Judge Brinkema Cites Espionage Act to Protect Reporter’s Privilege

Charlie Savage tells the headline story from Leonie Brinkema’s opinion on whether or not James Risen must testify in Jeffrey Sterling’s leak trial.

“A criminal trial subpoena is not a free pass for the government to rifle through a reporter’s notebook,” wrote the judge, Leonie Brinkema of the United State District Court in Alexandria, Va.

But I’m just as interested in a few other things she says. First there’s the way she dismisses the government’s claim that two of the people who testified to the Grand Jury–Jeffrey Sterling’s ex-girlfriend and a former CIA officer with knowledge of the MERLYN operation–would be unable to testify at he trial.

The government had argued that the girlfriend was protected by spousal privilege and that the former CIA officer would be hearsay.

Separate and apart from Risen’s concession regarding the admissibility of his grand jury affidavit at trial, see Mot. p. 45, other evidence relied upon by the Court in its Memorandum Opinion similarly would be inadmissible at trial. For example, the grand jury testimony of the witness cited by the Court at page 7 of its Memorandum Opinion would be inadmissible under Rules 801(c), 802 and 803 of the Federal Rules of Evidence and United States v. Acker, 52 F.3d 509, 514-515 (4th Cir. 1995)(availability of spousal privileges to testifying and non-testifying spouses). The grand jury testimony of the witness cited by the Court at pages 7, 9, 10, 20, and 34 of its Memorandum Opinion – testimony that this Court deemed one of the key facts in its conclusion – is inadmissible hearsay on its face absent some exception; yet Risen treats the admissibility of the testimony of both witnesses as a foregone conclusion.

But as Risen’s lawyer Joel Kurtzberg pointed out during the hearing on Risen’s subpoena, she’s not his wife!

They actually cite in their papers as to the testimony of Mr. Sterling’s ex-girlfriend, suggest that it wouldn’t be admissible because they cite to a Fourth Circuit case about the marital privilege.

And in fact, if you look at the case they cite, the case holds the exact opposite. It holds that if you are not married, even if you have been living together I believe for 26 years in that case, the marital privilege doesn’t apply.

Here’s how Brinkema dismisses this William Welch gimmick.

Although the government argues that the spousal privilege would prevent this witness from testifying, nothing in the record indicates thta Sterling and the witness are married now or were married during the time of Sterling’s alleged statements.

More interesting still is the way Brinkema dismisses the government’s claim that the CIA officer’s testimony would be inadmissible hearsay.

Brinkema starts by citing Federal Rules of Evidence describing the exception for a statement against interest.

A statement is admissible under this exception if: (1) the speaker is unavailable; (2) the statement is actually adverse to the speaker’s penal interest; and (3) corroborating circumstances clearly indicate the trustworthiness of the statement.

After noting that Risen’s testimony would be unavailable if she found that reporter’s privilege prevented his testimony or if he refused to testify, she then invokes the Espionage Act.

Risen’s statements are adverse to his penal interest because receiving classified information without proper authorization is a federal felony under 18 U.S.C. 793(e); see U.S. Sentencing Guidelines Manual 2M3.3 (providing a base offense level 29 for convictions for the “Unauthorized Receipt of Classified Information.”). 6

6 The government clearly recognizes Risen’s potential exposure to criminal liability and has offered to obtain an order of immunity for him.

Brinkema uses the overzealous interpretation of the Espionage Act the government itself has been floating lately as a way to force the government to have the former CIA officer testify, which I suspect they’d much rather not do.

And note that footnote about immunity. I’m not sure whether we knew the government had discussed offering Risen immunity or not, but particularly given claims they’re pursuing his testimony so aggressively as a way to jail him for protecting his sources, it is an interesting revelation.

Finally, there’s one more passage I find telling. In the middle of a passage discussing whether the government has access to the information Risen would testify to via other means, she notes,

The government has not stated whether it has nontestimonial direct evidence, such as email messages or recordings of telephone calls in which Sterling discloses classified information to Risen; nor has it proffered in this proceeding the circumstantial evidence it has developed.

In a case in which the government has pointed to records of emails and calls, Brinkema notes, the government has never said whether or not it has the content of those emails and calls. Given that this statement is a non sequitur (it appears amid a discussion of circumstantial evidence), and given that Brinkema knows the government may have improperly accessed Risen’s phone records in the warrantless wiretap case, I find her comment mighty suggestive.

Share this entry

The Inevitable Collapse of Legitimacy Under Secret Law: WikiLeaks Hacks

DOJ indicted 16 alleged hackers today, 14 of whom were purportedly involved in hacking PayPal after it refused to accept payments for WikiLeaks.

According to the San Jose indictment, in late November 2010, WikiLeaks released a large amount of classified U.S. State Department cables on its website. Citing violations of the PayPal terms of service, and in response to WikiLeaks’ release of the classified cables, PayPal suspended WikiLeaks’ accounts so that WikiLeaks could no longer receive donations via PayPal. WikiLeaks’ website declared that PayPal’s action “tried to economically strangle WikiLeaks.”

The San Jose indictment alleges that in retribution for PayPal’s termination of WikiLeaks’ donation account, a group calling itself Anonymous coordinated and executed distributed denial of service (DDoS) attacks against PayPal’s computer servers using an open source computer program the group makes available for free download on the Internet. DDoS attacks are attempts to render computers unavailable to users through a variety of means, including saturating the target computers or networks with external communications requests, thereby denying service to legitimate users. According to the indictment, Anonymous referred to the DDoS attacks on PayPal as “Operation Avenge Assange.”

Now, I’m not surprised DOJ indicted these folks. I’m not arguing that, if they did what DOJ alleged they did, they didn’t commit a crime.

But I can’t help but notice that DOJ has not yet indicted anyone for the DDoS attacks–the very same crime–committed against WikiLeaks 8 days earlier than the crime alleged in this indictment.

I’m guessing DOJ has a very good idea who committed that crime. But for some reason (heh), they haven’t indicted those perpetrators.

In fact, I’ll bet you that DOJ also has a better explanation for why PayPal started refusing WikiLeaks donations on December 4, 2010–two days before this alleged crime–than they describe here.

But we mere citizens are privy to none of that. As far as we know–because of choices about secrecy the government has made–a crime was committed against a media outlet on November 28, 2010. That crime remains unsolved. Indeed, DOJ has never made a peep about solving that crime. Meanwhile, today, 14 people were indicted for allegedly committing the very same crime the government–inexplicably, at least according to its public statements–has not pursued.

According to the public story, at least, the rule of law died with this indictment today. The government has put itself–the hackers it likes, if not employs–above the law, while indicting 14 people for the very same crime committed just weeks before those 14 people allegedly committed their crime.

Of course, that’s probably not how the government views it. I presume they went to some judge–probably a FISA judge–in the days leading up to November 28 and told that judge they were pursuing a case of Espionage and couldn’t that judge please give the government permission to commit a crime against a media outlet.

Mind you, I’m not aware of the part of the PATRIOT Act (or other US Code) that permits the government to commit crimes against media outlets it claims are engaged in Espionage. But then I’m not aware of the part of the PATRIOT Act that permits the government to track geolocation of all of us in the name of hunting terrorists.

And we know they do that.

That’s one of the problems with secret law, you know. It’s never clear what basis the government has given a judge, in secret, for breaking the law.

Less perplexing than how the government explains why its hack of WikiLeaks is not a crime but the alleged hacking committed by these 14 people is a crime, is why PayPal and Visa and MasterCard all of a sudden, within days, decided to stop taking donations to WikiLeaks. Withdrawing funding for alleged terrorists and spies with no due process, at least, is at least provided for under the law.

Though, from the perspective of seeing that our government used it to persecute a media outlet, it doesn’t necessarily make it right.

The other interesting thing about how this secret law thing works is that around about the same time this uninvestigated hack against WikiLeaks occurred and around about the same time these alleged hackers hacked PayPal, the government anonymously leaked information about problems with the claim that WikiLeaks was, in fact, engaged in Espionage. Even at that point, the government admitted it didn’t have much of an Espionage case.

The Justice Department, in considering whether and how it might indict Julian Assange, is looking beyond the Espionage Act of 1917 to other possible offenses, including conspiracy or trafficking in stolen property, according to officials familiar with the investigation.

Attorney General Eric H. Holder Jr. acknowledged this week that there were problems with the Espionage Act, a World War I-era law that says the unauthorized possession and dissemination of information related to national defense is illegal. But he also hinted that prosecutors were looking at other statutes with regard to Mr. Assange, the founder of WikiLeaks.

[snip]

A government official familiar with the investigation said that treating WikiLeaks different from newspapers might be facilitated if investigators found any evidence that Mr. Assange aided the leaker, who is believed to be a low-level Army intelligence analyst — for example, by directing him to look for certain things and providing technological assistance.

If Mr. Assange did collaborate in the original disclosure, then prosecutors could charge him with conspiracy in the underlying leak, skirting the question of whether the subsequent publication of the documents constituted a separate criminal offense. But while investigators have looked for such evidence, there is no public sign suggesting that they have found any.

Did they tell a judge WikiLeaks was engaged in Espionage even while they were telling Charlie Savage it wasn’t?

Particularly from the perspective of today–as it has become clear that Rupert Murdoch has been trafficking in stolen property without his media properties mysteriously getting hacked by people we believe to be aligned with the government–the 7 month period in which DOJ has failed to find any grounds to indict WikiLeaks itself really raises questions about the justification DOJ presumably gave to a judge all those months ago to engage in illegal prior restraint.

I assume DOJ claimed WikiLeaks engaged in Espionage. I assume the government used that claim to hack WikiLeaks and engage in prior restraint. I assume the government used the same claim to cut off US-based donations to WikiLeaks. And if the government admitted that publicly, likely just a few crazy civil libertarians like me would object to the government’s violation of the First Amendment.

We’re so quaint, those of us who believe in rule of law!

DOJ could fix the crisis in legitimacy this indictment will bring about by simply explaining some detail about why they’re not pursuing the hackers that brought down a media outlet last year, but they have pursued hackers that brought down an online payment service (never mind questions about why they’re not pursuing banksters). They could simply explain what law they used–or abused–to be able to incapacitate a media outlet without violating the First Amendment.

That might give their actions today–and back in November–the patina of legitimacy.

But instead, they have apparently chosen to persist in applying their secret laws, such that they can violate the First Amendment of the Constitution, even while prosecuting others for crimes the government has presumably committed itself.

And that, my friends, is how secret law kills democracy and the rule of law.

Share this entry

Sterling’s Graymail Attempt

As Josh Gerstein reported, back in June, Jeffrey Sterling asked the government for details about which parts of James Risen’s account of Merlin are true and which are false. His lawyers argue that Sterling cannot be guilty of disseminating national defense information if what he disseminated–as the government claims–was actually not true.

Now, at first glimpse, this seems to be a graymail attempt: an attempt to demand information from the government it will ultimately refuse to turn over.

In addition to details of the alleged operation, the defense is entitled to know if, as a result of the publication of State of War, the identity of Human Asset No. 1 was learned by any foreign power at all. It is entitled to know if because of the publication of State of War, the Iranians shelved plans to use the blue prints that they allegedly learned, due to the publication of State of War, were allegedly flawed. The defense is entitled to know if this “Rogue Operation,” as described by Mr. Risen, did help the Iranian nuclear program in any way.

Some of this information, after all, would be the information Risen’s sources would have been trying to get out in the first place; this is precisely the kind of information the government is trying to suppress by prosecuting this case. And the emphasis on whether Iran (or another country) learned this information from Risen’s book–or from the operation itself–would make for an interesting question (though I suspect the government would retreat to a claim they’ve made before: that part of the damage comes in letting other countries know about this op).

But I’m also interested in Sterling’s focus on expert witnesses: as of June 22, when this was filed, the government had not yet revealed to the defense what expert they would call to verify that this information was actually national defense information. I suspect part of what the defense is trying to do is force that issue–and in particular, learn whether that expert will be someone who was actually involved in the operation (and therefore could refute Sterling’s version of what happened) or someone else, who would rely on second-hand information.

At a minimum, it must allow the defense to challenge the accuracy of that testimony by confronting the witness called by the government with the truth of what actually occurred.

I hope to come back to this issue in the coming days.

just as interesting as this attempt to get more information on what the government claims happened with the Merlin program is the timing. At one level, it seems very late in the process, almost a second swipe at a Bill of Particulars (the government responded to the first one by giving Sterling the chapter of Risen’s book).

But remember that this filing also came before most of the filings on whether or not Risen will have to testify. I noted that in addition to everything else the government has said to support its subpoena of Risen, they also said he cannot protect a source who passed false information. Of course, they haven’t proven that, they’ve simply gotten a grand jury to buy off on that.

It seems the stakes on whether information Sterling allegedly provided Risen was true or not have gone up. But that seems to be precisely the kind of information the government will want to keep out of court.

Share this entry

ACLU FOIAs CIA for Documents on Juan Cole

The ACLU has just FOIAed the CIA and Director of National Intelligence for any information on Juan Cole. It asks for,

e-mails, letters, faxes, or other correspondence, memoranda, contemporaneous notes of meetings or phone calls, reports or any other material relating to the gathering, collecting, copying, collating, generating or other use of information and material regarding Professor Cole,

The FOIA is addressed to CIA, Director of National Intelligence, and DOJ.

Now, far be it for me to tell ACLU how to FOIA–after all, they’re the best in the business at wringing embarrassing documents out of the government.

But they might want to FOIA DOD, too.

You see, there’s something that has been haunting me about this description from James Risen’s story on this.

According to Mr. Carle, Mr. Low returned from a White House meeting one day and inquired who Juan Cole was, making clear that he wanted Mr. Carle to gather information on him. Mr. Carle recalled his boss saying, “The White House wants to get him.”“ ‘What do you think we might know about him, or could find out that could discredit him?’ ” Mr. Low continued, according to Mr. Carle.

Mr. Carle said that he warned that it would be illegal to spy on Americans and refused to get involved, but that Mr. Low seemed to ignore him.

That first request elicited, Carle told Amy Goodman, four paragraphs of information, one of which included derogatory information.

GLENN CARLE: Yes, that’s correct. I was—the following day, I came to work and was asked to represent my office at the senior staff meeting, which is routine. And I did. And it was also routine that I take a memorandum of some sort up to the front office, I believe, for the White House. And I thought that I should know what I was doing for the morning, and I read the memo, and it was a memo on Professor Cole with four paragraphs, as I recall, only one of which was about inappropriate personal information. The other three struck me as innocuous. I don’t remember specifically what they said, but one of the four.

Now maybe it’s Carle’s reference, also in the Democracy Now interview, to the Plame outing. But I can’t help but think of how the White House got people across the national security community to reveal that Plame worked for the CIA: They kept asking for information on Wilson’s trip, long after they had already gotten the information they purportedly needed. So, for example, the day after John Hannah briefed Cheney on the trip, Cheney asked someone at CIA for more information on the trip, using incorrect information that would need corrected (I suspect this request was made at a Deputies Committee meeting at the White House, and I think Libby is the one who formally made the request). Then, two days later and almost certainly after Cheney had been briefed personally by (he says) George Tenet as well as (records show) John McLaughlin, and almost certainly after Libby had gotten information from Marc Grossman on Plame’s work at the CIA, Cheney and Libby called the CIA from a meeting with Cathie Martin, to ask for information they already knew. That call was ultimately how Martin learned, from Bill Harlow, that Plame worked for the CIA.

You see, the White House kept asking for the same information they already knew so they could try to get the CIA to share that information in a way they could use it. Of course, along the way, they increased the circle of people who knew that information, which is one of the things that led to the leak of Plame’s identity.

Now, this may not be what is happening here: an attempt to get CIA to take note of information about Cole the White House believed was derogatory.

But it would be worth checking to see whether likely co-participants in a meeting with National Intelligence Council’s David Low or CIA’s Deputy Director for intelligence, John A. Kringen also got similar requests–not least because DOD, with its CIPA program, would likely have been less squeamish about digging up dirt on Cole.

In any case, given the way the government responds to FOIAs, we’ll probably learn more about this in 5 years or so.

Share this entry

Bin Laden Found By Trolling The Weeds, Not By Torture

Adam Goldman and Matt Apuzzo have a nice and fascinating article out today telling the story of a single CIA career analyst who was the critical cog in collating the information that led to Osama bin Laden’s capture and death:

He examined and re-examined every aspect of bin Laden’s life. How did he live while hiding in Sudan? With whom did he surround himself while living in Kandahar, Afghanistan? What would a bin Laden hideout look like today?

The CIA had a list of potential leads, associates and family members who might have access to bin Laden.

“Just keep working that list bit by bit,” one senior intelligence official recalls John telling his team. “He’s there somewhere. We’ll get there.”

Goldman and Apuzzo have done good work here; it is a great story, please read it in its entirety. But I want to play off their work to take it the step further that they did not. This is not just a feel good story about what worked and went right to capture bin Laden, it is an instructive primer on what didn’t work, to wit: torture.

So, while we congratulate CIA analyst “John”, let us also remember that years of effort, centuries of founding principles and an eternity of American morality was lost to the Bush/Cheney torture brigade. Ever since Osama bin Laden’s take down, the torture apologists have come out of their caves bleating at full voice in a vain attempt to justify their war crimes and save their face. Even yesterday, as the nation celebrated its founding, one of the most craven torture toadies of all, Marc Theissen, was back at it, saying the country owed the torture freaks an apology.

But torture is not what caught Osama bin Laden, good solid human intelligence and analysis were what did the trick.

That ability to spot the importance of seemingly insignificant details, to weave disparate strands of information into a meaningful story, gave him a particular knack for hunting terrorists.

Yes. Around here, we call that digging and trolling in the weeds. It is what works; not torture.

Share this entry

Russ Feingold Was Proved Fucking Right

A number of you have been asking for my intro of Russ Feingold last Thursday. Here it is. Now that I’ve had a chance to see it I realize I had a number of misstatements (and a number of places where I glossed necessary detail–I guess I speak like I blog, for better or worse).

Share this entry

Investigating Juan Cole Rather than Ahmed Chalabi

James Risen reports that Glen Carle, a former CIA officer, says the Bush Administration was looking for dirt on Juan Cole in 2005. In one incident, Carle’s supervisor asked whether the CIA had anything on Cole.

Mr. Carle said that sometime that year, he was approached by his supervisor, David Low, about Professor Cole. Mr. Low and Mr. Carle have starkly different recollections of what happened. According to Mr. Carle, Mr. Low returned from a White House meeting one day and inquired who Juan Cole was, making clear that he wanted Mr. Carle to gather information on him. Mr. Carle recalled his boss saying, “The White House wants to get him.”

“ ‘What do you think we might know about him, or could find out that could discredit him?’ ” Mr. Low continued, according to Mr. Carle.

Mr. Carle said that he warned that it would be illegal to spy on Americans and refused to get involved, but that Mr. Low seemed to ignore him.

“But what might we know about him?” he said Mr. Low asked. “Does he drink? What are his views? Is he married?”

Then, several months later, a CIA analyst sought information about Cole again.

Several months after the initial incident, Mr. Carle said, a colleague on the National Intelligence Council asked him to look at an e-mail he had just received from a C.I.A. analyst. The analyst was seeking advice about an assignment from the executive assistant to the spy agency’s deputy director for intelligence, John A. Kringen, directing the analyst to collect information on Professor Cole.

Now, Risen connects these two incidents with successful right wing attempts to persuade Yale not to offer Cole a prestigious position.

Cole’s critics — in The New York Sun, National Review, The Wall Street Journal and elsewhere, several of whom are now praising Yale for not hiring him — have maintained that they aren’t using political tests, but object to Cole’s career on a variety of grounds. They point to numerous quotes he has made (generally in his blog) that they say show a willingness to blame the United States and Israel inappropriately (Cole has said that some of the quotes are taken out of context and that others represent legitimate opinion). Several have also criticized his scholarship, saying that he is spending too much time on blogging and questioning his output of serious scholarship. (His supporters point to a long publication list.) Campus Watch, a pro-Israel group, maintains a long list of articles about Cole, most of which it endorses for their criticism of him.

But the timing also happens to coincide with Juan Cole’s correct predictions that Ahmed Chalabi would not win the 2005 Iraqi elections. We know from AJ Rossmiller that the intelligence community made great efforts to ignore Cole’s predictions.

Chalabi won just .5% of the vote. Iyad Allawi, in whom the Administration also invested their hopes, won just 8% of the vote. And the Shiite coalition dominated by SCIRI and the Sadrists got 41% of the votes. In his book, Still Broken, AJ describes that he saw this coming.

After Iraq’s winter elections, the results validated the predictions contained in the paper I’d written in the fall. It created something of a stir because the paper turned out to be remarkably accurate, far more so than the forecasts of other agencies and departments. Before the election occurred, a high-ranking official requested a follow-up evaluation of our assessments, and I wrote a memo that described our precision. The memo made its way up through the chain, and a few days later the office got a note from Stephen Cambone, the Undersecretary of Defense for Intelligence, praising both the prediction and the self-evaluation.

Unfortunately, the bulk of the last half of AJ’s book describes how such accurate predictions are generally weeded out by higher-ranking analysts worried that their office’s work product might piss off the Administration.

[snip]

When AJ was asked how he got the 2005 election right, one of the things he pointed to, half-seriously, was the open source work of Juan Cole.

I began to write the explanation of our methodology, and I tried to resist the temptation to criticize other agencies while explaining how and why we did things differently. State, in particular, was very sensitive about their screwup, and I didn’t want to piss anybody off.

“Sir, can’t I just say that I copied and pasted Juan Cole?”

Now, I’m not suggesting that the White House was digging dirt on Juan Cole because he correctly predicted Ahmed Chalabi would get smoked in a democratic election.

But it’s probably worth noting what opinions Cole expressed that generated this attention in the first place.

 

Share this entry

Robert Mueller: Civil Liberties Don’t Need a “Fresh” Review

This exchange last Thursday between Senator Al Franken and FBI Director Robert Mueller was frustrating enough–Senator Franken’s questions were the only ones on civil liberties Mueller faced, and the Director seemed pretty miffed to be questioned on the subject in the first place.

But I’m even more troubled by the exchange now that we’ve learned about the FBI’s new investigative guidelines that allow, among other things, database searches without any record and new powers to coerce informants.

After all, Mueller’s response to Franken’s concern about NSLs boasted that they had implemented a compliance system for NSLs and “other areas” where FBI might “fall into the same habits.” (What do you suppose those other areas are? Is he addressing FISC concerns?)

But perhaps as important if not more important, we set up a compliance program to address not just [National] Security Letters, but other areas such as National Security Letters where we could fall into the same, the same pattern, or habits. And so the National Security Letters I believe we addressed appropriately at the time, and it was used as a catalyst to set up a compliance program that addresses a concern in other areas comparable to what we had found with regard to National Security Letters.

Getting rid of the records on database searches would seem to eliminate any compliance system. And Mueller knew he was planning to do so (as did, I presume, Franken) when he gave this answer.

And in response to Franken’s question about infiltration of mosques and peace groups, Mueller assured Franken that FBI complied with its own guidelines.

I’m not certain it needs a fresh, a fresh, uh, look because I’m very concerned whenever those allegations arise. I will tell you that I believe that in terms of surveillances of religious institutions we have done it appropriately and with appropriate predication under the guidelines in the applicable statutes, even though there are allegations out there to the contrary. I also believe that when we have undertaken investigations of individuals expressing their First Amendment rights, we have done so according to our internal guidelines and the applicable statutes. And so, whenever these allegations come forward, I take them exceptionally seriously, make sure our inspection division or others look into it to determine whether or not we need to change anything. And I will tell you that addressing terrorism, and the responsibility to protect against attacks, brings us to the point where we are balancing day in and day out civil liberties and the necessity for disrupting a plot that could kill Americans and it’s something that we keep in mind day in and day out.

But of course, FBI is about to change those guidelines, making it easier for the Agents to attend political meetings undercover and track innocent people. And it doesn’t much matter if FBI complies with its own guidelines if those guidelines support abusive investigations. Mueller is basically insisting that he doesn’t need to reconsider FBI’s actions because FBI complies with its own guidelines and therefore the underlying guidelines themselves don’t need any more scrutiny.

And that canard about balancing civil liberties with the necessity of disrupting a plot (there’s zero evidence of course, that the FBI’s surveillance of peace groups has any tie to a plot, save against political speech)? Not only is this not a zero sum game, but the FBI doesn’t take similar civil liberties-infringing actions to disrupt right wing plots.

When he was gently, respectfully challenged to defend his civil liberties record, Mueller instead resorted to that same old terror fear-mongering. Given the new permissive guidelines, such an attitude is even more troubling.

Share this entry

More Security Theater as Play

Some weeks back, I posted on a Disney ride that offers riders the opportunity to be “verbally accosted by a security droid.” Now, kids can play at being a TSA-worker themselves with a security wand:

There’s nothing cooler than being a TSA agent for Homeland Security and now the Spy Gear Security Scanner lets kids live out their dreams. It’s a handheld security wand whose LED lights flash and an alarm goes off when it detects metal, just like the real thing!

Now, frankly, I’m less disturbed by this than by the Disney ride. There’s nothing wrong with being a TSA worker; it’s the rules they have to follow that are the problem. And I’d rather kids learn to be a TSA worker than to believe submitting to abusive ones is fun.

That said, it’s just one more indication of the way our culture is normalizing security theater by making it “play” for children.

Share this entry

FBI Aspires to Be the Stasi

Charlie Savage describes changes the FBI is making to its Domestic Investigations and Operations Guide. On its face, the changes he describes are downright bad. The changes allow FBI agents to:

  • Make a database “assessment” search of a group or person “proactively” without making a record of that search
  • Tail people during a “proactive” assessment more than once
  • Search a potential informant’s trash to gather information to use to force the informant to snitch for the government
  • Attend up to five meetings of a group undercover
  • Eliminate extra supervision of investigations of politicians or journalists if they are witnesses, not suspects, in the investigation
  • Eliminate such protection altogether for “low-profile” blogs

These new rules allow all sorts of fishing expeditions of people based on nothing more than a lead. Moreover, it would make it easy for the FBI to surveil targets with almost no evidence against them until they could be trumped up on some crime.

To some degree they feel like an effort to clean up past illegal activity (as the FBI did with its exigent letters program).

But consider how much worse these guidelines are in consideration of what else we know, or suspect.

We suspect, after all, that our government collects generalized databases of geolocation using Section 215. Since that information need only be “relevant” to a foreign intelligence investigation, it may well include records on all of us.

These new rules would allow the FBI to search such a database without recording that search. Aside from the obvious invitation for abuse–some agent wondering whether his girlfriend was hanging out with his best friend–it also eliminates the evidence that the FBI used such a controversial technique as geolocation as the premise for further investigation. It makes it easier for the FBI to investigate someone because of nothing more than who they know.

Then there’s the new rules allowing the FBI to conduct investigations of what a journalist “witnessed” without supervision. Remember that after the FBI decided James Risen had “witnessed” a leak of classified information, they collected his business records and emails, collecting much of the evidence they needed to indict Jeff Sterling. This rule would seem to virtually eliminate any real protection for journalists’ sources.

Finally, there’s the invitation to snoop through a potential informant’s trash. As I have pointed out, as far back as 2002, the government explicitly described using FISA to collect information, even on potentially unrelated crimes like rape, on potential informants so they could blackmail them into serving as snitches. Taken together, these rules would allow the FBI to search through existing databases (potentially including telecommunications metadata showing who a person communicated with and hung out with, as well as some financial information) to find potential snitches. The agent could search those databases with no apparent limits or record. And then the agent could sift through the potential informant’s trash to get the evidence to blackmail him to become an informant.

These rules seem ripe to snare a bunch of totally innocent people in the FBI’s investigative web. And even if it doesn’t, it may well serve to increase the paranoia of average people.

Share this entry