially classified or sensitive contents ofNED, and must not engage in online discussions via social networking or media sites regarding potentially classified or sensitive unclassified information that may be contained in NED.

The memo points to George Little’s earlier flaccid claims that the book contains classified information as the basis for this policy, even though those claims fell far short of an assertion that there was actually classified information in the book.

The strategy behind this policy seems to be to accept the massive release of this information, while prohibiting people from talking about what information in the book is classified or sensitive–or even challenging Little’s half-hearted claim that it is classified. Moreover, few of the people bound by this memo know what the President insta-declassified to be able to tell his own version of the Osama bin Laden raid, so the memo also gags discussions about information that has likely been declassified, not to mention discussions about the few areas where Bissonnette’s version differs from the Administration’s official version.

Still, it does let people access the information and talk about it generally.

Compare that policy with the Administration’s three-prong approach to WikiLeaks information:

  • Government employees cannot discuss–and are not supposed to consult at all–WikiLeaks cables. The treatment of Peter Van Buren for–among other things–linking to some WikiLeaks cables demonstrates the lengths to which the government is willing to go to silence all discussion of the cables. (Though I imagine the surveillance of social media will be similar to enforce the DOD guidance.)
  • Gitmo lawyers not only cannot discuss material–like the dodgy intelligence cable that the government used to imprison Latif until he died of still undisclosed causes or the files that cite tortured confessions to incriminate other detainees–released by WikiLeaks unless the press speaks of them first. But unlike DOD personnel who do not necessarily have a need to know, Gitmo lawyers who do have a need to know couldn’t consult WikiLeaks except in closely controlled secure conditions.
  • The Government will refuse to release cables already released under FOIA. While to some degree, this strategy parallels the DOD approach–whereas the NED policy avoids identifying which is and is not classified information, the WikiLeaks policy avoids admitting that cables everyone knows are authentic are authentic, the policy also serves to improperly hide evidence of illegal activity through improper classification.

Now, one part of the Administration’s logic behind this approach to purportedly classified information (thus far without the legal proof in either case, or even a legal effort to prove in the case of Bissonnette) is to limit discussion of information that was allegedly released via illegal means. Read more

Share this entry