Posts

Bipartisan Agreement: Garbage into Intel Oversight, Garbage Out

House Intelligence Chair Mike Rogers made headlines on Monday by responding to a last ditch Dennis Kucinich call for more review of drone strikes by claiming that public reports on civilian casualties are “wildly wrong.”

“I think that you would be shocked and stunned how wrong those public reports are about civilian casualties,” Rogers said on the House floor.

“Those reports are wrong. They are not just wrong, they are wildly wrong. And I do believe that people use those reports for their own political purposes outside of the country to try to put pressure on the United States,” Rogers said.

And because House Intel Ranking Member Dutch Ruppersberger joined Rogers’ claims, some have taken this as magic bipartisan proof that the many indices that have done independent reviews of intelligence community claims about civilian drone casualties are wrong.

The ranking Democrat on the Intelligence Committee, Rep. Dutch Ruppersberger (D-Md.), said he agreed with Rogers’s assessment, but also did not reveal anything more specific.

“Unfortunately, there are some casualties, very minor,” he said. “What you read in the media is usually not what the facts are.”

I have already noted what happens when Gang of Four members who purportedly serve as the foundation of our oversight over the intelligence community turn into talking heads defending it.

Ruppersberger’s inconsistency on this point reminded me that after the super secret drone killing of some American citizens last year, the Gang of Four all weighed in to assure Americans that Anwar al-Awlaki’s death was “legitimate” because there had been “a process.” The Gang’s loquacity contrasted sharply with the Administration’s silence on the very same issue, one reiterated since in the Administration’s Glomar claims about topics the Gang of Four feels welcome to discuss. That contrast is all the more troubling given that Ruppersberger admitted that the Gang of Four does not know who is on the Kill List (and therefore didn’t really know whether the killing of Samir Khan was “legitimate”).

It’s all very neat. Not only does the Gang of Four enjoy immunity from prosecution under the Speech or Debate Clause. But they were–and presumably are–serving as journalistic sources on topics about which they aren’t (though legally should be) fully informed.

Last week Julian Sanchez and Mike Masnick rehashed an earlier version of this, when the Bush Administration armed the Intelligence Committees with talking points that would reinforce their lies that the Terrorist Surveillance Program constituted the entirety of the illegal wiretap program.

Note what that does to the whole question of “legitimacy.” The Gang of Four only knows what Administration and agency officials tell them.  Yet, even in spite of potential and real limits to their knowledge of a program (and a history of deliberately misleading briefings on such topics), they will weigh in and declare something “legitimate.”

But this case is all the more interesting because Kucinich was specifically pushing his colleagues–these overseers–to question their knowledge on this front.

Look at the consequences of civilian casualties … raise questions about the information that’s being given to you,” Kucinich said.

That is, Kucinich was raising a process question–one that goes to the heart of the cognitive problem intelligence overseers have, which is that they rely exclusively on those they are purportedly overseeing for the knowledge they use to exercise that oversight.

And rather than telling us what the real tally was, or even explaining how he knew his knowledge was better than that of people who have sent independent journalists to double check tallies, Rogers simply insisted that he knows best.

Based, by all appearances, solely on the very narrow information those he oversees choose to give him.

Confirmed: Dutch Ruppersberger, NSA Intercepts, and Deep Hypocrisy on Leaks

WSJ has a tick-tock of how the talking points on Benghazi developed. It confirms two of the things I noted yesterday. The Intelligence Community developed the talking points behind the pseudo-scandal pursuant to a request from Dutch Ruppersberger.

Later on Sept. 13, then-director David Petraeus presented the CIA’s initial findings to the Senate Intelligence Committee. His conclusions mirrored that morning’s intelligence reporting. He said the attack began “spontaneously” following the protest in Cairo over the video. He also discussed the reports of involvement of Ansar al-Sharia and the al Qaeda affiliate and called the assault a terrorist attack.

Mr. Petraeus presented the same findings the next day to the House intelligence panel, whose top Democrat, Maryland Rep. C.A. “Dutch” Ruppersberger, requested unclassified talking points for lawmakers to use when speaking about the attack.

And the IC decide to withhold the information about a tie to AQIM in part because they were NSA intercepts.

After rounds of bureaucratic exchanges, the CIA officials seeking to remove al Qaeda won the argument, and officials agreed to retain the umbrella term “extremists” but drop the mention of al Qaeda.

The term represented a hedge the CIA used because the attack’s links to al Qaeda had yet to be confirmed. This argument was that including the name would have required additional wording to indicate uncertainty about the al Qaeda links—language that could have opened additional avenues for misinterpretation.

The information was derived from what was seen as a “tenuous” source—intercepts of phone calls between suspected militants saying that al Qaeda-linked militants took part in the attack. The evidence was deemed by some of the intelligence officials to be inconclusive.

Eliminating references to al Qaeda also would protect sources, some of the officials argued. With so few suspected al Qaeda-affiliated militants taking part in the attacks, officials were concerned that fingering al Qaeda in official information would tip them off that they were being monitored. Read more

When Overseers Become Talking Heads

The entire Benghazi pseudo-scandal can reportedly be traced back to House Intelligence Committee Ranking Member Dutch Ruppersberger’s request for talking points he could use to respond to journalists.

Three days after the lethal attack on the American Mission in Benghazi, Libya, Representative C. A. Dutch Ruppersberger of Maryland, the top Democrat on the House Intelligence Committee, asked intelligence agencies to write up some unclassified talking points on the episode. Reporters were besieging him and other legislators for comment, and he did not want to misstate facts or disclose classified information.

More than 10 weeks later, the four pallid sentences that intelligence analysts cautiously delivered are the unlikely center of a quintessential Washington drama, in which a genuine tragedy has been fed into the meat grinder of election-year politics.

Before I get too far, remember that Ruppersberger (D-NSA) is one of the geniuses who believe the way to stem leaks is to prevent intelligence professionals from giving background briefings. Remember, too, that the talking points that have caused so much trouble were almost certainly tweaked to protect the intercepts Ruppersberger’s constituent, the NSA, had collected. Nevertheless, this guy, who presumably supports the principle of not telling militants we’ve got their phone tapped, and who thinks people with a more developed understanding of sensitivities around intelligence should not be able to brief the press directly, had to have his talking points so he could talk to the press himself.

Ruppersberger’s inconsistency on this point reminded me that after the super secret drone killing of some American citizens last year, the Gang of Four all weighed in to assure Americans that Anwar al-Awlaki’s death was “legitimate” because there had been “a process.” The Gang’s loquacity contrasted sharply with the Administration’s silence on the very same issue, one reiterated since in the Administration’s Glomar claims about topics the Gang of Four feels welcome to discuss. That contrast is all the more troubling given that Ruppersberger admitted that the Gang of Four does not know who is on the Kill List (and therefore didn’t really know whether the killing of Samir Khan was “legitimate”).

It’s all very neat. Not only does the Gang of Four enjoy immunity from prosecution under the Speech or Debate Clause. But they were–and presumably are–serving as journalistic sources on topics about which they aren’t (though legally should be) fully informed.

Last week Julian Sanchez and Mike Masnick rehashed an earlier version of this, when the Bush Administration armed the Intelligence Committees with talking points that would reinforce their lies that the Terrorist Surveillance Program constituted the entirety of the illegal wiretap program.

Note what that does to the whole question of “legitimacy.” The Gang of Four only knows what Administration and agency officials tell them.  Yet, even in spite of potential and real limits to their knowledge of a program (and a history of deliberately misleading briefings on such topics), they will weigh in and declare something “legitimate.”

We have a problem in this country with the way our intelligence community communicates publicly (see Dan Drezner and Nada Bakos addressing different aspects of this problem.)

But the solution clearly is not the one the national security establishment increasingly appears to be adopting: to turn the four men and women who purportedly exercise the only oversight of the most sensitive programs into talking heads. That process almost certainly ensures incomplete briefing of these “overseers.” Worse, still, it guarantees a kind of complicity that makes the overseers-turned-talking-heads useless for oversight.

WIth their push to limit background briefings, the Gang of Four have raised their own stock as journalistic sources. But they’ve also further gutted the inadequate oversight we’ve got over intelligence.

Failed Overseers Prepare to Legislate Away Successful Oversight

Before I talk about the Gang of Four’s proposed ideas to crack down on leaks, let’s review what a crop of oversight failures these folks are.

The only one of the Gang of Four who has stayed out of the media of late–Dutch Ruppersberger–has instead been helping Mike Rogers push reauthorization of the FISA Amendments Act through the House Intelligence Committee with no improvements and no dissents. In other words, Ruppersberger has delivered for his constituent–the NSA–in spite of the evidence the government is wiretapping those pesky little American citizens Ruppersberger should be serving.

Then there’s Rogers himself, who has been blathering to the press about how these leaks are the most damaging in history. He supported such a claim, among other ways, by suggesting people (presumably AQAP) would assume for the first time we (or the Saudis or the Brits) have infiltrators in their network.

Some articles within this “parade” of leaks, Rogers said late last week, “included at least the speculation of human source networks that now — just out of good counterintelligence activities — they’ll believe is real, even if its not real. It causes huge problems.”

Which would assume Rogers is unaware that the last time a Saudi infiltrator tipped us off to a plot, that got exposed too (as did at least one more of their assets). And it would equally assume Rogers is unaware that Mustafa Alani and other “diplomatic sources” are out there claiming the Saudis have one agent or informant infiltrated into AQAP regions for every 850 Yemeni citizens.

In short, Rogers’ claim is not credible in the least.

Though Rogers seems most worried that the confirmation–or rather, reconfirmation–that the US and Israel are behind StuxNet might lead hackers to try similar tricks on us and/or that the code–which already escaped–might escape.

Rogers, who would not confirm any specific reports, said that mere speculation about a U.S. cyberattack against Iran has enabled bad actors. The attack would apparently be the first time the U.S. used cyberweapons in a sustained effort to damage another country’s infrastructure. Other nations, or even terrorists or hackers, might now believe they have justification for their own cyberattacks, Rogers said.

This could have devastating effects, Rogers warned. For instance, he said, a cyberattack could unintentionally spread beyond its intended target and get out of control because the Web is so interconnected. “It is very difficult to contain your attack,” he said. “It takes on a very high degree of sophistication to reach out and touch one thing…. That’s why this stuff is so concerning to me.”

Really, though, Rogers is blaming the wrong people. He should be blaming the geniuses who embraced such a tactic and–if it is true the Israelis loosed the beast intentionally–the Israelis most of all.

And while Rogers was not a Gang of Four member when things started going haywire, his colleague in witch hunts–Dianne Feinstein–was. As I’ve already noted, one of the problems with StuxNet is that those, like DiFi, who had an opportunity to caution the spooks either didn’t have enough information to do so–or had enough information but did not do their job.The problem, then, is not leaks; it’s inadequacy of oversight.

In short, Rogers and Ruppersberger and Chambliss ought to be complaining about DiFi, not collaborating with her in thwarting oversight.

Finally, Chambliss, the boss of the likely sources out there bragging about how unqualified they are to conduct intelligence oversight, even while boasting about the cool videogames they get to watch in SCIFs, appears to want to toot his horn rather the conduct oversight.

Which brings me back to the point of this post, before I got distracted talking about how badly the folks offering these “solutions” to leaks are at oversight.

Their solutions:

Discussions are ongoing over just how stringent new provisions should be as the Senate targets leakers in its upcoming Intelligence Authorization bill, according to a government source.

Read more

Gang Warfare to Protect Israel’s Secrets

Easily the most overlooked line in David Sanger’s story on StuxNet is this one:

Mr. Obama concluded that when it came to stopping Iran, the United States had no other choice.

If Olympic Games failed, he told aides, there would be no time for sanctions and diplomacy with Iran to work. Israel could carry out a conventional military attack, prompting a conflict that could spread throughout the region.

It’s a sentiment he repeats in this worthwhile interview:

FP: There haven’t been thoughtful discussions about the consequences or the ethics or the international legal ramifications of this approach. Let’s imagine for a moment that you’re [Iranian President] Mahmoud Ahmadinejad and you are confronted with this. Isn’t your first reaction, “How is them blowing up Natanz with a code any different from them blowing up Natanz with a bomb? And doesn’t that justify military retaliation?”

DS: Blowing it up with computer code, rather than bombs, is different in one big respect: It very hard for the Iranians in real time to know who the attacker was, and thus to make a public case for retaliating. It takes a long time to figure out where a cyber attack comes from.

That was a big reason for the U.S. and Israel to attack Natanz in this way. But it wasn’t the only reason, at least from the American perspective. One of the main driving forces for Olympic Games was to so wrap the Israelis into a project that could cripple Natanz in a subtle way that Israel would see less of a motivation to go about a traditional bombing, one that could plunge the Middle East into a another war. [my emphasis]

A key purpose of StuxNet, according to Sanger, was not just to set back the Iranian nuke program. Rather, it was to set back the nuke program in such a way as to set back Israel’s push for war against Iran.

With that in mind, consider the way the article blamed the Israelis for letting StuxNet escape.

An error in the code, they said, had led it to spread to an engineer’s computer when it was hooked up to the centrifuges. When the engineer left Natanz and connected the computer to the Internet, the American- and Israeli-made bug failed to recognize that its environment had changed. It began replicating itself all around the world. Suddenly, the code was exposed, though its intent would not be clear, at least to ordinary computer users.

“We think there was a modification done by the Israelis,” one of the briefers told the president, “and we don’t know if we were part of that activity.”

Mr. Obama, according to officials in the room, asked a series of questions, fearful that the code could do damage outside the plant. The answers came back in hedged terms. Mr. Biden fumed. “It’s got to be the Israelis,” he said. “They went too far.”

After having explained that the whole point of StuxNet was to stop the Israelis from bombing Iran, the article then goes on to say that what alerted the Iranians to StuxNet’s presence in their systems–and effectively gave a very dangerous weapon to hackers around the world–was an Israeli modification to the code.

The Israelis went too far.

Those details are, IMO, some of the most interesting new details, not included the last time David Sanger confirmed the US and Israel were behind StuxNet on the front page of the NYT.

How very telling, then, that of all the highly revealing articles that have come out during this Administration–of all of the highly revealing articles that have come out in general, including Sanger’s earlier one revealing some of the very same details–Congress is going apeshit over this one.

Read more

Are the Chinese Spying on Our Spying?

Danger Room reports that our nation’s spooks have moved beyond their concern about Chinese chips and other “counterfeit” (read, sabotaged) parts in war toys to grow concerned about Chinese parts in our telecom system.

Rep. Mike Rogers (R-Mich.), chairman of the House Permanent Select Committee on Intelligence (HPSCI), and the committee’s top Democrat, Rep. Dutch Ruppersberger, announced on Thursday that their committee will look into the potential for Chinese telecommunications equipment — like commercial servers, routers and switches — to help China spy on the United States.

“The investigation is to determine the extent to which these companies provide the Chinese government an opportunity for greater foreign espionage, threaten our critical infrastructure, and further the opportunity for Chinese economic espionage,” Rogers tells Danger Room. “Through this investigation we will come to a better understanding of the threat so we are better prepared to mitigate.”

The concern is that Chinese companies could tamper with equipment for use in civilian communications infrastructure, allowing China to insert Trojan horses that eavesdrop on targets in the United States. Chinese companies already make a number of telecommunications products sold in the U.S., but several have bowed out of deals to acquire large stakes in American telecom companies after facing U.S. government pressure.

Rogers says the investigation is an outgrowth of a review he commissioned shortly after becoming chairman of the committee in January.

Now, I don’t think Rogers and Ruppersberger are wrong to be concerned. The Chinese have every incentive to steal what they can from us, and their country’s corporations have always seemed willing to help out.

But I wonder if the concern doesn’t go beyond just China’s ability to affirmatively spy on select targets in the US and the rest of the world. To what degree are Rogers and Ruppersberger–the latter of whom represents the NSA–worried about the US monopoly on wiretapping switches? And is it possible that China will be able to create bottlenecks–as we did in the 1990s–to make it easier to wiretap? To what degree has China’s ascendance threatened the Anglo-American superiority in wiretapping?

If the Legal Case for Killing Awlaki Is So Sound, Then Why Maintain Presidential Plausible Deniability?

Glenn Greenwald has another worthwhile post on Democrats’ silence about the Anwar al-Awlaki assassination. But i wanted to push back against one thing he said. After quoting from this Mark Hosenball story on the kill list approval process, Glenn said,

So a panel operating out of the White House — that meets in total secrecy, with no law or rules governing what it can do or how it operates — is empowered to place American citizens on a list to be killed, which (by some process nobody knows) eventually makes its way to the President, who is the final Decider.

But that’s not actually what Hosenball wrote. On the contrary, Hosenball emphasized that Obama’s role in the kill list approval process remains unclear.

The role of the president in ordering or ratifying a decision to target a citizen is fuzzy. White House spokesman Tommy Vietor declined to discuss anything about the process.

[snip]

Other officials said the role of the president in the process was murkier than what Ruppersberger described.

They said targeting recommendations are drawn up by a committee of mid-level National Security Council and agency officials. Their recommendations are then sent to the panel of NSC “principals,” meaning Cabinet secretaries and intelligence unit chiefs, for approval. The panel of principals could have different memberships when considering different operational issues, they said.

[snip]

Several officials said that when Awlaki became the first American put on the target list, Obama was not required personally to approve the targeting of a person. But one official said Obama would be notified of the principals’ decision. If he objected, the decision would be nullified, the official said.

A former official said one of the reasons for making senior officials principally responsible for nominating Americans for the target list was to “protect” the president.

And the Administration has tried to keep Obama’s role murky. In addition to the Vietor refusal to discuss the issue Hosenball notes, Obama very pointedly refused to answer whether he had ordered Awlaki’s killing when asked by Michael Smerconish.

Michael Smerconish: Now comes the news that we’ve taken out Anwar al-Awlaki. Did you give that order?

Obama: I can’t talk about the operational details, Michael. [my emphasis]

This is, sadly, another way that the Awlaki assassination is like Bush’s torture program. There, too, the Administration built in plausible deniability for the President. The initial authorization for the torture–Bush’s September 17, 2001 Finding authorizing the capture and detention of al Qaeda figures–didn’t mention torture at all. The Administration twice refused to tell Jane Harman whether the President had authorized the program. The White House only gave more formal Presidential torture authorization in 2003 and again in 2004 (though even there, it attempted to avoid doing so).

Sure, Bush ultimately boasted that he had approved torture. But for years, the Administration sustained the President’s plausible deniability for the illegal program.

The Obama White House efforts to do the same with Awalaki’s death are all the more striking given that it has not been so coy about Obama’s involvement in ordering hits in the past, most notably when we killed Osama bin Laden. Indeed, they worked hard to foster the narrative of Obama making the difficult decision to order the SEAL operation. And here’s what a Senior Administration Official who may be named John Brennan said the day after the Osama bin Laden killing regarding Obama’s role.

In the middle of March, the President began a series of National Security Council meetings that he chaired to pursue again the intelligence basis and to develop courses of action to bring justice to Osama bin Laden.  Indeed, by my count, the President chaired no fewer than five National Security Council meetings on the topic from the middle of March — March 14th, March 29th, April 12th, April 19th, and April 28th.  And the President gave the final order to pursue the operation that he announced to the nation tonight on the morning — Friday morning of April 29th. [my emphasis]

With OBL, the Administration proudly highlighted Obama’s role in the decision-making process; here, they’re working hard to obscure it.

As with the torture program, that suggests the Administration may believe it important for the President to have plausible deniability about this killing.