Posts

Angler 2.0: Brennan Wields His Puppet Strings Differently

As I said earlier, the parallel between the Jo Becker/Scott Shane Angler 2.0 story and the earlier series by Becker and Barton Gellman is hard to miss.

But I’m very interested in how the stories are structured differently. With Angler 1.0, the story was very clearly about Dick Cheney and the methods he used to manipulate Bush into following his advice. Here, the story is really about John Brennan, Obama’s Cheney, portrayed deep in thought and foregrounding Obama in the article’s picture. Indeed, halfway through, the story even gives biographical background on Brennan, the classic “son of Irish immigrants” story, along with Harold Koh’s dubious endorsement of Brennan’s “moral rectitude.”

But instead of telling the story of John Brennan, Obama’s Cheney, the story pitches Obama as the key decision-maker–a storyline Brennan has always been one of the most aggressive pitchmen for, including when he confirmed information on the Anwar al-Awlaki strike he shouldn’t have. In a sense, then, Brennan has done Cheney one better: seed a story of his own power, but sell it as a sign of the President’s steeliness.

The Silent Sources for the Story

I already pointed out how, after presenting unambiguous evidence of Brennan’s past on-the-record lies, the story backed off calling him on it.

But there are other ways in which this story shifts the focus away from Brennan.

A remarkable number of the sources for the story spoke on the record: Tom Donilon, Cameron Munter, Dennis Blair, Bill Daley, Jeh Johnson, Michael Hayden, Jim Jones, Harold Koh, Eric Holder, Michael Leiter, John Rizzo, and John Bellinger. But it’s not until roughly the 3,450th word of a 6,000 word article that Brennan is first quoted–and that’s to largely repeat the pre-emptive lies of his drone speech from last month.

“The purpose of these actions is to mitigate threats to U.S. persons’ lives,” Mr. Brennan said in an interview. “It is the option of last recourse. So the president, and I think all of us here, don’t like the fact that people have to die. And so he wants to make sure that we go through a rigorous checklist: The infeasibility of capture, the certainty of the intelligence base, the imminence of the threat, all of these things.”

That is the only on-the-record direct quote from Brennan in the entire article, in spite of the centrality of Brennan to the story.

And I would bet several of the sources quoted anonymously in the section describing Obama’s method of counting the dead (which still ignores the women and children) are Brennan: “a top White House adviser” describing how sharp Obama was in the face of the first civilian casualties; “a senior administration official” claiming, in the face of credible evidence to the contrary, that the number of civilians killed in drone strikes in Pakistan were in “single digits.”

Note, too, the reference to a memo his campaign national security advisors wrote him.

“Pragmatism over ideology,” his campaign national security team had advised in a memo in March 2008. It was counsel that only reinforced the president’s instincts.

The memo was written not long after Brennan started playing a more central role among Obama’s campaign advisors. But the story makes no mention of his presumed role in it. Further, in describing Jeh Johnson to introduce a quote, the piece notes that he was “a campaign adviser” (it doesn’t say Johnson was also focused on voter protection). But it does not note that Brennan, too, was a key campaign advisor, one with an exclusively national security focus.

Nor does the story note, when it describes how Obama “deployed his legal skills … to preserve trials in civilian courts” it was John Brennan making that case, not the Attorney General.

In other words, in several places in this story, Brennan plays a key role that is downplayed.

The Pro-Drone Narrator

Given that fact, I’m really interested in the several places where the story adopts a pro-drone viewpoint (it does adopt a more critical stance in the narrative voice at the end).

For example, the story claims, in the first part of the story, that the drone strikes “have eviscerated Al Qaeda” without presenting any basis for that claim. This, in spite of the fact that al Qaeda has expanded in Yemen since we’ve started hitting it with drones.

Later, the article uncritically accepts the claim that the drone–regardless of the targeting that goes into using it–is a “precision weapon” that constitutes a rejection of a “false choice between our safety and our ideals.”

The care that Mr. Obama and his counterterrorism chief take in choosing targets, and their reliance on a precision weapon, the drone, reflect his pledge at the outset of his presidency to reject what he called the Bush administration’s “false choice between our safety and our ideals.”

For fucks sake! This article describes how the White House has adopted a “guilt by association” approach to drone targeting. Read more

Yet More White House Involvement in FOIA Responses

As I’ve been writing my series on the Administration’s extensive efforts to hide all mention of what I have decided to call the Gloves Come Off Memorandum of Notification, this passage from Daniel Klaidman’s article on the Administration’s equivocations about revealing information on the Anwar al-Awlaki killing has been nagging me.

Another senior official expressing caution about the plan was Kathryn Ruemmler, the White House counsel. She cautioned that the disclosures could weaken the government’s stance in pending litigation. The New York Times has filed a lawsuit against the Obama administration under the Freedom of Information Act seeking the release of the Justice Department legal opinion in the Awlaki case. (The department has declined to provide the documents requested.)

The suggestion here is that White House Counsel Kathryn Ruemmler didn’t want to affirmatively reveal details about Awlaki’s killing because doing so would mean they’d have to reveal details in the ACLU and NYT’s FOIAs for … the same information.

That never really made sense (though I never dwelt too much on it because the Administration’s stance on secrecy rarely makes sense).

But in the last few days, I’ve been wondering if Ruemmler was thinking not about the drone FOIA–about revealing details of one element authorized by the Gloves Come Off MON–but instead thinking about the MON itself. After all, if the government reveals one (torture) after another (drones) of the programs authorized by the Gloves Come Off MON, then it gets harder and harder to claim the whole MON must remain secret. And remember, still to be litigated in the torture FOIA is the MON itself, in addition to what I believe are references to it in the title of the Tenet memo.

And while this may mean nothing, the government has been stalling on its response to the drone FOIA. Back on April 9, the government asked for 10 more days to respond to the FOIA. Judge Colleen McMahon responded by snipping, “Ok, but dont ask for any more time. If government official can give speeches about this matter without creating security problem, any involved agency can.” Yet in spite of her warning, they asked for an additional month-long extension today.

We write respectfully on behalf of the Department of Justice and the Central Intelligence Agency (collectively, the “Government”) to seek a further extension until May 21, 2012, of the Government’s deadline to file its consolidated motion for summary judgment in these related Freedom of Information Act cases seeking records pertaining to alleged targeted lethal operations directed at U.S. citizens and others affiliated with al Qaeda or other terrorist groups. Attorney General Eric H. Holder, Jr. has personally directed us to seek this additional time to allow the Government to finalize its position with regard to the sensitive national security matters presented in this case.

We are mindful of the Court’s admonition in its April 9, 2012, order that the Government not seek an further extensions of its briefing deadline, and we do not take this request lightly. Given the significance of the matters presented in this case, the Government’s position is being deliberated at the highest level of the Executive Branch. It has become clear that further consultation and discussion at that level of the Executive Branch is necessary before the Government can make its submission to the Court.

Read more

The Guy Who’s Always Right, Harold Koh, Changes His Mind

In her profile of Harold Koh’s flip-flop on drones (and counterterrorism generally), Tara McKelvey shows that Koh joined the Administration with such certitude about his initial position–that drones were assassinations–he pissed everyone off.

“Everybody hated him,” says Cartwright, describing how Koh would rip into him and other people: “He would say, ‘Oh, you military guys, you’re just so stupid.’ ”

One of Koh’s key objections–and one of the obvious weak points in the Administration’s current justification on drones–had to do with the difficulty in showing that drone targets presented an imminent threat.

Koh referred to President Bush as the nation’s “torturer in chief” and told a New York Times reporter in December 2002 that the policy of targeted killings seemed to violate the government’s longstanding ban on assassination: “The question is, what factual showing will demonstrate that they had warlike intentions against us and who sees that evidence before any action is taken?”

But now, after seeing a bunch of classified information that should not change the broad outlines of the law, Koh has decided they’re not extrajudicial killings and assassinations after all. He denies this is a change in his opinion.

“I have never changed my mind,” he says. “Not from before I was in the government—or after.”

Sure, Koh is just one lawyer reviewing these questions, bureaucratically (though not morally, given Koh’s past comments on counterterrorism) a relatively minor one. But McKelvey’s portrait of Koh shows that what has remained unchanged about Koh are not his legal stances, but his certitude that he is correct, whatever his current legal stance.

Compare that with the thoughts of the guy who used to have Koh’s job, William Taft IV.

I ask Taft, “Why does the law matter when everyone thinks something is OK?”

“That is actually a deep question. When a human life is at stake, there needs to be a process for determining that a person can be executed or shot in an armed conflict,” he says. “Otherwise, we will have an individual just deciding that he wants to kill someone.”

“What if it’s the president?” I ask.

“Especially,” said Taft. “He’s the main person who might possibly have this authority, and you’ve got to watch it.”

We have a system that ensures that someone challenges the opinions of those, like Koh, who may be certain but may also be suffering from the tunnel vision of someone seeing the world of classified information our “democratic” government won’t share.  It’s a process that guarantees all the very smart and unwavering in a belief in their own correctness have someone who challenges their certitude.

It’s called due process.

There’s a reason why the people who are certain they’re already right or the people who have unlimited power should not have the ability to approve the killing of someone else with no review. It’s because those people will be least apt to question their own beliefs.

Anonymous DOJ Statement: “Trust Us”

The Senate Judiciary Committee is holding a hearing today to review the results of the Schuelke report on the prosecutorial misconduct in the Ted Stevens case and to entertain the Lisa Murkowski bill requiring disclosure. In response, DOJ submitted a statement for the record, opposing any legislation enforcing its discovery obligations.

When concerns were first raised about the handling of the prosecution of Senator Stevens, the Department immediately conducted an internal review. The Attorney General recognized the importance of ensuring trust and confidence in the work of Department prosecutors and took the extraordinary step of moving to dismiss the case when errors were discovered. Moreover, toensure that the mistakes in the Stevens case would not be repeated, the Attorney General convened a working group to review discovery practices and charged the group with developing recommendations for improving such practices so that errors are minimized. As a result of the working group’s efforts, the Department has taken unprecedented steps, described more fully below, to ensure that prosecutors, agents, and paralegals have the necessary training and resources to fulfill their legal and ethical obligations with respect to discovery in criminal cases. These reforms include a sweeping training curriculum for all federal prosecutors and the requirement–for the first time in the history of the Department of Justice–that every federal prosecutor receive refresher discovery training each year.

In light of these internal reforms, the Department does not believe that legislation is needed to address the problems that came to light in the Stevens prosecution. Such a legislative proposal would upset the careful balance of interests at stake in criminal cases, cause significant harm to victims, witnesses, and law enforcement efforts, and generate substantial and unnecessary litigation that would divert scarce judicial and prosecutorial resources.

In short, DOJ is saying, “trust us. We don’t need a law requiring us to do what case law says we need to.”

Right off the bat, I can think of 5 major problem with this statement:

No one has been held accountable

We are three years past the time when Stevens’ case was thrown out. Yet none of the prosecutors involved have been disciplined in any meaningful way.

No doubt DOJ would say that it will hold prosecutors responsible if and when the Office of Professional Responsibility finds they committed misconduct. But in the interim three years, DOJ as a whole has sent clear messages that it prefers protecting its case to doing anything about misconduct. And–as Chuck Grassley rightly pointed out at the hearing–thus far no one has been held responsible.

This statement may claim DOJ is serious about prosecutorial misconduct. But its actions (and inaction) says the opposite.

Even after this training, discovery problems remain

As the DOJ statement lays out, in response to the Stevens debacle, DOJ rolled out annual training programs for prosecutors to remind them of their discovery obligations.

And yet, last year, Leonie Brinkema found that prosecutors in the Jeff Sterling case had failed to turn over critical evidence about prosecution witnesses–one of the problems with the Stevens prosecution. The prosecutor involved? William Welch, whom Schuelke accused of abdicating his leadership role in the Stevens case (note, DOJ says the CIA is at fault for the late discovery; but Welch is, after all, the prosecutor who bears responsibility for it).

If William Welch can’t even get discovery right after his involvement in this case and, presumably, undergoing the training DOJ promises will fix the problem, then training is not enough to fix the problem.

Eric Holder won’t run DOJ forever

The statement focuses on Holder’s quick decision to dismiss the case against Stevens, as if that, by itself, guards against any similar problems in the future. But before Holder was AG, Michael Mukasey was–and Judge Emmet Sullivan grew so exasperated with Mukasey’s stonewalling on this case, he ordered him to personally respond to questions about the case.

Read more

Does NCTC Have the Minimal Data Security to Guard Its New Not-Terrorist-Terrorist Database?

As I noted here and here, yesterday the Director of National Intelligence and DOJ rolled out new Guidelines allowing the National Counterterrrorism Center to acquire non-terrorist datasets from federal agencies–including US person data–so they can do pattern analysis on those datasets and pass off the resulting data to other agencies.

When intelligence officials wanted to explain to Charlie Savage how this would work, they pointed to a State Department dataset–visa applications–as one dataset NCTC might now access directly.

A person from Yemen applies for a visa and lists an American as a point of contact. There is no sign that either person is a terrorist. Two years later, another person from Yemen applies for a visa and lists the same American, and this second person is a suspected terrorist.

Under the existing system, they said, to discover that the first visa applicant now had a known tie to a suspected terrorist, an analyst would have to ask the State Department to check its database to see if the American’s name had come up on anyone else’s visa application — a step that could be overlooked or cause a delay. Under the new rules, a computer could instantly alert analysts of the connection.

The State Department is, of course, still reportedly recovering from the fact that because of DOD’s lax network security, 250,000 diplomatic cables got liberated for the world to see.

Not surprisingly, then, the new Guidelines appear determined to reassure original dataset owners that their data won’t be compromised by sharing it with NCTC (which can then share it with other elements of the Intelligence Community and even foreign allies). You can tell they’re serious about this, because it’s one of the places they occasionally use “shall” (in other sensitive areas, they use the squishier “will”).

For access to or acquisition of specific datasets, the DNI, or the DNI’s designee, shall collaborate with the data provider to identify any legal constraints, operational considerations, privacy or civil rights or civil liberties concerns and protections, or other issues, and to develop appropriate Terms and Conditions that will govern NCTC’s access to or acquisition of datasets under these guidelines.

[snip]

In addition to the [general requirements laid out for sharing this data], at the time when NCTC acquires a new dataset or a new portion of a dataset, the Director of NCTC shall determine, in writing, whether enhanced safeguards, procedures, and oversight mechanisms are needed.

Though this bold approach almost immediately breaks down, as the Guidelines not only revert to “will,” but–worse–dig out the passive voice when describing the data transfer.

Measures will be put into place to ensure that the dataset is received and stored in a manner to prevent unauthorized access and use prior to the completion of replication.

And when the Guidelines get into specifics, they use that passive “will” again.

Access to these datasets will be monitored, recorded, and audited. This includes tracking of logons and logoffs, file and object manipulation, and changes, and queries executed, in according with audit and monitoring standards applicable to the Intelligence Community.

Who will (“shall”) implement these data security measures? What if he or she fails to do so adequately?

It’s a really, really important question because–as this year’s intelligence authorizations make clear, the Intelligence Community does not yet have insider threat detection–the kind of security that would permit these audits–and they’re not going to get it until 18 months from now. Hell, they’re not even going to start getting it until 6 months from now!

(a) Initial Operating Capability.–Not later than October 1, 2012, the Director of National Intelligence shall establish an initial operating capability for an effective automated insider threat detection program for the information resources in each element of the intelligence community in order to detect unauthorized access to, or use or transmission of, classified intelligence.

Read more

The National Counterterrorism Center Just Declared All of Us Domestic Terrorists

I’m going to have a series of posts on the new National Counterterrorism Center data sharing guidelines. As a reminder, the whole point of these guidelines is to allow the NCTC to obtain information on US persons, dump it into their datamining, and then ultimately pass it on. In this, I’ll show how, by magic of cynical bureaucracy, the government is about to turn non-terrorist data into terrorist data.

Here’s how that trick is accomplished rhetorically. In the Background section (and in one or two other places), the document includes this language to legally justify throwing US person data into big databases to be data mined. It starts by laying out NCTC’s data mandate:

[NCTC] shall “serve as the primary organization in the United States for analyzing and integrating all intelligence possessed or acquired by the United States Government pertaining to terrorism and counterterrorism, excepting intelligence pertaining exclusively to domestic terrorists and domestic counterterrorism.

It blathers on about how NCTC also has the responsibility to request information and pass it on. This is the legal language they’re going to translate to mean the opposite of what it says.

Jumping ahead a bit, the guidelines acknowledges that NCTC is only supposed to have access, if needed, to domestic terrorism information.

In the National Security Act of 1947, as amended, Congress recognized that NCTC must have access to a broader range of information than it has primary authority to analyze and integrate if it is to achieve its missions. The Act thus provides that NCTC “may, … receive intelligence pertaining exclusively to domestic terrorism from any Federal, State, or local government or other source necessary to fulfill its responsibility and retain and disseminate intelligence.” [my emphasis]

See that? It can have all the foreign terrorism information, and then if it needs to, it can have the domestic terrorism information.

Now, going back a few lines, it takes this authority–“pertaining exclusively to domestic terrorism”–and uses it to get … everything.

NCTC’s analytic and integration efforts … at times require it to access and review datasets that are identified as including non-terrorism information in order to identify and obtain “terrorism information,” as defined in section 1016 of the Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004, as amended. “Non-terrorism information” for purposes of these Guidelines includes information pertaining exclusively to domestic terrorism, as well as information maintained by other executive departments and agencies that has not been identified as “terrorism information” as defined by IRTPA. [my emphasis]

Note that bolded section is not a citation from existing law. It is, instead, NCTC turning NCTC’s authority to sometimes get domestic terrorism information into authority to get any dataset maintained by any executive agency that NCTC believes might include some information that might be terrorism information.

Those of us in the US Government’s tax, social security, HHS, immigration, military, and other federal databases? We’ve all, by bureaucratic magic, been turned into domestic terrorists.

Now, NCTC seems to understand what a grasp this is, so it deploys one more rhetorical effort, this time noting that the Director of National Intelligence–to whom NCTC reports–also gets access to all national security intelligence.

[The National Security Act] provides that “[u]nless otherwise directed by the President, the Director of National Intelligence shall have access to all national intelligence and intelligence related to hte national security which is collected by any federal department, agency, or other entity…”

So in addition to all of us in government databases–that is, all of us–being deemed domestic terrorists, the data the government keeps to track our travel, our taxes, our benefits, our identity? It just got transformed from bureaucratic data into national security intelligence.

We are all, now, first and foremost potential terrorists now. Only after NCTC destroys our data in five years (if they don’t find some excuse to keep it before then) will we become citizens again.

Did GAO Deem Secret PATRIOT a Waste of Time?

I noticed the same thing Charlie Savage did in this letter from Senators Wyden and Udall to Eric Holder complaining about the government’s secret interpretation of the PATRIOT Act. The Senators suggest that the secret program is not very useful.

We would also note that in recent months we have grown increasingly skeptical about the actual value of the “intelligence collection operation” discussed in the Justice Department’s recent court filing regarding the pending lawsuit. This has come as a surprise to us, as we were initially inclined to take the executive branch’s assertions about the importance of this “operation” at face value. We will provide more detail about this skepticism in a classified correspondence.

Their new-found skepticism about the program is rather interesting given that GAO recently completed a first-ever assessment of the FBI’s counterterrorism programs.

Thus, the Federal Bureau of Investigation had refused for years to submit to GAO oversight of its counterterrorism programs.  The Bureau contended that GAO had no authority to review the programs because they were funded through the intelligence budget.  Moreover, the FBI told Sen. Charles Grassley that the Office of Legal Counsel had ratified that position and supported its refusal to cooperate with GAO.

But that is now in the past.  The GAO recently completed a classified assessment of FBI counterterrorism programs with full cooperation from the FBI.  A public version of the report is expected to be released sometime in the spring.

I presume any GAO conclusions about the Secret PATRIOT program are just one factor contributing to Wyden and Udall’s skepticism. After all, Holder must know about the results of the GAO report by now, particularly if the document is being declassified (since that would require FBI’s involvement).

Nevertheless, it would be rather interesting if the long fight for real congressional oversight of intelligence programs led to increased skepticism about executive branch claims so quickly.

Eric Holder Suggests Scary Iran Plot Was Legal

I’m sure that Eric Holder didn’t mean to suggest that the assassination plots purportedly planned by Iran’s Quds Force and Manssor Arbabsiar with the assistance of a DEA informant targeting the Saudi Ambassador to the US, Adel al-Jubeir, as well as Israeli and Saudi figures in Argentina, are legal.

But given the debate between the ACLU’s Anthony Romero and Jack Goldsmith over whether assassinations in this country would be legal, I wanted to look at what he did say.

In their debate on WBUR’s On Point, Romero said something to the effect of Holder’s argument for targeted killing would serve as justification for other countries to target their own “terrorists” in our country. Goldsmith objected, saying such assassinations would only be legal in failed states (implicitly, like Yemen and Pakistan) where a state was unable to apprehend such a figure.

That’s not what Holder said. Here’s what he did say:

Over the last three years alone, al Qaeda and its associates have directed several attacks – fortunately, unsuccessful – against us from countries other than Afghanistan.   Our government has both a responsibility and a right to protect this nation and its people from such threats.

This does not mean that we can use military force whenever or wherever we want.   International legal principles, including respect for another nation’s sovereignty, constrain our ability to act unilaterally.   But the use of force in foreign territory would be consistent with these international legal principles if conducted, for example, with the consent of the nation involved – or after a determination that the nation is unable or unwilling to deal effectively with a threat to the United States.

Furthermore, it is entirely lawful – under both United States law and applicable law of war principles – to target specific senior operational leaders of al Qaeda and associated forces.  [my emphasis]

Strip this passage of its American exceptionalism, and here’s what it justifies: Read more

The Senate Judiciary Committee Hasn’t Seen the Targeted Killing Memo Either

I guess it should be no surprise that Pat Leahy, the Chair of the Senate Judiciary Committee, hasn’t seen the memo authorizing the killing of Anwar al-Awlaki. After all, if the full Senate Intelligence Committee–which is supposed to exercise oversight over covert operations like that assassination–hasn’t seen the memo, then it’d be unlikely the Administration would share it with Leahy, much less the full committee.

But Charlie Savage confirms that Leahy has not seen it (while also catching Eric Holder giving a response far more comprehensive than the Glomar response the NYT and ACLU have received in FOIA requests).

For months, the Obama administration has refused to confirm or deny the existence of a Justice Department memorandum that approved the targeted killing of a United States citizen, Anwar al-Awlaki, who died in a drone strike in Yemen last September.

But in an exchange at a budget hearing on Thursday, Senator Patrick J. Leahy and Attorney General Eric H. Holder Jr. came close to implicitly conceding that there is indeed such a memo, which was written by the Justice Department’s Office of Legal Counsel.

Mr. Leahy, a Vermont Democrat who is chairman of the Senate Judiciary Committee, brought up a conversation he said he and Mr. Holder had earlier this week about a speech on “drones and targeting of U.S. citizens” that the attorney general delivered on Monday.

“I still want to see the Office of Legal Counsel memorandum and I would urge you to keep working on that,” Mr. Leahy said to Mr. Holder. “I realize that’s a matter of some debate within the administration but …”

The senator then paused, smiled and laughed. Mr. Holder responded by nodding and said, chuckling, “That would be true.”

Say, Pat?

You were in an Appropriations Committee hearing.

One way–the only proven way–of forcing an Administration to act like it’s still a democracy is to withhold funds. Attach rules like, “DOJ may not authorize the targeted killing of US citizens unless it has shared the legal argument with its oversight committees.” Or, “DOJ may not authorize the targeted killing of US citizens without due process including judicial review.”

Unless you actually make the Administration act like they’re in a democracy, we’re all just pretending. And an Appropriations meeting is the perfect time to do such things.

The Answer, Robert Mueller, Is “Yes, DOJ Does Believe It Could Kill a Citizen in the US”

FBI Director Robert Mueller tried to avoid answering whether or not we can target US citizens in the United States.

FBI Director Robert Mueller on Wednesday said he would have to go back and check with the Department of Justice whether Attorney General Eric Holder’s “three criteria” for the targeted killing of Americans also applied to Americans inside the U.S.

Pressed by House lawmakers about a recent speech in which Holder described the legal justification for assassination, Mueller, who was attending a hearing on his agency’s budget, did not say without qualification that the three criteria could not be applied inside the U.S.

“I have to go back. Uh, I’m not certain whether that was addressed or not,” Mueller said when asked by Rep. Kevin Yoder, R-Kan., about a distinction between domestic and foreign targeting

Yoder followed up asking whether “from a historical perspective,” the federal government has “the ability to kill a U.S. citizen on United States soil or just overseas.”

“I’m going to defer that to others in the Department of Justice,” Mueller replied.

When Fox asked DOJ for clarification, a spokesperson said the framework as laid out by Holder applied abroad, and she couldn’t imagine a scenario in which it would happen domestically.

But of course, everyone is simply dodging. DOJ knows well their legal logic, such as it is, would permit the due process free killing of an American in America. After all, Eric Holder claimed in his speech that Congress had not limited the geographic scope of the government’s authority to use force.

Our legal authority is not limited to the battlefields in Afghanistan.   Indeed, neither Congress nor our federal courts has limited the geographic scope of our ability to use force to the current conflict in Afghanistan.   We are at war with a stateless enemy, prone to shifting operations from country to country.

Jeh Johnson said the same in a recent speech, specifically in the context of domestic authorities.

Third: there is nothing in the wording of the 2001 AUMF or its legislative history that restricts this statutory authority to the “hot” battlefields of Afghanistan.  Afghanistan was plainly the focus when the authorization was enacted in September 2001, but the AUMF authorized the use of necessary and appropriate force against the organizations and persons connected to the September 11th attacks – al Qaeda and the Taliban — without a geographic limitation.

And on Monday, when Holder objected to calling assassinations assassinations, he did not limit their claimed legality to overseas locales.

Here, for the reasons I have given, the U.S. government’s use of lethal force in self defense against a leader of al Qaeda or an associated force who presents an imminent threat of violent attack would not be unlawful — and therefore would not violate the Executive Order banning assassination or criminal statutes.

But long before Johnson and Harris made these arguments it became clear that the legal analysis had to permit the targeting of American citizens within the US.

That’s because the legal case cited to get from capturing a US citizen (based on the precedent of Hamdi) to killing him is Scott v. Harris, an entirely domestic case.

It also cited several other Supreme Court precedents, like a 2007 case involving a high-speed chase and a 1985 case involving the shooting of a fleeing suspect, finding that it was constitutional for the police to take actions that put a suspect in serious risk of death in order to curtail an imminent risk to innocent people.

You can’t very well argue that, having determined a US citizen to be a lawful target under the AUMF and then claimed, as they did with Awlaki, that they had no way of capturing him safely, they couldn’t assassinate him in the US, too. If a police officer can use deadly force to stop a high speed car chase, then counterterrorism officials would not hesitate to use whatever means to kill a terrorist.