Posts

DOJ Rethinks — but in a Few Areas, Expands — Access to Media Content

In a story on the new media guidelines DOJ rolled out yesterday, Charlie Savage reveals what representatives of the press think they got in the new guidelines, in addition to a formal codification of broader restrictions on the use of legal process to find real journalists’ sources:

Those conversations led to several adjustments about potentially critical issues, like how “news gathering” is defined. According to participants, the Justice Department originally intended to define it in a way that was limited to the passive receipt of government secrets. But the final version now covers the act of pursuing information.

The language in question appears to cover things like encrypted dropboxes, something that journalists liked to compare (inaptly) to the charge against Julian Assange of attempting to hack a password for Chelsea Manning. Thus far, multiple criminal prosecutions show that dropboxes have not thwarted DOJ from prosecuting those who submitted documents into them.

Journalism includes reporting on classified information

A more important change is that the guidelines explicitly include reporting on classified information in its definition of newsgathering.

Newsgathering includes the mere receipt, possession, or publication by a member of the news media of government information, including classified information, as well as establishing a means of receiving such information, including from an anonymous or confidential source.

Savage describes that “is also said to have removed espionage from a list of criminal activities that are excluded from protected news gathering.” I’m not sure that’s right: 18 USC 793 and 798 were (along with Child Sexual Abuse Materials) included in the exceptions to 42 USC 2000aa, which I think is unchanged by this regulation.

What has been removed from the prior version (in addition to the inclusion of classified information in the definition of newsgathering) is an exception permitting the use of legal process in investigations of classified leaks. This language has been removed.

In investigations or prosecutions of unauthorized disclosures of national defense information or of classified information, where the Director of National Intelligence, after consultation with the relevant Department or agency head(s), certifies to the Attorney General the significance of the harm raised by the unauthorized disclosure and that the information disclosed was properly classified and reaffirms the intelligence community’s continued support for the investigation or prosecution, the Attorney General may authorize members of the Department, in such investigations, to issue subpoenas to members of the news media.

In other words, it wasn’t that there was an exception for the Espionage Act. Rather, there was language permitting searches in leak investigations that might be (and frequently have been in recent years) charged under the Espionage Act. That exception has been removed, and reporting on classified information has been explicitly included in the definition of newsgathering.

As we’ll see below, the regulation still authorizes searches in cases of suspected agents of a foreign power.

Expanded protection and a prohibition with exceptions instead of permission for exceptions

As Savage notes, however, the topline change is both a restructuring in the ways that a journalist’s sources might be accessed and the types of legal process covered. Whereas previously, the language on accessing source information included a presumption of access with a bunch of limits on use, as laid out in the prior regulation

The Department views the use of certain law enforcement tools, including subpoenas, court orders issued pursuant to 18 U.S.C. 2703(d) or 3123, and search warrants to seek information from, or records of, non-consenting members of the news media as extraordinary measures, not standard investigatory practices. In particular, subpoenas or court orders issued pursuant to 18 U.S.C. 2703(d) or 3123 may be used, after authorization by the Attorney General, or by another senior official in accordance with the exceptions set forth in paragraph (c)(3) of this section, only to obtain information from, or records of, members of the news media when the information sought is essential to a successful investigation, prosecution, or litigation; after all reasonable alternative attempts have been made to obtain the information from alternative sources; and after negotiations with the affected member of the news media have been pursued and appropriate notice to the affected member of the news media has been provided, unless the Attorney General determines that, for compelling reasons, such negotiations or notice would pose a clear and substantial threat to the integrity of the investigation, risk grave harm to national security, or present an imminent risk of death or serious bodily harm. [my emphasis]

The new regulation outright prohibits compulsory legal process except in certain exceptions.

(c) Compulsory legal process for the purpose of obtaining information from or records of a member of the news media acting within the scope ofnewsgathering. Compulsory legal process for the purpose of obtaining information from or records of a member of the news media acting within the scope of newsgathering is prohibited except under the circumstances set forth in paragraphs (c)(l) through (3).

In other words, these regulations importantly flip the presumption from one that permits the access of journalist records in certain situations to one that prohibits it except according to an enumerated exception.

And this revised regulation has broader language prohibiting the use of legal process. It now includes interception orders (like that used against NBC journalists who were sourced by Henry Kyle Frese), MLAT orders (like the Mexican one that targeted Zach Whittaker in 2020), and orders served on obscure third party providers of enterprise email hosting (like orders used against the WaPo and NYT in recent years).

“Compulsory legal process” consists of subpoenas, search warrants, court orders issued pursuant to 18 U.S.C. 2703(d) and 3123, interception orders issued pursuant to 18 U.S.C. 2518, civil investigative demands, and mutual legal assistance treaty requests-regardless of whether issued to members of the news media directly, to their publishers or employers, or to others, including third-party service providers of any of the forgoing, for the purpose of obtaining information from or records of members of the news media, and regardless of whether the compulsory legal process seeks testimony, physical or electronic documents, telephone toll or other communications records, metadata, or digital content.

In other words, the revision closes loopholes used under the Trump Administration.

What journalism isn’t

More generally, DOJ has reconceptualized the regulation though the use of exceptions.

Some of these are exceptions that permit the compelled process of a journalist, the most interesting new one of which entails evidentiary authentication with DAAG authorization.

(1) To authenticate for evidentiary purposes information or records that have already been published, in which case the authorization of a Deputy Assistant Attorney General for the Criminal Division is required;

This may be a response to the need to get journalists to validate videos they took on January 6.

DOJ has slightly reworked an existing section that at least used to be tailored to the definition covered by FISA (and FISA surveillance of journalists is in no way excluded from these regulations). It still includes the same language excepting an agent of a foreign power or someone who aids or abets one.

A foreign power or agent of a foreign power, as those terms are defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801);

In at least one of the reworked categories, the regulations represent an (entirely reasonable) expansion. The regulation includes this definition of terrorist activity — adding 18 USC 2339B, C, and D — which not only aren’t tied to State’s Foreign Terrorist Organization designations, but also includes (with C) funding for what could be domestic terrorism.

Committing or attempting to commit the crimes of providing material support or resources to terrorists or designated foreign terrorist organizations, providing or collecting funds to finance acts of terrorism, or receiving military-type training from a foreign terrorist organization, as those offenses are defined in 18 U.S.C. 2339A, 2339B, 2339C, and 2339D; or

Seamus Hughes pointed me to this case in which three white supremacists were prosecuted under 18 USC 2339A as an example of how this might apply to domestic terrorists. The new regulations add a review by the National Security Division head on these categories, but since John Demers approved the data collection on real journalists under the Trump Administration, that’s unlikely to be a very useful protection.

Another new exception — this time not associated with newsgathering — is for an investigation targeting a journalist’s non-journalist housemate or similar who is the subject of an investigation.

To obtain information or records of a non-member of the news media, when the nonmember is the subject or target of an investigation and the information or records are in a physical space, device, or account shared with a member of the news media;

But the biggest change is that, in addition to that tweaked list of national security exceptions, DOJ added a bunch of more common crimes that journalism doesn’t include:

(B) Except as provided in paragraph (b)(2)(ii)(A) of this section, newsgathering does not include criminal acts committed in the course of obtaining information or using information, such as: breaking and entering; theft; unlawfully accessing a computer or computer system; unlawful surveillance or wiretapping; bribery; extortion; fraud; insider trading; or aiding or abetting or conspiring to engage in such criminal activities, with the requisite criminal intent.

The distinctions are not entirely clearcut though. Of most concern, what distinguishes a journalist reporting on tech vulnerabilities and a hacker is that “requisite criminal intent,” and one often determines that by accessing content.

Incorporation of cases against recent not-journalism cases

Importantly, however, these crimes include a number of the cases that got journalists all hot and bothered but which, under the new rules, are very clearcut (Savage’s professed uncertainty about Project Veritas notwithstanding).

DOJ’s approach to Julian Assange didn’t begin change until he helped Edward Snowden flee to Russia and Assange wasn’t charged — initially, with attempting to help Chelsea Manning crack a password, itself included in one of the distinguishing crimes — until after he had aided and abetted Russia in a hack-and-leak campaign, one of the national security exceptions. The Espionage charges against Assange were filed after Russia attempted to exfiltrate Assange at the end of 2017. Any superseding indictment of Assange in the future would likely include an extortion claim and an aid-and-abet claim of Josh Schulte’s hacking of the CIA, for which Assange clearly expressed the criminal intent.

With regards to Project Veritas, the very first subpoena targeting their office manager (one obtained while Bill Barr was still Attorney General) listed 18 USC 873, blackmail — a kind of extortion — among the crimes under investigation, and their own defenses raised the possibility of extortion. Plus, Robert Kurlander’s statement of offense described trying to raise the price Project Veritas would pay for Ashley Biden’s diary because it was “literally a stolen diary.” So these new guidelines, applied retroactively, make the Project Veritas search an obvious exception.

The distinction between certain crimes and journalism would encompass three other, still undisclosed investigations into journalists last year described in DOJ’s report on legal process. The first was into insider trading:

In connection with an investigation of securities fraud and wire fraud relating to insider trading activities, a Deputy Assistant Attorney General authorized a U.S. Attorney’s Office to apply for a warrant to search the person, personal effects, and cellular telephones of a member of the news media who was the subject of the insider trading investigation. Investigators had established probable cause that the member of the news media had participated in the insider trading activities with three coconspirators and was in communication with the primary target of the investigation, a former U.S. Congressperson; and that the information seized pursuant to the search warrant would lead to further evidence. Investigators had pursued multiple avenues to obtain the evidence, without success, and had exhausted all investigative leads. The Department’s News Media Policy generally requires that the Attorney General must approve any application to search the communications records of a member of the news media, see 28 C.F.R. § 50.10(d)(1), but here, because the suspected criminal conduct was wholly outside the scope of the member of the news media’s newsgathering activities, a Deputy Assistant Attorney General for the Criminal Division authorized the search warrant applications pursuant to the “suspect exception” of the Privacy Protection Act (PPA), see 28 C.F.R. § 50.10(d)(4).

The second was into fraud and money laundering.

In connection with a fraud and money laundering investigation involving employees of a news media entity, a Deputy Assistant Attorney General authorized a U.S. Attorney’s Office to search stored electronic content of email accounts maintained by a member of the news media and its affiliate entity; and to issue a subpoena to a thirdparty service provider for information relating to accounts maintained by a member of the news media. The Department’s News Media Policy generally requires that the Attorney General must approve any application to search the communications records of a member of the news media, see 28 C.F.R. § 50.10(d)(1), but here, because the suspected criminal conduct was wholly outside the scope of the entities’ and employees’ newsgathering activities, a Deputy Assistant Attorney General for the Criminal Division authorized the search warrant applications pursuant to the “suspect exception” of the PPA, see 28 C.F.R. § 50.10(d)(4).

A third investigation last year into stalking that included the use of spyware and hacking.

In connection with an investigation of a member of the news media for stalking offenses, a Deputy Assistant Attorney General authorized a U.S. Attorney’s Office to apply for a warrant to search the email account of the member of the news media. Investigators had established probable cause that the member of the news media had engaged in harassment and stalking of multiple people, including through the installation and use of spyware and the hacking of social media accounts, as well as employing several means to damage the reputations of the parties the member of the news media was harassing and stalking. The U.S. Attorney’s Office established evidence that the information seized pursuant to the search warrant would lead to evidence regarding the member of the news media’s criminal conduct, which was wholly outside the scope of his newsgathering activities. The Department’s News Media Policy generally requires that the Attorney General must approve any application to search the communications records of a member of the news media, see 28 C.F.R. § 50.10(d)(1), but here, a Deputy Assistant Attorney General for the Criminal Division authorized the search warrant application pursuant to the “suspect exception” of the PPA, see 28 C.F.R. § 50.10(d)(4).

In other words, DOJ has used the lessons from the Trump DOJ’s hunt for journalistic sources, Julian Assange, Project Veritas, and three other undisclosed investigations (and who knows? Perhaps also to media outlets run by Neo-Nazis to help fundraise) to change how they conceive of journalism. All of those are reasonable exceptions from journalism.

There are a bunch of potential loopholes. If DOJ wants a journalist’s content, there are a great many ways they can still get it and because those exceptions would permit sustained secrecy about the searches might never be disclosed.

But these regulations, at a minimum, have established that reporting on classified information is part of journalism and have eliminated a lot of the loopholes to surveillance used to target journalists during the Trump Administration.

DOJ Inspector General Report on the Tensions Created by Parallel Construction

Before you read this report on tensions between FBI Office of General Counsel’s National Security and Cyber Law Branch (NSCLB)  and DOJ’s National Security Division (NSD), remember the following things:

  • In significant part because of jurisdictional limitations, DOJ Inspector General blamed FBI for everything that went wrong with the Carter Page FISA applications, and in the wake of that report, Bill Barr, Trump, and his allies in Congress used it to damage the career every single person at FBI who had been involved with the Russian investigation (except for the two guys who made multiple mistakes in dismissing the Alfa Bank allegations).
  • John Durham then used that damage to attempt to coerce testimony, sometimes false, from FBI figures in his never-ending witch-hunt.
  • For the same jurisdictional limitations, any abuse John Durham engages in or Andrew DeFilippis engaged in can only be reviewed by DOJ’s feckless Office of Professional Responsibility, not by DOJ IG.
  • After that report, DOJ IG developed proof that Carter Page was not special; by some measures, his FISA application was better than those of people who hadn’t been fired by a future President for precisely the same foreign ties that the FISA was meant to assess.
  • The NSD then dismissed those findings from DOJ IG, largely by adopting a standard different from the one that had been adopted with Carter Page (it’s unclear whether DOJ IG is still trying to resolve these discrepancies or not).
  • None of the stuff that happened thus far addresses the substantive problems with the Page applications.

The report talks about the “historically strained” relationship between these two sets of lawyers, without laying out the role that the Carter Page review — and the Trump DOJ’s use of DOJ IG to punish his enemies generally — did to make things worse.

That tension plays out in the report. For example, Horowitz only provides recommendations to NSCLB and FBI’s OGC, not NSD. In each case, FBI is directed to coordinate with NSD, without the counterpart recommendation. The tension is particularly critical to something that DOJ IG cannot, therefore, recommend: That NSD have access to FBI case files, which would allow them to play a more proactive role in the vetting of FISA applications. It would also make NSD share in accountability for any problems that arise (as they should have with Page), though, and unsurprisingly NSD doesn’t want that.

NSCLB attorneys expressed their concern that although NSD attorneys assist agents in drafting the FISA applications submitted to the FISC, they do not share accountability when compliance incidents are reported to the FISC. Although NSCLB officials acknowledged the oversight role that NSD has related to FISA, they emphasized the need for FISA to be a team effort and not an adversarial relationship and stated their belief that the number of compliance incidents would be reduced if NSD would review the FISA-related documents housed in the FBI’s IT systems. However, according to NSCLB attorneys, NSD has expressed disinterest in ensuring FISA compliance on the front end and has said that it is the agent’s responsibility to identify in the first instance, anything that is necessary to be reported to the FISC. We were also told by NSCLB attorneys that NSD has said that it is concerned that an appearance of NSD attorneys having knowledge of the underlying documents would imply that they have full knowledge of all of the supporting documents, which would not be practicably feasible for them to have.

A senior NSD official that we spoke with told us that NSD has limited resources, and it does not have direct access to FBI systems.

NSD wants none of this accountability and DOJ IG can’t make them.

For all the tensions, though, it’s a fascinating report, as useful for providing both historical and bureaucratic background on this process as anything else. Much of this tension arises out of DOJ’s admitted parallel construction — using alternative sources for certain facts to protect sources and methods. There’s even a paragraph that describes NSCLB’s role as such (though not by name).

For instance, we were told that NSD relies on NSCLB to review documents such as search warrants and criminal complaint affidavits for law enforcement or other sensitivity concerns before they are filed with the court by prosecutors. When this process is not followed, it can become particularly problematic if NSCLB later finds that sensitive information was contained in the court filing. For example, if the FBI used a sensitive platform to obtain information, prosecutors may decide that a description of the platform is needed to support the search warrant or complaint. In such instances, NSCLB may ask prosecutors to anonymize that information. However, if NSCLB does not review the case agent’s draft affidavit in support of a search warrant or complaint before the agent provides it to the prosecutor, sensitive information may be exposed. Also, senior NSCLB officials told us that including an NSCLB attorney early in this process can provide an effective means of ensuring prosecutors have information necessary to support their case. Specifically, NSCLB can help identify which information may be difficult to use from a classification and sensitivity perspective and provide suggestions to obtain the information from an independent source without implicating sensitive techniques.

The report claims the particular roles of each side are not well-defined. I’m not convinced that’s the case, though. As described, NSCLB protects national security and the secrets that go along with that (including secret intelligence techniques). And NSD fulfills the needs of prosecutions as well as “protect[ing] FISA as a tool so the FBI can continue to use it.”

In one telling explanation,

NSCLB senior officials highlighted the fact that criminal prosecution is not necessarily the FBI’s aim in every national security investigation and that the FBI sometimes appropriately pursues investigations with the aim of disrupting threats or collecting intelligence.20

These are tensions, but they are not necessarily bad tensions. And it doesn’t seem like this report considers how this compares to the relationship between a prosecutor and a case agent where there are none of the national security (and classification) concerns.

In any case, the report attributes that tension for two radically different understandings about the standards involved in two FISA concepts, including one — material facts that must be disclosed to the FISA Court — that was at the core of the Carter Page case.

In the case of materiality, the FBI seems to be playing dumb (perhaps to avoid opening a whole historical can of worms given the aftermath of the Page IG Report).

The 2009 Accuracy Memorandum defined material facts as, “those facts that are relevant to the outcome of the probable cause determination.” The FBI had interpreted this standard as facts that are outcome determinative, or facts that would invalidate the legal determination. However, NSD had applied a broader standard than the FBI, with NSD’s interpretation of material facts being facts that are capable of influencing the requested legal determination. An NSD senior official told us that the FBI’s viewpoint was based on the FBI’s involvement in the criminal law enforcement arena where the threshold for materiality in a criminal search warrant is outcome determinative. This official also stated that most material errors reported to the FISC do not invalidate the legal determination, and that the FISC still expects for these types of errors to be reported to them.

Senior NSD officials stated NSD had applied the same standard for at least 15 years and NSCLB had known of NSD’s application of the standard because it was reflected in previous Rule 13 notices filed with the FISC. For example, in the OIG’s report on the FBI’s Crossfire Hurricane Investigation, NSD supervisors stated that “NSD will consider a fact or omission material if the information is capable of influencing the court’s probable cause determination, but NSD will err on the side of disclosure and advise the court of information that NSD believes the court would want to know.”41 Similarly, in a FISC filing on January 10, 2020, NSD referred to this statement in the OIG report while describing its oversight and reporting practices when errors or omissions are identified.42 However, senior NSCLB officials told us that NSCLB was first made aware of NSD’s interpretation of the materiality standard in the OIG’s Crossfire Hurricane Investigation report and NSD’s subsequent January 2020 FISC filing.43

In the case of the claimed differing understand of  querying techniques under 702 (in which, by my read, both sides were pretending this hasn’t dramatically changed as FISC became aware of how 702 collection was really used), NSD seems to engage in the knowing bullshit.

In contrast, NSD told us that the query standard has been the same since 2008. A senior NSD official stated that the FBI had a fundamental misunderstanding of the standard and that compliance incidents were not identified sooner because NSD can only review a limited sample of the FBI’s queries and NSD improved upon its ability to identify non-compliant queries over time.

I knew the standard the FBI was using. It is not credible that I knew what it was and NSD did not.

In both cases, this claimed disagreement seems to be an effort to avoid applying the standards adopted post-Page to the FISA approach (and not just on individualized orders) applied before then.

The report confirms something that had been obvious from heavily redacted sections of the last several 702 reauthorizations: FBI had been using 702 collection (and FISA collection generally) to vet potential confidential human sources.

For example, we were told disputes occurred related to queries conducted for vetting purposes.52 Specifically, according to the FBI, it was concerned that as a result of the change to the query standard it could no longer perform vetting queries on raw FISA information before developing a confidential human source (CHS). FBI officials told us that it was important for agents to be able to query all of its databases, including FISA data, to determine whether the FBI has any derogatory or nefarious information about a potential CHS. However, because of the implementation of the 2018 standard, the FBI is no longer able to conduct these queries because they would violate the standard (unless the FBI has a basis to believe the subject has criminal intent or is a threat to national security). According to the FBI, because its goal is to uncover any derogatory information about a potential CHS prior to establishing a relationship, many agents continue to believe that it is irresponsible to engage in a CHS relationship without conducting a complete query of the FBI’s records as “smoking gun” information on a potential CHS could exist only in FISA systems. Nevertheless, these FBI officials told us that they recognize that they have been unsuccessful when presenting these arguments to NSD and the FISC and, as noted below, they follow NSD’s latest revision of query standard guidance.

Using back door searches to vet informants is an approved use on the NSA and, probably, CIA side. In the FBI context, my understanding is that informants understand they’re exchanging Fourth Amendment protections as part of their relationship with the FBI. Perhaps if the FBI had simply made this public, it could have been an approved use. Instead, we’re playing all these games about the application.

The report describes — but doesn’t really address — how the tension between NSCLB and NSD undermined National Security Reviews which,

examine (1) whether sufficient predication exists for FBI preliminary and full investigations, (2) whether a sufficient authorized purpose exists for assessments, (3) whether tools utilized during or prior to the assessment are permitted, and (4) all aspects of National Security Letters issued by the FBI.

There was a huge backlog of these until NSD hurriedly closed a bunch of them in 2020, which is the kind of thing that when Bush did them with FISA tools in 2008 was itself a symptom. So, too, may be some policy memos that happened in Lisa Monaco’s first days and John Demers’ last ones.

The section I found to be most interesting (and one that DOJ IG could not or chose not to address in recommendations) pertains to the tension over declassification of material for prosecutions.

According to the FBI’s Declassification of Classified National Security Information Policy Guide, NSCLB must participate in the approval of discretionary declassification decisions concerning FBI classified information. NSCLB assists in ensuring that the declassification of either FISA derived material or other FBI classified information is: (1) necessary to protect threats against national security; (2) will not include classified materials obtained from foreign governments; (3) will not include classified materials obtained from other U.S. agencies (unless authorized by the originating agency); (4) will not reveal any sensitive or special techniques; and (5) will not adversely impact other FBI investigations.

[snip]

Despite the FBI’s limited support role, NSD and DOJ staff we spoke with told us that they believe NSCLB has involved itself inappropriately in discovery matters. For example, an NSD senior official told us that NSCLB has attempted to second guess discovery decisions made by prosecutors. This NSD official believed that NSCLB’s role is not to participate in the determination of how the prosecutors choose to protect a piece of classified information, but instead to identify information that is classified, its level of classification, and how a declaration from the owner of that information would explain to a court why the information presents a national security concern. According to this official, NSCLB may rightfully conclude the information is too sensitive to provide in discovery and, as a result, prosecutors may have to dismiss that case. However, we were told that discovery issues do not generally reach that point. We also were told by some AUSAs that they have had to remind NSCLB attorneys that AUSAs have the discovery obligations to courts and will make discoverability determinations.

An official from one USAO told us that, while it is understood that satisfying discovery obligations is the responsibility of the prosecutor, the FBI’s interest in protecting its equities may justify challenging a prosecutor’s discovery decisions. The official explained that such back and forth may be necessary to reach a balance between the needs of discovery and the protection of sensitive information; however, when the FBI’s role in the process extends into making assessments of what is discoverable it can slow the process down and necessitate the prosecutor asserting authority over discovery decisions.

[snip]

By contrast, senior NSCLB officials noted that several factors outside of NSCLB’s control can cause the declassification process to take a considerable amount of time. According to these officials, the FBI addresses the risk of disclosing information that could cause significant harm to the American public by using a thorough, deliberate process which can be impacted by the volume of information, the sensitivities involved, and the resources available to conduct a review. In defending NSCLB’s role in the discovery process, a senior NSCLB official expressed the view that AUSAs tend to err on the side of making material discoverable, even when it involves national security information, and do not appreciate how the disclosure of information may affect other FBI or USIC operations. This official told us that NSD often prefers to declassify all information that could be relevant, necessary, or discoverable to ease the prosecution of the case or the discovery process. .

This is, in my opinion, the description of what lawyers for an intelligence agency would do. That seems to be the role NSCLB is playing, for better or worse. In light of the cases described out of which the more specific tensions arise, I find the complaint that NSCLB is delaying discovery rather telling. If prosecutors choose to make a case that NSCLB believes would have been better handled via disruption, for example, or are entirely frivolous, such tensions are bound to surface. That said, if FBI’s General Counsel’s Office has been coopted people trying to protect sources and methods, NSD lawyers are going to look like the only ones guarding due process (though I’m sure they would with CIA’s lawyers, too).

There’s a lot of worthwhile observations in this report. But it’s hard to shake the conclusion that the most important takeaway is that DOJ cannot continue to have such asymmetry in the oversight that FBI and DOJ experience.

Four Ways Billy Barr Obstructed the Investigation into Rudy Giuliani

Eventually, I want to do a post quantifying all the damage to national security Billy Barr did by thwarting an influence-peddling investigation into Rudy Giuliani in 2019. But first, I want to quantify four ways that Barr is known to have obstructed the investigation into Rudy, effectively stalling the investigation for over 500 days.

The effort is helped by Rudy lawyer Robert Costello’s public claim that DOJ obtained a search warrant on Rudy’s iCloud account sometime in late 2019. That indicates that the investigation into Rudy’s ties to Lev Parnas and Igor Fruman (whether Rudy was the primary target or their business, Fraud Guarantee) already showed probable cause that a crime had been committed before Barr took repeated steps to undermine the investigation.

Fail to recuse from an investigation implicating Barr personally

The MEMCON of Donald Trump’s call with Volodymyr Zelenskyy invoked Barr personally, twice, including in the very same response where the President said that Marie Yovanovich would “go through some things.”

Well, she’s going to go through some things. I will have Mr. Giuliani give you a call and I am also going to have.Attorney General Barr call and we will get to the bottom of it.

According to a September 2019 NYT article, National Security Division head John Demers (who remains at DOJ and who oversees the FARA unit that would have a role in this prosecution), Deputy Attorney General Jeffrey Rosen, and Brian Benczkowski learned about the concerns about the call, including that it named Barr, even before the formal whistleblower complaint came in. Barr learned about it via some unexplained means.

It’s not clear what happened in that first round of review, but ultimately prosecutors reviewed it once the formal whistleblower complaint was referred by Joseph Maguire later in August and “declined to open an investigation.”

Mr. Eisenberg and Ms. Elwood both spoke on Aug. 14 to John Demers, the head of the Justice Department’s national security division, according to three people familiar with the discussion. Ms. Elwood did not pass on the name of the C.I.A. officer, which she did not know because his concerns were submitted anonymously.

The next day, Mr. Demers went to the White House to read the transcript of the call and assess whether to alert other senior law enforcement officials. The deputy attorney general, Jeffrey A. Rosen, and Brian A. Benczkowski, the head of the department’s criminal division, were soon looped in, according to two administration officials.

Department officials began to discuss the accusations and whether and how to follow up, and Attorney General William P. Barr learned of the allegations around that time, according to a person familiar with the matter. Although Mr. Barr was briefed, he did not oversee the discussions about how to proceed, the person said.

[snip]

At the end of August, the office of the director of national intelligence referred the allegations to the Justice Department as a possible criminal matter. Law enforcement officials ultimately declined to open an investigation.

While it’s true that Barr outsourced some actions — such as determining what to do with the first report and the White House request that DOJ publicly exonerate him — there’s no indication Barr recused from the investigation and indeed he remained in the loop with the White House about it. His failure to recuse is particularly important because, as the table above notes, he got briefed on the investigation into Parnas and Fruman not long after he was confirmed in February 2019. For most of August and September 2019, Barr and Jeffrey Rosen would have been two of the only people at DOJ who would recognize the danger the whistleblower complaint posed to Rudy and, through him, to Trump himself.

Ensure Public Integrity reviews only the Trump transcript, not the entire whistleblower complaint

Mind you, Barr didn’t conduct the investigation of the whistleblower complaint. Public Integrity prosecutors in the Criminal Division did, overseen by Brian Benczkowski.

According to an October 2019 report, Benczkowski still did not know of the investigation into Parnas and Fruman when he took a meeting with Rudy in the fall to discuss a bribery case implicating the Venezuelan who was paying for some of the Ukraine dirt-digging.

Several weeks ago, Brian A. Benczkowski, the head of the Justice Department’s Criminal Division, and lawyers from the division’s Fraud Section met with Mr. Giuliani to discuss a bribery case in which he and other attorneys were representing the defendants.

That meeting took place before the United States attorney’s office in Manhattan publicly charged the two Giuliani associates, Lev Parnas and Igor Fruman, with breaking campaign finance laws and trying to unlawfully influence politicians, including former Representative Pete Sessions, Republican of Texas. Mr. Parnas and Mr. Fruman were part of Mr. Giuliani’s effort to push Ukraine for an inquiry into Democrats.

“When Mr. Benczkowski and fraud section lawyers met with Mr. Giuliani, they were not aware of any investigation of Mr. Giuliani’s associates in the Southern District of New York and would not have met with him had they known,” said Peter Carr, a department spokesman.

[snip]

Prosecutors in Manhattan informed Attorney General William P. Barr about the investigation of Mr. Parnas and Mr. Fruman soon after he was confirmed in February, according to a Justice Department official. They were required to do so under the department’s rule that requires prosecutors to notify the attorney general of any cases that could generate national news media or congressional attention.

When Mr. Giuliani and other lawyers requested the meeting with the Justice Department to discuss a foreign bribery case, Mr. Benczkowski and the lawyers in the Fraud Section had not been informed of the Manhattan case and agreed to meet.

That exonerates him for being stupid enough to take the meeting, but it reveals something about the review of the complaint: it could not have adhered to the most basic rules of “connect-the-dots” investigations put in place after 9/11 to protect national security.

That’s because the first thing you’re supposed to do when you get a tip that implicates national security is to search DOJ’s holdings to see if the tip connects with any known suspects or investigations. Had this tip been treated like DOJ had been drilling for almost 17 years by the time the tip was received, then investigators would have searched on the OCCRP profile of Parnas and Fruman cited repeatedly in the full complaint.

Had that happened, then the implications of it would have been clear, it would have been referred to SDNY, Benczkowski would have learned about it, and DOJ wouldn’t have been making public exonerations of Trump.

Get OLC to overclassify the Barr connection and delay informing Congress

One likely way DOJ managed to avoid connecting Trump’s quid pro quo with the existing investigation of Parnas and Fruman is by treating the call with Zelenskyy, falsely, as the entirety of the whistleblower complaint. There’s no reference to Parnas and Fruman in the call, and so searching on it would not ID the tie to the SDNY investigation.

That’s one of several things that Steve Engel’s OLC did to attempt to avoid — and succeed in delaying — informing Congress about the complaint.

Engel’s OLC memo (a reprise of the memo that Amy Berman Jackson ruled was just a PR stunt to justify lying to Congress) claimed that the whistleblower complaint pertained exclusively to the conduct of the President and as such did not pertain to the Intelligence Community and so didn’t need to be shared with Congress. The only way to reach this decision would be to ignore the parts of the whistleblower complaint that deal with abuse of classification and the withholding of funds.

The other thing OLC did was to — at first– treat mentions of Barr and Rudy, as well as Ukraine and Zelenskyy, as Top Secret, even though the White House had only deemed those references to be Secret.

This effort, both to avoid informing the Intelligence Committees and, once he did, to hide key details from them, ultimately failed. But it did delay the discovery of the call from August to September 2019.

Warn Rupert Murdoch

Bill Barr had a meeting at SDNY the day before Parnas and Fruman were arrested on October 9. He went from there to a meeting with Rupert Murdoch, at Murdoch’s home.

It’s unclear what happened at that meeting, but Sean Hannity didn’t get on his flight to Vienna to meet with Dmitro Firtash, thereby avoiding even closer legal involvement in yet another Trump scandal.

There’s no evidence I know of that Barr similarly warned Rudy — Rudy canceled his trip, too, but it probably only took the arrest of Parnas and Fruman to persuade him of the wisdom of doing that. So I don’t consider this an act of obstruction protecting Rudy — just an act of obstruction protecting Sean Hannity.

Parnas has alleged that he was only arrested as a way to keep him silent about all this. While there’s a lot of reason to believe that’s possible, I’m not aware of proof that it did. It is, notably, one thing he was dangling his cooperation on with SDNY before he got remarkably quiet as the investigation into Rudy kicked into active mode.

Attempt to replace Geoffrey Berman with a Barr flunky

As noted, if we can believe Costello, then at some point SDNY did manage to conduct a search on Rudy’s iCloud. One possibility is that DOJ justified a search on Rudy after learning that Parnas had deleted his own iCloud account.

We may get more details of how that occurred with the Special Master argument.

For a time, the impeachment investigation presumably stalled any investigation into Rudy.

But last summer, at a time between the time when Rudy would have been implicated in the President’s Ukraine-related impeachment but before the time Rudy was attempting to undermine the election in explicit service of the President, Barr fired Geoffrey Berman. As Berman described, Barr attempted to bypass succession rules to temporarily put his own flunky in charge of the office, much as he had put Timothy Shea in at DC USA to kill investigations into Roger Stone, Mike Flynn, and (probably) Erik Prince.

By refusing to go along with Barr’s false claims that he had quit, however, Berman succeeded in ensuring that Audry Strauss, his then-Deputy, would replace him, where she remains today.

In all of Berman’s communications about why he dug in, he emphasized that there were investigations he wanted to see to completion, presumably including but not limited to this Rudy investigation.

Again, this effort failed. But, given what happened in DC, it is almost certain that this was an attempt to protect Rudy (and Steve Bannon).

DOJ used the election to refuse to approve a warrant on Rudy. And (while I’m having difficulty finding it) they imposed a policy requiring higher approvals for obtaining warrants on attorney content.

Effectively, that provided a way to stall the search into Rudy until April 20, 2021, when Lisa Monaco was approved.

Bill Barr tried, repeatedly, to entirely kill the investigation into Rudy, like he killed prosecutions of Stone and Flynn. But ultimately, one after another DOJ professional thwarted his attempts, and his abundant efforts to protect Rudy only managed to delay the investigation from October 2019 to April 2021.

Update: William Ockham notes that the change in policy was imposed on December 30, 2020, after Barr had resigned and at a time when Acting Attorney General Jeffrey Rosen knew that Joe Biden would take over DOJ. The new policy required consultation with a designated attorney in Office of Deputy Attorney General.

Within OEO, the Policy and Statutory Enforcement Unit (PSEU) is the section that provides this consultation. See Office ofthe Deputy Attorney General Guidance on AttorneyClient Privilege andAttorney Work Product Filter Protocols/or Search Warrants (July 2020). In many cases – particularly those involving significant investigations and high-profile matters – proposed searches are separately reported in urgent reports to the Attorney General and the Deputy Attorney General. To ensure mo!”e uniform notification procedures going forward, PSEU should notify the Office of the Deputy Attorney General (ODAG) of proposed searches involving subject attorneys. ODAG will assign an attorney to handle this responsibility who has the requisite knowledge and experience to provide meaningful input to PSEU. That attorney will provide updates to the Deputy Attorney General as necessary. Absent exigent circumstances, the OEO/PSEU consultation in Section 9-13.420 shall not be concluded until after ODAG has been notified and provided with an opportunity to provide input.

While probably not the sole intent, this may be why the search on Rudy was not approved until Lisa Monaco was confirmed on April 20.

Julian Assange’s First Witness, Journalism Professor Mark Feldstein, Professes to Be Unfamiliar with the Public Record on Assange

The first day of the Julian Assange extradition hearing was a predictable circus.

Assange’s lawyers tried two legal tactics.

First, they tried to get parts of the second superseding indictment excluded from the proceedings. They claimed they hadn’t had time to review it with Assange. While I’m sympathetic to the difficulties imposed by Assange’s imprisonment amid COVID measures, WikiLeaks supporters have at the same time been (correctly) complaining that the documents on which the new allegations are based have been public for some time.

In any case, it didn’t work. Judge Vanessa Baraister said that she had offered Assange the opportunity to raise this complaint in the last hearing.

Judge Baraister similarly rejected a bid to delay the hearing until January (not incidentally the period when, if a Trump pardon for Assange would be forthcoming, it would take place), on largely the same basis.

Next, Professor Mark Feldstein — a journalism professor at University of Maryland — tried to present his testimony. Technical problems forced Baraister to delay proceedings until tomorrow.

That has left the public with copies of Feldstein’s prepared testimony and a supplement before he has the opportunity to present it and lawyers for the US to grill him in response. That may be unfortunate, because Feldstein’s original testimony has some key errors and omissions, and in his supplement he professes a lack of familiarity with the public record in this case.

Let me be clear: I wholeheartedly agree with large swaths of Professor Feldstein’s testimony. Donald Trump has waged unprecedented attacks on members of the news media, both verbally and through policy. I agree, too, that the First Amendment is not limited to journalists, and that political advocacy like Assange’s has a storied place in the history of journalism. I agree that some of the stories based off Chelsea Manning’s leaks were blockbusters (Feldstein predictably starts by listing Collateral Murder, which is not charged, and his effort to include all the files that were charged strays much further from the ones that have been most important.) His history of classified leaks is useful, though in some places he seems to misunderstand what was new and what wasn’t revealed until the release of declassified documents. His statement speaks at length about the dire problem with overclassification (though in one case, he cites a John McCain accusation about Obama’s motive for leaking as fact, a claim that hasn’t held up to subsequent events; he later cites McCain as a classification villain). I even agree with some, though not all, of his analysis of how the charges against WikiLeaks threaten normal journalistic activities like soliciting, receiving, and publishing documents, and protecting confidential sources. (Feldstein never goes so far as to defend helping a source hack something.) His testimony is valuable for the background on journalism it offers.

But Feldstein’s account of how the Assange prosecution arose out of Donald Trump’s election — which occurred with Assange’s help!!! — not only invents claims he doesn’t support, but makes several telling errors in citation.

Donald Trump’s election changed the calculus. The month after his inauguration, the president met with FBI director James Comey and brought up the issue of plugging leaks. Comey suggested “putting a head on a pike as a message” and Trump recommended “putting reporters in jail.”83 Three days later, he instructed his attorney general to investigate “criminal leaks” of “fake” news reports that had embarrassed the White House.84 According to press accounts, the new administration soon “unleashed an aggressive campaign” against Assange. CIA director Mike Pompeo publicly attacked WikiLeaks as a “hostile intelligence service” that uses the First Amendment to “shield” himself from “justice.” In private, he briefed members of Congress on a bold counterintelligence operation the agency was conducting that included the possible use of informants, penetrating overseas computers, and even trying to directly “disrupt” WiliLeaks, a move that made some lawmakers uncomfortable.85 A week later, Attorney General Jeff Sessions said at a news conference that journalists “cannot place lives at risk with impunity,” that prosecuting Assange was a “priority” for the new administration, and that if “a case can be made, we will seek to put some people in jail.” 86 The new leaders at the Justice Department dismissed their predecessors’ interpretation that Assange was legally indistinguishable from a journalist and reportedly began “pressuring” their prosecutors to outline an array of potential criminal charges against him, including espionage. Once again, career professionals were said to be “skeptical” because of the First Amendment issues involved and a “vigorous debate” ensued. 87 Two prosecutors involved in the case, James Trump and Daniel Grooms, reportedly argued against charging Assange.88 But in April of 2019, Assange was arrested in London—even though “the Justice Department did not have significant evidence or facts beyond what the Obama-era officials had when they reviewed the case.”89

83 Abramson, “Comey’s wish for a leaker’s ‘head on a pike.’”

84 “Remarks by President Trump in Press Conference,” WH.gov (Feb. 16, 2017); Charlie Savage and Eric Lichtblau, “Trump Directs Justice Department to Investigate ‘Criminal Leaks,’” New York Times (Feb. 16, 2017); Barnes, et al, “How the Trump Administration Stepped up Pursuit of WikiLeaks’ Assange.”

85 CIA, “Director Pompeo Delivers Remarks at CSIS” (April 13, 2017): www.cia.gov/news-information/speechestestimony/2017-speeches-testimony/pompeo-delivers-remarks-at-csis.html.

86 “Sessions Delivers Remarks,” Justice.gov. [sic]

87 Matt Zapotosky and Ellen Nakashima, “Justice Department debating charges against WikiLeaks members,” Washington Post (April 20, 2017); Adam Goldman, “Justice Department Weighs Charges Against Julian Assange,” New York Times (April 20, 2017).

88 Devlin Barrett, Matt Zapotosky and Rachel Weiner, “Some federal prosecutors disagreed with decision to charge Assange under Espionage Act,” Washington Post (May 24, 2019). 89 Barrett, et al, “Prosecutors Disagreed.”

The first citation (83) is to a 2018 story on Jim Comey’s memos memorializing conversations about leaks damaging to Trump, not WikiLeaks. The second (84) refers to an effort to go after those who damaged Trump. The next three sentences are attributed to Mike Pompeo’s designation of WikiLeaks as a non-state hostile actor in April 2017 (85), in the wake of the Vault 7 leaks, but two of those sentences (bolded) are not actually sourced to Pompeo’s comments, but instead to news accounts not specified in the relevant footnote. The next sentence combines what Jeff Sessions said on April 20, 2017 and what he said on August 4, 2017; perhaps Feldstein aims to cover that up by not including a date or a citation in the remarks in question (see footnote 86; Sessions’ April 20 comments don’t appear to be on the DOJ website), but suggesting Sessions’ August comments were about Assange is a move that WikiLeaks has made elsewhere. Importantly, Feldstein does not footnote one of the most widely cited reports of that April 20 speech, a CNN report that describes what changed, already in 2017, since DOJ had earlier decided not to prosecute Assange.

The US view of WikiLeaks and Assange began to change after investigators found what they believe was proof that WikiLeaks played an active role in helping Edward Snowden, a former NSA analyst, disclose a massive cache of classified documents.

[snip]

US intelligence agencies have also determined that Russian intelligence used WikiLeaks to publish emails aimed at undermining the campaign of Hillary Clinton, as part of a broader operation to meddle in the US 2016 presidential election. Hackers working for Russian intelligence agencies stole thousands of emails from the Democratic National Committee and officials in the Clinton campaign and used intermediaries to pass along the documents to WikiLeaks, according to a public assessment by US intelligence agencies.

That is, if Feldstein had reviewed the press coverage more broadly, he would have a ready explanation for why DOJ began to rethink its earlier decision not to charge Assange.

Assange’s own filing may attempt to cover for Feldstein’s citation inaccuracy, claiming that Feldstein cited that April WaPo story rather than ““Sessions Delivers Remarks,” Justice.gov”.

Then came the political statement of Attorney General Sessions on 20 April 2017 that the arrest of Julian Assange was now a priority and that ‘if a case can be made, we will seek to put some people in jail’ [Feldstein quoting Washington Post article of Ellen Nakashima, tab 18, p.19].

But even that April 20, 2017 WaPo article he claims to rely on doesn’t help him. In fact, it disputes Feldstein’s account of Trump’s animus towards WikiLeaks.

Trump has had a fluid relationship with WikiLeaks, depending largely on how the group’s actions benefited or harmed him. On the campaign trail, when WikiLeaks released Podesta’s hacked emails, Trump told a crowd in Pennsylvania, “I love WikiLeaks!” But when it came to the release of the CIA tools, he did not seem so pleased.

“In one case, you’re talking about highly classified information,” Trump said at a news conference earlier this year. “In the other case, you’re talking about John Podesta saying bad things about the boss.”

The actual words cited in part to the WaPo in Feldstein’s testimony (naming Ellen Nakashima, not Matt Zapotosky) don’t appear in the April story but in the NYT story cited. The rest relies on a [Devlin Barret and] Zapotosky story fairly obviously sourced to prosecutor James Trump, whom Zapotosky covered in the Jeffrey Sterling case and other EDVA cases but who — the story admits — wasn’t on the team anymore even when Assange was originally charged (presumably meaning December 2017 on just a CFAA charge that would accord with AUSA Trump’s concerns about an Espionage charge), and who would therefore have no visibility into what went into the May 2018 superseding indictment of Assange, much less the one on the table now.

In short, a key paragraph in Feldstein’s testimony, which is cited repeatedly in both Assange’s briefs on the case (one, two), is a scholarly shit-show.

And that’s before you consider the chronology of it, omitting as it does the Vault 7 leak which all the Assange-specific comments were responding to, which started on March 7, 2017.

That’s not the only problem with Feldstein’s citations. Feldstein also footnotes a claim that Assistant Attorney General for DOJ’s National Security Division John Demers, “declared that ‘Julian Assange is no journalist’ and thus not protected under the free press clause of the US Constitution’s First Amendment” with a citation to news reports on the indictment, rather than the remarks as prepared rolling out the indictment. While the story from Charlie Savage that Feldstein cites responsibly quotes Demers in context, the full statement makes it clear that it’s not only not a comment directly about the First Amendment, but that Demers never mentions the First Amendment.

The Department takes seriously the role of journalists in our democracy and we thank you for it. It is not and has never been the Department’s policy to target them for their reporting.

Julian Assange is no journalist. This made plain by the totality of his conduct as alleged in the indictment—i.e., his conspiring with and assisting a security clearance holder to acquire classified information, and his publishing the names of human sources.

Indeed, no responsible actor—journalist or otherwise—would purposely publish the names of individuals he or she knew to be confidential human sources in war zones, exposing them to the gravest of dangers.

This continues WikiLeaks’ longstanding effort to suggest the government has made First Amendment claims about Assange that obscure what they have actually said. (AUSA Gordon Kromberg does appear to have addressed the First Amendment in ways WikiLeaks has claimed that others have, but his affidavit is not yet public.)

While Kromberg’s testimony is not yet public, in one of the government’s filings made public today, the government hints at what Kromberg may have said at more length, noting that Feldstein only cites part of — but not the entirety — of a news report on Assange.

The principal evidence upon which the defence relies to demonstrate the existence of a such a decision is a newspaper article dated 25 November 2013 [Sari Horowitz, “Julian Assange is unlikely to face US Charges over publishing classified documents”, Washington Post]; Cited by Professor Feldstein at §9 page 18. 39.

Professor Feldstein omits important sections of the report upon which he relies to demonstrate a “decision” not to prosecute:

“The officials stressed that a formal decision has not been made, and a grand jury investigating WikiLeaks remains impaneled, but they said there is little possibility of bringing a case against Assange, unless he is implicated in criminal activity other than releasing online top-secret military and diplomatic documents.

And:

“WikiLeaks spokesman Kristinn Hrafnsson said last week that the anti-secrecy organization is skeptical “short of an open, official, formal confirmation that the U.S. government is not going to prosecute WikiLeaks.” Justice Department officials said it is unclear whether there will be a formal announcement should the grand jury investigation be formally closed”.

So, in response to Kromberg, Feldstein dug himself a very much deeper hole.

In a supplemental filing, Assange expert witness Mark Feldstein claimed and exhibited that he’s not familiar with the public record (though he cleaned up some of his prior citation errors). In it, he claimed the only way to know the truth about the Assange prosecution would be from leaks of grand jury or White House documents. “[T]he reporting I cited by the New York Times and Washington Post is to date the only public source of information about the behind-the-scenes maneuvering to prosecute Assange,” he claimed in a filing submitted on July 5, 2020.

The government insists that the Trump administration’s prosecution of Assange is not politically motivated. It dismisses my contrary conclusion—and that of other expert witnesses—by saying that we “primarily rely on a select number of news articles…and the hearsay within them.”

Indeed, my declaration relied on news accounts that the Obama administration decided not to prosecute Assange because of concerns that doing so would violate the First Amendment. 2 In particular, I cited comments that Matthew Miller, the former spokesman for the Obama Justice Department, made in an interview with the Washington Post: “The problem the department has always had in investigating Julian Assange is there is no way to prosecute him for publishing information without the same theory being applied to journalists. And if you’re not going to prosecute journalists for publishing classified information, which the department is not, then there is no way to prosecute Assange.” The Post reported that prosecutors called this the “New York Times problem”—that if they indicted Assange for publishing the documents leaked by Chelsea Manning, then they would also have to also indict the New York Times for doing the same.3

I also noted that the Trump administration decide to reject this interpretation and cited a New York Times report that its new appointees running the Justice Department began “pressuring” prosecutors to indict Assange, although two career prosecutors argued against doing so on First Amendment grounds. I also cited the article’s finding that “the Justice Department did not have significant evidence or facts beyond what the Obama-era officials had when they reviewed the case”4 and concluded that the decision to indict Assange was not an evidentiary decision but a political one.5

As the government knows, internal prosecutorial deliberations are not a matter of public record. White House and Justice Department documents that would shed further light on the political dimensions of the case—emails, internal memos, grand jury transcripts, and other records—are kept secret by the government. Thus, the reporting I cited by the New York Times and Washington Post is to date the only public source of information about the behind-the-scenes maneuvering to prosecute Assange.

Like so much other questionable conduct by the Trump administration, revelations about the unorthodox nature of this prosecution came to light only because of the vigilance of a free and vigorous press.

1 Gordon D. Kromberg, “Declaration in Support of Assange Extradition,” US v. Assange (Jan. 17, 2020), ¶18-19, pp. 8- 9.

You have got to be fucking kidding me!!

I invite Professor Feldstein to assign his undergraduate journalism students with the task of trying to discover any Trump, White House, and National Security views about WikiLeaks and Julian Assange that might explain why DOJ decided not to prosecute in 2013 but did prosecute in 2017, 2019, and 2020.

His first year undergraduate students might note the proximity between the April 2017 Assange-related announcements (the Jeff Sessions of which he obscures with his dodgy citation) and the release of the Vault 7 files in March 2017, which burned the CIA hacking ability to the ground.

They also might point to Trump’s tweets celebrating WikiLeaks to suggest that while Trump might hate the traditional press, he spent most of the 2016 campaign celebrating WikiLeaks.

Feldstein’s second year undergraduate students might look to the obvious places — like the Mueller Report — for some views about how Trump ordered campaign staff to go chase down WikiLeaks’ releases. Not only do the descriptions completely undermine Feldstein’s claim that Trump treats WikiLeaks like he does traditional media outlets, but it shows that the Department of Justice conducted an extensive investigation implicating WikiLeaks after the 2013 Matthew Miller quote he relies on. Indeed, exceptional sophomores might note that a redaction error in the Mueller Report makes it clear that a Mueller prosecutorial decision about foreign donations pertains to WikiLeaks, a detail released in 2019 that James Trump would not have been privy to.

Junior year journalism students might refer to the Stone trial testimony to see what it said about Trump’s relationship with WikiLeaks. Really astute journalism students would note that Randy Credico testified that Donald Trump’s rat-fucker Roger Stone actually reached out to Randy Credico in an effort to broker a pardon for Assange.

Q. Had you put Mr. Stone directly in touch with Ms. Kunstler after the election?

A. Yes, I did.

Q. And why had you done that?

A. Well, sometime after the election, he wanted me to contact Mrs. Kunstler. He called me up and said that he had spoken to Judge Napolitano about getting Julian Assange a pardon and needed to talk to Mrs. Kunstler about it. So I said, Okay. And I sat on it. And I told her–I told her–she didn’t act on it. And then, eventually, she did, and they had a conversation.

The same astute budding journalists might look at the trial record and discover how long those pardon discussions lasted — continuing well past the time Mike Pompeo and Jeff Sessions were discussing prosecuting journalists and/or Assange.

Senior journalism students might even tie that testimony to a question Robert Mueller asked — but didn’t really get an answer about — regarding whether Trump had considered an Assange pardon.

Donald Trump refused to answer a question under oath about whether he considered pardoning Julian Assange during the transition period between when WikiLeaks releases helped get him elected and his inauguration, something that makes it pretty clear the President treats WikiLeaks and Assange, which helped him get elected, differently than he does journalists who did not.

Professor Feldstein says he’d need a leak to discover that.

There’s a slew more that graduate students might discover but that Feldstein professed to be helpless to discover himself, such as the warrant that makes it clear Stone reached out to WikiLeaks lawyer Margaret Kunstler — to discuss an Assange pardon, WikiLeaks supporter Randy Credico testified to under oath — seven days after Trump got elected.

Or the other Stone warrant making it clear that after several of the media reports Feldstein relies on, Mueller’s team was just beginning to obtain warrants implicating Assange, in part for election-related crimes that have nothing to do with the Espionage Act. Or yet another that suggests DOJ was investigating WikiLeaks, in part, for conspiracy and Foreign Agent charges in August 2018.

Diligent journalism students — budding journalists not intimidated by redaction marks — might even look to the multiple SSCI Reports that address the government’s evolving understanding of WikiLeaks, particularly those that show how the many conflicting views in 2016 came to change to believe that WikiLeaks had been coopted by Russia.

Despite Moscow’s history of leaking politically damaging information, and the increasingly significant publication of illicitly obtained information by coopted third parties, such as WikiLeaks, which historically had published information harmful to the United States. previous use of weaponized information alone was not sufficient for the administration to take immediate action on the DNC breach. The administration was not fully engaged until some key intelligence insights were provided by the IC, which shifted how the administration viewed the issue.

Here, in public view, is indication that not just DOJ but the entire Intelligence Community came to shift their view of WikiLeaks and Assange as they investigated how Russia had attacked US democracy in 2016. But Mark Feldstein testified in his supplemental testimony that he could only discover that if someone leaked it to him.

Finally, Feldstein’s students might seek to understand the workings of a grand jury from the same place journalists always have, from those called to testify before them. Had they done so, they would at a minimum discover the Jeremy Hammond description of how he refused to testify for what would be the last superseding indictment against Assange, in which he described prosecutors twice claiming (without evidence) that Assange is “a Russian spy.”

“What could the United States government do that could get you to change your mind and obey the law here? Cause you know” — he basically says — “I know you think you’re doing the honorable thing here, you’re very smart, but Julian Assange, he’s not worth it for you, he’s not worth your sacrifice, you know he’s a Russian spy, you know.”

[snip]

He implied that all options are on the table, they could press for — he didn’t say it directly, but he said they could press for criminal contempt. … Then he implies that you could still look like you disobeyed but we could keep it a secret — “nobody has to know I just want to know about Julian Assange … I don’t know why you’re defending this guy, he’s a Russian spy. He fucking helped Trump win the election.”

The claims of a prosecutor as he’s trying to coerce testimony don’t affirm the veracity of the claim. Hammond’s claims in no way prove that Assange is a Russian spy or even that DOJ believes he is. But it does indicate what DOJ’s then-current claims were, in March 2020, before the most recent superseding indictment against Assange. They would indicate that the prosecutors asking for the extradition of Julian Assange claim to believe he is a Russian spy.

There is an embarrassment of public documents describing how the US government’s view of Assange changed between 2013 and 2020, as well as plenty that show DOJ was obtaining new legal process well after DOJ decided not to prosecute Assange. That doesn’t mean their view is correct or that it in any way mitigates the risk to journalism. But it does mean their view is discoverable by anyone who wants to check the public record.

And yet journalism Professor Mark Feldstein professes to be helpless to explain why DOJ charged Assange in 2017 and 2019 and 2020 but not in 2013, not unless someone leaks to him what DOJ and Trump and the rest of the US government were really thinking. And so instead, he offered a paragraph that falls apart completely if you simply read his source material, to say nothing of the public record.

Feldstein gives himself a bit of an excuse by claiming that his scholarly statement doesn’t address what happened after 2011 (a focus that may come from WikiLeaks’ lawyers — recall that someone close to Assange scolded me for reporting accurately on what WikiLeaks had done in 2016 and afterwards).

It should be noted that this report addresses only WikiLeaks disclosures in 2010-2011, the time period when Assange is accused of violating the Espionage Act; it does not discuss the website’s previous or subsequent document releases.

But you can’t claim to provide expert testimony about what DOJ was doing in 2017 without considering what WikiLeaks had done in the interim, and how that might change investigative tactics and conclusions (and did, in fact, lead DOJ to reconsider the evidence they had).

The record shows that — far from treating Assange with the disdain Trump harbored towards traditional journalists — Trump’s close associates entertained numerous discussions about pardons, and Trump himself refused to deny that under oath to Mueller. It further shows that the targeting of Wikileaks immediately followed the Vault 7 leaks burned the CIA’s hacking capacity to the ground (a prosecution that Trump himself almost blew up hours before the FBI confiscated Schulte’s passports). Finally, there is an abundance of evidence discoverable in the public record by any diligent journalism student that the understanding of WikiLeaks significantly evolved after the decisions not to charge Assange in 2013, in part because a national security investigation sought to figure out how badly Russians had tampered in our election, and in part because Trump got all kinds of help in the election from foreigners (including Assange).

Mark Feldstein claims in his expert testimony that what is happening to Julian Assange is just part of Trump’s larger assault on the press.

Seen in this light, the administration’s prosecution of Julian Assange is part and parcel of its campaign against the news media as a whole. Indeed, Assange’s criminal indictment under the US Espionage Act is arguably its most important action yet against the press, with potentially the most far-reaching consequences.

But he makes that claim while also admitting zero familiarity about the public record concerning Assange which shows the opposite.

The Julian Assange prosecution presents serious risks to journalism. But none of those excuse shoddy journalism — a failure to even consult the public, official record — in support of his case. That’s what Assange’s first witness is planning to do.

Update: Cleaned up the post and fixed a date.

The Latest Stinky 702 Opinion Bodes Poorly for the Next One

Last night, I Con the Record released last year’s 702 opinion, approved by current presiding FISA Judge James Boasberg. It’s stinky. It shows continued violations of querying procedures (which I’ll describe below), as well as on new troubling issue at NSA (which I hope to describe in a follow-up).

Worse still, the opinion, the timing, and recent Bill Barr actions suggest we’ll see an even stinkier opinion in maybe another year.

The opinion we’re getting on September 3, 2020, was released by FISC on December 6, 2019. Not only has it taken nine months to release this opinion, but ODNI sat on it in anticipation of and in the aftermath of the DOJ IG Report on Carter Page, which was publicly released December 9, 2019. That means that the delay in releasing this led to a disproportionate focus on events that happened three or four years ago, but not on events that have persisted under Billy Barr.

But the timing is important for several other reasons: the government has to be preparing its next reapproval package now (assuming the 2019 certificates are good until December 5, it would need to submit a new package by November 5). That’s significant for several reasons. First, as laid out by the timeline below, while the FBI waited for a FISCR review of an October 2018 Boasberg decision that its querying procedures didn’t comply with a new requirement passed by Congress, there were ongoing querying problems of the same type, including both the deliberate querying of 702 information to vet sources (and cops), but also at least one mass query that ended up finding seven leads out of 16,000 Americans. There was a significant delay in reporting some of these:

  • Querying violations found in June reported September 18, 2019
  • Querying violations found in July reported September 6, 2019
  • August querying violation involved 16,000 people reported November 25, 2019

In addition, there were several more reports on querying violations, one on September 17, and another on September 20.

That is, the reports on some of these were delayed until after FISCR ruled (on July 12), and for many of them, there was a delay until around the same time as the government submitted their new reauthorization packet on September 17, 2019 (which is the package that led to this December 6 opinion).

Then, after submitting the reauthorization package, starting on October 4, 2019, the FBI asked to be excused from two reporting requirements imposed in 2018.

In one case — requiring that FBI has retained 702 information in some archival systems — the FBI waited to comply with a change in reporting requirements made in October 2018 until it was prepping the 2019 certificates, and then asked for a weaker reporting requirement (and got it, prospectively).

It must be noted, however, that the government has unjustifiably disregarded the current reporting requirement. Instead of taking concrete steps to comply even partially with the Court’s directive (or timely seeking relief from it), it chose to wait while the FBI reportedly worked on guidance to instruct its personnel on how to handle unminimized Section 702 information on these archival systems. See Letter Regarding the FBI’s Steps to Implement an Aspect of the Court’s 2018 Section 702 Opinion and Order, Sept. 27, 2019, at 3. In fact, it has taken so long to prepare this guidance that, instead of using it to instruct personnel on the October 2018 reporting requirement, which the government reports was the original plan, the FBI now intends to address only the narrower reporting requirement incorporated into the FBI’s proposed minimization procedures. See Letter Regarding the FBI’s Steps taken by the FBI to implement an aspect of the Comt’s 2018 Section 702 Opinion and Order, Nov. 20, 2019, at 4.

It should be unnecessary to state that government officials are not free to decide for themselves whether or to what extent they should comply with Court orders. The government has not sought retrospective relief from the reporting requirement imposed by the Court on October 18, 2018. Although the AG and DNI have amended the prior Section 702 certifications to authorize the FBI to apply its proposed minimization procedures to information acquired under prior certifications, that authorization only becomes “effective on October 17, 2019, or on the date upon which [this Court] issues an order concerning [the] amendments pursuant to subsection 702(j)(3) of the Act, whichever is later.”[redacted] The Court’s approval of those amendments does not have any nunc pro tune effect, nor does it excuse the government from reporting instances of retention that it is already obligated to report. With respect to those instances of retention, the October 2018 reporting requirement remains in effect.

In another — far more important — case, the FBI asked for the reporting requirement (on when an Agent conducts a criminal search and finds 702 information) to be eliminated entirely, again, after the reauthorization package was completed. This reporting requirement was designed to test the FBI’s now provably false claim that agents would never find 702 information when conducting criminal searches. It goes to the heart of concerns about Fourth Amendment violations.

Boasberg relaxed, though did not eliminate, that reporting requirement.

The government has not reported such instances in timely fashion. Rather, they have been reported to the Court belatedly, usually after they were uncovered during oversight reviews. The government now seeks relief from this reporting requirement “because the requirements in Section 702(f)(2) are a sufficient mechanism for the Court to assess the risk that the results of a query designed to elicit evidence of crimes unrelated to foreign intelligence will be viewed or otherwise used in connection with an investigation that is unrelated to national security.” October 4, 2019, Request at 8. But it would be premature to regard the government’s implementation of Section 702(f)(2) as a sufficient source of information. As discussed above, the FBI has repeatedly accessed Section 702-acquired contents under circumstances requiring a FISC order under Section 702(£)(2), but has never applied for such an order.

Closer to the mark is the government’s contention that implementing both Section 702(f)(2) and the November 2015 reporting requirement could complicate training and systems design. See October 4, 2019, Request at 8-9. For example, Section 702(f)(2) looks to whether a query involves a U.S.-person query term, while the applicability of the November 2015 reporting requirement depends on whether U.S.-person information is retrieved. And Section 702(f)(2) is implicated only when contents are accessed, while the November 2015 reporting requirement · does not distinguish between contents and non-contents information.

The Court has decided to retain a reporting requirement separate from Section 702(f)(2) because the obligation to get a FISC order under that section is limited to queries conducted in the context of a predicated criminal investigation. The FBI conducts numerous queries of Section 702 information at earlier investigative stages. See October 18, 2018, Opinion at 75. Reports about queries at those stages remain relevant to the Court’s interest in receiving information about the extent to which U.S.-person privacy interests are implicated by queries that are not designed to find and extract foreign-intelligence information. The Court has concluded, however, that it is appropriate to modify the prior reporting requirement so that it will focus on the use of U.S.-person query terms, rather than on whether U.S.-person information is accessed as a result of a query, and will be triggered only when contents information is accessed. Such modifications should make it considerably simpler for the government to implement the requirement in combination with Section 702(f)(2), while still requiring reporting in situations where Fourth Amendment concerns are likely to be implicated. See October 18, 2018, Opinion at 93 (queries that use U.S.-person query terms and result in review of contents are “the subset of queries that are particularly likely to result in significant intrusion into U.S. persons’ privacy”).

Ultimately, Boasberg approved the certifications, effectively arguing that FBI just needed time to be trained on them.

The Court has previously assessed that requiring FBI personnel to document why a query involving a U.S.-person query term is reasonably likely to have returned foreign-intelligence information or evidence of crime before examining contents returned by the query should “help ensure that FBI personnel … have thought about the querying standard and articulated why they believe it has been met” and prompt them “to recall and apply the guidance and training they have received on the querying standard.” See id. at 93; see also In re DNI/AG Certifications at 41 (that requirement may “motivate FBI personnel to carefully consider … whether a query satisfies” the standard). The recently reported querying violations suggest that some FBI personnel still need such help. That is not altogether surprising. As discussed above, the FBI is really just sta11ing to implement that documentation requirement on a comprehensive basis. For that reason, the improper queries described above do not undermine the Court’s prior determination that, with that requirement, the FBI’s querying and minimization procedures meet statutory and Fourth Amendment requirements.

I suggested when the 2018 package was released last year, we’d start learning details of back door searches that had been implicit since 2007.

Nevertheless, 12 years after this system was first moved under FISA (notably, two key Trump players, White House Associate Counsel John Eisenberg and National Security Division AAG John Demers were involved in the original passage), we’re only now going to start getting real information about the impact on Americans, both in qualitative and quantitative terms. For the first time,

  • We will learn how many queries are done (the FISC opinion revealed that just one FBI system handles 3.1 million queries a year, though that covers both US and non US person queries)
  • We will learn that there are more hits on US persons than previously portrayed, which leads to those US persons to being investigated for national security or — worse — coerced to become national security informants
  • We will learn (even more than we already learned from the two reported queries that this pertained to vetting informants) the degree to which back door searches serve not to find people who are implicated in national security crimes, but instead, people who might be coerced to help the FBI find people who are involved in national security crimes
  • We will learn that the oversight has been inadequate
  • We will finally be able to measure disproportionate impact on Chinese-American, Arab, Iranian, South Asian, and Muslim communities
  • DOJ will be forced to give far more defendants 702 notice

The thing is, 11 months after the release of that opinion, we’re still not seeing results — in the form of declassified opinions — of what FBI’s querying really looks like, once they’re forced to actually track it. The entirely of this 2019 opinion still shows what Boasberg considers the pre-implementation period for this reporting regime.

And the FBI has been trying to weaken it for two years now!

There’s one more indication that we may see troubling details once we get the next 702 opinion in a year’s time, if we do get it.

Less than a week ago, Billy Barr issued a memo imposing a new national security auditing function on the FBI.

To enhance the FBI’s existing compliance efforts, the Director of the FBI is taking steps to build a more robust and exacting internal audit capability, including the creation of an office focused on auditing the FBI’s national security activities. To support that effort, I hereby authorize the Director of the FBI to commence the process of establishing, consistent with law and policy, the Office ofInternal Auditing (“OIA”). A separate office devoted to internal auditing and headed by a senior FBI official will ensure that ri gorous and robust auditing, which is an essential ingredient to an effective compliance regime, is canied out. The FBI shall work with the Justice Management Division to make the required reorganization notifications regarding this new office. Once established, OJA shall be led by an Assistant Director who shall have the same reporting chain as the Assistant Director for OIC and the Assistant Director for INSD. The Director of the FBI shall appoint the Assistant Directors for OIC, INSD, and OIA, with the approval of the Deputy Attorney General.

OIC, INSD, and OIA shall be responsible for carrying out the internal compliance functions of the FBI as assigned by the Director of the FBI, who shall ensure that each office does not duplicate responsibilities and is adequately staffed to perform its assigned functions. The Deputy Attorney General and the Assistant Attorney General for Administration shall coordinate with the Director to ensure that those functions are resourced and funded appropriately.

Even though Barr says the newly created OIA won’t overlap with the compliance and inspection functions at FBI, it’s not clear why not. Further, Barr’s memo does not explicitly say why FBI needed a new compliance review for national security cases rather than the existing legal reviews that had conducted such review.

Don’t get me wrong, done correctly, this could be a long-needed reform. It’s not clear it is being done correctly. It seems partly timed to the elections (with a report on implementation due just before then). And DOJ IG — which has, historically, found abundant problems with the functions enumerated here — will not review the efficacy of this until around May 2022.

The Department ofJustice Inspector General has agreed to assess the implementation of this memorandum (“initial assessment”) no sooner than 18 months after the establishment of OIA and to report such assessment, consistent with the Inspector General Act, to the Attorney General, Deputy Attorney General, Director of the FBI, and Assistant Attorney General for National Security. The Inspector General has furt her agreed to conduct a subsequent assessment no later than five years after the initial assessment, and periodically thereafter as determined by the Inspector General, and to report such assessments, consistent with the Inspector General Act, to the Attorney General, Deputy Attorney General, Director of the FBI, and Assistant Attorney General for National Security.

Within 60 days of the date of the Inspector General’s initial assessment, the Director of the FBI shall provide the Attorney General and Deputy Attorney General an assessment of the implementation of this memorandum, including an assessment of the effectiveness of the FBI’s compliance structure and whether compliance functions should be consolidated under an Executive Assistant Director.

Which is to say, this initiative, while it may be long overdue, feels like Barr trying to get ahead of something or somethings.

Billy Barr is an authoritarian. He doesn’t care about surveillance (indeed, he’s the grandfather of the dragnets that Edward Snowden revealed).

But something must have led him to take action to make it look like he cares.

Timeline

March 24-27, 2017: The querying of 70K facilities “associated with” persons who had access to the FBI’s facilities and systems. FBI General Counsel (then run by Jim Baker, who had had these fights in the past) warned against the query, but FBI did it anyway, though did not access the communications. This was likely either a leak or a counterintelligence investigation and appears to have been discovered in a review of existing Insider Threat queries.

December 1, 2017: FBI conducted queries on 6,800 social security numbers.

December 7-11, 2017, the same entity at FBI also queried 1,600 queries on certain identifiers, though claimed they didn’t mean to access raw data.

February 5 and 23, 2018: FBI did approximately 30 queries of potential sources.

February 21, 2018: FBI did 45 queries on people being vetted as sources.

March 27, 2018: Initial 2018 package submitted.

April 5, 2018: Extension order.

Before April 13, 2018: an unspecified FBI unit queried FISA acquired metadata using 57,000 identifiers of people who work in some place.

October 17, 2018: Order finding FBI querying procedures do not comply with FISA.

February 21, 2019: NSA submits notice of Upstream violations.

February 26, 2019: Date after which NSA fixes Upstream violations.

June 2019: Oversight review finds violations of querying rules, including to vet a source, a candidate to be a local cop, and to find information about a planned visit by foreign officials.

June 26, 2019: Notice that CIA assistance to NCTC does not comply with rules.

July 2019: Oversight review finds violations of querying rules, including of college students in a “Collegiate Academy” and individuals who visited an FBI office. 

July 12, 2019: FISCR opinion finding that FBI querying procedures do not comply with FISA.

August 2019: Query of 16,000 persons identifies seven leads. 

August 12, 2019: FBI submits new querying procedures.

August 23, 2019: NSA complains about post-tasking for some collections.

September 4, 2019: Approval of amended FBI querying procedures.

September 6, 2019: Report of July 2019 query violations.

September 13, 2019: Notice regarding 702 query response showing 100 characters of text surrounding search term.

September 17, 2019: Application submitted, including proposed improvements on targeting procedures.

September 17, 2019: Notice of at least four querying violations involving taking steps to access 702 products without getting a warrant.

September 18, 2019: Report on June 2019 query violations.

September 20, 2019: Reports of other FBI querying violations, including to vet sources, to search on complainants, and to vet potential cops.

September 26, 2019: 45-day report on fulfilling FBI query rules.

October 1, 2019: Review period extended to December 16, 2019 (because of NSA and NCTC compliance issues, not FBI ones).

October 3, 2019: FISC orders further information.

October 4, 2019: FBI requests relief from requirement to report 702 access in response to criminal search.

October 10, 2019: Notice of overly attenuated NSA queries, including content searches using 23 US person identifiers.

October 11, 2019: Notice on FBI violations tied to not opting out of including FISA in searches.

November 4, November 13, 2019: Government provides additional information.

November 8, 2019: 45-day report on fulfilling FBI query rules.

November 14, 2019: Notice on violations tied to not opting out of including FISA in searches.

November 20, 2019: Government tells FISC that they never tried to comply with reporting requirement imposed in October 2018, are instead training their new proposed compliance method.

November 25, 2019: Notice regarding August 2019 mass query.

mid-December 2019: Date FBI promised to impose new record-keeping on FBI’s queries.

January 2020: Date NSA promised to have purged improperly acquired communications.

Horowitz

DOJ’s Accounting of Its FISA Errors Cannot Be Compared to the Carter Page Report

Last year, Bill Barr adopted the stance that Inspector General Michael Horowitz’s assessment of FISA — in the report on the Carter Page FISA applications — wasn’t strict enough, because it found no evidence that the errors in the applications arose from political bias. Last week, Bill Barr’s DOJ adopted the opposite stance, that DOJ IG was too critical of FISA, finding errors in the FBI process where there were none.

It did so in the second of two filings reviewing the errors that DOJ IG had found in 29 other FISA applications. When DOJ IG released an interim report (MAM) describing those errors in March, it appeared to suggest that the level of error in the Carter Page applications — at least with respect to the Woods Files — was actually lower than what DOJ IG had found in the 25 applications.

Now, DOJ appears to be trying to claim — without basis — that that’s not the case.

Ahead of the release of the actual filing, DOJ and FBI orchestrated a press release last week, announcing that they would tell the court none of the errors identified by DOJ IG invalidated the probable cause finding for the 29 files. Predictably, both the responsible press and the frothy right (in stories that misunderstood the findings of either DOJ IG report and at times made errors about the FISA process), concluded that this review shows that Page’s application was uniquely bad.

Only after the press had jumped on that conclusion did DOJ release the filing (here’s the earlier one and here’s AAG John Demers’ statement in conjunction with last week’s release).

The filing makes it clear that it is impossible to draw any comparison between these findings about the earlier Carter Page ones (or even to declare — as many in the press have — that this filing proves DOJ’s FISA problems aren’t as bad as DOJ IG suggested).

That’s true for three reasons:

  • DOJ IG has not finished the kind of review on any of the 29 files it did for Page, and DOJ is not claiming it did either
  • DOJ used a dramatically different methodology for this Woods review than DOJ IG did for the Page review
  • DOJ effectively disagreed with DOJ IG’s findings for roughly 46% of the errors DOJ IG identified — and it’s not clear they explained to the FISA Court why they did so

Before I explain these, there’s a more important takeaway.

In giving itself a clean bill of health, DOJ judged that it doesn’t matter that a 2016 FISA application claimed that one of their sources accused a person of sympathizing with a particular terrorist organization when in fact the source said the person had become sympathetic to radical Muslim causes. For the purposes of FISA, this is a huge distinction, because a terrorist organization counts as a foreign power for the sake of FISA, but radical Muslim causes do not. It’s the difference between targeting someone as a suspected agent of a foreign power and targeting them for First Amendment protected activities. DOJ said this error didn’t matter because there was so much other derogatory information against the target; whether that’s true or not, it remains the case that DOJ’s self-congratulation nevertheless admits to a key First Amendment problem in one of the applications.

Woods violations are different from significant inaccuracies are different from material inaccuracies are different from probable cause

As I explained in this post, the IG Report on Carter Page found two types of problems: 17 “significant inaccuracies” that were mostly errors of omission (see PDF 12 and 14-15 for a list), and Woods file errors (PDF 460ff) for which an assertion made in the application did not have or match the back-up in the accuracy file that is supposed to prove it. The “significant inaccuracies” are the more serious of the two, but a number of those were overblown and in a few cases, dubious, in the DOJ IG Report.

Both of those categories are different from material misstatements, of which DOJ admitted to a number by the time they withdrew the probable cause claim from the third and fourth, but not the first two, Page applications. Before the conclusion of the DOJ IG Report they had told the court of the following material misstatements:

  • July 12, 2018: Cover stories Papadopoulos gave to informants that FBI accurately assessed in real time as false, statements Bruce Ohr made that (in the slightly misrepresented form included in the DOJ IG Report) call into question Christopher Steele’s motives, admissions that Steele himself had spoken to the press
  • October 25, 2019 and November 27, 2019: Details about the actions of Kevin Clinesmith — first not disclosing and then altering a document to hide Page’s relationship with the CIA that covered some but not all of his willful sharing of non-public information with known Russian intelligence officers

It’s not clear the government specified which aspects of the DOJ IG Report it submitted to Rosemary Collyer in December 2019 it deemed material, but she focused on:

  • Statements made by Steele’s primary sub-source that undermined key claims about Page
  • Page’s denials (some proven true, some of still undetermined veracity) of details in the Steele dossier
  • Steele’s derogatory comments about Sergei Millian

On the scale of severity, the material misstatements are the ones that matter, because they’re the ones that will affect whether someone gets wiretapped or not. But the Woods file errors in the Carter Page report identified by DOJ IG describe just four (arguably, three) details even related to things ultimately deemed material which, in turn, led to the withdrawal of two of the applications. None directly described the core issues that led to the withdrawal of the two applications (though the Page denials in conjunction with the sub-source comments did).

Indeed, one key conclusion of this entire process — one that DOJ, DOJ IG, and FISC have all agreed with — is that the Woods files process is not very useful at finding the more important errors of omission of the kind that were the most serious problems in the Page application.

And that’s important because all three of these reports — the March DOJ IG MAM and the June and July responses to FISA — stem from, and only explicitly claim to address, Woods file errors. In its MAM, DOJ IG described what it called its “initial” review this way:

During this initial review, we have not made judgments about whether the errors or concerns we identified were material. Also, we do not speculate as to whether the potential errors would have influenced the decision to file the application or the FISC’s decision to approve the FISA application. In addition, our review was limited to assessing the FBI’s execution of its Woods Procedures, which are not focused on affirming the completeness of the information in FISA applications.

For its part, DOJ calls DOJ IG’s report “preliminary” (seemingly ignoring that the IG claimed in that MAM and claims on its website to be continuing this part of what it calls a preliminary part of a larger review of FISA). DOJ’s Office of Intelligence did do materiality reviews of both the errors DOJ IG found and some that it found in the process of compiling these reports (in addition to the CT material misstatement described above, it found what sounds like the omission of exculpatory statements in a CI case).

But all this amounts to the more basic of the two kinds of reviews that DOJ IG did in the Carter Page case.

For these reports, DOJ continued to use the accuracy review methodology it now agrees is inadequate

As noted, all parties now agree that the Woods procedure wasn’t doing what it was supposed to do. One reason it wasn’t is because the FBI has always given agents a few weeks notice before they review one of their Woods files, allowing them to scramble to fill out the accuracy file.

But DOJ IG (perfectly reasonably) didn’t give the Crossfire Hurricane team or any of the people involved in the 29 FISA applications it reviewed here that same notice. It conducted its Woods file assessment on what was actually in the accuracy file. In the case of the Carter Page review, they found a placeholder for a 302 that said exactly what DOJ IG faulted FBI for not having evidence for, an observation about how much Stefan Halper has been paid, and publicly available details about Gazprombank, among other true claims that were nevertheless not backed up in the Woods file. It would have been child’s play — but take some work — to get proof of those and most other claims in the file. The Woods file review that DOJ IG did in the Page case — and almost certainly, the review of the 29 files — tested whether the Woods procedures were being adhered to at all, not whether the Woods procedure effectively ensured only documented claims made it into a FISA application.

If you’re going to rely on the Woods procedure as an accuracy tool, that’s what reviews need to do, because otherwise they’re doing nothing to test the accuracy of the reports.

And DOJ now agrees. In its June filing, DOJ committed to changing how it does accuracy reviews starting in September (maybe). Starting then, agents will get no notice of a review before it happens, and the accuracy rate of that no-notice review will be tracked along with the accuracy once an agent is given time to chase down the documentation he didn’t include the first time.

NSD has determined that commencing with accuracy reviews starting after September 30, 2020, it will not inform the FBI field offices undergoing NSD oversight reviews which applications will be subjected to accuracy reviews in advance of those reviews. This date is subject to current operational limitations the coronavirus outbreak is imposing. NSD would not apply this change in practice to accuracy reviews conducted in response to a request to use FISA information in a criminal proceeding, given the need to identify particular information from particular collections that is subject to use. NSD also would not apply this change in practice to completeness reviews ( discussed further below); because of the pre-review coordination that is contemplated for those reviews.

NSD will expect that the relevant FBI field offices have ready, upon NSD’s arrival, the accuracy sub-files for the most recent applications for all FISAs seeking electronic surveillance or physical search. NSD will then, on its arrival, inform the FBI field office of the application(s) that will be subject to an accuracy review. If the case will also be subject to a completeness review, pre-coordination, as detailed below, will be necessary. The Government assesses that implementing this change in practice will encourage case agents in all FISA matters to be more vigilant about applying the accuracy procedures in their day-to-day work.

In addition, although NSD’s accuracy reviews allow NSD to assess individual compliance with the accuracy procedures, NSD’s historical practice has been to allow agents to obtain documentation during a review that may be missing from the accuracy sub-file. NSD only assesses the errors or omissions identified once the agent has been given the opportunity to gather any additional required documentation. While the Government believes that, in order to appropriately assess the accuracy of an application’s content, it should continue to allow agents to gather additional documentation during the accuracy review, it assesses that this historical practice has not allowed for the evaluation of how effective agents have been at complying with the requirement to maintain an accuracy sub-file, complete with all required documentation.

As a result, NSD will tally and report as a part of its accuracy review process all facts for which any documentation, or appropriate documentation, was not a part of the accuracy sub-file at the time the accuracy review commenced.

That said, that’s not how DOJ did these reviews. In fact, John Demers emphasized this fact in his statement claiming victory over these reviews.

In addition, when the OIG found a fact unsupported by a document in the Woods file, the OIG did not give the FBI the opportunity to locate a supporting document for the fact outside the file.

Indeed, that’s not the only thing that DOJ did to help DOJ clean up DOJ’s shitty performance on DOJ IG’s review of their work. After FBI Field Office lawyers got the DOJ IG assessment, they pulled together the existing documentation, then DOJ’s OI worked with agents to fill in what wasn’t there. In fact, DOJ even got an extension on the second report because DOJ and FBI agents were still working through the files, suggesting it took up to three months of work to get the files to where DOJ was willing to tell FISC about them.

In other words, whereas the Crossfire Hurricane team got judged — by Bill Barr’s DOJ — on what was in the Woods file when DOJ IG found it, Bill Barr’s DOJ is judging Bill Barr’s DOJ on what might be in a Woods file after agents have up to three months to look for paperwork to support claims they made as long as six years ago.

DOJ disagreed with DOJ IG’s finding of error about 46% of the time

Finally, DOJ and DOJ IG did not use the same categories of information to track errors on the Woods file reviews, and one of the most common ways they dismissed the import of an error was by saying that DOJ IG was wrong.

The MAM divides the errors it found into three categories: claims not supported by any documentation, claims not corroborated by the supposed back-up, and claims that were inconsistent with the supporting documentation.

[W]e identified facts stated in the FISA application that were: (a) not supported by any documentation in the Woods File, (b) not clearly corroborated by the supporting documentation in the Woods File, or (c) inconsistent with the supporting documentation in the Woods File.

In addition to the two material errors they found, DOJ claims the errors they found fall into five categories (described starting on page 10):

  • Non-material date errors
  • Non-material typographical errors
  • Non-material deviations from the source documentation
  • Non-material misidentified sources of information
  • Non-material facts lacking supporting documentation

But to get to that number, DOJ also weeded out a number of other problems identified by DOJ IG via three other categories of determination reflected in the up to three month back and forth with OI:

  • Claims made that were substantiated by documents added to the file after DOJ IG’s review
  • Claims that, after reviewing additional information, OI “determined that the application accurately stated or described the supporting documentation, or accurately summarized other assertions in the application that were supported by the accuracy subfile”
  • Claims not backed by any document, but for which “the supporting documentation taken as a whole provided support for the fact in the application”

DOJ doesn’t count those instances in its overview — as distinct from individual narratives — of the report (indeed, the scope of added documentation is not qualified at all). And while the DOJ fillings say FBI described that it added documentation to the file in the redacted FBI declaration for FISC, it’s not clear whether it told FISC what it added and how much and where and when it came from (FBI has been known to write 302s long after the fact to document events not otherwise documented in real time).

Here’s what all this looks like in one table (FBI did what is probably a similar table, but it’s classified). Note that DOJ IG used still different categories for the Carter Page review: “Supporting document does not state this fact,” which is probably the same as their “not clearly corroborated” category. In my table, I’ve counted that as a “lacking documentation error.”

There are several takeaways from this table.

First, the numerical discrepancy provides some idea of how many errors DOJ IG found that DOJ made go away either by finding documentation for them, or by deciding that DOJ IG was wrong. DOJ IG said it found an average of 20 errors in the 25 applications it was able to review, or 500 total. DOJ says it found 63 errors in the June report and 138 errors in the July Report, over a total of 29 applications (they did a review of the four files for which DOJ IG was provided with no Woods file, so had 4 more files than DOJ IG).

My numbers are off by 3 from theirs, which might be partly accounted for recurrent errors in a reauthorized application or lack of clarity on DOJ’s narrative. Or maybe like DOJ, I subtracted 48 from 138 and got 91.

Approximately 48 of these 138 non-material errors reflect typographical errors or date discrepancies between an assertion in an application and a source document. Of the remaining 91 non-material errors or unsupported facts, four involve nonmaterial factual assertions that may be accurate, but for which a supporting document could not be located in the FBI’s files; 73 involve non-material deviations between a source document and an application; and 13 involve errors in which the source of an otherwise accurate factual assertion was misidentified.

But my count shows that DOJ simply declared DOJ IG to be wrong 151 times in its assessment that something was an error, with an amazing 35 examples of that in one application, and of which 14 across all applications were instances where DOJ couldn’t find a document to support a claim (not even with three months to look), but instead said the totality of the application supported a claim.

Claiming that the totality of an application supports a claim, while being unable to find documentation for a discrete fact, sure sounds like confirmation bias.

And in the up to three months of review, FBI found documentation to support upwards of 130 claims that originally were not supported in the Woods file. In other words, these weren’t errors of fact — they were just instances of FBI not following the Woods procedure.

We know that if the Crossfire Hurricane team had been measured by the standard DOJ did in these filings, it would have done better than most of these applications (again, only with respect to the Woods file). That’s because, aside from the four claims that rely on intercepted information (which is not public), there is public documentation to support every claim deemed unsupported in the report but three: the one claiming that James Clapper had said that Russia was providing money in addition to the disinformation to help Trump.

The DNI commented that this influence included providing money to particular candidates or providing disinformation.

And the two claiming that Christopher Steele’s reporting had been corroborated, something the DOJ IG Report lays out at length was not true in the terms FBI normally measured. Except, even there, Steele handler Mike Gaeta’s sworn testimony actually said it had been. He described jumping when Steele told him he had information because he was a professional,

And at that time there were a number of instances when his information had borne out, had been corroborated by other sources.

He also provided a perfectly reasonable explanation for why Steele’s reporting was not corroborated in the way DOJ IG measured it in the report: because you could never put Steele on a stand, so his testimony would never be used to prosecute people.

From a criminal perspective and a criminal investigative kind of framework, you know, Christopher Steele and [redacted] were never individuals who were going to be on a witness stand.

In other words, while it appears that DOJ cleaned up many of the errors identified by DOJ IG by finding the documentation to back it over the course of months, the public record makes it clear that Crossfire Hurricane would have been able to clear up even more of the Page Woods file.

The exceptions prove the rule. There are, as my table notes, two or three claims that do not accurately describe what the underlying document says, claiming:

  • That Page never refuted the claims against him (he had, and in many cases, was telling the truth in his refutations)
  • That Steele told the FBI he never shared information with anyone outside his “business associate” [Fusion] and the FBI (he also shared it with State, as other parts of FBI had been told)
  • That in his first FBI interviews Papadopoulos admitted he had met with Australian officials but not that he discussed Russia during those meetings (it’s unclear how accurate this claim is)

Assume the last bullet (used just once) reflects the redacted parts of Papadopoulos’ 302s even though it does match his current statements, that nevertheless leaves you with an error rate on arguably the worst category — misrepresenting your evidence — of 2 or 3 per application. The first two of these are the Woods file errors that turned out to have a tie (a significant one in the first bullet) with the material reasons why some of the files were withdrawn. They’re the two errors in the Woods file that most directly tied to omitted evidence in the application that would lead to their withdrawal.

Of the 29 applications reviewed by DOJ, 12 of them have 3 or more “deviations from the source” material. One has 14 and another has 15.

So on the worst measure that this review actually did measure, the one that on Page’s application tied most directly to reasons to withdraw the application, Page’s application actually was within the norm.

It may well be that when all the reviews are done, DOJ will have proof that Carter Page’s application was an exceptionally bad application. Certainly, the material misstatements may end up being worse.

But the only thing this apples to oranges comparison of the Page methodology and the traditional DOJ methodology has proven is that — as a matter of the Woods file reviews — Bill Barr has used a different standard for Bill Barr’s DOJ than he has with Crossfire Hurricane. And that if the Page file had been treated as all the others were, from a Woods file perspective, it actually wouldn’t look that bad.

It also shows that when Bill Barr’s DOJ wants to continue spying on Americans who don’t happen to be associated with Donald Trump, he’s happy to argue that Michael Horowitz’s very legalistic reviews of the sort that did Andrew McCabe in are wrong.

Updated for clarity.

Cross Filings: NSD Figures Out How Woods Procedures Are Supposed to Work

JustSecurity has an odd panel on FISA yesterday reviewing the DOJ IG Memo showing that Carter Page’s FISA applications were actually better than average with respect to compliance with Woods Procedures. It includes Andrew McCabe (who signed the last, most problematic, Carter Page application) and Mary McCord (who was involved in the review process for three of the applications, and even told McCabe they needed more information on Christopher Steele before the first one), but it doesn’t disclose their roles in the process. It also doesn’t include defense attorneys among its experts, who might provide more context about problems identified with FISA long before the Page investigation.

I’m particularly interested in McCord’s comments. She likens this to what happened in the wake of Brady v Maryland, and then again in the wake of Ted Stevens’ trial, as prosecutors came to a more proactive view on discovery (she doesn’t explain how prosecutors fucked up so badly on the Stevens case if any cultural change had really happened).

While I applaud McCord for taking a more skeptical view of the Page surveillance at several points (as described in the DOJ IG Report), her focus on Brady and her confidence in cultural change is misplaced, in my opinion.

As bmaz would and has been screaming, Brady isn’t actually the standard here. Franks is. He has argued that the affidavits targeting Page would never have reached the standard under Franks, and thus if Page were treated like any other defendant (of course, he was never charged), these affidavits would have passed muster.

I would respond to bmaz that you’d never even get to a Franks hearing because no defendant has ever gotten review of their application. Now that Ric Grenell has declassified the bulk of Carter Page’s applications, it should be far easier to declassify applications going forward. Liza Goitein included providing review to defendants among her recommendations for reforms next month, but none of the other panelists did.

But all the panelists seem to have missed something that happened at the same time as the memo was released. As I noted in my own review of the MAM, NSD (which McCord led for a key period during which Page was surveilled) has been doing their reviews in such a way as to make the Woods Procedures useless. They were giving FBI Agents four weeks advance notice before conducting a review, which meant they never did what DOJ IG did — see whether the FISA file had the paperwork that under the Woods Procedure it should have.

Before any of these reviews happen, the field offices are told which applications will be reviewed, which gives the case agents a chance to pull together the documentary support for the application.

Thus, prior to the FBI CDC or NSD OI review, field offices are given advance notification of which FISA application(s) will be reviewed and are expected to compile documentary evidence to support the relevant FISA.

If the Woods Procedures were being followed, it should never be the case that the FBI needs to compile documentary evidence before the review; the entire point of it is it ensure the documentary evidence is in the file before any application gets submitted. Once you discover that all the FBI and OI reviews get advance notice, you’re not really reviewing Woods Procedures, it seems to me, you’re reviewing paperwork accuracy.

[snip]

To check the accuracy of the Woods Files, they should with no notice obtain a subset of them, as DOJ IG just did, and see whether the claims in the report are documented in the Woods File, and only after that do their onsite reviews (with notice, to see if there was documentation somewhere that had not been included in the file). That might actually be a better way of identifying where there might be other kinds of problems with the application.

It turns out, on the same day that DOJ IG released their MAM, NSD submitted a FISA filing updating James Boasberg on what they’re doing with reviews.

The panel deals with the DOJ IG Management Advisory Memorandum showing that Carter Page’s applications were in no way unique, with regards to Woods Procedure violations; in fact, his application had fewer Woods Procedure violations, on average, than the 29 applications DOJ IG reviewed. Much of the discussion focuses on

The results (rightly) look really stinky for the FBI. But in fact, the MAM revealed that NSD — McCord’s old department, which thus far had (possibly for jurisdictional reasons) avoided most criticism for FISA — was conducting reviews that made the Woods Files largely useless as an oversight tool (and therefore as a guarantee of accuracy). That’s because Office of Intelligence has been giving FBI Field Offices four weeks advance warning about which files they’re going to review.

DOJ IG describes its finding that these results aren’t being used in better fashion.

(4) FBI and NSD officials we interviewed indicated to us that there were no efforts by the FBI to use existing FBI and NSD oversight mechanisms to perform comprehensive, strategic assessments of the efficacy of the Woods Procedures or FISA accuracy, to include identifying the need for enhancements to training and improvements in the process, or increased accountability measures.

At least given their description, however, I think they’ve found something else. They’ve confirmed that — contrary to DOJ’s description to FISC that,

OI also conducts accuracy reviews of a subset of cases as part of these oversight reviews to ensure compliance with the Woods Procedures and to ensure the accuracy of the facts in the applicable FISA application.

OI is actually only doing the latter part, measuring the accuracy of the facts in an applicable FISA application. To check the accuracy of the Woods Files, they should with no notice obtain a subset of them, as DOJ IG just did, and see whether the claims in the report are documented in the Woods File, and only after that do their onsite reviews (with notice, to see if there was documentation somewhere that had not been included in the file).

As I lay out in a timeline below, DOJ was submitting a response to the FISA Court on April 3, even as DOJ IG was releasing its MAM. In that response (therefore three days before my post), they said they’d stop giving advance notice for the accuracy reviews, which will make Woods Procedures newly useful.

NSD has determined that commencing with accuracy reviews starting after September 30, 2020, it will not inform the FBI field offices undergoing NSD oversight reviews which applications will be subjected to accuracy reviews in advance of those reviews. This date is subject to current operational limitations the coronavirus outbreak is imposing. NSD would not apply this change in practice to accuracy reviews conducted in response to a request to use FISA information in a criminal proceeding, given the need to identify particular information from particular collections that is subject to use. NSD also would not apply this change in practice to completeness reviews ( discussed further below); because of the pre-review coordination that is contemplated for those reviews.

NSD will expect that the relevant FBI field offices have ready, upon NSD’s arrival, the accuracy sub-files for the most recent applications for all FISAs seeking electronic surveillance or physical search. NSD will then, on its arrival, inform the FBI field office of the application(s) that will be subject to an accuracy review. If the case will also be subject to a completeness review, pre-coordination, as detailed below, will be necessary. The Government assesses that implementing this change in practice will encourage case agents in all FISA matters to be more vigilant about applying the accuracy procedures in their day-to-day work.

In addition, although NSD’s accuracy reviews allow NSD to assess individual compliance with the accuracy procedures, NSD’s historical practice has been to allow agents to obtain documentation during a review that may be missing from the accuracy sub-file. NSD only assesses the errors or omissions identified once the agent has been given the opportunity to gather any additional required documentation. While the Government believes that, in order to appropriately assess the accuracy of an application’s content, it should continue to allow agents to gather additional documentation during the accuracy review, it assesses that this historical practice has not allowed for the evaluation of how effective agents have been at complying with the requirement to maintain an accuracy sub-file, complete with all required documentation.

As a result, NSD will tally and report as a part of its accuracy review process all facts for which any documentation, or appropriate documentation, was not a part of the accuracy sub-file at the time the accuracy review commenced. Agents will still be given the opportunity to gather such documentation during or after the accuracy review, so that NSD can assess if the application contains any inaccuracies with respect to the application’s content. NSD will include these additional findings in its summaries of accuracy reviews (discussed herein) and also will include such findings in its biannual reports to the Court regarding its accuracy and completeness review findings. NSD assesses that by implementing this additional metric, it will encourage case agents to be more vigilant about adhering to the FBI’s accuracy· procedures.

It’s rare that a bureaucracy of any sort — much less government, much less part of government that pertains to national security — recognizes that its paperwork isn’t serving the function it is supposed to. But here, even though DOJ IG didn’t make this observation, NSD figured it out and committed to change their processes.

There are more comments about NSD’s review processes that deserve more attention. For example, I said that NSD should start reporting the results of its accuracy (and the new completeness) reviews in its Semiannual FISA Reports (which currently focus only on 702). As part of a seeming effort to rebut Amicus David Kris’ comment that DOJ has the resources to do oversight right, the filing suggested that other oversight obligations take up too much time to dedicate more time to traditional FISA reviews (though NSD did increase attorney resources in OI’s oversight section by 50%).

(U) OI’s Oversight Section, which is responsible for oversight and compliance relating to the IC’s implementation of FISA authorities, currently has approximately 20 attorneys and must rely on assistance from the Operations Section of OI to staff the existing accuracy reviews. Moreover, OI’s Oversight Section conducts oversight of other FISA authorities, including at other IC agencies, and conducts oversight of FBI’s implementation of its Attorney General’s Guidelines for Domestic FBI Operations. The latter involves conducting onsite National Security Reviews at approximately 15 FBI field offices annually. In addition, OI’s oversight and compliance responsibilities with respect to the IC’s implementation of Section 702 consumes substantial OI resources. 14 Furthermore, the Oversight Section fulfills statutorily-required reporting obligations to Congress on behalf of the Department. These reports, which describe, in detail, the Government’s use of FISA authorities and all identified compliance incidents, run hundreds of pages in the aggregate and most must be completed twice a year. As the Court is aware, the Oversight Section also investigates and reports to the Court all FISA compliance incidents involving IC agencies. Additionally, among other responsibilities, the Oversight Section prepares quarterly reports for the Court to inform the Court about certain Section 702 compliance incidents and provide updates on previously reported Section 702 compliance incidents. The Oversight Section also conducts onsite reviews at multiple IC agencies.

It seems like this process could be more streamlined, though. It also seems like you don’t need attorneys to do all these reviews. Accuracy and completeness are not legal issues, they’re reading issues.

Ultimately, the way to ensure that smart changes by NSD actually have the desired effect is to give any defendant against whom FISA information is used in prosecution review of his or her FISA file. But it remarkable to see that McCord’s successor, John Demers, is actually making the kinds of changes that could make the Woods Files function the way they’ve been supposed to for two decades.

Timeline

  • March 23: FBI Associate Deputy Director of FBI reponds to draft MAM
  • March 27: Associate Deputy Attorney General Brad Weinsheimer responds to draft MAM
  • March 30: DOJ IG completes a Management Advisory Memorandum on it efforts to clean up FISA
  • March 31: DOJ IG publicly releases the MAM
  • April 3: James Boasberg orders the government to report whether errors found in the 29 applications that DOJ IG reviewed are material
  • April 3: DOJ National Security Division submits Response to March 5 order incorporating changes to Woods Procedure reviews
  • April 6: I point out that NSD should change how they do Woods Procedure reviews

The Scope of DOJ IG’s FISA Review

A seeming millennium ago, last Tuesday, DOJ’s Inspector General released a Management Advisory Memo describing the interim results of its effort to assess whether problems identified in Carter Page’s FISA application were unique, or reflected a more general problem with FISA. Based on the results from two prongs of DOJ IG’s ongoing investigation, DOJ IG believed they needed to alert FBI right away of their preliminary results in hopes they would inform FBI’s efforts to fix this and to offer two additional recommendations on top of the ones they made in December.

Unsurprisingly, a bunch of mostly right wingers have misrepresented the MAM. I wanted to use this post to explore what the MAM shows about the two prongs of investigation, the significance of the results, and the review of FISA generally. As a bonus track, I’ll talk about what role Intelligence Community Inspector General Michael Atkinson, who was fired on Friday, did not have in the FISA application reviews discussed in the MAM, contrary to what a bunch of wingnuts are claiming to justify his firing.

The universe of FISA

Before getting into what the review showed, some background on the universe of FISA may be helpful.

Both prongs of DOJ IG’s investigation examine probable cause FISA applications from 8 FBI offices submitted over the 5 year period ending last September (the end of Fiscal Year 2019).

The last three years’ transparency reports from the Office of Director of National Intelligence have broken down how many of the probable cause FISA applications were known to target US persons. While there’s been some flux in the number of total probable cause applications, the ones targeting US persons have been going down (perhaps not coincidentally, as scrutiny of the process has increased), from 336 in CY 2016 to 232 in CY 2018.

Using 300 applications targeting US persons as an estimate, that says for the 5-year period DOJ IG is examining, there would have been roughly 1,500 that targeted US persons. The MAM says that the 8 offices included in the review thus far submitted more than 700 FISA applications “relating to U.S. Persons.”

The FBI has 56 field offices. Some states (CA, TX, FL, NY, PA) have multiple FBI offices. Some offices cover multiple states.

In any given year, National Security Division’s Office of Intelligence only does FISA reviews in a fraction of the FBI offices — 25-30, per a recent court filing (FISA 702 reviews covered a smaller number of offices during the early years of the 5-year period, but it’s unclear whether NSD does the reviews at the same time). A James Boasberg opinion on 702 reauthorization from last year confirmed that, “OI understandably devotes more resources to offices that use FISA authorities more frequently.”  That would presumably include DC, NY, and LA (all of which are big enough to be led by an Assistant Director). Cities with large numbers of Chinese-Americans (like SF) or Muslims (like Minneapolis and Detroit) likely do disproportionately more FISA than other large city offices, and I assume offices in TX and FL do a lot as well.

Prong One: Reviewing Woods Files

DOJ IG described that one prong of their review — their own review of Woods Files — involved visiting those 8 field offices “of varying sizes” and reviewing “judgmentally selected sample” of 29 applications to review.

over the past 2 months, we visited 8 FBI field offices of varying sizes and reviewed a judgmentally selected sample of 29 applications relating to U.S. Persons and involving both counterintelligence and counterterrorism investigations. This sample was selected from a dataset provided by the FBI that contained more than 700 applications relating to U.S. Persons submitted by those 8 field offices over a 5-year period.

Between them, those 8 field offices submitted 700 applications in the 5-year period studied, which says that even with some smaller offices included, the field offices still submitted almost half of the US person applications in the period (meaning DOJ IG likely included at least a few of the biggest offices).

This review is ongoing. But thus far, assuming my 1,500 estimate is fair, DOJ IG reviewed around 2% of the applications submitted by the FBI, or 4% of those submitted by these offices. By definition, those 29 files could not have included an application from each office for each year.

For each of these 29 applications, DOJ IG reviewed the Woods File associated with the application to see if there was, as intended, back-up for each of the factual claims in the application; that’s all they’ve done so far. This prong of the review was a strictly paperwork review: DOJ IG did not review whether the claims in the application could be backed up elsewhere, or if there were things in the case file targeting a person that should have been included in the application (which was actually the far bigger problem in the Carter Page applications).

[I]nitial review of these applications has consisted solely of determining whether the contents of the FBI’s Woods File supported statements of fact in the associated FISA application; our review did not seek to determine whether support existed elsewhere for the factual assertion in the FISA application (such as in the case file), or if relevant information had been omitted from the application.

But they didn’t have to keep reviewing to conclude that Woods Files are not functioning like they’re supposed to. Not only was there not a Woods File for 4 of the applications, but the remaining 25 all had problems.

(1) we could not review original Woods Files for 4 of the 29 selected FISA applications because the FBI has not been able to locate them and, in 3 of these instances, did not know if they ever existed; (2) our testing of FISA applications to the associated Woods Files identified apparent errors or inadequately supported facts in all of the 25 applications we reviewed, and interviews to date with available agents or supervisors in field offices generally have confirmed the issues we identified;

[snip]

[F]or all 25 FISA applications with Woods Files that we have reviewed to date, we identified facts stated in the FISA application that were: (a) not supported by any documentation in the Woods File, (b) not clearly corroborated by the supporting documentation in the Woods File, or (c) inconsistent with the supporting documentation in the Woods File. While our review of these issues and follow-up with case agents is still ongoing—and we have not made materiality judgments for these or other errors or concerns we identified—at this time we have identified an average of about 20 issues per application reviewed, with a high of approximately 65 issues in one application and less than 5 issues in another application.

By comparison, DOJ IG found just 8 Woods File errors in the first Carter Page application and 16 in last two, most problematic, renewals (see PDF 460-465). So the applications DOJ IG reviewed were, on average, worse than the Page application with respect to the Woods compliance.

These applications also didn’t all have the required paperwork from an informant’s handling agent — though in some cases, the agent was the same.

About half of the applications we reviewed contained facts attributed to CHSs, and for many of them we found that the Woods File lacked documentation attesting to these two requirements. For some of these applications, the case agent preparing the FISA application was also the handling agent of the CHS referenced in the application, and therefore would have been familiar with the information in CHS files.

It’s actually somewhat notable that just half of this very small sample of applications included information from an informant. And only some of these files were lacking the required paperwork for informants. That suggests, to the degree that the FISA application might hide problems with informants that otherwise might have been found in a criminal warrant affidavit (though even there, FBI has a lot of ways to protect these details), that may not be as big of a problem as defense attorneys have suspected (though that’s an area where I’d expect bigger problems on the CT side than the CI one).

The findings on the third problem identified in the Carter Page applications — that the Woods File did not get a fresh review with each application — are less definitive.

based on the results of our review of two renewal files, as well as our discussions with FBI agents, it appears that the FBI is not consistently re-verifying the original statements of fact within renewal applications. In one instance, we observed that errors or unsupported information in the statements of fact that we identified in the initial application had been carried over to each of the renewal applications. In other instances, we were told by the case agents who prepared the renewal applications that they only verified newly added statements of fact in renewal applications because they had already verified the original statements of fact when submitting the initial application.

This could represent as few as 3 of the 25 files for which there were Woods Files.

In any case, the larger point seems to be the more important one: the FBI has not been using Woods Files like they’re supposed to, making sure that the paperwork to back up any claim made in a FISA application actually reflects the underlying documentation and thereby making sure the claims they make to the FISC are valid.

Presiding FISA Judge James Boasberg issued an order today, requiring the government to figure out whether any of the problems identified in this review were material, with an emphasis on the 4 applications for which there was no Woods File.

Reviewing Accuracy Reviews

As noted, the FBI has not been using Woods Files like they’re intended to be used. But neither is DOJ’s National Security Division.

The other part of DOJ IG’s audit involved reviewing the Accuracy Reviews done by the FBI and NSD as part of the existing FISA oversight process.

There are two kinds of Accuracy Reviews done as part of FISA oversight. First, the FBI requires that lawyers in its field offices review at least one application a year.

FBI requires its Chief Division Counsel (CDC) in each FBI field office to perform each year an accuracy review of at least one FISA application from that field office.

As noted below, these are sent to FBI OGC. NSD’s Office of Intelligence doesn’t get them.

In addition, NSD OI does their own reviews for a subset of offices.

Similarly, NSD’s Office of Intelligence (OI) conducts its own accuracy review each year of at least 1 FISA application originating from each of approximately 25 to 30 different FBI field offices.

Remember there are 56 field offices and roughly 300 US person applications. So in practice, IO could review as few as 8% of the applications in a given year (though it’s probably more than that).

Here’s how DOJ described the OI reviews to FISC in December.

OI’s Oversight Section conducts oversight reviews at approximately 25-30 FBI field offices annually. During those reviews, OI assesses compliance with Court-approved minimization and querying procedures, as well as the Court orders. Pursuant to the 2009 Memorandum, OI also conducts accuracy reviews of a subset of cases as part of these oversight reviews to ensure compliance with the Woods Procedures and to ensure the accuracy of the facts in the applicable FISA application. 5 OI may conduct more than one accuracy review at a particular field office, depending on the number of FISA applications submitted by the office and factors such as whether there are identified cases where errors have previously been reported or where there is potential for use of FISA information in a criminal prosecution. OI has also, as a matter of general practice, conducted accuracy reviews of FISA applications for which the FBI has requested affirmative use of FISA-obtained or -derived information in a proceeding against an aggrieved person. See 50U.S.C. §§ 1806(c), 1825(d).

(U) During these reviews, OI attorneys verify that every factual statement in the categories of review described in footnote 5 is supported by a copy of the most authoritative document that exists or, in enumerated exceptions, by an appropriate alternate document. With regard specifically to human source reporting included in an application, the 2009 Memorandum requires that the accuracy sub-file include the reporting that is referenced in the application and further requires that the FBI must provide the reviewing attorney with redacted documentation from the confidential human source sub-file substantiating all factual assertions regarding the source’s reliability and background. 6

5 (U) OI’s accuracy reviews cover four areas: (1) facts establishing probable cause to believe that the target is a foreign power or an agent of a foreign power; (2) the fact and manner of FBI’s verification that the target uses or is about to use each targeted facility and that property subject to search is or is about to be owned, used, possessed by, or in transit to or from the target; (3) the basis for the asserted U.S. person status of the target(s) and the means of verification; and (4) the factual accuracy of the related criminal matters section, such as types of criminal investigative techniques used (e.g., subpoenas) and dates of pertinent actions in the criminal case. See 2009 Memorandum at 3.

6 (U) If production of redacted documents from the confidential human source sub-file would be unduly burdensome, compromise the identity of the source, or otherwise violate the Attorney General Guidelines for Confidential Human Sources or the FBI’s Confidential Human Source Manual, FBI personnel may request that the attorney use a human source sub-file request form. Upon receipt of that form, the relevant FBI confidential human source coordinator will verify the accuracy of the source’s reliability and background that was used in the application, and transmit the results of that review to the reviewing or attorney.

So in December, DOJ claimed that these reviews served to “ensure compliance with the Woods Procedures and to ensure the accuracy of the facts in the applicable FISA application.” They claimed that “OI attorneys verify that every factual statement in the categories of review described in footnote 5” — pertaining to 1) facts establishing probable cause 2) the target actually uses the targeted facilities 3) the target is a US person and 4) the criminal investigative techniques are accurately described —  are “supported by a copy of the most authoritative document that exists or, in enumerated exceptions, by an appropriate alternate document.” In theory, the easiest way to verify bullet point 1 (the case for probable cause) would be for the OI lawyers to check whether the Woods Files were complete.

Before I get into results, a word about the numbers.

Altogether, DOJ IG reviewed 34 FBI CDC and NSD OI reports and those reports covered 42 US person FISA applications.

Specifically, in addition to interviewing FBI and NSD officials, we reviewed 34 FBI and NSD accuracy review reports covering the period from October 2014 to September 2019—which originated from the 8 field offices we have visited to date and addressed a total of 42 U.S. Person FISA applications, only one of which was also included among the 29 FISA applications that we reviewed.

These numbers are bit confusing. For starters, the base number of accuracy reports, 34, is less than 40 (what it would be if there were a review for all 8 field offices for each of 5 years, which is supposed to be mandated for each FBI office). DOJ IG did not review one application per year per FBI office. I asked DOJ IG why that was; they said only “there may be many reasons why this is the case,” emphasizing multiple times that this audit is in its earliest phases (I’ve got requests for comment in with both NSD and FBI). Some of those many reasons might be:

  • Smaller offices reviewed don’t submit a FISA application every year, so for some offices there was none to review
  • OI doesn’t review most FBI offices every year, so for less frequently reviewed offices, there won’t be a review every year (but there should be an FBI one if the office did any FISA applications)
  • DOJ IG was only interested in US person FISA applications; some of the ones that FBI and OI reviewed would likely not target US persons
  • Only applications for which FISA coverage had ended were reviewed; for the later applications, FISA coverage might be ongoing and therefore excluded from the DOJ IG review
  • DOJ IG may not have finished its review of all these Accuracy Reviews reviews yet, so didn’t include them in the MAM

Additionally, the references to this part of review seems to suggest that the NSD reviews the same FISA application that each FBI field office reviews each year, as well as any problematic ones or ones being used in a prosecution, though that’s something I’m trying to get clarity on. Likewise, I’m trying to figure out whether FBI and OI similarly try to pick a “judgmentally selected sample” to ensure both the counterterrorism and counterintelligence functions are reviewed.

One detail makes this process a really bad measure of Woods File compliance (which is different from whether they measure the accuracy of the application effectively). Before any of these reviews happen, the field offices are told which applications will be reviewed, which gives the case agents a chance to pull together the documentary support for the application.

Thus, prior to the FBI CDC or NSD OI review, field offices are given advance notification of which FISA application(s) will be reviewed and are expected to compile documentary evidence to support the relevant FISA.

If the Woods Procedures were being followed, it should never be the case that the FBI needs to compile documentary evidence before the review; the entire point of it is it ensure the documentary evidence is in the file before any application gets submitted. Once you discover that all the FBI and OI reviews get advance notice, you’re not really reviewing Woods Procedures, it seems to me, you’re reviewing paperwork accuracy.

Nevertheless, even with the advance notice, the 93% of the 42 applications DOJ IG reviewed included problems.

[T]hese oversight mechanisms routinely identified deficiencies in documentation supporting FISA applications similar to those that, as described in more detail below, we have observed during our audit to date. Although reports related to 3 of the 42 FISA applications did not identify any deficiencies, the reports covering the remaining 39 applications identified a total of about 390 issues, including unverified, inaccurate, or inadequately supported facts, as well as typographical errors. At this stage in our audit, we have not yet reviewed these oversight reports in detail.

Keep in mind, OI is reviewing for four things — whether there’s paperwork present to support  that the application shows 1) facts establishing probable cause 2) the target actually uses the targeted facilities 3) the target is a US person (or, for applications targeting under the lower foreign power standard, that the target is not a US person, but that shouldn’t be relevant here) and 4) the criminal investigative techniques used already are accurately described. The second bullet point is actually at least as important as the probable cause, because if the wrong person is wiretapped, then a completely innocent person ends up compromised. That’s the kind of thing where typographical errors (say, transposing 2 digits in a phone number) have had serious ramifications in the past.

The lack of clarity regarding numbers makes one other point unclear. The memo setting up this process envisions NSD’s involvement in assessing whether problems with FISA applications are material. But in practice, the FBI doesn’t consult with them. And in the set of applications that DOJ IG Reviewed (again, it’s unclear whether OI reviewed all the FBI files, along with a select few more, or not), FBI found more problems than OI did, 250 as compared to 140 (for a total of 390 problems).

The 2009 joint FBI-NSD policy memorandum states that “OI determines, in consultation with the FBI, whether a misstatement or omission of fact identified during an accuracy review is material.” The 34 reports that we reviewed indicate that none of the approximately 390 identified issues were deemed to be material. However, we were told by NSD OI personnel that the FBI had not asked NSD OI to weigh in on materiality determinations nor had NSD OI formally received FBI CDC accuracy review results, which accounted for about 250 of the total issues in the reports we reviewed.

[snip]

FBI CDC and NSD OI accuracy review reports had not been used in a comprehensive, strategic fashion by FBI Headquarters to assess the performance of individuals involved in and accountable for FISA applications, to identify trends in results of the reviews, or to contribute to an evaluation of the efficacy of quality assurance mechanisms intended to ensure that FISA applications were “scrupulously accurate.” That is, the accuracy reviews were not being used by the FBI as a tool to help assess the FBI’s compliance with its Woods Procedures.

This is one of the complaints and recommendations in the MAM: it complains that the FBI reviews are basically going into a file somewhere, without a lessons learned process. It recommends that change. It also recommends that OSD get FBI’s reports, so they can integrate them into their own “trends reports” that they do based on their own reviews.

DOJ IG describes its finding that these results aren’t being used in better fashion.

(4) FBI and NSD officials we interviewed indicated to us that there were no efforts by the FBI to use existing FBI and NSD oversight mechanisms to perform comprehensive, strategic assessments of the efficacy of the Woods Procedures or FISA accuracy, to include identifying the need for enhancements to training and improvements in the process, or increased accountability measures.

At least given their description, however, I think they’ve found something else. They’ve confirmed that — contrary to DOJ’s description to FISC that,

OI also conducts accuracy reviews of a subset of cases as part of these oversight reviews to ensure compliance with the Woods Procedures and to ensure the accuracy of the facts in the applicable FISA application.

OI is actually only doing the latter part, measuring the accuracy of the facts in an applicable FISA application. To check the accuracy of the Woods Files, they should with no notice obtain a subset of them, as DOJ IG just did, and see whether the claims in the report are documented in the Woods File, and only after that do their onsite reviews (with notice, to see if there was documentation somewhere that had not been included in the file). That might actually be a better way of identifying where there might be other kinds of problems with the application.

With regards to the lessons learned problem, there seems like an obvious solution to this: Congress mandates that DOJ complete semiannual reviews of 702 practices (which includes reviews of NSA and CIA practices, as well as those of FBI), and they include precisely this kind of trend analysis. Even in spite of their heavy redaction in public form, I’ve even been able to identify problems with 702 and related authorities in the same time frame as NSA was doing so. There’s no reason that semiannual reports couldn’t be expanded (or replicated) to include probable cause targeting. At the very least it’d be a way to force OI and FBI to have this lessons learned discussion. Republican members of Congress have claimed that more oversight should be shifted to Congress (not a very good idea given that no one in Congress seemed to be conducting the close read that I had been), and this is an easy way to play a more active role.

DOJ IG has not reviewed the most important things yet

The MAM is explicit that it has not reviewed the import of the errors it found.

[W]e have not made judgments about whether the errors or concerns we identified were material. Also, we do not speculate as to whether the potential errors would have influenced the decision to file the application or the FISC’s decision to approve the FISA application. In addition, our review was limited to assessing the FBI’s execution of its Woods Procedures, which are not focused on affirming the completeness of the information in FISA applications.

Nor has it reviewed FBI’s own decisions regarding the 290 errors they found in their own reviews to determine if the FBI’s judgment that they were not material was valid. If it compared its results for the one application that FBI and/or OI also reviewed, it doesn’t say so explicitly (which would seem a really important measure about the integrity of the standard reviews).

And while it’s significant that there are so many errors, regardless of the review, it still doesn’t address what the Carter Page case said was the far more important issue: what got left out. Of the 8 to 18 Woods Files errors in the Carter Page investigation, for example, just one got to the core of the problem with the application, that Page was making denials, denials that — before later applications were submitted — the FBI had reason to know were correct (another of the Woods File errors might have raised questions about Steele, but did not go to the heart of the problems with his reporting). The other problems had to do with paperwork, not veracity. And none of the Woods File problems related to CIA’s contact approval of Page for some but not all of his willful sharing of non-public information with known Russian intelligence officers.

DOJ IG says it will conduct further analysis of the problems it has thus far found.

In connection with our ongoing audit, the OIG will conduct further analysis of the deficiencies identified in our work to date and of FBI FISA renewals. In addition, we are expanding the audit’s objective to also include FISA application accuracy efforts performed within NSD. Consistent with the OIG’s usual practices, we will keep the Department and the FBI appropriately apprised of the scope of our audit, and we will prepare a formal report at the conclusion of our work.

But it’s not yet clear that this will include picking a subset of the files already reviewed to do the kind of deep dive that was done with Carter Page.

Further, at this point, DOJ IG seems not to be seeing one of the more obvious conclusions. As explained above, it recommends that the FBI and NSD use their accuracy reviews better to better do lessons learned.

We recommend that the FBI institute a requirement that it, in coordination with NSD, systematically and regularly examine the results of past and future accuracy reviews to identify patterns or trends in identified errors so that the FBI can enhance training to improve agents’ performance in completing the Woods Procedures, or improve policies to help ensure the accuracy of FISA applications.

But it specifically speaks in terms of improving performance with the Woods Procedures.

If the Woods Procedures are meant to be a tool, it would be necessary to conduct no-notice reviews of the files. Otherwise, you’re not reviewing the Woods Procedures. That would need to be a recommendation.

But it seems to be possible if not likely that fixing the problems IDed back before 2000 with a paperwork requirement that doesn’t go to the core of the issue hasn’t worked (and, as described, has never been used as a key measure for the existing OI reviews), then it seems other solutions are necessary — including that criminal defendants get some kind of review. Though even that would be inadequate to the task, given that before DOJ makes the decision to permit FISA materials to be used in a prosecution, they review whether the files would sustain a judge’s review first.

The goal here is not to placate FISC, nor is it to check some boxes as part of the application process. It’s to ensure that absent the threat of review by a defense attorney, the benefits (which already have serious limits) of adversarial review are achieved via other means. And there’s good reason to believe that absent more significant changes in the oversight process, the Woods Procedures are never going to achieve that result.

The Michael Atkinson conspiracy theory

As I was already writing this, it became clear that the frothy right was using this report, released on Tuesday, to provide a non-corrupt excuse for Trump’s firing of Intelligence Community Inspector General Michael Atkinson late on Friday night.

The basis for such a claim is not entirely clear to me. Frothers in my Twitter timeline at first seemed to confuse Atkinson with DOJ’s IG, Michael Horowitz, or believed that the ICIG had a central role in FISA. Then they seized on the fact that, for the two years before he became ICIG, Atkinson was at National Security Division, which both oversees some cases likely to have a FISA component and oversees the submission of applications and then conducts the oversight reviews.

Atkinson’s confirmation materials provide some exactitude for what he did at DOJ when:

September 2002 to March 2006: Trial Attorney for DOJ’s Fraud Section

March 2006 to March 2016: AUSA in DC USAO working on Fraud (including in oversight positions)

March 2016 to June 2016: Acting DAAG, National Asset Protection at NSD

July 2016 to May 2018: Senior Counsel to AAG for NSD

There would be little imaginable reason for a fraud prosecutor, as Atkinson was for the majority of his DOJ career, to use FISA (two of the highest profile cases he worked on were the prosecution of Democratic Congressmen William Jefferson and Jesse Jackson Jr), though he said he worked on some espionage, sanctions, and FARA cases. As Acting DAAG, he worked in a different part of NSD than the unit that handles FISA applications and oversight.

As he described it in his confirmation materials, he would have been a consumer of FISA information, but not the person doing the reviews.

As Senior Counsel to the AAG (serving under John Carlin, Mary McCord, Dana Boente, and John Demers), he might have visibility into review processes on FISAs, though at that level, managers assumed the Woods Procedure worked as required (meaning, Atkinson would not have known of these problems).

In his confirmation materials, however, Atkinson suggested he spent far more time as Senior Counsel overseeing the response to unauthorized disclosures, which likely still included Snowden when he started in 2016, added Shadow Brokers that year, and would have focused closely on Vault 7 in 2017 and 2018.

My experience in helping to coordinate the responses to unauthorized disclosures while serving as the Senior Counsel to the Assistant Attorney General, U.S. Department of Justice, National Security Division (NSD), should assist me in serving effectively as the IC IG. As part of this position, I have assisted in coordinating the Department’s efforts to investigate and prosecute unauthorized disclosures across the IC enterprise. This experience has reinforced for me the important role that fair, impartial, and effective whistleblower protection processes play in maximizing the IC’s effectiveness and minimizing the risks of unauthorized disclosures and harm to our national security. As part of this experience, I have also been a consumer and user of intelligence from multiple intelligence sources, and I have seen first-hand the benefits to our country when there is a unity of effort by the Intelligence Community to address national security needs.

For Vault 7, at least, the investigation into Joshua Schulte — who was always the prime suspect — used criminal process from the very start (though it’s possible that the increased surveillance of Julian Assange involved FISA). And while there are less spectacular cases of unauthorized disclosure that might involve some nexus with a foreign country, raising FISA issues, many of these leaks cases were criminal cases, seemingly not reliant on FISA. Which would mean some of the most sensitive cases Atkinson worked on didn’t involve FISA.

Though the frothy right may think Atkinson had a central role because the title of the person at FBI field offices who must conduct a review is “Chief [Division] Counsel,” and they confused both the agency and the location.

In any case, there’s one more piece missing from this: while I happen to think DOJ IG has not focused closely enough on what NSD should be doing in its oversight role, thus far, DOJ IG has not investigated it. And so there’s actually no allegation of wrong-doing from anyone at NSD in either of these two reports, not even the NSD people who actually work on FISA. On the contrary, DOJ IG simply describes OI doing reviews where they identified problems and wrote them up. Yes, OI likely should have been more involved in determining whether the errors FBI found were material. Given that Boasberg has mandated materiality reviews of the 29 files reviewed by DOJ IG, now would be a good time to implement that practice.

Still, compliance or not with Woods Files remains a distraction from a deeper review of whether these files included all pertinent information. And if FISA is going to remain viable, that’s the examination that needs to happen.

Does DOJ Plan to Get Henry Kyle Frese’s Cooperation to Prosecute Journalists?

Henry Kyle Frese, a DIA analyst charged with leaking classified information about China to two NBC journalists in October, pled guilty today. The guidelines laid out in his plea put him well above the 10 year maximum sentence he faces, meaning he may be the rare defendant facing the full prison term allowable. More interesting, his plea includes the possibility of a downward departure for cooperation (though it explicitly says he may get that even if no other charges are brought).

That’s interesting because the bulk of the details laid out in his Statement of Facts describes what he leaked to the two journalists (remember: in investigating this case, DOJ obtained a Title III warrant to eavesdrop on his calls with the journalists). It includes details about Frese accessing information — almost certainly the information relating to China — that was unrelated to his job as a counterterrorism analyst.

In relation to one of the twelve times the defendant orally transmitted TOP SECRET NDI to Journalist 1, in or about mid-April to early May 2018, the defendant accessed an intelligence report unrelated to his job duties on multiple occasions, which contained NDI classified at the TOP SECRET//SCI level (“Intelligence Report 1”).

[snip]

On at least 30 separate occasions in 2018, the defendant conducted searches on classified government systems for information regarding the classified topics he discussed with Joumalists 1 and 2.

The only other person mentioned in the Statement of Facts was an employee of an overseas counterterrorism consulting group.

Between early 2018 and October 2019, the defendant communicated with an employee of an overseas CT consulting group (“Consultant 1”) via social media. On at least two occasions, the defendant transmitted classified NDI related to CT topics to Consultant 1, using a social media site’s direct messaging feature

Consultant 1 was not authorized to receive classified NDI, and at all times during his communications with Consultant 1, the defendant knew that he was not authorized to transmit classified NDI to Consultant 1.

This, then, appears to be the scenario that would also set a precedent before Julian Assange is brought to the US for trial: that journalists asking someone with clearance for information get treated like spies.

The Revelations about FISA Bureaucracy in FBI’s FISA Fix Filing

The government submitted the filing ordered by now (thankfully) former FISA presiding Judge Rosemary Collyer on Friday, explaining how it’ll avoid the problems identified in the DOJ IG Report on Carter Page. As I’ll show in a follow-up, I believe the changes — with one possible exception — are worthwhile, if inadequate to the task.

In this post, however, I’d like to lay out what the filing reveals about two aspects of the FISA process that I did not know before.

Other agencies and state and local law enforcement can use FISA: While minimization procedures have revealed that FBI can share FISA information with other agencies, including state and local authorities, this filing reveals those other agencies can serve as the affiant for FISA applications.

Agents from other federal law enforcement agencies or state or local law enforcement officers serving on a Joint Terrorism Task Force with the FBI may, in some cases, act as the declarants for applications submitted by the FBI after reviewing receiving the necessary training. In the case of state or local law enforcement officers, such officers are deputized as Special Deputy United States Marshals for this purpose. (4)

I’ve never heard of this before and there are a whole lot of questions this raises, both about whether non-DOJ agencies are submitting FISA applications (CIA would be unsurprising, but ICE would be alarming and under this administration, not at all crazy), but also about the accountability for people who aren’t Federal employees. How many “Special Deputy United States Marshals” does SDNY have, for example, and was FISA used during the worst excesses of its intelligence program?

The timeline of updates to the Woods Procedures: The filing explains (I’m sure some of this is public, but it’s laid out here as well) that the Woods Procedures have been updated:

  • On February 2, 2006, FBI reminded its agents they need to,”create, maintain, and update a sub-file that contains all materials that document the support for each factual assertion contained in FISA applications.” Given the timing, this change may have been part of the effort to clean up Stellar Wind, which had been used to substantiate FISA applications without notice for the previous five years.
  • On March 24, 2006, DOJ’s OIPR advised the court about the sub-file requirement, though focused especially on ensuring that, “the federal official currently handling the source (or the federal official who is responsible for liaison to another entity who is handling the source) [confirms] that the source remains reliable, and that all material information regarding the reliability of the source is reported accurately in the FISA application.” This would have been the period when the FBI was cleaning up after Katrina Leung, one of the worst double agents in recent history, so may have pertained to her reporting.
  • In February 2009, NSD and FBI together required the FBI to remove any asserted fact for which there is no documentation, and do so retroactively. It also implemented quarterly accuracy reviews that have since been made semi-annual. The Section 215 disclosures in this same time period suggest Bush got sloppy in its last years, so this may have reflected a need to clean that up, too.
  • August 2016. There was an update to the Woods Procedure and 2009 Memorandum in 2016, but the filing doesn’t describe it (or why).

How OI’s accuracy reviews work:

As DOJ has revealed in the past, OI’s Oversight Section does FISA oversight reviews at 25-30  (of the 56) Field offices a year. They review the compliance with minimization and querying procedures, the latter of which only recently got imposed.

In addition, they do an accuracy review of a subset of FISA applications that reviews:

  • The facts establishing probable cause to believe that the target is a foreign power or agent thereof
  • The verification process that the targeted facilities are used by, owned by, possessed by, or in transit to or from the target
  • The basis for the US person status of the target
  • The factual accuracy of the related criminal matters section, such as types of criminal investigative techniques used (e.g., subpoenas) and dates of pertinent actions in the criminal case

As the filing makes clear, “these accuracy reviews do not check for the completeness of the facts included in the application,” which is the real source of the problems identified in the Page application. Right now, OI is “considering” expanding a subset of reviews to check for completeness, but is not committing to doing so.

Two things are of interest here. The definition of FISA “facilities,” has long been of interest, not least because the government likes to pretend it consists mostly of phone numbers and email addresses. Indeed, 2007, FISC approved a broad definition of “facility” that can be used to target suspects of a terrorist group (and, presumably now, other clandestine networks), in large numbers. The language in this bullet all comes from statute, but the use of “about to be used,” would support the kind of monitoring of a new computer or phone we’ve heard of. This language also might support the monitoring of Amazon and bank accounts. The validation of facilities (both to be sure Page was still using them and to sustain FISA coverage to be able to get to new ones) was something important to the renewal process of Page’s FISAs.

The language on criminal matters reveals how the FBI deals with parallel investigations, such as the one that happened with Keith Gartenlaub (where they government used both criminal subpoenas and FISA searches, which ultimately led to a child porn prosecution unrelated to any FISA suspicion). I knew this section existed, but thought it did so just to comply with a statutory requirement, when targeting US persons, that their clandestine activities may involve violating criminal statute. But this language makes it clear that this part of the FISA application also serves to provide notice of such parallel proceedings. Given that the FBI has to declare that they can’t obtain information under FISA via other means, this raises more questions about the degree to which FISA can serve as an additive authority for certain kinds of investigations that will let the FBI use techniques they wouldn’t use otherwise.

The section on OI reviews also reveals that they review FISA applications before information from an application is used in a proceeding against someone picked up in it.

OI has also, as a matter of general practice, conducted accuracy reviews ofFISA applications for which the FBI has requested affirmative use ofFISA-obtained or -derived information in a proceeding against an aggrieved person.

It’s hard to tell whether this is a good thing or a bad thing. That’s because it doesn’t necessarily help the defendant. After all, if the OI review discovers problems with FISA applications, then DOJ would be more likely to parallel construct the prosecution, thereby burying a problematic part of the investigation. And a review at the period when FBI is already considering using it in a proceeding is too late in the process to protect the civil liberties of the person who is aggrieved if there was a problem with the application.

The section describing these reviews also reveals that, “in enumerated exceptions,” the FBI doesn’t have to rely on “the most authoritative document that exists” in the Woods Procedure. A footnote makes clear that one of the areas where the application itself may not include everything in the underlying documentation is human sources, which permits the lawyer submitting the application to ask a human source coordinator to verify the application matches the underlying documentation. Remember that the language about Christopher Steele used in the Carter Page application didn’t come from his handling agent’s assessment, but it came from a serialized intelligence report based off his reporting. That’s not what this describes, but may be one of the reasons the FBI took that shortcut.