Posts

Horowitz

What a Properly Scoped FISA Abuse Inspector General Report Would Look Like

In this piece on the Jim Comey IG Report, I showed that Michael Horowitz’s department received evidence of two violations of DOJ rules. His office first received seven memos that documented that DOJ’s protocols to ensure the integrity of investigations had collapsed under Donald Trump’s efforts to influence investigations. And then, at some later time, his office learned that Comey had (improperly, according to the report) retained those memos even after being fired and that FBI had classified six words in the memos he retained retroactively.

Horowitz’s office has completed an investigation into an act that otherwise might be punished by termination that already happened. But there is zero evidence that Horowitz has conducted an investigation into the subject of the whistleblower complaint, the breakdown of DOJ’s protections against corruption.

In April 2018, Horowitz released a report (which had been hastily completed in February) detailing that Andrew McCabe had been behind a reactive media release during the 2016 election. But his office has not yet released its conclusions regarding the rampant leaks that McCabe was responding to. In other words, Horowitz seems to have once again released a report on a problem that — however urgent or not — has already been remedied, but not released a report on ongoing harm.

Horowitz is reportedly preparing to release a report on what the frothy right calls “FISA abuse.” but given the content of a Lindsey Graham letter calling for declassification of its underlying materials, it’s seems likely that that report, too, is scoped narrowly, focusing just on Carter Page (and any other Trump officials targeted under FISA). There’s no request for backup materials on the other investigation predicated off of hostile opposition research, the investigation into the Clinton Foundation.

I have long said that if Republicans think the FISA order into Carter Page was abusive, then they’re being remiss in their oversight of FISA generally, because whatever abuse happened with Page happens, in far more egregious fashion, on the FISA applications of other people targeted and prosecuted with them.

If Michael Horowitz is concerned that the information from paid informants is not properly vetted before being used as the basis for a FISA application, they would be better to focus on any number of terrorism defendants. Adel Daoud appears to have been targeted under FISA based off a referral — probably, like Christopher Steele, a paid consultant — claiming he said something in a forum that the government later stopped claiming; Daoud remains in prison right now after having been set up in an FBI sting.

If Michael Horowitz is concerned that the FBI is misusing press reports in FISA applications, they would be better to focus on the case against Keith Gartenlaub. The FBI based its FISA applications partly off a Wired article that was totally unrelated to anything Gartenlaub was involved with. Gartenlaub will forever be branded as a sex criminal because, after finding no evidence that he was a spy, the government found 10 year old child porn they had no evidence he had ever accessed.

If Michael Horowitz is concerned that information underlying a FISA application included errors — such as that there are no Russian consulates in Miami — he should probably review how Xiaoxing Xi got targeted under FISA because the FBI didn’t understand what normal scholarship about semiconductors involves. While DOJ dropped its prosecution of Xi once it became clear how badly they had screwed up, he was charged and arrested.

And if Michael Horowitz is concerned about FISA abuse, then he should examine why zero defendants have ever gotten able to review their applications, even though that was the intent of Congress. Both Daoud and Gartenlaub should have been able to review their files, but both were denied at the appellate level.

The point being, the eventual report on “FISA abuse” will not be about FISA abuse. It will, once again, be about the President’s grievances. It will, at least according to public reporting, not treat far more significant problems, including cases where the injury against the targets was far greater than it was for Carter Page.

I don’t believe Michael Horowitz believes he is serving as an instrument of the President’s grievances. But by scoping his work to include only the evidence that stems from the President’s grievances and leaving out matters that involve ongoing harm, that’s what he is doing.

Note: I have or had a legal relationship with attorneys involved in these cases, though not when writing the underlying posts.

[Photo: National Security Agency, Ft. Meade, MD via Wikimedia]

Keith Gartenlaub Challenges the Destroyed FISA Wall

Keith Gartenlaub is appealing his conviction on possession of child porn to the Supreme Court, based on a FISA challenge. And while any petition for cert before SCOTUS faces long odds, I believe this one is interestingly situated in that its challenge to the plain view doctrine, in conjunction with the use of FISA evidence in a prosecution having nothing to do with national security, may present a way for SCOTUS to reconsider the wall between national security investigations and criminal prosecutions.

As a reminder, the FBI decided to investigate Gartenlaub (at a time when they were making other bone-headed investigative decisions involving Chinese-Americans) because he had access to files the Chinese government was seeking and a naturalized Chinese-American wife.

FBI switched back and forth from criminal to FISA access at least once (and probably twice), and in the process did a physical search of three Gartenlaub hard drives using the more expansive search regime available under FISA, only to then repeat the same search to obtain the same evidence of child porn to use for prosecution.

The government never presented evidence the child porn had been accessed since 2005, and Gartenlaub presented an alternate explanation for how it had gotten on his computer. In fact, the record suggests the FBI didn’t want to prosecute Gartenlaub for child porn; they wanted to flip him, so he would spy on his well-connected in-laws. It didn’t happen and now, even after his release from prison, he’s trying to challenge the genesis of his prosecution from that FISA search.

The reason why the case is interesting is because the FBI was seeking something very specific: materials relating to Boeing’s C-17 program. A criminal forensic search for such materials, conducted under a Rule 41 warrant, would start by turning off the forensic search for items — most notably, videos — that would not return the suspected evidence of crime (which would be engineering documents).

Because of typical games the FBI plays with forensics, this was not established in the District court. But the appeal points to the government’s claims that under FISA they don’t have to use such forensic narrowing. It goes on to establish that they did not use such forensic narrowing tools, and, not having done that, found no evidence to support the FISA allegations but instead finding evidence that led to the child porn charges.

In its Opposition Brief before the Ninth Circuit, the government acknowledges that there were no limitations to its secret search of Gartenlaub’s hard drives, saying in a header: “The Government Was Permitted to Search Every File on Defendant’s Computers . . . .”17 And nothing in the record indicates that the government used any standard forensic techniques routinely used to particularize computer searches like: date limitations; targeted key word searches; image recognition scans; taint teams, or other routine, well established techniques to limit a digital search to its target and screen out privileged, confidential, and irrelevant information.

Despite its unlimited search, the FBI found no evidence that Gartenlaub had provided C-17 data to China, or otherwise acted as a spy for China. But the FBI did allegedly find, among the tens of thousands of files on the hard drives, a handful of files containing child pornography. Dropping its fantasy that Gartenlaub was a Chinese spy, the FBI turned to the theory he collected child pornography.

The appeal then argues that using FISA to get to criminal evidence is an end run around criminal procedure, in part because Gartenlaub had no way to challenge the criminal warrant after the evidence had already been found via FISA warrant.

Gartenlaub’s case demonstrates how easy it is to bypass the Constitution’s criminal procedure guarantees by getting a secret FISA search warrant and using it to prosecute regular crimes. And it is impossible for a criminal defendant to challenge a secret FISA warrant because the defendant cannot access any of the information underlying the FISA warrant due to its secrecy. This thwarts a criminal defendant’s Due Process right to test the government’s case in adversarial proceedings. For these reasons alone the Court should grant certiorari to clarify the use of non-responsive FISA evidence in regular criminal proceedings.

Ultimately, one of Gartenlaub’s requests for cert (and most his requests parallel this closely) argues that the government should not be permitted to use FISA warrants unless it submits those FISA warrants for court review.

Gartenlaub’s case is an example of how the government can abuse a national security investigation under FISA to prosecute unrelated non-national security crimes. Because of this risk, the government should not be permitted to use secret national security warrants to prosecute regular crimes if it won’t submit those warrants and supporting materials to investigation and the adversarial process the criminal procedure amendments require. This Court should grant certiorari to analyze and clarify the scope of the 1978 FISA’s encroachment upon the fundamental, centuries old, criminal procedure protections of the Fourth, Fifth, and Sixth Amendments.

On its face, it’s a fairly modest request. And, as the appeal notes, a fairly modest one, given that there is only one other case where FISA is known to be used in a pure criminal case. The appeal distinguishes this case from the past one, Isa, in a way that appeals directly to the Court’s recent narrowing of digitally-based searches.

The 27 year old FISA case of United States v. Isa appears to be one of the few instances where a prosecutor used the non-responsive fruits of a FISA search for an unrelated regular criminal prosecution.70 Isa upheld the use of a FISA surveillance recording, in a state prosecution, of the surveillance target’s murder of his 16-year-old daughter.71 During the course of the surveillance the murder occurred and was incidentally recorded. Unlike Gartenlaub’s case, the evidence was not obtained via the methodical rummaging over the course of months through the target’s computers.

In other words, on its face, it presents a case where there is no question of standing, where the reach of the questions presented may seem narrow, and on topics that fit nicely with recent court decisions recognizing the greater invasiveness of digital searches.

Except the impact of putting FISA review on the table for a purely criminal case (the appeal raises the Carter Page example) would have significant, probably overdue impact on the complete elimination of the wall between intelligence and criminal investigations after 9/11.

None of that says it will work, of course. But it’s a neat formulation that, if it did, might finally push FISA back towards being closer to what it was first envisioned as.

In the Most Cowardly Possible Decision, Ninth Circuit Upholds Gartenlaub Conviction

The Ninth Circuit just released an unsigned opinion in Keith Gartenlaub’s case; in a non-precedental opinion, they upheld his conviction.

As a reminder, Gartenlaub was an engineer at Boeing. During a period when there were suspected Chinese breaches of Boeing at other locations, an FBI Agent in the LA area decided that there must be someone breaching Boeing at the local facility. He set out to find a suspect and focused on Gartenlaub (apparently) because he had access to relevant files and a Chinese-America wife. It appears that the FBI used back door searches on Section 702 material in their early investigation of Gartenlaub. They also moved back and forth from criminal warrants to FISA warrants. Using a FISA physical search warrant, the FBI searched his home and imaged his hard drives. Searches of those hard drives found no evidence he was a spy for China, as they had claimed; instead, they found child porn that had not been accessed in a decade. The government used that to obtain yet another warrant on Gartenlaub, parallel constructing the child porn for use at trial, all in an attempt to get him to agree to spy on his Chinese relatives. Instead, he went to trial and was found guilty of knowingly possessing child porn.

He appealed his conviction both because the government presented no evidence he had actually accessed this child porn since it had been loaded onto his computer, and because the government used a FISA order to find the porn that they then used to search him (and also used to legitimize the Tor exception, which permits the NSA to target location-obscured facilities known to be used by Americans, so long as they sift out the non-criminal US person content after the fact).

The Ninth Circuit sat on this decision until Gartenlaub was out of prison

I say this opinion was cowardly for a number of reasons (aside from the court taking nine months to release a thin, unsigned opinion). Part of the cowardice is the timing. The court entered this judgment on September 17, two weeks ago.

They just released it today.

Today also happens to be the day that Gartenlaub moved to a halfway house. Perhaps the court hoped by releasing it after he was released from prison, it would moot any further challenge.

Even the Carter Page precedent didn’t win Gartenlaub a review of his FISA application

While Gartenlaub challenged the sufficiency of the evidence that he knowingly possessed the child porn (which the Ninth also upheld), the key to this challenge was whether using child porn the government had found using the broader search protocols available under FISA presented a Fourth Amendment challenge, particularly in light of the US v. Comprehensive Drug Testing precedent on plain view doctrine in the circuit.

The Ninth avoided dealing with this issue in two ways. First, even though Carter Page has established the precedent that defendants — indeed, the whole world! — can see FISA applications, the court conducted its own review, and found the FBI had presented probable cause that Gartenlaub (or perhaps his wife?) was an agent of China “when the FISA order was issued.”

Based upon our independent review of the classified record evidence, we conclude that the FISA warrant was supported by probable cause. The FISA application and supporting materials demonstrated probable cause to believe that Gartenlaub was an agent of a foreign power when the FISA order was issued.

I’m really curious about that language, “when the order was issued,” as the two streams of collection the FBI was using leaves open the possibility that FBI had learned that he wasn’t a spy by the time they did the search.

Based on their review of the FISA application the Ninth decided that such a review was not necessary or even useful to determine the legality of the search.

We have conducted an in camera review of the underlying FISA materials. We conclude that the disclosure of the FISA materials to Gartenlaub was not “necessary to make an accurate determination of the legality of the search.” 50 U.S.C. § 1825(g); see also United States v. Ott, 827 F.2d 473, 476–77 (9th Cir. 1987) (finding “no indications of possible misrepresentation of fact, vague identification of the persons to be surveilled, or surveillance records which include a significant amount of non-foreign intelligence information, or any other factors that would indicate a need for disclosure” (internal quotation marks omitted)). In point of fact, disclosure was not necessary even under a less rigorous standard than that proposed by the government.

Of course, given the likelihood that the government used 702 data to obtain this FISA order (and the FBI’s use of shoddy public reporting), that’s not all that comforting.

The Ninth punts on the Fourth Amendment issue

Having disposed of the sufficiency of the evidence and the probable cause challenges, the Ninth then addressed the key issue that any non-cowardly opinion would have dealt with: whether using a FISA order, instead of a criminal warrant, to get the ability to search more extensively on a person’s life constitutes a Fourth Amendment violation (this is particularly important in Gartenlaub’s case, because he was suspected of stealing non-videos, so a criminal search wouldn’t have had any reason to search for videos). The court admits that this is a really troubling issue.

The idea that the government can decide that someone is a foreign agent based on secret information; on that basis obtain computers containing “[t]he sum of [that] individual’s private life,” Riley v. California, 134 S. Ct. 2473, 2489 (2014); and then prosecute that individual for completely unrelated crimes discovered as a result of rummaging through that computer comes perilously close to the exact abuses against which the Fourth Amendment was designed to protect.

But they treat this question as a review for plain error (in part because Gartenlaub’s original attorney, who made some other key errors at the District level, didn’t raise the Fourth Amendment issue).

Plain error review is the appropriate standard because Gartenlaub did not assert the Fourth Amendment argument predicated on alleged misuse of the FISA warrant before the district court.

Note, significant evidence about how the government abused the FISA process to get at the more expansive search authority under FISA became public after Gartenlaub submitted his appeal.

In any case, having deemed this a plain error review rather than a Fourth Amendment one, the court basically said there’s no standard set for the use of plain view in national security cases, so the District judge could not have plainly erred.

No controlling authority dictates the conclusion that the government’s Foreign Intelligence Surveillance Act (“FISA”) search and subsequent use of FISA-derived materials in a non-national security prosecution violates the Fourth Amendment, such that the district court’s failure to follow it was plain error. See United States v. Gonzalez-Aparicio, 663 F.3d 419, 428 (9th Cir. 2011), as amended (Nov. 16, 2011). Our decision in United States v. Comprehensive Drug Testing, Inc., 621 F.3d 1162 (9th Cir. 2010) (en banc), abrogation recognized by Demaree v. Pederson, 887 F.3d 870 (9th Cir. 2018) (per curiam), is inapposite; it did not decide the question presented by this case and, in fact, addressed no national security concerns particular to the FISA context.

This is, in other words, a punt — a punt that admits such unrestricted searches are a problem, but manages to avoid ruling for this case, a case that itself served as precedent at the FISA court for a whole slew of even more problematic national security searches.

[Photo: National Security Agency, Ft. Meade, MD via Wikimedia]

Keith Gartenlaub Wonders Why He Can’t Get the Carter Page Treatment

Whatever else you think of the Carter Page pseudo-scandal, the release of his FISA application has finally ended the 50 year period during which not a single person targeted under FISA has ever seen the application used to obtain the order.

That should mean that for defendants who can legitimately demonstrate there was probably something actually problematic with the application they can review the application and challenge the order and everything that comes from it. Keith Gartenlaub, who was targeted as a Chinese spy based off basically nothing, currently has a pending challenge in his FISA case in the 9th Circuit.

His attorney, John Cline, has already written the court pointing out that the release of Page’s FISA application demonstrates DOJ’s 50 year fearmongering about FISA is really overblown.

As with the HPSCI memoranda, the declassification and disclosure of the redacted Page FISA materials demonstrates that it is possible to discuss publicly aspects of a FISA application without damaging national security. In addition, the declassification and disclosure of the redacted FISA materials highlights the absurdity of the government’s assertion, in this and other cases involving motions to suppress FISA surveillance, that any disclosure of any portion of a FISA application, even to cleared defense counsel under the protections of CIPA, would harm national security. If the redacted Page FISA materials can be disclosed publicly without harming national security, as the Executive Branch has
determined, even more substantial disclosure of the Gartenlaub FISA application can be made to cleared defense counsel under CIPA without causing such harm.

It is likely that we (or rather, Cline, Gartenlaub’s cleared attorney) would learn far more about the things FBI gets away with in FISA applications from Gartenlaub’s application than Page’s.

If defendants like Gartenlaub can carry out such review, we actually might be able to make FISA more reasonable.

Andy Finds an Acorn: The Searches of Carter Page’s Devices

I’ve long argued that Trump opponents should include Andrew McCarthy among the right wing Trump defenders they read. That’s true, in part, because he at least feigns to be considering the public evidence (though I think he has long since gotten swept up in tribalism). Moreover, as a former prosecutor who worked on some high visibility national security cases, he knows how these things worked fifteen years ago.

His piece on the Adam Schiff memo is typical of his current work. Virtually every single point is easily refuted; most are laughable, such as when he claims the FBI’s use of his 2013 interview to prosecute some spies means his March 2016 interview was truthful.

The memo does note that “the FBI also interviewed Page multiple times about his Russian intelligence contacts.” Apparently, these interviews stretch back to 2013. The memo also lets slip that there was at least one more interview with Page in March 2016, before the counterintelligence investigation began. We must assume that Page was a truthful informant since his information was used in a prosecution against Russian spies and Page himself has never been accused of lying to the FBI.

McCarthy also adheres to the GOP propaganda line that “Democrats conveniently omit is that … the Russian spies explicitly regarded him as an ‘idiot’ (and they had not even seen him on cable TV),” which I mocked in this piece at Vice.

The Republican response to the evidence that the Trump campaign named Page a foreign policy advisor around the same time the FBI interviewed him over suspected ties with Russian spies is perhaps the most pathetic thing in here. Among other things, it complains that the Schiff memo doesn’t mention that “a Russian intelligence officer called Page ‘an idiot.’”

So the latest Memoghazi arguments might best be summarized this way: After Democrats convincingly argued Trump made a suspected Russian asset a key foreign policy advisor, Republicans insisted that doesn’t matter because the suspected Russian asset was a moron.

On one point (a point I’ve been making), however, McCarthy is right.

The Schiff memo reveals, for the first time, that DOJ obtained a FISA order covering both electronic surveillance and “physical search.” Not many people understand this, but DOJ uses physical search orders not just to authorize FBI agents to search through a person’s home, but also to search through that person’s electronic devices (and cloud providers’ cloud storage). As I explained in my post on FISA and the Space-Time Continuum, using a physical search order allows the government to search far back in time.

Domestically, there are two kinds of collection: 1805, which is the collection of data in motion — an old fashioned wiretap, and 1824, which is called a “physical search” order. The government likes to hide the fact that the collection of data at rest is accomplished with an 1824 physical search order, not 1805. So an 1824 order might be used to search a closet, or it might be used to image someone’s hard drive. Most often, 1805 and 1824 get combined, but not always (the FISC released a breakdown for these last year).

Of course (as the Gartenlaub case will show), if you image someone’s hard drive, you’re going to get data from well before the time they’ve been under a FISA order, quite possibly even from before you’ve owned your computer.

In Keith Gartenlaub’s case, a physical search order was used to conduct a black bag search of his home, during which the FBI imaged and subsequently searched the saved hard drives from the last three computers Gartenlaub had used, going back a decade, which is how FBI found child porn that hadn’t been accessed in a decade.

And, as McCarthy notes (though without explaining the electronic/physical distinction), in the case of Carter Page, depending on what minimization procedures the FISC imposed, a physical search order approved on October 21, 2016 might allow FBI to search his devices for communications he had between March and September 2016, when he was a member of the Trump campaign.

What Democrats fail to mention is that the surveillance enabled the FBI to intercept not only his forward-going communications but also any stored emails and texts he might have had. Clearly, they were hoping to find a motherlode of campaign communications. Remember, Page was merely the vehicle for surveillance; the objective was to probe Trump ties to Russia.

I’ve explained that the near-certainty that NSA obtained a 705(b) order on Page for when he traveled to Moscow, London, and the Emirates in December and January would make such backwards looking surveillance even more likely.

I’m not sure that amounts to using Page as a vehicle to surveil the Trump campaign. Depending on how you count it, FISC modified somewhere between 112 and 310 applications in 2016, easily more than they ever had before (my guess is the big spike in numbers has to do with their consideration of the Riley SCOTUS precedent as they approve more orders accessing iPhones). Modifications are how minimization procedures show up in FISA counts, and imposing limits on what the government might access from Page’s devices is the kind of thing I’d expect to see out of the FISC.

Still, McCarthy doesn’t know that FBI used Page as a vehicle; the FBI could easily argue they were trying to protect Trump from the suspected spy the campaign’s non-existent vetting had invited into its midst. And he couldn’t know whether targeting Page allowed FBI to access campaign-related communications without knowing what kind of minimization procedures were imposed, if any.

A real oversight committee would make answering such a question a priority, because it’s the kind of question that goes to the core of the impact of the Page order on Trump’s campaign, but also because the question of how FISC orders permit FBI to access decades of information is a fairly important legal issue, not least in the Ninth Circuit in the Gartenlaub case.

Alas, HPSCI is not that real oversight committee, and so no one appears to be asking that question.

In Defense of Suspected Russian Agent Carter Page, Michael Mukasey Just Gave Defense Attorneys a Big Gift

In my post laying out the damage the Nunes memo might have caused, I predicted that defense attorneys would use the release of the memo — and the language Don McGahn used to claim its release served a public interest — to support their arguments that defendants should get to review the underlying application for a FISA warrant.

In the 40 year history of FISA, no defendant who got notice that FISA data was being used against them in prosecution has been able to review the application used against them. Because Nunes released this information so frivolously, because White House Counsel Don McGahn, in his cover memo, suggested this was a time when “public interest in disclosure of [FISA materials] outweighs any need to protect the information, the memo lowers the bar for release of FISA-related information going forward.

I assume Carter Page, if he is charged, will successfully be able to win review of his FISA application (and think that would be entirely appropriate); that may mean he doesn’t get charged or, if he does, Mueller has to bend over backwards to avoid using FISA material.

But I also assume — and hope — that this disclosure ends the 40 year drought on the release of information, which the original drafters of FISA envisioned would be appropriate in certain circumstances. I think this the one salutary benefit of this memo; it makes it more likely that FISA will work the way it is supposed to going forward.

I even think it possible that the release of this information may affect the response to Keith Gartenlaub’s pending appeal in the Ninth Circuit. His is a case that merits FISA review, and whereas the court might have hesitated to give him that in the past, it would be far easier for them to do so here.

Former Attorney General Michael Mukasey, fresh off trying to broker the release of sanctions violator Reza Zarrab, just gave defense attorneys another big gift.

In a WSJ op-ed that ignores all the holes in the Nunes memo and pretends two guilty pleas about lies about negotiations with Russians have nothing to do with an investigation into “collusion” with Russians, he says that Carter Page’s FISA application should be made public so we can figure out whether DOJ misled the FISA Court.

I believe that at a minimum, the public should get access to a carefully redacted copy of the FISA application and renewals, so we can see whether officials behaved unlawfully by misleading a court;

Remember: when defendants who’ve gotten FISA notice ask to see their own applications to see whether “officials behaved unlawfully by misleading a court,” one thing the government has to do to keep the application secret is submit a declaration from the Attorney General saying that FISA applications are so sensitive they can never be shared with defendants. In the declaration Eric Holder submitted in the Gartenlaub case, for example, he claimed,

Based on the facts and considerations set forth below, I hereby claim that it would harm the national security of the United States to disclose or hold an adversary hearing with respect to the FISA Materials.

[snip]

I certify that the unauthorized disclosure of the FISA Materials that are classified at the “TOP SECRET” level could reasonably be expected to cause exceptionally grave damage to the national security of the United States. I further certify that the unauthorized disclosure of the FISA materials that are classified at the “SECRET” level could be expected to cause serious damage to the national security of the United States. The FISA Materials contain sensitive and classified information concerning United States intelligence sources and methods and other information related to efforts of the United States to conduct national security investigations, including the manner and means by which those investigations are conducted. As a result, the unauthorized disclosure of the information could harm the national security interests of the United States.

I’m sure Holder was using boilerplate that Mukasey himself used, when he submitted similar declarations to courts.

Remember, Gartenlaub is awaiting a ruling from the Ninth Circuit on whether he should be able to access his FISA application to see whether officials misled the FISA Court. The government has been claiming over and over that accessing his FISA application to do so would be too dangerous.

And yet, here we have one of the most hawkish Attorneys General in recent history telling the world that even the public release of FISA applications to do just that would be useful.

The Harm Releasing the Nunes Memo Caused

I did two pieces elsewhere on the Devin Nunes memo yesterday. At Vice, I tracked all the holes in the memo; subsequent reporting showed that I hit virtually all the big ones that Adam Schiff hit in his response memo: the memo misrepresented what FBI told FISC about the political nature of Christopher Steele’s, it misrepresents Andrew McCabe’s testimony, and the memo misrepresented why George Papadopoulos was mentioned in the application. At HuffPo, I described how on the twin FISA events of the last few weeks — 702 reauthorization and the Nunes memo — both Nunes and Paul Ryan were on the wrong side of the principles of rule of law and civil liberties.

Since the memo has proven to be such a dud, a lot of people are now questioning DOJ’s and Democrats’ claims that releasing the memo would harm national security. I want to lay out three ways (DOJ surely believes) it may well do that.

Tells Carter Page and any co-conspirators precisely when FISA surveillance started

The memo tells Carter Page — and any co-conspirators both within the Trump camp and overseas — precisely when the surveillance on Page started and what it consists of.

FBI obtained an electronic surveillance warrant against Page on October 21, 2016, and obtained 3 reauthorizations (so roughly January 19, April 19, and July 18). While Page’s interlocutors overseas were likely wiretapped, if possible, associates in the Trump camp can now assume any conversations they had with him before October 21 were not recorded and remain unavailable to Robert Mueller.

Mind you, we know the memo doesn’t reveal the full extent of surveillance directed against Carter Page, because it gives no details on the 2014 FISA wiretap reportedly used against him. That leaves open the possibility that he was surveilled using other means. I think the GOP would have included had FISC approved a physical search FISA warrant against Page, because that would include the possibility of obtaining stored communications from during the campaign. But I would also bet a lot of money that whatever Attorney General was in charge during periods when Page traveled overseas approved a 705(b) order on him, permitting surveillance to continue while he was overseas. I’ll have more to say on this in upcoming days.

Note, it is also possible that the surveillance against Page continues.

Tells subjects of the investigation the status of the investigation and FBI’s ability to validate the Steele memo

The memo provides other details about the investigation, too.

On October 21, per a quotation from FBI Assistant Director Bill Priestap, the investigation into Russian ties with the Trump camp was is its “infancy.” Again, this will let Russians and Trump associates know that anything they managed to destroy before that date may well be unavailable to Mueller.

Later in October, the source report on Steele reported that the dossier had been “only minimally corroborated.” If any of the events in the dossier are real, then the Russians (especially) will have a sense of how unsuccessful the FBI had been in finding the evidence to corroborate those events. If the dossier is, as I’ve suggested, disinformation, the Russians would know that their disinformation was wasting FBI Agent time at least for months.

Tells Australians and every other foreign partner shared intelligence may be officially declassified

The memo mentions the Papadopoulos tip and confirms that’s what triggered the investigation; it also confirms that nothing shared prior to then had triggered an investigation. While the description here doesn’t attribute that intelligence to the Australians, we know that’s where it came from. Now Australia and every other country will know that intelligence they share, including intelligence that makes it look like Five Eyes officials are reporting on the citizens of other Five Eyes countries, may be released by Devin Nunes for political gain. This will add to the many reasons why our friends will hesitate before sharing intelligence with us.

Makes it more likely defendants will get FISA review

In the 40 year history of FISA, no defendant who got notice that FISA data was being used against them in prosecution has been able to review the application used against them. Because Nunes released this information so frivolously, because White House Counsel Don McGahn, in his cover memo, suggested this was a time when “public interest in disclosure of [FISA materials] outweighs any need to protect the information, the memo lowers the bar for release of FISA-related information going forward.

I assume Carter Page, if he is charged, will successfully be able to win review of his FISA application (and think that would be entirely appropriate); that may mean he doesn’t get charged or, if he does, Mueller has to bend over backwards to avoid using FISA material.

But I also assume — and hope — that this disclosure ends the 40 year drought on the release of information, which the original drafters of FISA envisioned would be appropriate in certain circumstances. I think this the one salutary benefit of this memo; it makes it more likely that FISA will work the way it is supposed to going forward.

I even think it possible that the release of this information may affect the response to Keith Gartenlaub’s pending appeal in the Ninth Circuit. His is a case that merits FISA review, and whereas the court might have hesitated to give him that in the past, it would be far easier for them to do so here.

In other words, the release of this memo likely helped those Mueller is trying to investigate, provided another reason for our foreign partners to hesitate before sharing intelligence with us, and makes it more likely some defendants will get to review their FISA application going forward. I can see how DOJ would consider all of that harmful to national security.

Update: On Twitter some folks added that this makes people distrust FBI, making it less likely they’ll share information with the Bureau. In my opinion actually sharing interview reports with HPSCI already did that (though that Chris Wray was forced to do so wouldn’t be as widely known). I also think the sheer shittiness of the dossier minimizes the impact of that somewhat. But I think it’s a fair point.

Yes, in Gartenlaub, FBI Was Hunting for Child Porn in the Name of Foreign Intelligence Information

Over at Motherboard, I’ve got a piece on the Keith Gartenlaub hearing in the Ninth Circuit on December 4. Gartenlaub was appealing his conviction for possession of child porn, in part, based on the argument that the government shouldn’t have been able to look for child porn under the guise of searching for foreign intelligence information.

As I note, the public hearing seems to have gone reasonably well for Gartenlaub, with a close focus on how the US v Comprehensive Drug Testing precedent in the 9th Circuit, which requires searches of digital media to be appropriate to the purpose of the search, might limit searches for Foreign Intelligence Information.

Anthony Lewis, arguing for the government, suggested that FISA was different from the Rule 41 context; in FISA, he argued, specificity would be handled by post collection minimization procedures.

Anthony Lewis, arguing for the government, responded to Gartenlaub’s argument with vague promises that the minimization procedures—rules that FISA imposes on data obtained under the statute—would take care of any Fourth Amendment concerns. “The minimization procedures themselves really supply the answer in the FISA context,” Lewis said. Accessing data found during a search “simply operates differently in the FISA context, in which there is a robust set of procedures that exist on the back end of the search through acquisition, retention, and dissemination that is simply unlike what happens in a Rule 41 context.”

Lewis argued (and this is not in the post) that because FISA permits the sharing of criminal information, minimization procedures would always using evidence of a crime found in a search.

If it is evidence of a crime, then the minimization procedures — the statute does not call for it to be minimized. There are other procedures in place, some of which I can’t discuss in this open proceeding, but there are procedures in place that limit the use of that. Some of them are in the statute itself that Attorney General approval is required in order to use information obtained or derived from FISA.

The judges didn’t seem convinced. Each judge on the panel voiced a theory by which they could rule for Gartenlaub (which is different from giving him any kind of relief).

Judge Ronald Gould worried that if the government found evidence that wasn’t foreign intelligence but revealed something urgent—he used the example of a serial killer’s next targets throughout the hearing—it would need a way to use that information. Gartenlaub’s attorney John Cline and amicus lawyer Ashley Gorski, arguing for the ACLU, both noted an exigent circumstance exception could justify the use of the information on the hypothetical serial killer.

Judge Lawrence Piersol, a senior district court judge from Idaho, seemed to imagine district court judges providing individualized review on whether the information was reasonably obtained in a FISA-authorized search, possibly with the involvement of the court’s own cleared experts.

Judge Kim Wardlaw, who sat on the en banc panel for the Ninth Circuit precedent in question, asked why, when the government saw “a whole database [that] obviously suggests child porn” it couldn’t “go get another warrant?” So she seemed to favor a system where the government would have to get a criminal warrant to obtain child porn. That would present very interesting questions in this case, however, since the government obtained a criminal warrant based on probable cause that Gartenlaub was sharing information on Boeing intellectual property with China before it executed the FISA-authorized search that discovered the child porn.

But (also not in the post) Piersol added another example — one that has direct relevance for the most prominent investigation in the country implicating FISA, the Mueller investigation, which indicted FISA target Paul Manafort for what amounts to money laundering.

What about instead if you’re going through and looking for foreign intelligence information and you find a tremendous number of financial transactions which looks like it could well be money laundering. What do you do with that? Nothing? I mean, you just go ahead and prosecute it? You don’t have to worry about the fact that you weren’t looking for that?

Sure, Manafort’s not in the Ninth, but the judges sure seem inclined to limit the government’s ability to use a FISA order to troll through digital devices to find evidence of a crime that they can then use — as they did with Gartenlaub and are trying to do with Manafort — to coerce cooperation from the defendant. Depending on how they framed such a limit, it might seriously limit how the government enacted other FISA authorities in the circuit (which of course includes Silicon Valley — though any secondary searches would take place in Maryland or some other NSA facility); of very particular import, it would affect how the government implements its 2014 exception, whereby the NSA collects location obscured data (including entirely domestic communications) but then purges all but that which can be retained, including for criminal purposes, after the fact.

Which is why it’s so troubling that — as has happened in the last case where a defendant had a good argument to look at his FISA materials — the panel asked Lewis to stick around for an ex parte session.

Things were going swimmingly, that is, up until Wardlaw’s last comments to the government’s lawyer, Lewis. As he finished, she said she had no further questions, but added, “We’re going to ask you to stay after the hearing, to be available for us.” Lewis responded, “Understood, your honor,” as if he (and the people whose bags were sitting behind his counsel’s table but who were not themselves present) had advance warning of this. “Understood,” Lewis repeated again.

That was the first Gartenlaub’s team learned of the secret meeting the panel of judges had planned.

So after having presented a lackluster argument, Lewis was going to get a chance, it appears, to argue his case without Gartenlaub’s lawyers present, to be able to argue that not even Ninth Circuit precedent can limit the government’s authority to search with no limits in the name of national security.

There’s apparently precedent for this. Cline, who worked on the appeal of a defendant who almostgot FISA review, Adel Daoud, said the appeals court judges booted him and the other defense lawyers out of the courtroom for a similar ex parte hearing in that case too.

“The Seventh Circuit cleared the courtroom after the public argument and then allowed only government attorneys back in for the classified, ex parte session,” he said.

The session would not only give Lewis a chance to make further argument that the law envisions finding criminal evidence and using it to flip targets, but also to explain why, if the panel ruled in the direction it appeared they might, it would cause problems with other NSA collection.

Here’s the thing though — and the reason why an ex parte proceeding is so problematic here.

If given the chance, Gartenlaub would be able to argue in fairly compelling manner that the government set out to find things like child porn. That’s because one of the first steps of a forensics search — according to Gartenlaub’s forensics expert, Jeff Fischbach, who attended the hearing — is to set what you’re looking for. There’s a button to exclude all images and videos; by turning it off you vastly accelerate the search. And in Gartenlaub’s case, the government claimed to be looking for very specific kinds of foreign intelligence information: Boeing intellectual property, or any materials suggesting that Gartenlaub was dealing in same. The IP would have been CAD drawings stolen in digital form, not images. So to search what the government claimed it wanted to search for, there would have been no reason to search through any videos or photos. Which would have excluded finding the decade old child porn lying unopened on the hard drive.

As Wardlaw (who had been on the CDT panel) laid out,

The main problem we had was that in CDT, the government was authorized to look at the files pertaining to certain individuals — I believe Barry Bonds — and instead, they went further, and looked at the drug testing files for other baseball players. So that search was not authorized. They were not the subjects of the warrant and the warrant was circumscribed that way. Here, the warrant is any foreign intelligence data, it’s not narrower than that.

We don’t actually know (and it’s likely Wardlaw doesn’t either, at this point). But the government claimed to be searching for very specific things, tied to very specific claims of stolen IP from Boeing. Yet they necessarily designed their search to find far more than that. Which is how they found no foreign intelligence, but instead unopened child porn.

“Hype:” How FBI Decided Searching 702 Content Was the Least Intrusive Means

Former FBI Special Agent Asha Rangappa has a defense of back door searches at Just Security that (unlike most defenses of 702) actually takes on those searches as practiced in most problematic way at FBI, rather than as done in much more controlled fashion at NSA.

FBI does federated searches

I think she nitpicks a few issues. For example, she claims that back door opponents claim there is a “stand-alone computer in the middle of each FBI office with a big sign that reads ‘702 DATABASE ‘” but then goes on to claim “FBI uses one database for all of its investigative functions,” even while admitting that the FBI really does “federated queries” of multiple repositories. The distinction — particularly given that we know the database comes with access limits tied to job function — could offer solutions to concerns about 702 data (including providing access to just metadata, a proposal I’m not a fan of but one she attacks in the post). She also ignores the FBI’s use of “ad hoc databases” that have posed access and data protection concerns in the past.  Which is to say, the technical realities of how FBI Agents access this data soup are more complex than she lays out, and those complexities should be part of the discussion because they present additional risks and opportunities.

FBI’s raw data will be US-person focused

Rangappa minimizes what percentage of raw data obtained by FBI would include US person contact.

According to FBI Director Christopher Wray, the FBI receives about 4.3 percent of the NSA’s total collection – and since not every incidental communication will necessarily involve an USPER, the number of communications involving Americans are likely less than that.

While the FBI does have global investigations, the FBI is going to have few full investigations that have no domestic component. Investigations focused on US victims (say a US company hacked by Russian or Chinese state actors) won’t include many US interlocutors, but the other most likely 702 related investigations would all be focused on international communications: who suspected extremists were talking to in the US, what Iranians were buying dual use or other proliferation products, including from US companies, which Americans that Chinese scientists or Russian businessmen were engaging with closely. The 5,000 or so targets sucked into FBI would be the 5,000 targets in most frequent contact with Americans, by design. That has been the entire justification for this collection program since its inception as Stellar Wind.

And — as Ron Wyden recently made clear — it is permissible to target a foreigner if collecting on a US person is one purpose of the targeting, so long as the foreigner is targetable in his own right. Indeed, we can probably point to examples where that happened. That’s going to increase the US content pulled in with those 5,000 targets.

702 can target a whole bunch of selectors

And I believe this is misleading.

PRISM allows the NSA to target non-U.S. persons reasonably believed to be located abroad based on “selectors” – like an email address or a phone number (but not keywords or names) – which will reasonably return foreign intelligence information.

It is true that upstream collection doesn’t use keywords (and has halted about collection altogether). It is true that the most common selector provided in a directive to Google will be an email address. But there are a slew of other kinds of selectors that NSA and FBI can target. That includes IP addresses, which given the 2014 exception means entirely domestic communications can be collected. Even ignoring the targeting of IP addresses that Americans are known to also use (which will come into FBI’s possession a different way), the collection on chat room IPs, just as one example, might suck up a lot more US person content than individual emails might. And the FBI can also search for things like cookies or encryption tools, which will pull in different kinds of content.

FBI’s queries are not all routinely audited

I think Rangappa overstates the tracking of queries and makes an outright error when she claims that backdoor searches are “routinely audited.”

Every query, furthermore, is documented and placed in a case file. (If we learned anything from James Comey, it’s that the FBI puts everything down on paper.) In fact, every query conducted by the FBI is recorded and must be traceable back to an authorized purpose and a case file.  Agent queries are routinely audited, and a failure of an agent to provide an authorized purpose for conducting a query can be grounds for sanctions, suspension, or even termination.

She overstates the tracking of queries because by design there’s not a case file for many of the queries in question, because they’re done at the assessment stage. Moreover, if the FBI tracked its queries as well as Rangappa claims, it could provide documentation of what was going on to oversight bodies, but it has persistently claimed it could not do so, not in public, and not even in private.

More importantly, the FBI’s use of 702 is simply not audited adequately. That’s true, in part, because in 2012-2013, FBI moved much of its FISA activity to field offices, and not every field office gets audited every six months.

During this reporting period, however, FBI transitioned much of its dissemination from FBI Headquarters to FBI field offices. NSD is conducting oversight reviews of FBI field offices use of these disseminations, but because every field office is not reviewed every six months, NSD no longer has comprehensive numbers on the number of disseminations of United States person information made by FBI.

In 2015 — the most recent period for which we’ve gotten a Semiannual Report — NSD only reviewed minimization at 15 field offices (and ODNI did not attend all of these).

During these field office reviews, NSD also audits a sample of FBI personnel queries in systems that contain unminimized Section 702 collection. As detailed in the attachments to the Attorney General’s Section 707 Report, NSD conducted minimization reviews at 15 FBI field offices during this reporting period and reviewed cases involving Section 702-tasked facilities.

FBI has 56 field offices. And while I’m confident that NSD focuses its 702 reviews on the offices that work with FISA most often — places like DC, NY, LA, SF, and places with significant foreign population, like Detroit and Minneapolis — that means that when a field office that doesn’t use FISA often (say, if an Agent in Milwaukee were researching a hacker named MalwareTech), a combination of inexperience and lax oversight might be especially likely to result in problems.  And note, in any office, just a sample of queries gets reviewed, as the government explained to FISC last year, and the tracking isn’t detailed enough to figure out what occurred with a query without talking to the Agent who did it.

Additionally, NSD conducts minimization reviews in multiple FBI field offices each year. As part of these minimization reviews, NSD and FBI National Security Law Branch have emphasized the above requirements and processes during field office training. Further, during the minimization reviews, NSD audits a sample of queries performed by FBI personnel in the databases storing raw FISA-acquired information, including raw section 702-acquired information. Since December 2015, NSD has reviewed these queries to determine if any such queries were conducted solely for the purpose of retaining evidence of a crime. If such a query was conducted, NSD would seek additional information from the relevant FBI personnel as to whether FBI personnel received and reviewed section 702-acquired information of or concerning a U.S. person in response to such a query.

Notably, the one case where FBI reported a criminal return on a criminal search in 702 information only got reported after NSD did follow-up questioning. So yeah, NSD spends 4 days at Main Justice reviewing this stuff and goes to 27% of the field offices every six months, but that’s a far cry from “routinely auditing” queries.

The importance of investigative levels

The most remarkable thing about Rangappa’s post, however, is how well she exhibits the absurdity of what really goes on here. She correctly states — as I reported here — that FBI only obtains 702 content in full investigations. And she provides a short description of FBI’s three investigative levels.

Specifically, the NSA passes on to the FBI information collected on selectors associated with “Full Investigations” opened by the FBI. Full Investigations are the most serious class of investigations within the Bureau, and require the most stringent predicate to open: There must be an “articulable factual basis” that a federal crime has occurred or is occurring or a threat to national security exists.  (Two other investigative classifications, Preliminary Investigations and Threat Assessments, have lower thresholds to open and shorter time limits to remain open.)

She helpfully describes how investigations work through stages, with new investigative methods approved for each

Querying DIVS is, quite literally, the first and most basic thing the FBI does in its investigative sequence. Depending on the kind of information the search returns, an agent will then take the next prescribed step as outlined in the FBI’s Domestic and Investigative Operations Guide (DIOG) until a case is either opened for further investigation, or the matter is resolved in the negative and closed.

She then dismisses the concern that FBI does queries of 702 data at the assessment level without really addressing it.

Much of the criticism of the FBI’s use of 702 centers around the fact that agents can query subjects in their databases even if there is no evidence of criminal wrongdoing. However, as any law enforcement official will tell you, criminals and spies don’t show up on the doorstep of law enforcement with all of their evidence and motives neatly tied up in a bow. Cases begin with leads, tips, or new information obtained in the course of other cases. Often, the discrete pieces of information the FBI receives may not in and of themselves constitute criminal acts – and the identifying information provided to the FBI may be incomplete. However, anytime the FBI receives a credible piece of information that could indicate a potential violation of the law or a threat to national security, it has a legal duty determine whether a basis for further investigation exists. It is for this reason that a query of its existing databases is essential before proceeding further.

Somehow, the necessity of investigating a tip requires not an assessment of the lead itself, but querying a vast data store to see if the lead connects to any other known evidence even if that evidence is not itself evidence of criminal behavior. (One of the reasons FBI does that — which I’ve written about elsewhere — is to make it easier to find informants.)

That logic — which absolutely reflects the logic under which FBI operates — is all the more bizarre given the fact that the FBI is obliged, under the same DIOG Rangappa cites as the basis for the step-by-step development of an FBI case, to always consider using the “least intrusive” means as laid out by this language in the Attorney General Guidelines.

The conduct of investigations and other activities authorized by these Guidelines may present choices between the use of different investigative methods that are each operationally sound and effective, but that are more or less intrusive, considering such factors as the effect on the privacy and civil liberties of individuals and potential damage to reputation. The least intrusive method feasible is to be used in such situations.

DIOG section 4.4, which lays out what least intrusive means, says that “wiretaps … are very intrusive.” It says that “collecting information regarding an isolated event, such as a certain phone number called … is less intrusive or invasive of an individual’s privacy than collecting a complete communications … profile.” It states that, “If, for example, the threat is remote, the individual’s involvement is speculative, and the probability of obtaining probative information is low, intrusive methods may not be justified, and, in fact, may do more harm than good.”

Ultimately, though, the DIOG swallows all these rules by stating that, “FBI employees may use any lawful method allowed, even if intrusive, where the intrusiveness is warranted by the threat to the national security.” The logic must be — probably not born out even by FBI’s limitation to obtaining raw 702 data tied to Full Investigations — that for any person tied to a Full Investigation, any possible tie to an American about whom someone has submitted a tip, national security overrides all FBI’s rules about least intrusive methods.

But nonetheless, the FBI’s own guidelines admit how intrusive it is to start an investigation by looking at entire conversations rather than simply seeing the record of a email sent. That is, however, what the routine practice is.

On 702, NSA Wants to Assure You You’re Not a Target Target Target Target Target Target Target Target Target Target Target Target Target Target Target Target Target Target Target

NSA just released a touchy-feely Q&A, complete with a touchy-feely image of the NSA, explaining “the Impact of Section 702 on the Typical American.”

I shall now shred it.

First note that this document deals with 702? It should be dealing with Title VII, because the entire thing gets reauthorized by 702 reauthorization. That means Sections 704 and 705(b), which are used to target Americans, will be reauthorized. And they have had egregious problems in recent years (even if the problems only affect some subset of around 300 Americans). Sure, Paul Manafort and Carter Page are not your “typical” Americans, but abuses against them would be problematic for reasons that could affect Americans (not least that they could fuck up the Mueller probe if FISA disclosure for defendants weren’t so broken).

The piece starts by talking about how the IC uses 702 to “hunt” for information on “adversaries,” which it suggests include terrorists and hackers.

The U.S. Intelligence Community relies on Section 702 of the Foreign Intelligence Surveillance Act in the constant hunt for information about foreign adversaries determined to harm the nation or our allies. The National Security Agency (NSA), for example, uses this law to target terrorists and thwart their plans. In a time of increasing cyber threats, Section 702 also aids the Intelligence Community’s cybersecurity efforts.

Somehow, it neglects to mention the foreign government certificate — which can target people who aren’t “adversaries” at all, but instead foreign muckety mucks we want to know about — or the counterproliferation certificate — which can target businesses of all kinds that deal in dual use technologies. Not to mention the SysAdmins that it might target for all these purposes.

The piece then lays out in two paragraphs and six questions (I include just one below) the basic principles that 702 can only “target” foreigners overseas.

Under Section 702, the government cannot target a U.S. person anywhere in the world, or any person located in the United States.

Under Section 702, NSA can target foreigners reasonably believed to be located outside the United States only if it has a basis to believe it will acquire certain types of foreign intelligence information that have been authorized for collection.

[snip]

Q: Can I, as an American, be the target of Section 702 surveillance?

A: No. As an American citizen, you cannot be the target of surveillance under Section 702. Even if you were not an American, you could not be targeted under Section 702 if you were located in the United States.

Effectively, this passage might as well say, “target target target target target target target target target target
target target target target target target target target target,” which is how many times (19) the word is used in the touchy-feely piece. The word “incidental” appears just once, where it entertains what happens if one of “Mary’s” foreign relatives were in a terrorist organization.

Q: One of Mary’s foreign relatives in South America is a member of an international terrorist group. Could Mary’s conversations with that relative be collected under Section 702?

A: Yes, it’s possible, if the U.S. government is aware of the relative’s membership in a terrorist group and the relative is one of the 106,000 targets under Section 702. However, even if this scenario occurred, there would still be protections in place for Mary, a U.S. citizen, if her conversations with that target were incidentally intercepted. For example:

U.S. intelligence agencies’ court-approved minimization procedures are specifically designed to protect the privacy of U.S. persons by, among other things, limiting the circumstances in which NSA can include the identity of a U.S. person in an intelligence report. Moreover, even where those procedures allow the NSA to include the identity of a U.S. person in an intelligence report, NSA frequently substitutes the U.S. person identity with a generic phrase or term, such as “U.S. person 1” or “a named U.S. person.” NSA calls this “masking” the identity of the U.S. person.

There are also what’s known as “age-off requirements”: After a certain period of time, the IC must delete any unminimized Section 702 information, regardless of the nationality of the communicants.

I guess the NSA figured if they used “Fatima,” whose relatives were in Syria, this scenario would be too obvious?

Yet in this, the only discussion of “incidental” collection, the NSA doesn’t explain how it is used — for example to find informants (meaning Fatima might be coerced into informing on her mosque if she discussed her tax dodging with her cousin) or to find 2nd degree associates (meaning Fatima’s friend in the US, Mohammed, might get an FBI visit because Fatima’s cousin in Syria is in ISIS). It also doesn’t explain that the “age-off” is five years, if Fatima is lucky enough to avoid having the FBI deem her conversations with her cousin in Syria interesting. If not, the data will sit on an FBI server for 30 years, ready to provide an excuse to give Fatima extra attention next time some bigot gets worried because he sees her taking pictures at Disney World.

Curiously, while the NSA doesn’t address the disproportionate impact of 702 on Muslims, it does pretend to address the disproportionate impact on Asians or their family members — people like like Xiaoxiang Xi and Keith Gartenlaub.

Q: Could the government target my colleague, who is a citizen of an Asian country, as a pretext to collect my communications under Section 702?

A: No. That would be considered “reverse targeting” and is prohibited.

Thanks to Ron Wyden, we know how cynically misleading this answer is. He explained in the SSCI 702 reauthorization bill report that the government may,

conduct unlimited warrantless searches on Americans, disseminate the results of those searches, and use that information against those Americans, so long as it has any justification at all for targeting the foreigner.

Effectively, the government has morphed the “significant purpose” logic from the PATRIOT Act onto 702, meaning collecting foreign intelligence doesn’t have to be the sole purpose of targeting a foreigner; learning about what an American is doing, such as a scientist engaging in scientific discussion, can be one purpose of the targeting.

After dealing with unmasking, the NSA then performs the always cynical move of asking whether the NSA can query US person content.

Q: Can NSA use my information to query lawfully collected 702 data?

A: NSA can query already lawfully collected Section 702 information using a U.S. person’s name or identifier (such as an e-mail account or phone number) only if the query is reasonably designed to identify foreign intelligence information.

However, a U.S. person is still afforded protection. The justification for the query must be documented. The process for conducting a query is also subject to internal controls. Such queries are reviewed by the Department of Justice and the Office of the Director of National Intelligence to ensure they meet the relevant legal requirements. Additionally, if the query was subsequently identified as being improper, it would be reported to the Foreign Intelligence Surveillance Court and to Congress.

This passage is absolutely correct. But also absolutely beside the point, because NSA sends a significant chunk of its collection to the FBI where it can be searched to assess leads and search for evidence of crimes, and where queries get nowhere near the kind of oversight that NSA queries get.

Then the piece tries to explain the need for all the secrecy.

Q: Terrorists aim to hurt Americans and our allies, so why doesn’t the Intelligence Community share more Section 702 information about how the IC goes after them?

A: The Intelligence Community has dramatically enhanced transparency, especially regarding its implementation of Section 702. Thousands of pages of key documents have been officially released, and are available on IC on the Record. The public has more information than ever before on how the IC uses this critical foreign surveillance authority. That said, the IC must continue to protect classified information. This includes specifics on whether or not it has collected information about any particular individual.

If terrorists could find out that NSA had intercepted their communications, terrorists would likely change their communications methods to avoid further detection.

This is, partly, a straw man. People aren’t really asking to know NSA’s individual targets. They’re asking to know whether the government has back doored their iPhones via demands under FISA, or whether the NSA is collecting on the 430,000 Americans that use Tor every day, or if they’re also using this “foreign intelligence” collection program to hunt Americans buying drugs on Dark Markets or even BLM activists that our racist Attorney General has deemed a threat to national security. And in the name of keeping secrets from terrorists (who actually have the feedback mechanism of observing what gets their associates drone-killed to learn what gets collected), the government is refusing to admit that the answer to all those questions is yes: yes, the government has back doored our iPhones, yes, the government is spying on the 430,000 Americans that use Tor, and yes, for those who use Tor to buy drugs, they may even use 702 data to prosecute you.

Finally, the NSA pretends that everyone else in the world has a program just like this.

Q: Is the U.S. government the only one in the world with intercept programs like 702?

A: No. Many other countries have intelligence surveillance intercept programs, nearly all of which have far fewer privacy protections. Section 702 and its supporting policies and practices stand out in terms of strength of oversight, privacy protections, and public transparency.

It is true that other countries have “intercept programs,” but with the exception of China and Russia’s access to domestic Internet companies, no other country has a program “like 702” that, by virtue of the United States hosting the world’s most popular Internet companies, gives the US the luxury of spying on the rest of the world using a nice note to Google rather than having to hack users individually (or hack all users, as Russia did with Yahoo).

So, yes, the NSA has now offered a picture of itself, literally and metaphorically, that minimizes the scope, the thousands of spies it employs, and the reach, both domestic and global. But it’s a profoundly misleading picture.