Michael Hayden, after Escaping Justice, Calls for Other Criminals to Be Made Examples

In an article on the Bradley Manning and Edward Snowden leaks, Washington Times quotes former NSA and CIA Director Michael Hayden this way: (h/t Matthew Aid)

It is “really important that the government respond well to this particular abuse,” he said of the Snowden and Manning cases.

[snip]

Mr. Hayden said he does not endorse some forms of exemplary punishment, “what the French call ‘for the encouragement of others.’”

But if hackers “have this attachment to transparency, perhaps the intelligence community is not where they should be,” he said, adding that the government needs to use the Snowden case to show that it is “serious.”

The former director of both the NSA and CIA said it is “very appropriate” for the U.S. government to pursue Mr. Snowden relentlessly and make his fate an issue in its bilateral relations with any nation that harbors him.

“We need to recruit from this culture,” he said. “Members of this culture, when they embrace government service with its necessary requirements of secrecy, need to be shown the government is quite serious about those necessary requirements.”

To WT’s credit, they do acknowledge that Hayden currently works for the Chertoff Group, one of the most corrupt profiteers off the war on terror.

But it doesn’t mention that Hayden’s the guy who decided it’d be a good idea to outsource NSA’s IT to companies like Booz Allen Hamilton so as to get more people “from this culture” working on NSA’s programs in the first place.

More importantly, it doesn’t mention that the 2009 Draft NSA IG Report that Snowden leaked provided new details about how Hayden made the final decision to continue the illegal wiretapping program even after DOJ’s top lawyers judged it illegal in 2004.

Edward Snowden leaked new details of Michael Hayden’s crime. He leaked new details of how Hayden betrayed the public trust in probably more serious fashion than Edward Snowden has.

And yet somehow Michael Hayden continues to be the primary go-to guy to talk about how serious this leak is? Michael Hayden gets to opine about how Edward Snowden should be made an example of?

Now, perhaps applying Hayden’s own logic would have been valuable years ago. Perhaps if Hayden had been made an example of himself, after he betrayed the public trust and broke the law, we not only would have more trust in the NSA, but we have a better understanding of what NSA did then and is doing now.

But since we didn’t, Michael Hayden remains one primary exhibit about why Snowden’s leaks, however illegal, have a certain legitimacy.

Because so long as Michael Hayden runs free, we know the government refuses to police itself on these issues.

It’s all very rich for one criminal to call for another criminal to be made an example of. But the responsible press should at least point out how ironic it is that the criminal who escaped justice insists those who have exposed new details of his own crime get the full brunt of it.

Big-Footing Superpower Status Also about Legally Immune Commander in Chief(s)

In a piece making the obvious comparison between fugitive spy Robert Seldon Lady and accused Espionage fugitive Edward Snowden, Tom Englehardt writes off the press silence about presumed American assistance to Lady in fleeing an international arrest warrant as the reality of being the sole superpower.

It’s no less a self-evident truth in Washington that Robert Seldon Lady must be protected from the long (Italian) arm of the law, that he is a patriot who did his duty, that it is the job of the U.S. government to keep him safe and never allow him to be prosecuted, just as it is the job of that government to protect, not prosecute>, CIA torturers who took part in George W. Bush’s Global War on Terror.

So there are two men, both of whom, Washington is convinced, must be brought in: one to face “justice,” one to escape it.  And all of this is a given, nothing that needs to be explained or justified to anyone anywhere, not even by a Constitutional law professor president.  (Of course, if someone had been accused of kidnapping and rendering an American Christian fundamentalist preacher and terror suspect off the streets of Milan to Moscow or Tehran or Beijing, it would no less self-evidently be a different matter.)

Don’t make the mistake, however, of comparing Washington’s positions on Snowden and Lady and labeling the Obama administration’s words and actions “hypocrisy.”  There’s no hypocrisy involved.  This is simply the living definition of what it means to exist in a one-superpower world for the first time in history.  For Washington, the essential rule of thumb goes something like this: we do what we want; we get to say what we want about what we do; and U.N. ambassadorial nominee Samantha Powers then gets to lecture the world on human rights and oppression.

This version of how it all works is so much the norm in Washington that few there are likely to see any contradiction at all between the Obama administration’s approaches to Snowden and Lady, nor evidently does the Washington media.

Englehardt doesn’t mention Sabrina De Sousa’s claims about the CIA’s kidnapping of Osama Mustapha Hassan Nasr (Abu Omar) and Italy’s subsequent prosecution of those involved. Adding her in the mix makes it clear how closely immunity for the Commander in Chief and his top aides is part of this superpower big-footing.

De Sousa, who says she served as an interpreter for the kidnappers on a planning trip, but not in the operation itself, was convicted and sentenced in Italy in part because the government refused to invoke diplomatic immunity (she admits she worked for CIA, but was under official cover).

The kidnapping did not meet US standards for renditions, but Station Chief Jeff Castelli wanted to do one anyway, and pushed through its approval even without Italian cooperation.

Despite concerns with the strength of Castelli’s case, CIA headquarters still agreed to move forward and seek Rice’s approval, De Sousa said. She recalled reading a cable from late 2002 that reported that Rice was worried about whether CIA personnel “would go to jail” if they were caught.

In response, she said, Castelli wrote that any CIA personnel who were caught would just be expelled from Italy “and SISMi will bail everyone out.”

Of her CIA superiors, De Sousa said, “They knew this (the rendition) was bullshit, but they were just allowing it. These guys approved it based on what Castelli was saying even though they knew it never met the threshold for rendition.”

Asked which agency officials would have been responsible for reviewing the operation and agreeing to ask Rice for Bush’s authorization, De Sousa said they would have included Tenet; Tyler Drumheller, who ran the CIA’s European operations; former CIA Director of Operations James Pavitt and his then-deputy, Stephen Kappes; Jose Rodriguez, then the head of the CIA’s Counterterrorism Center, and former acting CIA General Counsel John Rizzo.

De Sousa says the Italians and Americans colluded to protect the highers up, while prosecuting her and other lower level people.

De Sousa accused Italian leaders of colluding with the United States to shield Bush, Rice, Tenet and senior CIA aides by declining to prosecute them or even demanding that Washington publicly admit to staging the abduction.

Calling the operation unjustified and illegal, De Sousa said Italy and the United States cooperated in “scape-goating a bunch of people . . . while the ones who approved this stupid rendition are all free.”

Note, she doesn’t say this, but some of the people in the chain of command for this kidnapping — in both the US and Italy — were also involved in planting the Niger forgeries used to start the Iraq War. And, of course, a number of the Americans were involved in the torture program and its cover-up.

Since then, De Sousa has used all legal avenues to blow the whistle on this kidnapping.

De Sousa said that she has tried for years to report what she said was the baseless case for Nasr’s abduction and her shoddy treatment by the CIA and two administrations.

Her pleas and letters, however, were ignored by successive U.S. intelligence leaders, the CIA inspector general’s office, members and staff of the House and Senate intelligence committees, Rice, former Secretary of State Hillary Clinton and Attorney General Eric Holder, said De Sousa.

Assuming De Sousa’s story is correct (and an anonymous source backs its general outlines), then it adds one more reason why Lady quietly got to return to the US while Snowden will be loudly chased around the world.

What Americans are buying off on — along with superpower status that may defund schools in exchange for empire — with their silence about the disparate treatment of Sady and Snowden, then, is not just the ego thrill of living in a thus far unrivaled state.

It’s also, implicitly, the kind of immunity for the Commander in Chief and executive branch that shouldn’t exist in democratic states.

Well, at Least DOJ Promised Not to Mine Journalists’ Metadata Going Forward

When I read this passage from DOJ’s new News Media Policy, it caused me as much concern as relief.

The Department’s policies will be revised to provide formal safeguards regarding the proper use and handling of communications records of members of the news media. Among other things, the revisions will provide that with respect to information obtained pursuant to the Department’s news media policy: (i) access to records will be limited to Department personnel who are working on the investigation and have a need to know the information; (ii) the records will be used solely in connection with the investigation and related judicial proceedings; (iii) the records will not be shared with any other organization or individual inside or outside of the government, except as part of the investigation or as required in the course of judicial proceedings; and(iv) at the conclusion of all proceedings related to or arising from the investigation, other than information disclosed in the course of judicial proceedings or as required by law, only one copy of records will be maintained in a secure, segregated repository that is not searchable.

It is nice for the subset of journalists treated as members of news media whose calls get treated under these new policies and not — as still seems possible — under the apparently more permissive guidelines in the FBI’s Domestic Investigations and Operations Guide that when their call and other business records are collected, some of that information will ultimately be segregated in a non-searchable collection. Though why not destroy it entirely, given that the information used for the investigation and court proceedings will not be segregated?

Moreover, this passage represents a revision of previous existing policy.

Which means data from members of the news media may not have been segregated in the past.

When you consider that one of the abuses that led to these new policies included the collection of 20 phone lines worth of data from the AP — far, far more than would be warranted by the investigation at hand — it raises the possibility that DOJ used to do more with the data it had grabbed from journalists than just try to find isolated sources.

Like the two to three hop analysis they conduct on the Section 215 dragnet data.

It’s with that in mind that I’ve been reading the reports that Kiwi troops were wandering around Kabul with records of McClatchy freelancer Jon Stephenson’s phone metadata.

The Sunday Star-Times has learned that New Zealand Defence Force personnel had copies of intercepted phone “metadata” for Stephenson, the type of intelligence publicised by US intelligence whistleblower Edward Snowden. The intelligence reports showed who Stephenson had phoned and then who those people had phoned, creating what the sources called a “tree” of the journalist’s associates.

New Zealand SAS troops in Kabul had access to the reports and were using them in active investigations into Stephenson.

The sources believed the phone monitoring was being done to try to identify Stephenson’s journalistic contacts and sources. They drew a picture of a metadata tree the Defence Force had obtained, which included Stephenson and named contacts in the Afghan government and military.

The sources who described the monitoring of Stephenson’s phone calls in Afghanistan said that the NZSIS has an officer based in Kabul who was known to be involved in the Stephenson investigations.

Last year, when this happened, Stephenson was on the Green-on-Blue beat, He published a story that a massacre in Pashtun lands had been retaliation for the killing of Taliban. He reported on another NATO massacre of civilians. He reported that a minister accused of torture and other abuses would be named Hamid Karzai’s intelligence chief. Earlier last year he had reported on the negotiations over prisoner transfers from the US to Afghan custody.

Now, the original report made a both a credibility and factual error when it said Stephenson’s metadata had been “intercepted.” That has provided the Kiwi military with a talking point on which to hang a non-denial denial — a point Jonathan Landay notes in his coverage of the claims.

Maj. Gen. Tim Keating, the acting chief of New Zealand’s military, said in a statement that no military personnel had undertaken “unlawful interception of private communications.”

“I have asked the officers responsible for our operations in Afghanistan whether they have conducted monitoring of Mr Stephenson . . . and they have assured me that they have not.”

The statement, however, did not address whether metadata, which includes the location from where a call is made, the number and location of the person who is being called and the duration of the call, was collected for Stephenson’s phones. Such data are generally considered business records of a cell phone provider and are obtained without intercepting or real-time monitoring of calls. In the United States, for example, the Foreign Intelligence Surveillance Court has ordered Verizon to deliver such records of all its customers to the National Security Agency on a daily basis.

While under contract to McClatchy, Stephenson used McClatchy cell phones and was in frequent contact with McClatchy editors and other reporters and correspondents. [my emphasis]

Indeed, higher ranking New Zealand politicians are trying to insinuate that Stephenson’s call records would only be collected if he was communicating with terrorists — even while admitting the government did have a document treating investigative journalists like terrorists.

Prime Minister John Key said it’s theoretically possible that reporters could get caught in surveillance nets when the U.S. spies on enemy combatants.

[snip]

Also Monday, New Zealand Defense Minister Jonathan Coleman acknowledged the existence of an embarrassing confidential order that lists investigative journalists alongside spies and terrorists as potential threats to New Zealand’s military. That document was leaked to Hager, who provided a copy to The Associated Press. Coleman said the order will be modified to remove references to journalists.

Finally, New Zealand officials seem to be getting close to blaming this on the US.

“The collection of metadata on behalf of the NZDF by the U.S. would not be a legitimate practice, when practiced on a New Zealand citizen,” Coleman said. “It wouldn’t be something I would support as the minister, and I’d be very concerned if that had actually been the case.”

Thus far, the coverage of the Stephenson tracking has focused on the Kiwi role in all of it. But as Landay notes, Stephenson would have been using McClatchy-provided cell phones at the time, suggesting the US got the records themselves, not by intercepting anything, but simply by asking the carrier, as they did with the AP.

Ultimately, no one is issuing a direct denial that some entity tied to ISAF — whether that be American or New Zealand forces — collected the phone records of a journalist reporting for a US-based outlet to try to identify his non-friendly sources.

So what other journalists have US allies likened to terrorists because they actually reported using both friendly and unfriendly sources?

Espionage: Now, with No Damage Envisioned

A recently unsealed decision from Colleen Kollar-Kotelly just changed the interpretation of the Espionage Act for Washington DC to cover leaks that wouldn’t even harm the US.

Judge Colleen Kollar-Kotelly ruled that the prosecution in the pending case of former State Department contractor Stephen Kim need not show that the information he allegedly leaked could damage U.S. national security or benefit a foreign power, even potentially.  Her opinion was a departure from a 30 year old ruling in the case of U.S. v. Morison, which held that the government must show that the leak was potentially damaging to the U.S. or beneficial to an adversary.  (In that case, Samuel L. Morison was convicted of unauthorized disclosure of classified intelligence satellite photographs, which he provided to Jane’s Defence Weekly. He was later pardoned by President Clinton.)

“The Court declines to adopt the Morison court’s construction of information relating to the ‘national defense’ insofar as it requires the Government to show that disclosure of the information would be potentially damaging to the United States or useful to an enemy of the United States,” Judge Kollar-Kotelly wrote in a May 30 opinion. The opinion was redacted and unsealed (in partially illegible form) last week.

The prosecution must still show that the defendant “reasonably believed” that the information “could be used to the injury of the United States or to the advantage of a foreign nation” and that the defendant “willfully” communicated it to an unauthorized person.  But it would no longer be necessary for prosecutors to demonstrate that the information itself could potentially damage national security or benefit an adversary.

Imagine how this ruling could empower prosecutors in the AP UndieBomb 2.0 investigation, in which the AP’s story reported only that the US had thwarted an UndieBomb plot. They didn’t report it until after the White House said they had cleared up a sensitive issue relating to the plot (which in practice ended up being the drone death of Fahd al-Quso).

This would make it easier for the government to prosecute AP’s sources for leaking information that even the government had suggested, to the AP, wouldn’t harm US interests.

And of course, all that builds on top of the now routine treatment of leaks to the press as Espionage, something fairly unusual before the Obama Administration.

Frightening.

Candidate Obama’s Tribute to “Courage and Patriotism” of Whistleblowers Disappears 2 Days after First Snowden Revelations

Sunlight Foundation discovers the Obama Administration has removed access to his 2008 campaign promises from the White House website. It suggests one of the promises Obama may want to hide has to do with his support for whistleblowers.

While front splash page for for Change.gov has linked to the main White House website for years, until recently, you could still continue on to see the materials and agenda laid out by the administration. This was a particularly helpful resource for those looking to compare Obama’s performance in office against his vision for reform, laid out in detail on Change.gov.

According to the Internet Archive, the last time that content (beyond the splash page) was available was June 8th — last month.

Why the change?

Here’s one possibility, from the administration’s ethics agenda:

Protect Whistleblowers: Often the best source of information about waste, fraud, and abuse in government is an existing government employee committed to public integrity and willing to speak out. Such acts of courage and patriotism, which can sometimes save lives and often save taxpayer dollars, should be encouraged rather than stifled. We need to empower federal employees as watchdogs of wrongdoing and partners in performance. Barack Obama will strengthen whistleblower laws to protect federal workers who expose waste, fraud, and abuse of authority in government. Obama will ensure that federal agencies expedite the process for reviewing whistleblower claims and whistleblowers have full access to courts and due process.

It may be that Obama’s description of the importance of whistleblowers went from being an artifact of his campaign to a political liability.

To be fair, Obama did extend whistleblower protection beyond that of the law last year — though he did it largely in secret.

Of course, that came at the same time as Obama rolled out an Insider Threat Detection system that seems designed to discourage anyone from speaking out … about anything.

And then there’s the issue of all the whistleblower prosecutions.

But if Obama did hide his campaign promises specifically to hide this tribute to the “courage and patriotism” of whistleblowers, then I find the timing particularly interesting. June 8 was just two days after the first Edward Snowden release (at a time, moreover, when the Guardian had reported only issues that went to lies James Clapper and Keith Alexander had told, making Snowden’s claim to be unable to go through regular channels quite credible).

Mind you, Obama could be hiding other promises. I still think promises about mortgages and homes are his biggest failure.

Fourth Circuit Guts National Security Investigative Journalism Everywhere It Matters

The Fourth Circuit — which covers CIA, JSOC, and NSA’s territory — just ruled that journalists who are witnesses to alleged crimes (or participants, the opinion ominously notes) must testify in the trial.

There is no First Amendment testimonial privilege, absolute or qualified, that protects a reporter from being compelled to testify by the prosecution or the defense in criminal proceedings about criminal conduct that the reporter personally witnessed or participated in, absent a showing of bad faith, harassment, or other such non-legitimate motive, even though the reporter promised confidentiality to his source.

With this language, the Fourth applies the ruling in Branzburg — which, after all, pertained to the observation of a drug-related crime — to a news-gathering activity, the receipt of classified information for all the states in which it most matters.

The opinion goes on to echo DOJ’s claims (which I recalled just yesterday) that Risen’s testimony is specifically necessary.

Indeed, he can provide the only first-hand account of the commission of a most serious crime indicted by the grand jury –- the illegal disclosure of classified, national security information by one who was entrusted by our government to protect national security, but who is charged with having endangered it instead.

[snip]

There is no dispute that the information sought from Risen is relevant. Moreover, it “can[not] be obtained by alternative means.” Id. at 1139. The circumstantial evidence that the government has been able to glean from incomplete and inconclusive documents, and from the hearsay statements of witnesses with no personal or first-hand knowledge of the critical aspects of the charged crimes, does not serve as a fair or reasonable substitute.

[snip]

Risen is the only eyewitness to the crime. He is inextricably involved in it. Without him, the alleged crime would not have occurred, since he was the recipient of illegally-disclosed, classified information. And it was through the publication of his book, State of War, that the classified information made its way into the public domain. He is the only witness who can specify the classified information that he received, and the source or sources from whom he received it.

[snip]

Clearly, Risen’s direct, first-hand account of the criminal conduct indicted by the grand jury cannot be obtained by alternative means, as Risen is without dispute the only witness who can offer this critical testimony.

This language will enhance the strength of the reservation DOJ made to its News Media Policies, allowing it to require testimony if it is essential to successful prosecution.

The only limit on the government’s authority to compel testimony under this opinion is if the government is harassing the journalist, which (with proof of the way the government collected phone records, which remains secret) might have been proven in this case. There is a strong case to be made that the entire point of this trial is to put James Risen, not Jeffrey Sterling, in jail. But Leonie Brinkema has already ruled against it. I think the subpoena for 20 AP phone lines might rise to that level as well, except that case is being investigated in the DC Circuit, where this ruling doesn’t apply.

This pretty much guts national security journalism in the states in which it matters.

Golly. It was just last week when the press believed DOJ’s News Media Guidelines would protect the press’ work.

DOJ’s News Media Policies Reserved the Authority to Force James Risen to Testify

James Risen’s lawyer, Joel Kurtzberg, argues that the News Media Policies released by DOJ last week mean his client should not have to testify in the Jeffrey Sterling case. (As I understand it, Michael Isikoff made a similar argument while moderating a panel including Eastern District of VA US Attorney Neil MacBride today too, though MacBride reportedly dodged any answer.) In a letter to the Fourth Circuit (which has been sitting on this decision for well over a year), he cites two paragraphs from the Policies — one affirming DOJ’s promise to access “member of the news media” materials only as a last resort, and another one calling for the “appropriate balance” between two competing interests of “protecting the American people” and “free press” — and then claims,

the standard that the DOJ now articulates in the report is the very same standard that the government argues should not be applied to Mr. Risen by the court in this case. The DOJ’s recent change in position is nothing less than an admission that the legal standard it asks this court to apply provides wholly inadequate protection for the interests at stake in this case.

Unfortunately, I think Kurtzberg misreads the way DOJ has specifically left Risen unprotected.

The first paragraph Kurtzberg cites ends,

The Department’s policy is to utilize such tools only as a last resort after all reasonable alternative investigative steps have been taken, and when the information sought is essential to a successful investigation or prosecution.

DOJ’s rules used to be interpreted to say sources would have to testify only if their testimony (or records) was necessary to identify their source or the content of the leak. This is the standard Leonie Brinkema used when she ruled Risen didn’t have to testimony because the government had already identified his source.

But with the language reserving the right to access journalist records or testimony if it is “essential to a successful prosecution,” DOJ has specifically reserved the right to do what they are doing in the Sterling case.

Indeed, their appeal of Brinkema’s decision argues that Risen must testify because it is crucial to the prosecution.

Risen is the only eyewitness to the crime and, as the recipient of the classified information at issue, he is inextricably linked to the criminal conduct. Risen’s testimony is the only direct evidence of Sterling’s guilt; no circumstantial evidence, or combination thereof, is as probative as Risen’s testimony or as certain to foreclose the possibility of reasonable doubt The information Risen can provide is therefore relevant and unavailable from other sources, and the government has demonstrated a compelling need for Risen’s testimony.

That is, even though DOJ has a slew of other evidence they say will prove Jeffrey Sterling was Risen’s source about a botched effort to deal Iran bad nuclear blueprints, they maintain Risen’s testimony is still irreplaceable for the trial.

They argue his testimony is “essential to a successful prosecution,” precisely one of the reservations DOJ included in their policies.

I’m not saying this is what the policy should be or that Risen’s testimony really is essential. I am saying DOJ seems to have included language that, according to them, at least, excludes Risen from protection.

I also am saying that journalists who celebrated these policies for their improvements in some areas have overestimated the degree to which DOJ really wants to change its approach to journalists involved in leak investigations.

Negative Manning Decision and the Future of Investigative Journalism

imagesLittle more than few hours ago, a critical ruling was handed down by Judge Denise Lind in the Bradley Manning UCMJ prosecution ongoing at Fort Meade. The decision was on based on this motion by the defense seeking dismissal of the “Aiding the Enemy” charge, among others in the prosecution.

To make a long, even if sadly predictable, story short, the motion was denied by Judge Lind and the charge will proceed to determination on the merits. This is, to be sure, a nod to the prosecution (which is actually the standard in such motions for directed verdicts during trials; that is the facts are taken in the light most favorable to the non-moving party, the government). It is also, obviously, a blow to the defense, although undoubtedly an expected one for defense attorney David Coombs. There is a very outside chance of a silver lining I will discuss below.

Julie Tate at the Washington Post sets the table:

The motion to dismiss the charge was filed July 4 by Manning’s civilian defense attorney. He argued that the government had failed to show that Manning “had ‘actual knowledge’ that by giving information to WikiLeaks, he was giving information to an enemy of the United States.” He said the government did introduce evidence “which might establish that PFC Manning ‘inadvertently, accidentally, or negligently’ gave intelligence to the enemy,” but that this was not enough to prove the most serious charge against him, known as an Article 104 offense.

On two separate occasions, Lind, an Army colonel, had questioned military prosecutors about whether they would be pursuing the charge if the information had been leaked directly to The Washington Post or the New York Times. Each time, the prosecution said it would. That troubles advocates for whistleblowers, who fear that the leaking of national defense information that appears online, as it inevitably does, can be construed as assisting the enemy.

If convicted of aiding the enemy, Manning, an intelligence analyst who served in Iraq, could face life in prison.

That describes the motion and the stakes as to Manning. Julie’s article also gives more particulars on the denial this morning, and is worth a read. For a tick tock, please see the continuously good coverage by Kevin Gosztola of Firedoglake.

But as enormous as the stakes are for Bradley Manning, the enterprise of investigative journalism is also on trial, even if in an indirect manner.

Yet another journalist who has tirelessly, and superbly, covered the Manning prosecution, Alexis O’Brien, has written at the Daily Beast, the stakes for investigative journalism are also life and/or death in the face of the security/surveillance state. Citing the in court, and on the trial record, compelling testimony of Professor Yochai Benkler of Harvard Law School, Alexis related:

In a historic elocution in court last week, Prof. Yochai Benkler, co-director of the Berkman Center for Internet and Society at Harvard Law School, told Lind that “the cost of finding Pfc. Manning guilty of aiding the enemy would impose” too great a burden on the “willingness of people of good conscience but not infinite courage to come forward,” and “would severely undermine the way in which leak-based investigative journalism has worked in the tradition of [the] free press in the United States.”

“[I]f handing materials over to an organization that can be read by anyone with an internet connection, means that you are handing [it] over to the enemy—that essentially means that any leak to a media organization that can be read by any enemy anywhere in the world, becomes automatically aiding the enemy,” said Benkler. “[T]hat can’t possibly be the claim,” he added.

Benkler testified that WikiLeaks was a new mode of digital journalism that fit into a distributed model of emergent newsgathering and dissemination in the Internet age, what he termed the “networked Fourth Estate.” When asked by the prosecution if “mass document leaking is somewhat inconsistent with journalism,” Benkler responded that analysis of large data sets like the Iraq War Logs provides insight not found in one or two documents containing a “smoking gun.” The Iraq War Logs, he said, provided an alternative, independent count of casualties “based on formal documents that allowed for an analysis that was uncorrelated with the analysis that already came with an understanding of its political consequences.”

Those really are the stakes in the, now, not all that new age of digital journalism. When the prosecutors in the Manning trial, upon direct questioning by Judge Lind as to whether they would still prosecute Manning if his leaks had been delivered straight to the New York Times or Washington Post, it had to be a wake up call for traditional media. Or so you would think. But, really, the outrage has been far greater over the James Rosen/Fox subpoena that could, and arguably should, be considered relative peanuts.

But, Yochai Benkler is right as to the import of the consideration as to Wikileaks in the Manning case.

In closing, the one slim and thin ray of limited hope from today’s ruling by Denise Lind: If I were Lind and cared at all about the ultimate verdict on Pvt. Bradley Manning, I too would have made this ruling. Why, you ask? Well, because a dismissal on the motion would have been the equivalent of a directed verdict on the law and would be far easier to overturn on appeal than a decision on the merits that the government has not met its burden of proof. Is this possible; sure, it certainly is. Is this likely; no, I would not make any substantial bets on it.

Wherein Alexander the Great Conquers the World

“Collect it all,” an anonymous source describes General Keith Alexander’s approach to data, in a bizarre WaPo profile this morning.

The article includes several anonymous condemnations of Alexander the Great’s approach.

  • “But even his defenders say Alexander’s aggressiveness has sometimes taken him to the outer edge of his legal authority.”
  • “Some in Congress complain that Alexander’s NSA is sometimes slow to inform the oversight committees of problems, particularly when the agency’s eavesdroppers inadvertently pick up communications that fall outside the NSA’s legal mandates.”
  • “Even close allies have fretted about the concentration of so much responsibility — not to mention influence — in a single individual.”

It also provides details of why he is so dangerous.

  • “Alexander has argued for covert action authority, which is traditionally the domain of the CIA, individuals familiar with the matter say.”
  • “He has been credited as a key supporter of the development of Stuxnet, the computer worm that infected Iran’s main uranium enrichment facility in 2009 and 2010 and is the most aggressive known use to date of offensive cyberweaponry.”
  • “‘He is the only man in the land that can promote a problem by virtue of his intelligence hat and then promote a solution by virtue of his military hat,’ said one former Pentagon official,”
  • Private companies should give the government access to their networks so it could screen out the harmful software. The NSA chief was offering to serve as an all-knowing virus-protection service, but at the cost, industry officials felt, of an unprecedented intrusion into the financial institutions’ databases.”

But the entire article — which focuses far more closely on Alexander the Great’s cybersecurity and cyberwar activities than terrorism — pretends to be about terrorism.

For NSA chief, terrorist threat drives passion to ‘collect it all,’ observers say

In late 2005, as Iraqi roadside bombings were nearing an all-time peak, the National Security Agency’s newly appointed chief began pitching a radical plan for halting the attacks that then were killing or wounding a dozen Americans a day.

At the time, more than 100 teams of U.S. analysts were scouring Iraq for snippets of electronic data that might lead to the bomb-makers and their hidden factories. But the NSA director, Gen. Keith B. Alexander, wanted more than mere snippets. He wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.

“Rather than look for a single needle in the haystack, his approach was, ‘Let’s collect the whole haystack,’ ” said one former senior U.S. intelligence official who tracked the plan’s implementation. “Collect it all, tag it, store it. . . . And whatever it is you want, you go searching for it.”

The unprecedented data collection plan, dubbed Real Time Regional Gateway, would play a role in breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices by late 2008. It also encapsulated Alexander’s controversial approach to safeguarding Americans from what he sees as a host of imminent threats, from terrorism to devastating cyberattacks.

This approach (which appears to be sheer regurgitation on the part of one of WaPo’s writers, perhaps not surprising given Joby Warrick’s contributions) replicates both David Petraeus’ false claims about the surge winning the war in Iraq (rather than bribes to delay the violence that is exploding again) and the very legal ploy I’ve described is built into FISA programs.

That is, every time NSA proposes some vast new expansion of its collection, it does so by pointing to the Terror Terror Terror threat (whether or not that’s the chief threat at hand). People within National Counterterrorism Center troll their files to build up the threat as urgently as possible, including using tortured evidence. And then they pull that together into a justification that probably looks just like the first paragraphs of this article as self-justification.

And remember, Alexander the Great was resuming comprehensive collection on Iraq after Jack Goldsmith had limited it to terrorists in 2004 (presumably after he and others discovered comprehensive collection includes eavesdropping on calls from servicemen calling home).

And by using the Terror Terror Terror threat, Alexander the Great can invoke the certainty of death to describe proposals that include camping on the most private bank websites to hunt for malware (to say nothing of offensively attacking other states).

“Everyone also understands,” he said, “that if we give up a capability that is critical to the defense of this nation, people will die.”

Once you get beyond the initial several paragraphs of propaganda, the story makes clear that a number of people — and not just Jeff Merkley, who is one of the named critics — are beginning to realize this is too much.

But by the time you get there, Alexander the Great has conquered the world.

“Collect it all.”

Why “Members of the News Media” Should Welcome a Shield for the Act of Journalism

As I noted in this piece, the new policies DOJ rolled out in the wake of the AP and James Rosen revelations applies explicitly to “members of the news media,” not journalists per se. The definition might permit the exclusion of bloggers and book writers, not to mention publishers like WikiLeaks.

I’ve been asked what I think a better solution is. My answer is to define — and then protect — the act of journalism, not the news media per se.

That approach would have several advantages over protecting “the news media.” First, by protecting the act of journalism, you include those independent reporters who are unquestioningly engaging in journalism (overcoming the blogger question I laid out, but also those working independently on book projects, and potentially — though this would be a contentious though much needed debate — publishers like WikiLeaks), but also exclude those news personalities who are engaging in entertainment, corporate propaganda, or government disinformation.

But protecting the act of journalism rather than “news media” would also serve to exclude another group that should have limited protection. Included within DOJ’s definition of those it is protecting here are not just the reporters who work for the news media, but also the managers.

“News media” includes persons and organizations that gather, report or publish news, whether through traditional means (e.g., newspapers, radio, magazines, news service) or the on-line or wireless equivalent. A “member of the media” is a person who gathers, reports, or publishes news through the news media.

While I absolutely agree that, say, AP’s editors should have had their phone records protected as they contemplated withholding the UndieBomb 2.0 story after the White House request (those records were included in the subpoena) — that is, as they engaged in a journalistic role. That would protect any discussions they had with sources or other experts to challenge the government’s claim about damage, for example. But the communications of a Tim Russert being pressured after the fact about a critical story by the Vice President’s Chief of Staff should not be protected. Nor should WaPo CEO Katharine Weymouth’s discussions with huge donors like Pete Peterson or potential salon sponsors. While I suspect DOJ sees real benefit in protecting these cocktail weenie means of pressure on news media (as do, undoubtedly, some of the executives involved), I see no journalistic reason to do so.

Moreover, in an era where WaPo is really a testing firm with a journalistic rump and NBC is really the TV content wing of a cable supplier, should we really be protecting the “news media” with no limits? (Bloomberg, I think, presents the most fascinating question here, particularly given their recent spying on users of Bloomberg terminals; where does the journalistic protection for companies that primarily provide privatized information begin and end?)

But even within the scope of Friday’s guidelines, there’s a reason the members of the news media should favor protecting the act of journalism rather than membership in news media.

That’s because two of the most important passages in the new News Media Policies refer to newsgathering activities as a further modification to its otherwise consistent discussion of members of the news media. The phrase appears in what amounts to a mission statement describing why this issue is important.

As an initial matter, it bears emphasis that it has been and remains the Department’s policy that members of the news media will not be subject to prosecution based solely on newsgathering activities. Furthermore, in light of the importance of the constitutionally protected newsgathering process, the Department views the use of tools to seek evidence from or involving the news media as an extraordinary measure. The Department’s policy is to utilize such tools only as a last resort, after all reasonable alternative investigative steps have been taken, and when the information sought is essential to a successful investigation or prosecution.

This is a weird passage, in that it both admits the “newsgathering process” is constitutionally protected, presumably for all, but then suggests the protections within this policy will only apply to members of the news media (one limitation) who cannot be prosecuted exclusively for their newsgathering activities (a second limitation).

Note the parallel limitation in a number of DOJ’s surveillance and investigative guidelines — which say people cannot be investigated solely for their First Amendment protected activities — has not provided adequate protection to Muslims engaging in speech and religion.

The policies again invoke “newsgathering activities” in the passage describing the news media protections in DOJ’s treatment of the Privacy Protection Act.

First, the Department will modify its policy concerning search warrants covered by the PPA involving members of the news media to provide that work product materials and other documents may be sought under the “suspect exception” of the PPA only when the member of the news media is the focus of a criminal investigation for conduct not connected to ordinary newsgathering activities. Under the reviews policy, the Department would not seek search warrants under the PPA’s suspect exception if the sole purpose is the investigation of a person other than the member of the news media.

By limiting protections offered to members of the news media to “ordinary newsgathering activities,” DOJ has just punted one of the crucial issues underlying the James Rosen affidavit (and, along with it, DOJ’s efforts to prosecute WikiLeaks). Because it still permits DOJ to decide, potentially in secret (though, as a laudable part of the new policy, with the input of the Public Affairs Director and the Privacy and Civil Liberties Officer), what constitutes “ordinary newsgathering activities.” And some of the things the FBI officer apparently decided  in that case did not constitute ordinary newsgathering activities, but instead provided evidence that Rosen was part of a conspiracy to commit espionage, include:

  • Soliciting disclosure of intelligence information, including documents, on North Korea
  • Using (in the FBI officer’s description) “covert email communications as a means of compartmentalizing the information” — this includes use of a pseudonym and a code for facilitating non-email communication
  • Exploiting a source “like a rag doll” and the source’s vanity (according to defendant Stephen Jin-Woo Kim’s descriptions); employing flattery (according to the FBI officer’s description)
  • Providing other news articles in advance of their publication to a source not used on that story

While there are other protections for news media in these new policies (including protections from non-NSL Administrative orders, review before using such investigative methods, reporting on how much investigation of news media occurs, and what amount to increased minimization procedures for news media contact information), this is one of the critical new protections in this policy.

If DOJ decides that protecting sources and methods, soliciting information, and sucking up to sources do not constitute “ordinary newsgathering activities,” then how useful are the protections?

DOJ has announced its intention to respect ordinary newsgathering activities and even recognized constitutional protections for them, sort of (I look forward to the legal cases that cite that language, anyway). But until there’s a common understanding about when such activities constitute journalism and when they constitute spying, the protection has limited value.

If the ultimate idea is to protect newsgathering activities, then why not establish what those activities are and then actually protect them, regardless of whether they are tied to a certain kind of institution?