Posts

The Government Doesn’t Want to Talk about Collecting Domestic Communications under FAA

On Friday, the government appealed the 2nd Circuit’s decision that Amnesty International and other NGOs and individuals have standing to challenge the FISA Amendments Act. I’ll have a post on the implications of their substantive argument shortly. But in the meantime, I wanted to note what they’re not even addressing.

The image to the left is a fragment of the government’s references to statutes and regulation mentioned in its brief; it’s the part of the list referring to the part of the FAA in question. As you can see, it almost–but not quite–lists every clause of the law.

One clause notably missing from the almost-sequential list above is 1881a(b)(4), which reads,

[An acquisition authorized under subsection (a)] may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States;

And while it mentions clauses that refer back to this restriction (for example, 1881a(c)(1), 1881a(d), 1881a(g)(2)(A)(i), etc), it never goes back and includes this language–the requirement that the government not intentionally acquire communications that are located entirely within the US–in its argument. (There are other clauses the brief ignores, a number of which pertain to oversight of the certifications the government has made; I may return to these at a future time.)

Or, to put it another way, the government never admits that the FAA permits the purportedly unintentional collection of entirely domestic communication.

And yet that is a part of this lawsuit. The original complaint in this suit invoked this clause:

An acquisition under section 702(a) may not … “intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States

[snip]

Moreover, the Attorney General and the DNI may acquire purely domestic communications as long as there is uncertainly about the location of one party to the communications.

And the 2nd Circuit opinion (authored by Gerard Lynch) referenced this clause:

“Targeting procedures” are procedures designed to ensure that an authorized acquisition is “limited to targeting persons reasonably believed to be located outside the United States,” and is designed to “prevent the intentional acquisition of any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States.”

[snip]

In addition, the certification must attest that the surveillance complies with statutory limitations providing that it:

[snip]

(4) may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States;

[snip]

Under the FAA, in contrast to the preexisting FISA scheme, the FISC may not monitor compliance with the targeting and minimization procedures on an ongoing basis. Instead, that duty falls to the AG and DNI, who must submit their assessments to the FISC, as well as the congressional intelligence committees and the Senate and House Judiciary Committees.

[snip]

But the government has not asserted, and the statute does not clearly state, that the FISC may rely on these assessments to revoke earlier surveillance authorizations.

Now, to some degree, the government might argue it ignored the clause prohibiting intentional–but not accidental–targeting of domestic communications because the plaintiffs’ primary basis for establishing standing is their frequent communication with likely targets overseas. As I’ll show, the government wants to make this case about a particular definition of a target, and key to that argument is a claim that it is impossible for the plaintiffs to be targets.

Yet therein lies one of the key problems with their argument, given that 1881a(b)(4) only prohibits the plaintiffs from being intentional targets; the FAA very pointedly did not prohibit the government from keeping US person information it “unintentionally” collected. In fact, Mike McConnell and Michael Mukasey started issuing veto threats when Russ Feingold tried to restrict the ongoing use of domestic communications identified as such after the fact.

Finally, in the one case that approved this kind of collection (though under the Protect America Act, not the FAA) used targeting procedures to substitute for particularity required under the Fourth Amendment. Under PAA, those procedures were not mapped out by law; under FAA they are, partly in the clause the government wants to ignore.

And yet, remarkably, the government doesn’t want that clause to be part of its discussion with SCOTUS. Seeing as how even the FISA Court of Review finds that substitute for particularity–the targeting procedures–to be a key part of compliance with the Fourth Amendment, you’d think that would be relevant.

What WAS Our Sentinel Drone Surveilling in Iran?

Kevin Drum captures where the state of the reporting on the story that the MEK, backed by Israel, is responsible for the assassinations of Iranian scientists and the implication that that makes Israel a state that sponsors terrorism. Drum writes,

Are the attacks on Iran terrorism? Of course they are. If they’re not, we might as well give up on even trying to define the word. But is it acceptable just because the other side is using it? Of course it’s —

But wait a second. Is it? For all practical purposes, Iran and Israel are at war; they’ve been at war for a long time; and both sides have tacitly agreed that it will primarily be a war carried out nonconventionally. The alternative is what we did in Afghanistan and Iraq: a full-scale conventional attack.

Is that a superior alternative? To say the least, I’m a little hard pressed to say it is. But the alternative is not to fight back at all. Given the current state of the art in human nature, that’s really not in the cards.

Still: is it terrorism? Yes. Do both sides use it? Yes. Is this, in many cases, the future of warfare? Probably yes.

The only question I’d raise is a chicken and an egg thing. Who attacked whom first? And if Hezbollah is your proxy to say that Iran did, then what was the 2006 invasion of Lebanon about?

Speaking of chickens and eggs, though, there’s something left out of this formulation. The US.

As I noted back in December, the reporting of David Sanger (whose beat seems to be precisely the intersection of US and Israeli covert ops) seems to suggest that our drones have been surveilling now-dead Iranian scientists.

So David Sanger, the (American and Israeli) intelligence community’s chief mouthpiece to boast about their latest victories against Iran, by-lined this story from Boston (rather than his home base of DC) to tell us the Sentinel drone was surveilling Iran’s suspected nuclear sites, using its isotope-sniffing powers.

In addition to video cameras, independent experts say the drone almost certainly carries communications intercept equipment and sensors that can detect tiny amounts of radioactive isotopes and other chemicals that can give away nuclear research.

But the real advantage of the Sentinel drone, Sanger and Shane tell us, is the ability to see who’s onsite when.

While an orbiting surveillance satellite can observe a location for only a few minutes at a time, a drone can loiter for hours, sending a video feed as people move about the site. Such a “pattern of life,” as it is called, can give crucial clues to the nature of the work being done, the equipment used and the size of the work force.

Actually, we knew that. Here’s the kind of information the Sentinel presumably gave us about Osama bin Laden’s compound.

Agents, determining that Kuwaiti was living there, used aerial surveillance to keep watch on the compound, which consisted of a three-story main house, a guesthouse, and a few outbuildings. They observed that residents of the compound burned their trash, instead of putting it out for collection, and concluded that the compound lacked a phone or an Internet connection. Kuwaiti and his brother came and went, but another man, living on the third floor, never left. When this third individual did venture outside, he stayed behind the compound’s walls. Some analysts speculated that the third man was bin Laden, and the agency dubbed him the Pacer.

In our assassination of Osama bin Laden, it seems, we used the Sentinel to learn the daily routine of everyone in the compound. Just the kind of information we’ve used to assassinate key Iranian scientists.

Read more

The Administration’s Many Excuses for Hiding Its Targeted Killing Memo

Remember this article? It describes the debate within the Administration over how readily and extensively to acknowledge the US killing of Anwar al-Awlaki. As it describes, the debate was at least preliminarily resolved at a Situation Room meeting in November.

The issue came to a head at a Situation Room meeting in November. At lower-level interagency meetings, Obama officials had already begun moving toward a compromise. David Petraeus, the new CIA director whose agency had been wary of too much disclosure, came out in support of revealing the legal reasoning behind the Awlaki killing so long as the case was not explicitly discussed. Petraeus, according to administration officials, was backed up by James Clapper, the director of national intelligence. (The CIA declined to comment.) The State Department, meanwhile, continued to push for fuller disclosure. One senior Obama official who continued to raise questions about the wisdom of coming out publicly at all was Janet Napolitano, the Homeland Security director. She argued that the calls for transparency had quieted down, as one participant characterized her view, so why poke the hornet’s nest? Another senior official expressing caution about the plan was Kathryn Ruemmler, the White House counsel. She cautioned that the disclosures could weaken the government’s stance in pending litigation. The New York Times has filed a lawsuit against the Obama administration under the Freedom of Information Act seeking the release of the Justice Department legal opinion in the Awlaki case. (The department has declined to provide the documents requested.)

It came down to what Denis McDonough, the deputy national-security adviser, cheekily called the “half Monty” versus the “full Monty,” after the British movie about a male striptease act. In the end, the principals settled on the half Monty. As the State Department’s Koh continued to push for the maximum amount of disclosure, McDonough began referring to that position as “the full Harold.”

Note especially the stance of Kathryn Ruemmler, the White House Counsel, who argued that any disclosures on the Awlaki killing “could weaken the government’s stance in pending litigation.”

That is, Ruemmler argued the Administration couldn’t voluntarily provide information about Awlaki’s killing, because it might mean it would have to involuntarily give that information up pursuant to a lawsuit over that information. Huh?

Since November, both the NYT (on December 20, 2011) and the ACLU (yesterday) have sued to get the Awlaki memo under FOIA (the ACLU is also suing to get the underlying evidence, including that relating to Samir Khan and Awlaki’s son Abdulrahman).

So I wanted to compare the different responses different agencies gave the NYT and ACLU around the same time that many top Administration officials were advocating for some kind of transparency even while the White House Counsel was arguing that doing so might lead to transparency. Here’s how the government responded to these FOIAs when (I’ve not noted the ACLU appeals, but all were appealed before the subequent follow-up):

Around June 2010: OLC completes Awlaki memo

June 11, 2010: NYT’s Scott Shane FOIAs DOJ OLC for memos on targeted killings

October 7, 2011: NYT’s Charlie Savage FOIAs OLC for memos on targeting killings

October 19, 2011: ACLU FOIAs Anwar al-Awlaki OLC memo, underlying evidence supporting it, and information relating to Samir Khan and Abdullah al-Awalaki

October 27, 2011: OLC denies both NYT requests under FOIA exemptions (b)(1), (b)(3), and (b)(5), and, in response to Shane’s request, also notes that with regards to other agencies, “neither confirms nor denies the existence of the documents” in the request

October 27, 2011: DOJ Office of Information Policy grants ACLU’s request for expedited processing but determines the request fell within “unusual circumstances” so it could not meet the statutory deadline

October 31, 2011: DOD denies ACLU’s request for expedited processing and also claimed “unusual circumstances”

November 2011, unknown date: Situation Room meeting at which Principals decide to pursue a “half monty” strategy of limited release of information on Awlaki

November 4, 2011: NYT appeals its denial

November 7, 2011: USSOCOM denies ACLU’s request for expedited processing and determined the request fell within “unusual circumstances”

November 14, 2011: OLC denies ACLU’s request under FOIA exemptions (b)(1), (b)(3), and (b)(5)

November 17, 2011: CIA denies ACLU’s FOIA “pursuant to FOIA exemptions (b)(1) and (b)(3)” and claims that the “fact of the existence or nonexistence of requested records is currently and properly classified”

Read more

Ron Wyden Suggests Secret PATRIOT GPS Tracking May Be Illegal Under Jones

As I’ve suggested in my posts on US v Jones, the Justices seemed opposed to the kind of tracking we believe the government is doing under Section 215 of the PATRIOT Act. Yet of the three opinions ruling the warrantless use of GPS tracking in the case improper, only Sonia Sotomayor spoke broadly enough to make it clear that the Secret PATRIOT application is unconstitutional.

Ron Wyden (who, remember, wrote a column on Jones’ application to Secret PATRIOT) used yesterday’s Threat Assessment hearing to try to get James Clapper to commit to whether US v Jones makes Secret PATRIOT illegal. (2:25)

Wyden: Director Clapper, as you know the Supreme Court ruled last week that it was unconstitutional for federal agents to attach a GPS tracking device to an individual’s car and monitor their movements 24/7 without a warrant. Because the Chair was being very gracious, I want to do this briefly. Can you tell me as of now what you believe this means for the intelligence community, number 1, and 2, would you be willing to commit this morning to giving me an unclassified response with respect to what you believe the law authorizes. This goes to the point that you and I have talked, Sir, about in the past, the question of secret law, I strongly feel that the laws and their interpretations must be public. And then of course the important work that all of you’re doing we very often have to keep that classified in order to protect secrets and the well-being of your capable staff. So just two parts, 1, what you think the law means as of now, and will you commit to giving me an unclassified answer on the point of what you believe the law actually authorizes.

Clapper: Sir, the judgment rendered was, as you stated, was in a law enforcement context. We are now examining, and the lawyers are, what are the potential implications for intelligence, you know, foreign or domestic. So, that reading is of great interest to us. And I’m sure we can share it with you. [looks around for confirmation] One more point I need to make, though. In all of this, we will–we have and will continue to abide by the Fourth Amendment.

Given Clapper’s quick invocation of the law enforcement context, I suspect the Intelligence Community’s lawyers are planning to use the language in Samuel Alito’s concurring opinion addressing “extraordinary offenses”…

We also need not consider whether prolonged GPS monitoring in the context of investigations involving extraordinary offenses would similarly intrude on a constitutionally protected sphere of privacy. In such cases, long-term tracking might have been mounted using previously available techniques.

…To claim that their intelligence application–“foreign or domestic”–would still permit the tracking of innocent citizens using their cell phones.

In any case, if Clapper is good on his word (though note, he said he’d give this interpretation to Wyden, not release it publicly), the government may finally tip its hand regarding its cell phone tracking of Americans.

The Non-Counterterrorist Drone Loophole: Did Clapper Admit We Targeted Iranian Scientists?

One of the most interesting exchanges in yesterday’s Threat Assessment hearing occurred between Ron Wyden and James Clapper–with David Petraeus, whom Wyden calls out, observing silently (the exchange starts at 1:01).

Wyden: Let me wrap up with you Director Clapper on an issue that I’ve asked about before at this open hearing. General Petraeus knows about this, this is a question about the use of force and a speech that was given by Mr. Koh, Harold Koh of the State Department, a lawyer. Let me note at the beginning it’s a matter of public record that the intelligence community sometimes takes direct action against terrorists and this direct action sometimes involves the use of lethal force. And as you know Director [sic] Koh gave a speech outlining our policy with respect to various terrorist groups, talked about detention, talked about the use of unmanned drones and noted that under US law, the use of force against terrorist groups is permitted by Congressional authorization, while under international law it is permitted by America’s right to self defense. But in spite of having asked about this on a number of occasions, and General Petraeus, you know that I, too, share the Chair’s view with respect to your working with us here on this committee and your being forthright, I’ve not been able to get an answer to this specific question. And I would like to know whether that speech that Mr. Koh gave contained unstated exceptions for intelligence agencies?

Clapper: With respect to counterterrorism, it does not. So it applies to all components of the government involved in counterterrorism be it military or non-military.

Wyden: Are there other exceptions other than counterterrorist activities?

Clapper: I believe his speech dealt with counterterrorism.

Wyden: So you believe that his speech, the text of the speech–cause this would be important–applies to all agencies. It applies to the intelligence community, his entire speech, the overall thrust of the speech applies to all of the intelligence community.

Clapper: With respect to counterterrorism, yes.

Now, it seems clear that Wyden is referring to the portion of Koh’s speech that deals with drone strikes, which is reproduced in full below the line.

And my impression is that Wyden–who emphasizes targeting terrorists when he asks the question–was asking whether there was an exception to the principles of distinction and proportionality for the CIA when they used drones. Or, to put it more plainly, Wyden seemed to be asking whether the CIA could use drones to target civilians.

My guess is that Petraeus has refused to answer that question not to hide a CIA exception for the use of drones with civilian terrorists (say, with Anwar al-Awlaki) but rather to hide the CIA involvement in targeting of civilians in other contexts.

That’s the implication of Clapper’s response: “with the respect to counterterrorism, yes.” And Wyden’s expression as he delivers the question, “Are there other exceptions other than counterterrorist activities?” is worth watching.

There may be further confusion stemming from the language of Koh’s speech. While he was, in this section, specifically addressing “the Law of 9/11,” he does claim that his comments apply to “all of our operations involving the use of force.” Clapper’s caveat seems to belie that claim.

Koh’s language also addressed the use of force generally, not just those dealing with drones. We do use drones for missions outside of counterterrorism–including in drug operations, so Clapper’s caveat might suggest the CIA can target civilians in such context.

But if I had to guess, I’d say this had to deal with non-drone use of lethal force, possibly the assassinations of Iranian nuclear scientists. Was Clapper suggesting CIA targeted civilian nuclear scientists?

And while we may not have attached the bombs to Iranian civilian scientists’ cars (though our surrogates did), remember the suggestions that our drone surveillance of Iran was involved in those assassinations.

Read more

Dianne Feinstein Calls James Clapper a Polyanna on Afghanistan

The takeaway the stenographers have gotten from yesterday’s intelligence threat assessment is that the Scary Iran Plot means Iran wants to target us in this country.

They reported that even as Dianne Feinstein made it clear James Clapper was bullshitting us on another front.

In her statement, she  noted that James Clapper’s assessment of our Afghanistan war is more optimistic than what the still-classified NIE says. (starting after 7:50)

I’m also concerned by what appears to the the disparity between the discussion of Afghanistan in Director Clapper’s statement for the record and the bleaker description in the December 2011 NIE. The Director’s statement notes modest improvements in the challenges that remain. While I’m unable to describe the NIE, as it remains a classified document, news reports of the NIE describe it as “sobering” and “dire” (those words in quotes, include phrases like, “mired in stalemate” (end quote). So I would like to ask the witnesses how they assess how stable Afghanistan will be in 2012 as well as in 2014 and beyond.

Here’s some of the public reporting on the NIE she’s talking about:

The U.S. intelligence community says in a secret new assessment that the war in Afghanistan is mired in stalemate, and warns that security gains from an increase in American troops have been undercut by pervasive corruption, incompetent governance and Taliban fighters operating from neighboring Pakistan, according to U.S. officials.

[snip]

In a section looking at future scenarios, the NIE also asserts that the Afghan government in Kabul may not be able to survive as the U.S. steadily pulls out its troops and reduces military and civilian assistance.
“Its viability is tenuous,” said one official, citing the report.

Clapper’s statement, however, says the following:

In terms of security, we judge that the Afghan police and Army will continue to depend on ISAF support. ISAF partnering and mentoring have begun to show signs of sustainable progress at the tactical and ministerial levels; however, corruption as well as poor leadership and management will threaten Afghan National Security Forces’ (ANSF) operational effectiveness.

[snip]

The Karzai government did achieve some success in 2011. The first phase of the process to transition security to Afghan leadership proceeded smoothly, and the second tranche of the transition is progressing as scheduled. The Karzai administration successfully convened a Loya Jirga in November to socialize the strategic partnership with the United States. Now that the fall 2010 electoral crisis is resolved, the Wolesi Jirga will likely regroup during the current winter recess and return its focus to limiting President Karzai’s authority, likely using the parliamentary approval process for ministerial appointees as a way to highlight the Parliament’s independence.

I find several things interesting about this: first, Clapper’s statement does admit that the ANSF isn’t ready to defend the country. The area where Clapper seems to most deviate from the reported details of the NIE is on Karzai’s government. Clapper would have us think it is improving, the NIE doesn’t agree.

But I’m also amused. After DiFi made it clear that Clapper’s statement had been spun, why did reporters (note, an exception is Josh Gerstein, who pointed out these comments as well) believe the other things he said, notably about Scary Iran?

 

CIA: No Big Deal That We Trained NYPD to Conduct Domestic Spying

The CIA announced in September it was going to review a narrow aspect of the way CIA officers set up NYPD’s domestic spying agency in the wake of 9/11. As I pointed out then, the investigation was scoped to ignore key parts of the NYPD’s program.

The NYPD program is, by all appearances, a massive ethnic profiling operation that hasn’t been all that effectiveat finding potential terrorists. DOJ ought to be conducting this investigation as a potential civil rights violation.

But instead, CIA will conduct the investigation, meaning the chances the public will know the result are slimmer even than if DOJ conducted it.

[snip]

So is CIA particularly worried? Both James Clapper and the CIA flack appear to be narrowly parsing the potential problem: whether or not there are CIA officers on the streets of NY, whether they are investigating domestically as opposed to overseas (remember, the NYPD is sticking its nose into overseas investigations, too).

And, surprise surprise! CIA’s Inspector General just announced that it found no problem in its narrowly scoped investigation.

The agency’s inspector general concluded that no laws were broken and there was “no evidence that any part of the agency’s support to the NYPD constituted ‘domestic spying’,” CIA spokesman Preston Golson said.

[snip]

David Buckley, the CIA’s inspector general, completed his review in late October. It’s not clear if his report opens the door for other municipal police departments nationwide to work closely with the CIA in the war on terror.

Let the ineffective, wasteful domestic spying continue then, I guess!

Lots of Senior Officials Spilling State Secrets Today

Last year, Director of National Intelligence James Clapper said the following:

I am asserting privilege over classified intelligence information, assessments, and analysis prepared, obtained, or under the control of any entity within the U.S. Intelligence Community concerning al-Qaeda, AQAP or Anwar al-Aulaqi that may be implicated by [Awlaki’s father’s attempt to sue for information about why Awlaki was on the CIA’s assassination list]. This includes information that relates to the terrorist threat posed by Anwar al-Aulaqi, including information related to whether this threat may be “concrete,” “specific,” or “imminent.”

Then Secretary of Defense Robert Gates said the following:

DOD cannot reveal to a foreign terrorist organization or its leaders what it knows about their activities and how it obtained that information.

[snip]

The disclosure of any operational information concerning actions U.S. armed forces have or may plan to take against a terrorist organization overseas would risk serious harm to national security and foreign relations. Official confirmation or denial of any operations could tend to reveal information concerning operational capabilities that could be used by adversaries to evade or counter any future strikes.

[snip]

Finally, as discussed below, public confirmation or denial of either prior or planned operations could seriously harm U.S. foreign relations.

[snip]

The disclosure of information concerning cooperation between the United States and a foreign state, and specifically regarding any possible military operations in that foreign country, could lead to serious harm to national security, including by disrupting any confidential relations with a foreign government. [my emphasis]

Then CIA Director and current Secretary of Defense Leon Panetta said the following:

I am invoking the [state secrets] privilege over any information, if it exists, that would tend to confirm or deny any allegations in the Complaint [about CIA targeting Awlaki for assassination] pertaining to the CIA.

Yet in spite of the fact that these top government officials swore to a judge that revealing operational details about the CIA’s assassination operations, US counterterrorist cooperation with Yemen, and confirmation of prior or planned military operations would harm foreign relations and national security, we’re seeing details like this in reporting on Anwar al-Awlaki’s death:

An American-born cleric killed in Yemen played a “significant operational role” in plotting and inspiring attacks on the United States, U.S. officials said Friday, as they disclosed detailed intelligence to justify the killing of a U.S. citizen.

Anwar al-Awlaki, an American-born radical Islamic preacher who rose to the highest level of al Qaeda’s franchise in Yemen, was killed in a CIA-directed strike upon his convoy, carried out with the U.S. Joint Special Operations Command’s firepower, according to a counterterrorist official, speaking on condition of anonymity to discuss intelligence.

[snip]

Four individuals were killed in Friday’s attack, according to U.S. officials.

[snip]

Al-Awlaki had been under observation for three weeks while they waited for the right opportunity to strike, one U.S. official said.

[snip]

U.S. counterterrorism officials said that counterterrorism cooperation between the U.S. and Yemen has improved in recent weeks, allowing the U.S. to gather better intelligence on al-Awlaki’s movements. The ability to better track him was a key factor the successful strike, U.S. officials said.

Or details like this, including John Brennan’s comments on the record:

Fox News has learned that two Predator drones hovering above al-Awlaki’s convoy fired the Hellfire missiles which killed the terror leader. According to a senior U.S. official, the operation was carried out by Joint Special Operations Command, under the direction of the CIA.

[snip]

But American sources confirmed the CIA and U.S. military were behind the strike on al-Awlaki, whom one official described as a “big fish.”

The strike hit a vehicle with three or four suspected Al Qaeda members inside, in addition to al-Awlaki. According to a U.S. senior official, the other American militant killed in the strike was Samir Khan, the co-editor of an English-language Al Qaeda web magazine called “Inspire.”

[snip]

Top U.S. counter terrorism adviser John Brennan says such cooperation with Yemen has improved since the political unrest there. Brennan said the Yemenis have been more willing to share information about the location of Al Qaeda targets, as a way to fight the Yemeni branch challenging them for power. Other U.S. officials say the Yemenis have also allowed the U.S. to fly more armed drone and aircraft missions over its territory than ever previously, trying to use U.S. military power to stay in power. [my emphasis]

Judge Bates, if I were you, I’d haul Clapper, Gates, and Panetta into your courtroom to find out whether they lied their ass off to you last year so as to deprive a US citizen of due process, and if they didn’t, then how long it will be until John Brennan and some other counterterrorism officials get charged with Espionage.

Wyden and Udall Want Obama to Admit to Secret Collection Program

Ron Wyden and Mark Udall have an amendment to the PATRIOT Act that makes it clear the Obama Administration briefed the Intelligence Committees in February on an intelligence collection program, conducted under PATRIOT authority, that interprets the language of the law so broadly as to mean something it really doesn’t say. The amendment reads, in part,

(6) United States Government officials should not secretly reinterpret public laws and statutes in a manner that is inconsistent with the public’s understanding of these laws, and should not describe the execution of these laws in a way that misinforms or misleads the public;

(7) On February 2, 2011, the congressional intelligence committees received a secret report from the Attorney General and the Director of National Intelligence that has been publicly described as pertaining to intelligence collection authorities that are subject to expiration under section 224 of the USA PATRIOT Act (Public Law 107–56; 115 Stat. 295); and

(8) while it is entirely appropriate for particular intelligence collection techniques to be kept secret, the laws that authorize such techniques, and the United States Government’s official interpretation of these laws, should not be kept secret but should instead be transparent to the public, so that these laws can be the subject of informed public debate and consideration.

(b) REPORT.—Not later than 60 days after the date of the enactment of this Act, the Attorney General shall publish in the Federal Register a report—

(1) that details the legal basis for the intelligence collection activities described in the February 2, 2011, report to the congressional intelligence committees; and

(2) that does not describe specific intelligence collection programs or activities, but that fully describes the legal interpretations and analysis necessary to understand the United States Government’s official interpretation of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et seq.).

In short, Eric Holder and James Clapper came to SSCI on February 2 and told the committee about a way the government was broadly interpreting FISA and the powers expiring next Monday.

This Amendment would require Holder to admit to what the government was doing, in broad terms, without revealing what kind of surveillance was going on.

This probably pertains to the Section 215 authorities; we know they’re using it to construct databases of people who buy hydrogen peroxide and acetone. But I would bet there’s a more generalized collection program that results in more databases they can mine. A very good guess would be using geolocation data from cell phones to collect information on the whereabouts of Americans.

Don’t you think the time to press for such admissions is before this shit gets re-upped for another four years?

Update: Apparently this isn’t even among the amendments Reid is pulling parliamentary maneuvers to avoid even discussing. So I guess this is just an effort to wave a flag saying, “PATRIOT isn’t what it says it is?”

Like SSCI, HPSCI Requires DNI to Close Gaping Security Holes … by 2013

Steven Aftergood has the House intelligence report online and–as he points out–it contains a requirement that the intelligence community close one of the gaping holes in network security highlighted by the WikiLeaks case. The deadline? 2013.

SEC. 402. INSIDER THREAT DETECTION PROGRAM.

(a) Initial Operating Capability.–Not later than October 1, 2012, the Director of National Intelligence shall establish an initial operating capability for an effective automated insider threat detection program for the information resources in each element of the intelligence community in order to detect unauthorized access to, or use or transmission of, classified intelligence.

(b) Full Operating Capability.–Not later than October 1, 2013, the Director of National Intelligence shall ensure the program described in subsection (a) has reached full operating capability.

(c) Report.–Not later than December 1, 2011, the Director of National Intelligence shall submit to the congressional intelligence committees a report on the resources required to implement the insider threat detection program referred to in subsection (a) and any other issues related to such implementation the Director considers appropriate to include in the report.

(d) Information Resources Defined.–In this section, the term “information resources” means networks, systems, workstations, servers, routers, applications, databases, websites, online collaboration environments, and any other information resources in an element of the intelligence community designated by the Director of National Intelligence.

This is precisely what the Senate Intelligence Committee is also mandating. As I pointed out earlier, this seems to simply take DOD’s own lackadaisical deadline and make it a requirement.

In other words, if closing this security gap a year and a half after the leaks are alleged to have occurred is too tough, then they can go ahead and take another year or so to close the barn door.

Though to be fair, this deadline may come directly from the lackadaisical DOD, as the deadlines given here seem to match those DOD aspires to hit.

Now, maybe it’s considered unpatriotic to note that our intelligence community–and its congressional overseers–are tolerating pretty shoddy levels of security all while insisting that they takes leaks seriously.

But seriously: if our government is going to claim that leaks are as urgent as it does, if it’s going to continue to pretend that secrets are, you know, really secret, then it really ought to at least pretend to show urgency on responding to the gaping technical issues that will not only protect against leakers, but also provide better cybersecurity and protect against spies. Aspiring to fix those issues years after the fact really doesn’t cut it.

Ah well! Bin Laden is dead. Who else might want our secrets?