Section 215: The White House’s Bullshit Talking Points

Here’s what the White House has offered as talking points to defend collecting (DiFi has confirmed) all the call data from all Americans since 2006. Interspersed is my commentary.

The article discusses what purports to be an order issued by the Foreign Intelligence Surveillance Court under a provision of the Foreign Intelligence Surveillance Act that authorizes the production of business records. Orders of the FISA Court are classified.

As they’ve done with drone strikes and, especially, WikiLeaks cables before, the Administration refuses to confirm that this is, in fact, what several members of Congress have made it clear it is: an authentic FISA Order that (as Dianne Feinstein revealed) is just the quarterly renewal of a program that goes back to the PATRIOT Act renewal in March 2006.

In other words, with its “talking points,” the Administration is recommitting to keeping this program legally secret, even though it’s not secret.

Everything that say after they set up that information asymmetry should be regarded with the knowledge that the White House refuses to permit you to check its claims.

The talking points go on.

On its face, the order reprinted in the article does not allow the Government to listen in on anyone’s telephone calls. The information acquired does not include the content of any communications or the name of any subscriber. It relates exclusively to metadata, such as a telephone number or the length of a call.

Here, the White House does two things. With its “exclusively metadata” comment, it tries to minimize how much metadata really provides. Here’s how Shane Harris, in a superb explainer, describes what metadata can really provide.

What can you learn with metadata but no content?

A lot. In fact, telephone metadata can be more useful than the words spoken on the phone call. Starting with just one target’s phone number, analysts construct a social network. They can see who the target talks to most often. They can discern if he’s trying to obscure who he knows in the way he makes a call; the target calls one number, say, hangs up, and then within second someone calls the target from a different number. With metadata, you can also determine someone’s location, both through physical landlines or, more often, by collecting cell phone tower data to locate and track him. Metadata is also useful for trying to track suspects that use multiple phones or disposable phones. For more on how instructive metadata can be, read this.

Note the White House fails to mention the forms of some metadata, such as geolocation, that are particularly invasive.

But the other thing this White House bullshit talking point does is precisely the same thing the Bush White House did when, in 2005 after James Risen and Eric Lichtblau exposed the illegal wiretap program, it dubbed a subpart of the program the Terrorist Surveillance Program and talked about how innocuous it was taken in solitary. The White House is segregating one part of the government’s interdependent surveillance system and preening about how harmless that isolated part is in isolation.

What the White House doesn’t mention is how the government uses this data, among other ways, to identify possible terrorists who they can conduct more investigation of, including accessing their content using this data mining to establish probable cause.

What the White House is trying to hide, in other words, is that this collection is part of a massive collection program that uses algorithms and other data analysis to invent people to investigate as terrorists.

And then the bullshit White House talking points contradict themselves.

Information of the sort described in the Guardian article has been a critical tool in protecting the nation from terrorist threats to the United States, as it allows counterterrorism personnel to discover whether known or suspected terrorists have been in contact with other persons who may be engaged in terrorist activities, particularly people located inside the United States.

Wait, what? Just one talking point ago, the White House told us that, “The information acquired does not include the content of any communications or the name of any subscriber.” But here we are, a mere talking point later, and the White House is claiming that it is used to discover whether known terrorists are in contact with other persons? Uh, so it does involve the known identities of both existing suspects and those gleaned from this massive collection of data, huh?

But don’t worry. Because a court has rubber stamped this.

As we have publicly stated before, all three branches of government are involved in reviewing and authorizing intelligence collection under the Foreign Intelligence Surveillance Act. Congress passed that act and is regularly and fully briefed on how it is used, and the Foreign Intelligence Surveillance Court authorizes such collection.

How does the separation of powers work again? Congress passes the law, the Executive enforces the law, and Courts review the law?

Only, in its bold claim that all three branches of government support this, the Court’s role is to “authorize such collection.” There’s a reason for that word, authorize. The only thing the courts are permitted to review are whether the government has provided,

(A) a statement of facts showing that there are reasonable grounds to believe that the tangible things sought are relevant to an authorized investigation (other than a threat assessment) conducted in accordance with subsection (a)(2) to obtain foreign intelligence information not concerning a United States person or to protect against international terrorism or clandestine intelligence activities, such things being presumptively relevant to an authorized investigation if the applicant shows in the statement of the facts that they pertain to—
(i) a foreign power or an agent of a foreign power;

(ii) the activities of a suspected agent of a foreign power who is the subject of such authorized investigation; or

(iii) an individual in contact with, or known to, a suspected agent of a foreign power who is the subject of such authorized investigation; and

(B) an enumeration of the minimization procedures adopted by the Attorney General under subsection (g) that are applicable to the retention and dissemination by the Federal Bureau of Investigation of any tangible things to be made available to the Federal Bureau of Investigation based on the order requested in such application.

That is, the government just has to make a “reasonable” argument that this stuff is “relevant” to an investigation geared toward protecting against international terror or foreign clandestine activities. And if they can point to any number of foreign types (a foreign power, a suspected agent of a foreign power, or someone in contact with a suspected agent of a foreign power), the judge is instructed to presume it is related even if that seems like a stretch.

This is not a robust review of the claims the government is making. On the contrary, it is designed not to be a robust review of those claims.

Which brings us to Congress, that other branch the White House touts. It is utterly and embarrassingly true that they have repeatedly bought off on this, even if James Sensenbrenner, among others, is suckering journalists claiming that he didn’t. Indeed, oversight committees shot down efforts to limit Section 215 orders to people who actually had a tie to a suspected terrorist or foreign spy in 2006, 2009, and 2011. Such language was shot down each time. So, too, were efforts in 2011 and 2012 to reveal what was really going on in Section 215 collection; oversight committees shot that down too.

So here, in a rarity for national security overreach, the White House is absolutely right. Congress repeatedly bought off on this program, including its unbelievably broad standard for “relevance.”

Except … except … when Ron Wyden tried to get the government to tell him how many Americans’ records had been reviewed (by using this front-end collection to identify the back-end collection) the Inspectors General in question professed to be helpless to do that (later hints suggested they had done that study, but refused to share it with the Intelligence Committees).

So while it is true that Congress, with a few exceptions, have been completely complicit in this, it is also true that the Executive Branch has withheld the information Congress needs to understand what is happening with US person data.

I wonder why?

Never you worry, though, because it’s all constitutional.

There is a robust legal regime in place governing all activities conducted pursuant to the Foreign Intelligence Surveillance Act. That regime has been briefed to and approved by the Court.

Activities authorized under the Act are subject to strict controls and procedures under oversight of the Department of Justice, the Office of the Director of National Intelligence and the FISA Court, to ensure that they comply with the Constitution and laws of the United States and appropriately protect privacy and civil liberties.

Don’t worry, the White House concludes. The legal review designed not to be robust is robust.

And to be fair, the FISA Court has, on at least one occasion, told the Administration they were violating the Fourth Amendment. Though apparently DOJ and ODNI thought this Fourth Amendment violative collection was kosher, as they had to be slapped down by the court, so I’m not sure what purpose their purported oversight serves.

But as I pointed out this morning, there’s a flaw to this argument that is grounded in the Administration’s refusal to admit this is a real FISA Court order.

Standing.

The government, over and over and over and over, assures us this is all very Constitutional. Even while the government, over and over and over and over, goes to great lengths to ensure citizens don’t learn how they’re being surveilled, which would (in addition to pissing them off) give them the ability to sue.

Until the Americans who have been surveilled are permitted to challenge this in a court — precisely what the government has gone to great lengths to prevent — White House claims to constitutionality ring hollow.

The government doesn’t have the confidence to let us test these claims in court. That ought to tell you what they really think about its constitutionality.

Ron Wyden Calls Bullshit on Mike Rogers’ Claims

Mike Rogers, in an effort to defend his efforts to approve and hide dragnet collection on all Americans for years, claimed today that the dragnet prevented a terrorist attack.

“Within the last few years, this program was used to stop a terrorist attack in the United States. We know that. It’s important. It fills in a little seam that we have,” Rogers told reporters Thursday. ”And it’s used to make sure that there is not an international nexus to any terrorism event if there may be one ongoing. So in that regard, it is a very valuable thing,” Rogers said.

When pressed later for more details, Rogers said the committee is “working on trying to get this declassified in a way that we can provide more information. We’re not there yet. But it was a significant case that happened within the last few years.”

Get this: Rogers’ defense argues it makes sense to conduct dragnet surveillance of 310 million Americans for 7 years (plus the 5 years Bush did so illegally), all to thwart one terrorist plot.

One. Plot.

21 million person-years of call data collected since 2006.

One plot.

In his statement, Ron Wyden is a lot more skeptical that this program is so valuable.

The American people have a right to know whether their government thinks that the sweeping, dragnet surveillance that has been alleged in this story is allowed under the law and whether it is actually being conducted. Furthermore, they have a right to know whether the program that has been described is actually of value in preventing attacks. Based on several years of oversight, I believe that its value and effectiveness remain unclear.

Hey, I’d say that one plot over 7 years — especially when you consider how many banksters have done trillions of damage while FBI and NSA have been fiddling with the call records of innocent people — is the definition of a waste of time and resources.

What an Overbroad Section 215 Order Looks Like

Screen shot 2013-06-05 at 10.02.05 PMGlenn Greenwald has a tremendous scoop, for the first time I know of publishing a Section 215 warrant — in this case one asking for all US-based traffic metadata from Verizon Business Services from April until July.

Now, I think that this actually affects just a subset of all Verizon traffic: the business-focused traffic rather than Verizon Wireless or similar consumer products most people subscribe to (and if that’s so, the shitstorm that is about to break out will be all the more interesting given that rich businessmen will be concerned about their privacy for once).

Also, this does not ask for call content. It asks only for metadata, independent of any identifying data.

In other words, they’re using this not to wiretap the conversations of Occupy Wall Street activists but to do pattern analysis on the telecom traffic of (I think) larger businesses.

The request does, however, ask for location data (and Verizon does offer bundles that would include both cell and cloud computing). So maybe the FBI is analyzing where all Verizon’s business customers are meeting for lunch.

My extremely wildarsed guess is that this is part of hacking investigation, possibly even the alleged Iranian hacking of power companies in the US (those stories were first reported in early May).

I say that because cybersecurity is a big part of what Verizon Enterprise (as I believe they now go by) sells to its business customers; the infographic above, warning of data breaches when you least expect it (heh), is part of one they use to fear-monger its customers. Energy consumers are one of its target customer bases. And the case studies it describes involve several Smart Grid projects. Precisely the kind of thing the government is most freaked out about right now.

After all, aside from Medicare fraud, the government simply doesn’t investigate businesses, ever. Certainly not the kind of bankster businesses we’d like them to investigate. One of the few things they investigate business activities for is to see if they’ve been compromised. Moreover, the Section 215 order requires either a counterintelligence or a counterterrorist nexus, and the government has gone to great lengths to protect large businesses, like HSBC or Chiquita, that have materially supported terrorists.

Anyway, that’s all a wildarsed guess, as I said.

Ah well. If the government can use Section 215 orders to investigate all the Muslims in Aurora, CO who were buying haircare products in 2009, I’m sure big business won’t mind if the government collects evidence of their crimes in search of Iran or someone similar.

Update: Note, this order seems to show a really interesting organizational detail. This is clearly an FBI order (I’m not sure who, besides the FBI, uses Section 215 anyway). But the FISA Court orders Verizon to turn the data over to the NSC. This seems to suggest that FBI has NSA store and, presumably, do the data analysis, for at least their big telecom collections in investigations. That also means the FBI, which can operate domestically, is getting this for DOD, which has limits on domestic law enforcement.

John Brennan Refuses to Deny the Government Collects US Person Data with No Predicate

John Brennan pointedly refused to answer Mark Udall’s question about whether the government collects information on Americans without a predicate.

In 2008, you stated, “I would argue the government needs to have access to only those nuggets of information that have some kind of predicate. That way the government can touch it and pull back only that which is related.” You also stated that the issue needed to be discussed, “not to the point of revealing sources and methods and giving the potential terrorists out there insights into our capability – but to make sure there is a general understanding and consensus that these initiatives, collections, capabilities, and techniques comport with American values and are appropriately adjusted to deal with the threat we face.” Do you believe the U.S. government currently has access to only nuggets of information that have some kind of predicate? Do you believe that the public has adequate information on this topic?

I believe your first question is referencing statements I made about the need to balance security, privacy, and civil liberty interests in connection with the then ongoing public debate over changes to the Foreign Intelligence Surveillance Act. With respect to FISA, this Administration has worked hard to ensure that any electronic surveillance that targets the American people is subject to judicial review through the Foreign Intelligence Surveillance Court to ensure, among other things, that such surveillance complies with the Constitution, and I strongly supported these efforts. I believe it is important that the Judicial Branch act as a check on the Executive Branch to ensure there is an adequate factual predicate to conduct lawful electronic surveillance that targets the American people. I have also supported – and will continue to support – the Administration’s efforts to ensure that Congress is kept informed of our surveillance practices and processes.

Moreover, the Act provides the process and procedures the Government must follow to undertake surveillance, as well as the role the Judicial Branch and the Congress play in that process. As I have stated publicly, I support as much transparency as possible on our counterterrorism efforts, consistent with our obligation to protect sources and methods. Thus, to the extent we could discuss with the public some of the factual predicates that have been deemed by courts as sufficient to justify surveillance, I would support doing so. Indeed I do believe, as I said in my September 2011 speech at Harvard Law School that an “open and transparent government” is one of the values our democratic society expects and demands. [my emphasis]

As a threshold matter, Brennan is addressing underlying predicates only with regards to the FISA Amendments Act, not to Section 215, which uses the relevance standard to collect information — from acetone and hydrogen peroxide purposes, probably to geolocation — of totally innocent Americans.

But even so, this answer not only doesn’t answer Udall’s question — didn’t you once believe that we should only collect intelligence for which there is a predicate so we don’t conduct fishing expeditions — but it points to the inadequate role of the FISA Court in limiting who the US can spy on.

I guess John Brennan has become a fan of fishing expeditions into US person data.

In any case, unlike Lisa Monaco, Brennan isn’t going to promise to release the secret law.

In 2008, you stated that it was important that there be a public airing, including public congressional hearings, related to the predicate for the surveillance of U.S. persons. Do you believe there is more on this topic that could be declassified?

[snip]

And while I am not aware of any particular information on this topic that could be declassified, I do believe any such information should be disclosed to the extent that such a disclosure could be done consistent with our national security.

The International Manhunt for WikiLeaks

One of the things DOJ is protecting from FOIA in Electronic Privacy Information Center’s suit is information other governments have shared with the US on the investigation.

According to FBI’s David Harvey, this includes classified information from foreign governments.

(45) E.O. 13526, § 1.4(b) authorizes the classification of foreign government information. E.O. 13526, § 6.1(s) defines foreign government information as: “(1) information provided to the United States Government by a foreign government or governments, an international organization of governments, or any element thereof, with the expectation that the information, the source of the information, or both, are to be held in confidence; (2) information produced by the United States Government pursuant to or as a result of a joint arrangement with a foreign government or governments, or an international organization of governments, or any element thereof, requiring that the information, the arrangement, or both, are to be held in confidence; or (3) information received and treated as ‘foreign government information’ under the terms of a predecessor order.”

(46) Many foreign governments do not officially acknowledge the existence of some of their intelligence and security services, or the scope of their activities or the sensitive information generated by them. The free exchange of information between United States intelligence and law enforcement services and their foreign counterparts is predicated upon the understanding that these liaisons, and information exchanged between them, must be kept in confidence.

(47) The release of official United States Government documents that show the existence of a confidential relationship with a foreign government reasonably could be expected to strain relations between the United States and the foreign governments and lead to diplomatic, political, or economic retaliations. A breach of this relationship can be expected to have at least a chilling effect on the free flow of vital information to the United States intelligence and law enforcement agencies, which may substantially reduce their effectiveness. Although the confidential relationship of the United States with certain countries may be widely reported, they are not officially acknowledged. (48) Disclosure of such a relationship predictably will result in the careful analysis and possible compromise of the information by hostile intelligence services. The hostile service may be able to uncover friendly foreign intelligence gathering operations directed against it or its allies. This could lead to the neutralization of friendly allied intelligence activities or methods or the death of live sources, cause embarrassment to the supplier of the information, or result in economic or diplomatic retaliation against both the United States and the supplier of the information.

(49) Even if the government from which certain information is received is not named in or identifiable from the material it supplies, the danger remains that if the information were to be made public, the originating government would likely recognize the information as material it supplied in confidence. Thereafter, it would be reluctant to entrust the handling of its information to the discretion of the United States.

(50) The types of classified information provided by foreign government intelligence components can be categorized as: (a) information that identifies a named foreign government and detailed information provided by that foreign government; (b) documents received from a named foreign government intelligence agency and classified “Secret” by that agency; and (c) information that identifies by name, an intelligence component of a specific foreign government, an official of the foreign government, and information provided by that component official to the FBI.

[snip]

(51) The cooperative exchange of intelligence information between the foreign governments and the FBI was, and continues to be, with the express understanding that the information will be kept classified and not released to the public. Disclosure of the withheld information would violate the FBI’s promise of confidentiality. Read more

DOJ: We Can’t Tell Which Secret Application of Section 215 Prevents Us From Telling You How You’re Surveilled

As Mike Scarcella reported yesterday, the government has moved for summary judgment in an Electronic Privacy Information Center FOIA suit for details on the government’s investigation into WikiLeaks. EPIC first FOIAed these materials in June 2011. After receiving nothing, they sued last January.

The government’s motion and associated declarations would be worth close analysis in any case. All the more so, though, in light of the possibility that the government conducted a fishing expedition into WikiLeaks as part of its Aaron Swartz investigation, almost certainly using PATRIOT Act investigative techniques. The government’s documents strongly suggest they’re collecting intelligence on Americans, all justified and hidden by their never ending quest to find some excuse to throw Julian Assange in jail.

EPIC’s FOIA asked for information designed to expose whether innocent readers and supporters of WikiLeaks had been swept up in the investigation. It asked for:

  1. All records regarding any individuals targeted for surveillance for support for or interest in WikiLeaks;
  2. All records regarding lists of names of individuals who have demonstrated support for or interest in WikiLeaks;
  3. All records of any agency communications with Internet and social media companies including, but not limited to Facebook and Google, regarding lists of individuals who have demonstrated, through advocacy or other means, support for or interest in WikiLeaks; and
  4. All records of any agency communications with financial services companies including, but not limited to Visa, MasterCard, and PayPal, regarding lists of individuals who have demonstrated, through monetary donations or other means, support or interest in WikiLeaks. [my emphasis]

At a general level, the government has exempted what files it has under a 7(A) (ongoing investigation) exemption, while also invoking 1 (classified information), 3 (protected by statute), 5 (privileged document), 6 (privacy), 7(C) (investigative privacy), 7(D) (confidential source, which can include private companies like Visa and Google), 7(E) (investigative techniques), and 7(F) (endanger life or property of someone) exemptions.

No one will say what secret law they’re using to surveil Americans

But I’m most interested in how all three units at DOJ — as reflected in declarations from FBI’s David Hardy, National Security Division’s Mark Bradley, and Criminal Division’s John Cunningham — claimed the files at issue were protected by statute.

None named the statute in question. All three included some version of this statement, explaining they could only name the statute in their classified declarations.

The FBI has determined that an Exemption 3 statute applies and protects responsive information from the pending investigative files from disclosure. However, to disclose which statute or further discuss its application publicly would undermine interests protected by Exemption 7(A), as well as by the withholding statute. I have further discussed this exemption in my in camera, ex parte declaration, which is being submitted to the Court simultaneously with this declaration

In fact, it appears the only reason that Cunningham submitted a sealed declaration was to explain his Exemption 3 invocation.

And then, as if DOJ didn’t trust the Court to keep sealed declarations secret, it added this plaintive request in the motion itself.

Defendants respectfully request that the Court not identify the Exemption 3 statute(s) at issue, or reveal any of the other information provided in Defendants’ ex parte and in camera submissions.

DOJ refuses to reveal precisely what EPIC seems to be seeking: what kind of secret laws it is using to investigate innocent supporters of WikiLeaks.

By investigating a publisher as a spy, DOJ gets access to PATRIOT Act powers, including Section 215

There’s a very very large chance that the statute in question is Section 215 of the PATRIOT Act (or some other national security administrative subpoena). After all, the FOIA asked whether DOJ had collected business records on WikiLeaks supporters, so it is not unreasonable to assume that DOJ used the business records provision to do so.

Moreover, the submissions make it very clear that the investigation would have the national security nexus to do so. While the motion itself just cites a Hillary Clinton comment to justify its invocation of national security, both the FBI and the NSD declarations make it clear this is being conducted as an Espionage investigation by DOJ counterintelligence people, which — as I’ve been repeating for over two years — gets you the full PATRIOT Act toolbox of investigative approaches.

Media outlets take note: The government is, in fact, investigating a publisher as a spy. You could be next.

Read more

Our Government’s UnPATRIOTic Investigation of Aaron Swartz

As I noted back in December 2010, as soon as Eric Holder declared WikiLeaks’ purported crime to be Espionage, it opened up a whole slew of investigative methods associated with the PATRIOT Act. It allowed the government to use National Security Letters to get financial and call records. It allowed them to use Section 215 orders to get “any tangible thing.” And all that’s after FISA Amendments Act, which permits the government to bulk collect “foreign intelligence” on a target overseas–whether or not that foreign target is suspected of Espionage–that includes that target’s communications with Americans. The government may well be using Section 215 to later access the US person communications that have been collected under an FAA order, though that detail is one the government refuses to share with the American people.

At no point would a judge have the opportunity to challenge Holder’s assertion that a website publishing documents offered up anonymously is engaged in Espionage. All it would take is Holder’s assertion that it was, and those investigative powers would become available.

No matter how many Americans got sucked up into that investigation.

Which is why I find it interesting that Aaron Swartz’ lawyers were asking, last summer–but got only indirect answers–about how the government had collected some of the evidence, particularly emails, turned over to the grand jury.

This paragraph asked the government to “identify the origin of any and all statements of Aaron Swartz including but not limited to emails, text messages, chats, documents, memoranda or letters, i.e., to identify the source from which each statement was received and the legal procedure used to obtain each such statement of the defendant.” Swartz has received in discovery internet memoranda and chats purporting to be from him. For example, the discovery contains a number of chats on googlegroups.com which contain entries which facially indicate that Swartz was a participant in the communications. The discovery also contains a number of emails which on their faces indicate that they were either to or from Swartz. Swartz requires the additional information requested – the source of these statements and the procedure used by the government to obtain them – to enable him to move to suppress such statements if grounds exist to do so, which he cannot determine without the requested information.

The government offered this explanation.

In Paragraph 15, the defendant would require the government to identify the origin of any and all statements of Aaron Swartz in its possession and the legal procedure used to obtain the statements. All of the emails, text messages, chat sessions, and documents containing statements provided by the defendant relevant to this case were obtained either from individuals with whom the defendant communicated or from publicly available websites stored on the Internet. No emails, texts messages, chat logs, or documents were obtained from Internet service providers using orders under 18 U.S.C. 2703(d). As previously represented to defense counsel, there was no court-authorized electronic surveillance in this case. [my emphasis]

The government admits the defense has asked for the content and origin of all Aaron’s statement in its possession. In response, it described how it had gotten Aaron’s statements relevant to this case–which may well be just a subset of Aaron’s statements in their possession. It also says that it did not obtain any of his statements (presumably referring to the larger potential universe) using 18 USC 2703(d), which is how DOJ demanded Twitter information on four WikiLeaks figures in late 2010 to early 2011. It suggests everything it got relevant to this case was either willingly from people involved in private conversations with him–though it didn’t say whether it asked for them specifically or not–or from publicly available places. And it alludes to an earlier representation to the defense about whether or not it had intercepted Aaron’s communications in this case.

I believe these are the representations in question, which comes from early discovery discussions in August 2011.

C. Electronic Surveillance under Local Rule 1 16.1 (C)(l)(c)

No oral, wire, or electronic communications of the defendant as defined in 18 U.S.C. § 2510 were intercepted relating to the charges in the indictment.

D. Consensual Interceptions under Local Rule 1 16.1 (C)(l)(d)

There were no interceptions (as the term “intercept” is defined in 18 U.S.C. § 2510(4)) of wire, oral, or electronic communications relating to the charges contained in the indictment, made with the consent of one of the parties to the communication in which the defendant was intercepted or which the government intends to offer as evidence in its case-in-chief.

As you can see, in this statement the government made in August 2011 anticipated some of the same dodges the government was making in June 2012.

But in the earlier statement, the limitation on its assertions are even narrower than the later one. Whereas by June 2012 they were making assertions about “this case” in general, when they first discussed the issue, they discussed only the communications related to “the charges contained in the indictment” (though presumably they may have still been considering other charges).

Also, the second paragraph makes it very clear it is discussing intercepts only as defined under the Title III definition for intercept, which pertains to communications collected in transit. I’m not sure what the government considers communications collected under FISA and stored, though I would not be surprised, given all the discussions about the government yoking Section 215 onto FAA if they had some creative treatment of those US person communications.

None of that is proof that they had accessed Swartz’ communications via other means or, indeed, that they have any communications outside those pertaining directly to JSTOR downloads.

But their very careful hedges sure seem to leave that possibility open.

 

ECPA Amendments and Privacy in a Post Petraeus World

One of the issues making the rounds like wildfire today was a report from Declan McCullagh at CNET regarding certain proposed amendments to the Electronic Communications Privacy Act (ECPA). The article is entitled “Senate Bill Rewrite Lets Feds Read Your E-mail Without Warrants” and relates:

A Senate proposal touted as protecting Americans’ e-mail privacy has been quietly rewritten, giving government agencies more surveillance power than they possess under current law.

CNET has learned that Patrick Leahy, the influential Democratic chairman of the Senate Judiciary committee, has dramatically reshaped his legislation in response to law enforcement concerns. A vote on his bill, which now authorizes warrantless access to Americans’ e-mail, is scheduled for next week.

Leahy’s rewritten bill would allow more than 22 agencies — including the Securities and Exchange Commission and the Federal Communications Commission — to access Americans’ e-mail, Google Docs files, Facebook wall posts, and Twitter direct messages without a search warrant. It also would give the FBI and Homeland Security more authority, in some circumstances, to gain full access to Internet accounts without notifying either the owner or a judge. (CNET obtained the revised draft from a source involved in the negotiations with Leahy.)

This sounds like the predictably craven treachery that regularly comes out of Senate, indeed Congressional, legislation on privacy issues. And exactly what many had hoped would cease coming out of Washington after the public scrutiny brought on by the Petraeus/Broadwell/Kelley scandal. And, should these amendments make it into law, they may yet prove detrimental.

But there are a couple of problems here. First, as Julian Sanchez noted, those abilities by the government already substantially exist.

Lots of people RTing CNET’s story today seem outraged Congress might allow access to e-mail w/o warrant—but that’s the law ALREADY!

Well, yes. Secondly, and even more problematic, is Pat Leahy vehemently denies the CNET report. In fact, Senator Leahy does not support broad exemptions for warrantless searches for email content. A source within the Judiciary Committee described the situation as follows: Read more

The Kiriakou Conundrum: To Plea Or Not To Plea

There are many symbols emblematic of the battle between the American citizenry and the government of the United States in the war of transparency. One of those involves John Kiriakou. Say what you will about John Kiriakou’s entrance into the public conscience on the issue of torture, he made a splash and did what all too few had, or have since, been willing to do. John Kiriakou is the antithesis of the preening torture monger apologist in sullen “big boy pants”, Jose Rodriquez.

And, so, people like Kiriakou must be punished. Not by the national security bullies of the Bush/Cheney regime who were castigated and repudiated by an electorate who spoke. No, the hunting is, instead, by the projected agent of “change”, Barack Obama. You expect there to be some difference between a man as candidate and a man governing; the shock comes when the man and message is the diametric opposite of that which he sold. And, in the sling of such politics, lies the life and fate of John Kiriakou.

Why is the story of John Kiriakou raised on this fine Saturday? Because as Charlie Savage described, Kiriakou has tread the “Path From Terrorist Hunter to Defendant”. Today it is a path far removed from the constant political trolling of the Benghazi incident, and constant sturm and drang of the electoral polling horserace. It is a critical path of precedent in the history of American jurisprudence, and is playing out with nary a recognition or discussion. A tree is falling in the forrest and the sound is not being heard.

You may have read about the negative ruling on the critical issue of “intent to harm” made in the federal prosecution of Kiriakou in the Eastern District of Virginia (EDVA) last Tuesday. As Josh Gerstein described:

Prosecutors pursuing former CIA officer John Kiriakou for allegedly leaking the identities of two other CIA officers involved in interrogating terror suspects need not prove that Kiriakou intended to harm the United States or help a foreign nation, a federal judge ruled in an opinion made public Wednesday.

The ruling from U.S. District Court Judge Leonie Brinkema is a defeat for Kiriakou’s defense, which asked the judge to insist on the stronger level of proof — which most likely would have been very difficult for the government to muster.

In 2006, another federal judge in the same Northern Virginia courthouse, T.S. Ellis, imposed the higher requirement in a criminal case against two former lobbyists for the American Israel Public Affairs Committee.

However, Brinkema said that situation was not parallel to that of Kiriakou, since he is accused of relaying information he learned as a CIA officer and the AIPAC staffers were not in the government at the time they were alleged to have received and passed on classified information.

“Kiriakou was a government employee trained in the classification system who could appreciate the significance of the information he allegedly disclosed. Accordingly, there can be no question that Kiriakou was on clear notice of the illegality of his alleged communications.

Gerstein has summarized the hard news of the court ruling admirably, but there is a further story behind the sterile facts. By ruling the crucial issue of “intent” need not be proven by the accusing government, the court has literally removed a critical element of the charge and deemed it outside of the due process proof requirement, much less that of proof beyond a reasonable doubt.

What does that mean? In a criminal prosecution, it means everything. It IS the ballgame.

And so it is here in the case of United States v. John Kiriakou. I am going to go a little further than Gerstein really could in his report, because I have the luxury of speculation. As Josh mentioned:

On Tuesday, Brinkema abruptly postponed a major motions hearing in the case set for Wednesday and a hearing set for Thursday on journalists’ motions to quash subpoenas from the defense. She gave no reason for canceling the hearings.

HELLO! That little tidbit is the everything of the story. I flat out guarantee the import of that is the court put the brakes on the entire case as a resultnof an off the record joint request of the parties to facilitate immediate plea negotiation. As in they are doing it as you read this.

There is simply no other reason for the court to suspend already docketed process and procedure in a significant case, much less do so without a formal motion to extend, whether by one party or jointly. That just does not happen. Well, it does not happen unless both parties talked to the court and avowed a plea was underway and they just needed the time to negotiate the details.

So, what does this mean for John Kiriakou? Nothing good, at best. Upon information and belief, Kiriakou was offered a plea to one count of false statements and no jail/prison time by the original specially designated lead prosecutor, Pat Fitzgerald. But the “word on the street” now is that, because the government’s sheriff has changed and, apparently, because Kiriakou made an effort to defend himself, the ante has been ridiculously upped.

What I hear is the current offer is plead to IIPA and two plus years prison. This for a man who has already been broken, and whose family has been crucified (Kiriakou’s wife also worked for the Agency, but has been terminated and had her security clearance revoked). Blood out of turnips is now what the “most transparent administration in history” demands.

It is a malicious and unnecessary demand. The man, his family, and existence are destroyed already. What the government really wants is definable precedent on the IIPA because, well, there is not squat for such historically, and the “most transparent administration in history” wants yet another, larger, bludgeon with which to beat the baby harp seals of whistleblowing. And so they act.

To date, there have been no reported cases interpreting the Intelligence Identities Protection Act (IIPA), but it did result in one conviction in 1985 pursuant to a guilty plea. In that case, Sharon Scranage, a former CIA clerk, pleaded guilty for providing classified information regarding U.S. intelligence operations in Ghana, to a Ghanaian agent, with whom she was romantically involved. She was initially sentenced to five years in prison, but a federal judge subsequently reduced her sentence to two years. That. Is. It.

So, little wonder, “the most transparent administration in history” wants to establish a better beachhead in its fight against transparency and truth. John Kiriakou is the whipping post. And he is caught in the whipsaw….prosecuted by a maliciously relentless government, with unlimited federal resources, and reliant on private defense counsel he likely long ago could no longer afford.

It is a heinous position Kiriakou, and his attorneys Plato Cacheris et. al, are in. There are moral, and there are exigent financial, realities. On the government’s end, as embodied by the once, and now seemingly distant, Constitutional Scholar President, and his supposedly duly mindful and aware Attorney General, Eric Holder, the same moralities and fairness are also at issue. Those of us in the outside citizenry of the equation can only hope principles overcome dollars and political hubris.

Eric Holder, attorney general under President Barack Obama, has prosecuted more government officials for alleged leaks under the World War I-era Espionage Act than all his predecessors combined, including law-and-order Republicans John Mitchell, Edwin Meese and John Ashcroft.
….
“There’s a problem with prosecutions that don’t distinguish between bad people — people who spy for other governments, people who sell secrets for money — and people who are accused of having conversations and discussions,” said Abbe Lowell, attorney for Stephen J. Kim, an intelligence analyst charged under the Act.

The once and previous criticisms of John Kiriakou, and others trying to expose a nation off its founding tracks, may be valid in an intellectual discussion on the fulcrum of classified information protection; but beyond malignant in a sanctioned governmental prosecution such as has been propounded against a civilian servant like John Kiriakou who sought, with specificity, to address wrongs within his direct knowledge. This is precisely where, thanks to the oppressive secrecy ethos of the Obama Administration, we are today.

Far, perhaps, from the “hope and change” the country prayed and voted for in repudiating (via Barack Obama) the festering abscess of the Bush/Cheney regime, we exist here in the reality of an exacerbated continuation of that which was sought to be excised in 2008. Kiriakou, the human, lies in the whipsaw balance. Does John Kiriakou plead out? Or does he hold out?

One thing is certain, John Kiriakou is a man, with a family in the lurch. His values are not necessarily those of those of us on the outside imprinting ourselves on him.

If the government would stop the harp seal beating of Mr. Kiriakou, and at least let the man stay with his family instead of needlessly consuming expensive prison space, that would be one thing. But the senseless hammer being posited by the out for blood successor to Patrick Fitzgerald – Neil MacBride, and his deputy William N. Hammerstrom, Jr. – is scurrilous.

Rest assured, far from the hue and cry on the nets and Twitters, this IS playing out on a very personal and human scale for John Kiriakou while we eat, drink and watch baseball and football this weekend.

Chris Hedges et. al Win Another Round On the NDAA

You may remember back in mid May Chris Hedges, Dan Ellsberg, Jennifer Bolen, Noam Chomsky, Alexa O’Brien, Kai Wargalla, Birgetta Jonsdottir and the US Day of Rage won a surprising, nee stunning, ruling from Judge Katherine Forrest in the Southern District of New York. Many of us who litigate felt the plaintiffs would never even be given standing, much less prevail on the merits. But, in a ruling dated May 16, 2012, Forrest gave the plaintiffs not only standing, but the affirmative win by issuing a preliminary injunction.

Late yesterday came even better news for Hedges and friends, the issuance of a permanent injunction. I will say this about Judge Forrest, she is not brief as the first ruling was 68 pages, and todays consumes a whopping 112 pages. Here is the setup, as laid out by Forrest (p. 3-4):

Plaintiffs are a group of writers, journalists, and activists whose work regularly requires them to engage in writing, speech, and associational activities protected by the First Amendment. They have testified credibly to having an actual and reasonable fear that their activities will subject them to indefinite military detention pursuant to § 1021(b)(2).

At the March hearing, the Government was unable to provide this Court with any assurance that plaintiffs’ activities (about which the Government had known–and indeed about which the Government had previously deposed those individuals) would not in fact subject plaintiffs to military detention pursuant to § 1021(b)(2). Following the March hearing (and the Court’s May 16 Opinion on the preliminary injunction), the Government fundamentally changed its position.

In its May 25, 2012, motion for reconsideration, the Government put forth the qualified position that plaintiffs’ particular activities, as described at the hearing, if described accurately, if they were independent, and without more, would not subject plaintiffs to military detention under § 1021. The Government did not–and does not–generally agree or anywhere argue that activities protected by the First Amendment could not subject an individual to indefinite military detention under § 1021(b)(2). The First Amendment of the Read more