Posts

Did CIA’s Handsomely Paid Contractors Doctor Its Log Books, Again?

I wanted to return to one other detail of John Brennan’s (designed to be made public, I believe) January 27 letter to Dianne Feinstein explaining the urgent need to continue the “investigative, protective, or intelligence activity” targeted at CIA’s overseers.

In the letter, Brennan describes the original basis for CIA’s claimed suspicion into SSCI this way:

CIA maintains a log of all materials provided to the Committee through established protocols, and these documents do not appear in that log, nor were they found in an audit of CIA’s side of the system for all materials provided to SSCI through established protocols. Because we were concerned that there may be a breach or vulnerability in the system for housing highly classified documents, CIA conducted a limited review to determine whether these files were located on the SSCI side of the CIA network and review audit data to determine whether anyone had access the files. [my emphasis]

The original basis CIA used to justify investigating their overseers was a log purportedly recording which documents they had been given.

Recall that CIA worked with contractors — SAIC, as I understand it — to review and re-review each document before they turned it over to SSCI.

CIA insisted that the Committee review documents at a government building in Virginia. Once the CIA produced relevant documents related to the CIA detention and interrogation program, the CIA then insisted that CIA personnel—and private contractors employed by the CIA—review each document multiple times to ensure unrelated documents were not provided to a small number of fully cleared Committee staff.

This process accounts for much of the $44 million cost of the report.

The log must have come out of this process: contractors, being paid handsomely by the CIA to slow the investigation, recording each document that they claimed to hand over to investigators.

So at the base of Brennan’s claim is a log, made by self-interested contractors employed by CIA, about torture.

The CIA’s contractors don’t have a very reliable history recording issues relating to torture.

Recall that — contrary to much of the public reporting on the matter — the destruction of the torture tapes did not just destroy ugly images of torture inflicted on Abu Zubaydah.

In addition, by destroying the torture tapes, CIA destroyed evidence that:

  • The CIA’s contractors used torture on Abu Zubaydah that exceeded the guidelines provided by DOJ
  • The CIA’s contractors’ descriptions of those torture techniques — in written cables and logs — did not match what they had actually done to Abu Zubaydah
  • By the time CIA shut down the Thai black site and decided to stop taping their torture, someone (the CIA’s contractors?) had already destroyed or sabotaged a number of the torture tapes, including ones depicting waterboarding

That is, one of the likely reasons why CIA destroyed the torture tapes is that their handsomely paid self-interested contractors produced a substantively inaccurate log about torture.

And at the base of the CIA’s witch hunt into SSCI staffers is a log about torture presumably made by handsomely paid self-interested contractors.

John Brennan’s Parallel “Investigative, Protective, or Intelligence Activity”

Yesterday, Jack Goldsmith defended CIA lawyer Robert Eatinger for referring Senate Intelligence Committee staffers for criminal investigation. Eatinger had no choice but to refer his Agency’s overseers, you see, because EO 12333 required it.

I knew Eatinger a bit when I was at OLC a decade ago, and based on that experience I agree with John Rizzo that “[h]e doesn’t have a political bone in his body” and “[i]f he made this referral, it’s because he felt it was the right and necessary thing to do.”

It might be useful to articulate the standard for the “right and necessary thing to do,” because I think that standard is at the bottom of this corner of the controversy.  The standard comes from Section 6.1(b) of E.O. 12,333, which imposes a duty on the CIA Director to:

Report to the Attorney General possible violations of Federal criminal laws by employees and of specified Federal criminal laws by any other person as provided in procedures agreed upon by the Attorney General and the head of the department, agency, or establishment concerned, in a manner consistent with the protection of intelligence sources and methods, as specified in those procedures;

I believe that the CIA Director delegates this duty to the CIA General Counsel.

Note how low the bar is for the referral—possible violations of federal law.  Think about what that low standard means.  It means that CIA often has a duty to refer a matter to DOJ that it is reasonably confident does not violate federal law, simply because the matter possibly violates federal law.  As John Radsan noted in his study of the CIA General Counsel’s Office, the low standard results in CIA making “several referrals to the Justice Department in a typical month.”  It might seem that these frequent referrals are signs of lawlessness, but in fact they are a mechanism of accountability. The very soft trigger of “possible” as opposed to “likely” or “actual” violations promotes significant over-reporting and allows another Agency, DOJ, to decide the appropriate action in the first instance.” [my emphasis]

Nice try.

But there’s a significant problem with that. In response to Ron Wyden’s question about whether CIA is subject to the Computer Fraud and Abuse Act — a polite way of suggesting CIA hacked the Committee server — John Brennan told Wyden,

The statute does apply. The Act, however, expressly “does not prohibit any lawfully authorized investigative, protective, or intelligence activity … of an intelligence agency of the United States.” 18 U.S.C. § 1030(f).

In other words, Brennan implicitly asserts the CIA snooping on SSCI was legal because CIA was engaged in lawfully authorized “investigative, protective, or intelligence activity.”

Side note: what are the chances that Brennan, who likes to remind that he’s not a lawyer when he gets legally dangerous questions, consulted with CIA’s Acting General Counsel Robert Eatinger in crafting this response to Wyden?

But let’s look at when and how Brennan chose to engage in what he claims is either “investigative, protective, or intelligence activity” and when and how Eatinger found SSCI’s oversight of CIA reached the “low bar” that merited referral.

Read more

Caroline Krass Confirmed as CIA General Counsel in Landslide Vote

In the background of the fight between CIA and the Senate Intelligence Committee lurked the nomination of Caroline Krass.

Mark Udall had said that he would hold her nomination to get some answers on the Torture Report.

But she just got confirmed with just a few more no votes –4 — than the 2 she got from the Committee. Dianne Feinstein, Ron Wyden, Martin Heinrich, Mark Udall all voted yes.

This was predictable. As I pointed out the other day, the alternative to quickly confirming Krass was leaving Robert Eatinger — the guy who launched a witch hunt into Committee staffers — Acting Counsel at CIA. Even a mediocre candidate would be preferable to that, for Committee Democrats, and by all reports and appearances Krass is a very sharp and candid lawyer.

That said, in addition to seeking leverage over the Torture Report dispute, Committee members had expressed concern that Krass explicitly endorsed withholding privileged documents from the oversight Committee. So by rushing through Krass’ nomination, the Senate waived any opportunity to obtain some commitment for greater sharing with the Senate.

And thus it happens that, in response to an intolerable situation concocted by Article II, Article I pisses away even more of its authority.

Update: Here’s Udall’s statement on Krass.

Udall, a member of the U.S. Senate Select Committee on Intelligence, released his procedural hold today on the nomination of Caroline Krass to be the CIA’s general counsel, citing the conflict of interest of the acting-general counsel, as well as a firm and clear commitment by the president to declassify the committee’s landmark report on the CIA’s detention and interrogation program.

“We need to correct the record on the CIA’s coercive detention and interrogation program and declassify the Senate Intelligence Committee’s exhaustive study of it. I released my hold on Caroline Krass’s nomination today and voted for her to help change the direction of the agency,” Udall said. “The president has stated an unequivocal commitment to supporting the declassification of the Senate Intelligence Committee’s report. Coloradans expect me to hold him to his word.”

 

Robert Eatinger and CIA’s Counterterrorism Center Lawyers’ Lies about Torture: A Timeline

The traditional media is catching up to my post the other day focusing on Robert Eatinger, the CIA lawyer who referred Senate Intelligence Committee staffers for criminal investigation. Welcome traditional media!!

Just to expand the discussion of how deeply involved CTC’s lawyers — including, but not limited to, Eatinger — have been in torture, I thought I’d expand on my post from the other day with a timeline of CTC documents and consultation, most from its legal team, that might be among the 1,600 mentions of Eatinger in the Senate Torture Report that Dianne Feinstein referred to the other day.

I should note that for most, if not all, of the CIA’s Detention and Interrogation Program, the now acting general counsel was a lawyer in the CIA’s Counterterrorism Center—the unit within which the CIA managed and carried out this program. From mid-2004 until the official termination of the detention and interrogation program in January 2009, he was the unit’s chief lawyer. He is mentioned by name more than 1,600 times in our study.

Note, some of this information relies on the OPR report; at least three of CTC’s lawyers refused to cooperate with that report, two based on advice of counsel. Remember too that, just as happened with the SCIF CIA made the Senate Intelligence Committee use, between 10 and 61 torture documents disappeared from DOJ’s OLC SCIF during the period when OPR was working on its report.

April 2002: Months before the first torture memo, CTC’s lawyers, in consultation with NSC and DOJ, approved 24-48 hours of sleep deprivation for use with Abu Zubaydah (who, remember, was still recovering from life-threatening bullet wounds). The torturers promptly exceeded those limits. So CTC, on its own, approved the new amounts because, they claimed, Abu Zubaydah hadn’t suffered any adverse consequences. (See PDF 113-114)

After consulting with the NSC and DOJ, CTC[redacted] originally approved 24-48 hours of sleep deprivation.

In April 2002 CTC[redacted] learned that due to a misunderstanding, that time frame had been exceeded.

However, CTC[redacted] advised that since the process did not have adverse medical effects or result in hallucinations (thereby disrupting profoundly Abu Zubaydah’s senses or personality) it was within legal parameters.

After August 1, 2002: After the Bybee Memos laid out which torture techniques were permitted, then, CTC chief lawyer Jonathan Fredman sent out legal guidance to the torturers in Thailand. Rather than relying on the Bybee Memos, he relied on a July 13, 2002 John Yoo memo, purportedly prepared without the knowledge of Bybee (but, given the timing, probably written in response to Chertoff’s refusal to provide pre-declination andwith coaching from David Addington). The earlier memo lacked some of the key caveats of the later ones.

September 6, 2002: On September 4, 2002, Jose Rodriguez and a lawyer from CTC briefed Nancy Pelosi and Porter Goss on torture. The following day, CIA started discussing destroying the torture tapes. Then, on September 6, a lawyer from CTC altered the record of the briefing to Pelosi and Goss. (see PDF 84 and PDF 11-12)

October 2, 2002: CTC top lawyer Jonathan Fredman briefs Gitmo about torture and says a number of inflammatory things about detainee treatment.

December 24, 2002: CTC completes memo advocating for destruction of torture tapes.

Early 2003: After DOJ told CIA’s Inspector General to develop its own set of facts for review of any criminal liability in torture, John Yoo and Jennifer Koester start freelancing with CTC’s lawyers to develop the “Legal Principles” or “Bullet Points” document which expanded on the analysis officially approved by OLC. Koester told DOJ’s Office of Professional Responsibility the document would be used to assess the legality of the torture.

She understood that the Bullet Points were drafted to give the CIA OIG a summary of OLC’s advice to the CIA about the legality of the detention and interrogation program. [Koester] understood that the CIA OIG had indicated to CTC[redacted] that it might evaluate the legality of the program in connection with its investigation, and that the Bullet Points were intended to demonstrate that OLC had already weighed in on the subject.

June 16, 2003: In her review, Koester took out language CIA had included saying that “comparable, approved techniques” to those approved in the Bybee Memo did not violate law or the Constitution. But when CTC’s lawyers sent the “Bullet Points” back to OLC in 2003 as an attempted fait accompli, that language had been inserted back into the memo.

April 2004: Eatinger takes over as top CTC lawyer.

Unknown date: CTC’s lawyers write a declination memo recommending against charges for Salt Pit manager Matt Zirbel in the murder of Gul Rahman based on (according to Jay Bybee’s characterization) an entirely intent-based exoneration. (see footnote 28)

Notably, the declination memorandum prepared by the CIA’s Counterterrorism Section regarding the death of Gul Rahman provides a correct explanation of the specific intent element and did not rely on any motivation to acquire information. Report at 92. If [redacted], as manager of the Saltpit site, did not intend for Rahman to suffer severe pain from low temperatures in his cell, he would lack specific intent under the anti-torture statute. And it is also telling that the declination did not even discuss the possibility that the prosecution was barred by the Commander-in-Chief section of the Bybee memo.

May 11, 2004: White House meeting, possibly attended by Eatinger, at which White House lawyers tell CIA not to destroy torture tapes.

June 2004: According to John Rizzo, Eatinger attends White House meeting at which White House lawyers instruct not to destroy torture tapes.

August 4-5, 2004: CTC lawyers provide Daniel Levin additional information on waterboarding; the Torture Report found this information to be inaccurate.

August 19, 2004: Another CIA letter, from a lawyer other than John Rizzo, the Torture Report found to be inaccurate.

September 5, 2004: Another CIA letter, from a lawyer other than John Rizzo, the Torture Report found to be inaccurate.

September 19, 2004: Another CIA letter, from a lawyer other than John Rizzo, the Torture report found to be inaccurate.

February 2, 2005: A CTC lawyer worked closely with Daniel Levin to try to finish the Combined Memo before Levin moved to NSC. At that point, the Memo did not include waterboarding. Nevertheless, Levin did not complete it, and Steve Bradbury would add waterboarding back in when he completed the memo that April.

Febraury 14, 2005: CTC panics because Congress might hold hearings into detainee treatment.

March 1, 2005: Steven Bradbury’s main contact for Combined and other torture memos is a CTC attorney. The Torture Report found information used in these memos to be inaccurate.

March 2, 2005: CTC sends Re: Effectiveness of the CIA Counterintelligence Interrogation Techniques to Steven Bradbury for use in Special Needs argument in torture memos. Similar memos that have been released have made demonstrably false claims. John Rizzo says CTC lawyers were involved in drafting this document.

April 15, 2005: CTC sends Briefing Notes on the Value of Detainee Reporting to Steven Bradbury for use in Special Needs argument in torture memos. Similar memos that have been released have made demonstrably false claims. Rizzo says CTC lawyers were involved in drafting this document.

May 10, 2005: Steven Bradbury completes two OLC memos — the Techniques Memo and Combined Memo — that the Torture Report found are based on inaccurate information.

May 30, 2005: Bradbury completes a third OLC memo — the CAT Memo — that the Torture Report found is based on inaccurate information.

November 8, 2005: The day CIA destroyed the torture tapes, someone from CTC/LGL gave HPSCI Chair Pete Hoekstra a briefing with no staffers present. (see page 32) The briefing was included in a summary of all Congressional briefings completed that day.

November 8, 2005: Eatinger and another CTC lawyer claim there is no legal reason to retain the torture tapes, in spite of several pending legal requests covering the videos. Jose Rodriguez orders their destruction.

January 25, 2006: Another letter from a lawyer other than John Rizzo that Torture Report may have found to be inaccurate.

April 19, 2006: Fax from a lawyer other than Rizzo that Torture Report may have found to be inaccurate.

May 18, 2006: Letter from a lawyer other than Rizzo, claiming torture techniques would be used for safety reasons, the Torture Report may have found to be inaccurate.

Update: h/t to DocEx blog for some additions to this timeline.

In Nomination Hearing, DIRNSA Nominee Mike Rogers Continues James Clapper and Keith Alexander’s Obfuscation about Back Door Searches

Yesterday, the Senate Armed Services Committee held a hearing for Vice Admiral Mike Rogers to serve as head of Cyber Command (see this story from Spencer about how Rogers’ confirmation as Cyber Command chief serves as proxy for his role as Director of National Security Agency because the latter does not require Senate approval).

Many of the questions were about Cyber Command (which was, after all, the topic of the hearing), but a few Senators asked questions about the dragnet that affects us all.

In one of those exchanges — with Mark Udall — Rogers made it clear that he intends to continue to hide the answers to very basic questions about how NSA conducts warrantless surveillance of Americans, such as whether the NSA conducts back door searches on American people.

Udall: If I might, in looking ahead, I want to turn to the 702 program and ask a policy question about the authorities under Section 702 that’s written into the FISA Amendments Act. The Committee asked your understanding of the legal rationale for NASA [sic] to search through data acquired under Section 702 using US person identifiers without probable cause. You replied the NASA–the NSA’s court approved procedures only permit searches of this lawfully acquired data using US person identifiers for valid foreign intelligence purposes and under the oversight of the Justice Department and the DNI. The statute’s written to anticipate the incidental collection of Americans’ communications in the course of collecting the communications of foreigners reasonably believed to be located overseas. But the focus of that collection is clearly intended to be foreigners’ communications, not Americans. But declassified court documents show that in 2011 the NSA sought and obtained the authority to go through communications collected under Section 702 and conduct warrantless searches for the communications of specific Americans. Now, my question is simple. Have any of those searches been conducted?

Rogers: I apologize Sir, I’m not in a position to answer that as the nominee.

Udall: You–yes.

Rogers: But if you would like me to come back to you in the future if confirmed to be able to specifically address that question I will be glad to do so, Sir.

Udall: Let me follow up on that. You may recall that Director Clapper was asked this question in a hearing earlier this year and he didn’t believe that an open forum was the appropriate setting in which to discuss these issues. The problem that I have, Senator Wyden’s had, and others is that we’ve tried in various ways to get an unclassified answer — simple answer, yes or no — to the question. We want to have an answer because it relates — the answer does — to Americans’ privacy. Can you commit to answering the question before the Committee votes on your nomination?

Rogers: Sir, I believe that one of my challenges as the Director, if confirmed, is how do we engage the American people — and by extension their representatives — in a dialogue in which they have a level of comfort as to what we are doing and why. That is no insignificant challenge for those of us with an intelligence background, to be honest. But I believe that one of the takeaways from the situation over the last few months has been as an intelligence professional, as a senior intelligence leader, I have to be capable of communicating in a way that we are doing and why to the greatest extent possible. That perhaps the compromise is, if it comes to the how we do things, and the specifics, those are perhaps best addressed in classified sessions, but that one of my challenges is I have to be able to speak in broad terms in a way that most people can understand. And I look forward to that challenge.

Udall: I’m going to continue asking that question and I look forward to working with you to rebuild the confidence. [my emphasis]

The answer to the question Rogers refused to answer is clearly yes. We know that’s true because the answer is always yes when Wyden, and now Udall, ask such questions.

But we also know the answer is yes because declassified parts of last August’s Semiannual Section 702 Compliance Report state clearly that oversight teams have reviewed the use of this provision, which means there’s something to review.

As reported in the last semiannual assessment, NSA minimization procedures now permit NSA to query its databases containing telephony and non-upstream electronic communications using United States person identifiers in a manner designed to find foreign intelligence information. Similarly, CIA’s minimization procedures have been modified to make explicit that CIA may also query its databases using United States person identifiers to yield foreign intelligence information. As discussed above in the descriptions of the joint oversight team’s efforts at each agency, the joint oversight team conducts reviews of each agency’s use of its ability to query using United States person identifiers. To date, this review has not identified any incidents of noncompliance with respect to the use of United States person identifiers; as discussed in Section 4, the agencies’ internal oversight programs have, however, identified isolated instances in which Section 702 queries were inadvertently conducted using United States person identifiers. [my emphasis]

It even obliquely suggests there have been “inadvertent” violations, though this seems to entail back door searches on US person identifiers without realizing they were US person identifiers, not violations of the procedures for using back door searches on identifiers known to be US person identifiers.

Still, it is an unclassified fact that NSA uses these back door searches.

Yet the nominee to head the NSA refuses to answer a question on whether or not NSA uses these back door searches.

And it’s not just in response to this very basic question that Rogers channeled the dishonest approach of James Clapper and Keith Alexander.

As Udall alluded, at the end of a long series of questions about Cyber Command, the committee asked a series of questions about back door searches and other dragnet issues. They asked (see pages 42-43):

  • Whether NSA can conduct back door searches on data acquired under EO 12333 and if so under what legal rationale
  • Whether NSA can conduct back door searches on data acquired pursuant to traditional FISA and if so under what legal rationale
  • What the legal rationale is for back door searches on data acquired under FISA Amendments Act
  • What the legal rationale is for searches on the Section 215 query results in the “corporate store”

I believe every single one of Rogers’ answers — save perhaps the question on traditional FISA — involves some level of obfuscation. (See this post for further background on what NSA’s Raj De and ODNI’s Robert Litt have admitted about back door searches.)

Consider his answer on searches of the “corporate store” as one example.

What is your understanding of the legal rationale for searching through the “Corporate Store” of metadata acquired under section 215 using U.S. Persons identifiers for foreign intelligence purposes?

The section 215 program is specifically authorized by orders issued by the Foreign Intelligence Surveillance Court pursuant to relevant statutory requirements. (Note: the legality of the program has been reviewed and approved by more than a dozen FISC judges on over 35 occasions since 2006.) As further required by statute, the program is also governed by minimization procedures adopted by the Attorney General an d approved by the FISC. Those orders, and the accompanying minimization procedures, require that searches of data under the program may only be performed when there is a Reasonable Articulable Suspicion that the identifier to be queried is associated with a terrorist organization specified in the Court’s order.

Remember, not only do declassified Primary Orders make it clear NSA doesn’t need Reasonable Articulable Suspicion to search the corporate store, but PCLOB has explained the possible breadth of “corporate store” searches plainly.

According to the FISA court’s orders, records that have been moved into the corporate store may be searched by authorized personnel “for valid foreign intelligence purposes, without the requirement that those searches use only RAS-approved selection terms.”71 Analysts therefore can query the records in the corporate store with terms that are not reasonably suspected of association with terrorism. They also are permitted to analyze records in the corporate store through means other than individual contact-chaining queries that begin with a single selection term: because the records in the corporate store all stem from RAS-approved queries, the agency is allowed to apply other analytic methods and techniques to the query results.72 For instance, such calling records may be integrated with data acquired under other authorities for further analysis. The FISA court’s orders expressly state that the NSA may apply “the full range” of signals intelligence analytic tradecraft to the calling records that are responsive to a query, which includes every record in the corporate store.73

There is no debate over whether NSA can conduct back door searches in the “corporate store” because both FISC and PCLOB say they can.

Which is probably why SASC did not ask whether this was possible — it is an unclassified fact that it is — but rather what the legal rationale for doing so is.

And Rogers chose to answer this way:

  1. By asserting that the phone dragnet must comply with statutory requirements
  2. By repeating tired boilerplate about how many judges have approved this program (ignoring that almost all of these approvals came before FISC wrote its first legal opinion on the program)
  3. By pointing to AG-approved minimization procedures (note–it’s not actually clear that NSA’s — as distinct from FBI’s — dragnet specific procedures are AG-approved, though the more general USSID 18 ones are)
  4. By claiming FISA orders and minimization procedures “require that searches of data under the program may only be performed when there is a Reasonable Articulable Suspicion that the identifier to be queried is associated with a terrorist organization”

The last part of this answer is either downright ignorant (though I find that unlikely given how closely nominee responses get vetted) or plainly non-responsive. The question was not about queries of the dragnet itself — the “collection store” of all the data. The question was about the “corporate store” — the database of query results based off those RAS approved identifiers. And, as I said, there is no dispute that searches of the corporate store do not require RAS approval. In fact, the FISC orders Rogers points to say as much explicitly.

And yet the man Obama has picked to replace Keith Alexander, who has so badly discredited the Agency with his parade of lies, refused to answer that question directly. Much less explain the legal rationale used to conduct RAS-free searches on phone query results showing 3rd degree connections to someone who might have ties to terrorist groups, which is what the question was.

Which, I suppose, tells us all we need to know about whether anyone plans to improve the credibility or transparency of the NSA.

Where the Bodies Are Buried: A Constitutional Crisis Feinstein Better Be Ready To Win

In a piece at MoJo, David Corn argues the Senate Intelligence Committee – CIA fight has grown into a Constitutional crisis.

What Feinstein didn’t say—but it’s surely implied—is that without effective monitoring, secret government cannot be justified in a democracy. This is indeed a defining moment. It’s a big deal for President Barack Obama, who, as is often noted in these situations, once upon a time taught constitutional law. Feinstein has ripped open a scab to reveal a deep wound that has been festering for decades. The president needs to respond in a way that demonstrates he is serious about making the system work and restoring faith in the oversight of the intelligence establishment. This is more than a spies-versus-pols DC turf battle. It is a constitutional crisis.

I absolutely agree those are the stakes. But I’m not sure the crisis stems from Feinstein “going nuclear” on the floor of the Senate today. Rather, I think whether Feinstein recognized it or not, we had already reached that crisis point, and John Brennan simply figured he had prepared adequately to face and win that crisis.

Which is why I disagree with the assessment of Feinstein’s available options as laid out by Shane Harris and John Hudson in FP.

If she chooses to play hardball, Feinstein can make the tenure of CIA Director John Brennan a living nightmare. From her perch on the intelligence committee, she could drag top spies before the panel for months on end. She could place holds on White House nominees to key agency positions. She could launch a broader investigation into the CIA’s relations with Congress and she could hit the agency where it really hurts: its pocketbook. One of the senator’s other committee assignments is the Senate Appropriations Committee, which allocates funds to Langley.

Take these suggestions one by one: Feinstein can only “drag top spies” before Congress if she is able to wield subpoena power. Not only won’t her counterpart, Saxby Chambliss (who generally sides with the CIA in this dispute) go along with that, but recent legal battles have largely gutted Congress’ subpoena power.

Feinstein can place a hold on CIA-related nominees. There’s even one before the Senate right now, CIA General Counsel nominee Caroline Krass, though Feinstein’s own committee just voted Krass out of Committee, where Feinstein could have wielded her power as Chair to bottle Krass up. In the Senate, given the new filibuster rules, Feinstein would have to get a lot of cooperation from her Democratic colleagues  to impose any hold if ever she lost Senate Majority Leader Harry Reid’s support (though she seems to have that so far).

But with Krass, what’s the point? So long as Krass remains unconfirmed, Robert Eatinger — the guy who ratcheted up this fight in the first place by referring Feinstein’s staffers for criminal investigation — will remain Acting General Counsel. So in fact, Feinstein has real reason to rush the one active CIA nomination through, if only to diminish Eatinger’s relative power.

Feinstein could launch a broader investigation into the CIA’s relations with Congress. But that would again require either subpoenas (and the willingness of DOJ to enforce them, which is not at all clear she’d have) or cooperation.

Or Feinstein could cut CIA’s funding. But on Appropriations, she’ll need Barb Mikulski’s cooperation, and Mikulski has been one of the more lukewarm Democrats on this issue. (And all that’s assuming you’re only targeting CIA; as soon as you target Mikulski’s constituent agency, NSA, Maryland’s Senator would likely ditch Feinstein in a second.)

Then FP turns to DOJ’s potential role in this dispute.

The Justice Department is reportedly looking into whether the CIA inappropriately monitored congressional staff, as well as whether those staff inappropriately accessed documents that lay behind a firewall that segregated classified information that the CIA hadn’t yet cleared for release. And according to reports, the FBI has opened an investigation into committee staff who removed classified documents from the CIA facility and brought them back to the committee’s offices on Capitol Hill.

Even ignoring all the petty cover-ups DOJ engages in for intelligence agencies on a routine basis (DEA at least as much as CIA), DOJ has twice done CIA’s bidding on major scale on the torture issue in recent years. First when John Durham declined to prosecute both the torturers and Jose Rodriguez for destroying evidence of torture. And then when Pat Fitzgerald delivered John Kiriakou’s head on a platter for CIA because Kiriakou and the Gitmo detainee lawyers attempted to learn the identities of those who tortured.

There’s no reason to believe this DOJ will depart from its recent solicitous ways in covering up torture. Jim Comey admittedly might conduct an honest investigation, but he’s no longer a US Attorney and he needs someone at DOJ to actually prosecute anyone, especially if that person is a public official.

Implicitly, Feinstein and her colleagues could channel Mike Gravel and read the 6,000 page report into the Senate record. But one of CIA’s goals is to ensure that if the Report ever does come out, it has no claim to objectivity. Especially if the Democrats release the Report without the consent of Susan Collins, it will be child’s play for Brennan to spin the Report as one more version of what happened, no more valid than Jose Rodriguez’ version.

And all this assumes Democrats retain control of the Senate. That’s an uphill battle in any case. But CIA has many ways to influence events. Even assuming CIA would never encourage false flags attacks or leak compromising information about Democrats, the Agency can ratchet up the fear mongering and call Democrats weak on security. That always works and it ought to be worth a Senate seat or three.

If Democrats lose the Senate, you can be sure that newly ascendant Senate Intelligence Chair Richard Burr would be all too happy to bury the Torture Report, just for starters. Earlier today, after all, he scolded Feinstein for airing this fight.

“I personally don’t believe that anything that goes on in the intelligence committee should ever be discussed publicly,”

Burr’s a guy who has joked about waterboarding in the past. Burying the Torture Report would be just the start of things, I fear.

And then, finally, there’s the President, whose spokesperson affirmed the President’s support for his CIA Director and who doesn’t need any Democrats help to win another election. As Brennan said earlier today, Obama “is the one who can ask me to stay or to go.” And I suspect Brennan has confidence that Obama won’t do that.

Which brings me to my comment above, on AJE, that Brennan knows where the literal bodies are buried.

I meant that very, very literally.

Not only does Brennan know firsthand that JSOC attempted to kill Anwar al-Awlaki on December 24, 2009, solely on the President’s authority, before the FBI considered him to be operational. But he also knows that the evidence against Awlaki was far dodgier than it should have been before the President authorized the unilateral execution of an American citizen.

Worse still, Feinstein not only okayed that killing, either before or just as it happened. But even the SSCI dissidents Ron Wyden, Mark Udall, and Martin Heinrich declared the Awlaki killing “a legitimate use of the authority granted the President” in November.

I do think there are ways the (Legislative) Democrats might win this fight. But they’re not well situated in the least, even assuming they’re willing and able to match Brennan’s bureaucratic maneuvering.

Again, I don’t blame Feinstein for precipitating this fight. We were all already in it, and she has only now come around to it.

I just hope she and her colleagues realize how well prepared Brennan is to fight it in time to wage an adequate battle.

Robert Eatinger, Lawyer Who Approved Torture Tape Destruction, Tries to Intimidate Senate Investigators

Dianne Feinstein just gave a barn burner of a speech explaining the CIA/SSCI fight over the Torture Report. There are a lot of details I’ll return to.

But one of the most important issues, in my mind, is the detail that the Acting General Counsel of the CIA, Robert Eatinger, referred the Senate Intelligence Committee investigators to DOJ for investigation. (h/t to DocexBlog for identifying Eatinger) Feinstein correctly interpreted this as an attempt to intimidate her staffers as they complete the investigation.

And, as Feinstein made clear, Eatinger is a key focus of the report. Feinstein revealed that Eatinger (whom she did not name) was named, by name, (if I heard Feinstein’s claim correctly) 1,600 times in the Torture Report.

At least some of those mentions surely describe CIA’s decision to destroy the torture tapes, an act Eatinger sanctioned.

Former CIA clandestine branch chief Jose A. Rodriguez Jr., who ordered the destruction of the tapes, has said through his attorney that he based his decision on legal advice from agency lawyers. The lawyers, Steven Hermes and Robert Eatinger, did not endorse the tapes’ destruction but rather concluded there was “no legal impediment” to disposing of them, according to sources briefed on their advice.

Hermes and Eatinger, who only recently were interviewed by Durham, continue to work at the agency and have retained counsel, the sources said.

Feinstein described Eatinger’s key role as the Counterterrorism Center’s chief lawyer (presumably after Jonathan Fredman left). Some things CTC lawyers did were:

  • Approved the use of sleep deprivation before DOJ considered the question
  • Altered the record of the original briefing to Nancy Pelosi and Porter Goss
  • Used a John Yoo freelanced memo as the basis of advice to CIA on torture
  • Collaborated with John Yoo to write a “Legal Principles” document that authorized otherwise unauthorized torture techniques

Lawyers probably associated with CTC also lied about the treatment of Hassan Ghul in 2004.

Eatinger also contributed to a CIA cover-up attempt in a key State Secrets case.

There’s a lot that’s amazing about this story. But I find it particularly telling that a lawyer trying to protect his own ass — trying to hide details of the 1,600 mentions of his name in the Torture Report — has targeted Senate Intelligence Committee staffers.

Update: Given that Eatinger is apparently the person who referred the Senate staffers, it is significant that Feinstein started her speech by raising the torture tape destruction.

The origin of this study: The CIA’s detention and interrogation program began operations in 2002, though it was not until September 2006, that Members of the Intelligence Committee, other than the Chairman and Vice Chairman, were briefed. In fact, we were briefed by then-CIA Director Hayden only hours before President Bush disclosed the program to the public.

A little more than a year later, on December 6, 2007, a New York Times article revealed the troubling fact that the CIA had destroyed videotapes of some of the CIA’s first interrogations using so-called “enhanced techniques.” We learned that this destruction was over the objections of President Bush’s White House Counsel and the Director of National Intelligence.

After we read about the tapes’ destruction in the newspapers, Director Hayden briefed the Senate Intelligence Committee. He assured us that this was not destruction of evidence, as detailed records of the interrogations existed on paper in the form of CIA operational cables describing the detention conditions and the day-to-day CIA interrogations.

The CIA director stated that these cables were “a more than adequate representation” of what would have been on the destroyed tapes. Director Hayden offered at that time, during Senator Jay Rockefeller’s chairmanship of the committee, to allow Members or staff to review these sensitive CIA operational cables given that the videotapes had been destroyed.

John Kiriakou’s Prosecution Is an Important Precedent to CIA – Senate Intelligence Committee Spat

On several occasions, I have pointed to the arbitrary system our classification system constructs. It asks government employees to spy on their colleagues. It permits agencies to conduct fishing expeditions into personal information as part of the polygraph process. It permits Agencies to selectively approve propaganda under the guise of pre-publication review (most notably in the case of Jose Rodriguez and John Rizzo). By stripping sensitive unclassified jobs of their Merit Board protection, even lower level staffers who don’t receive a clearance-related income boost are now subject to this arbitrary system. And Congress even tried to use pensions as another leverage point against cleared personnel.

The arbitrary nature of this system is perhaps most clear, however, when it comes to prosecutions.

Which is a point John Kiriakou made in an op-ed yesterday. In it, he suggests Leon Panetta and James Cartwright could be sitting next to him in Loretto Prison.

The [Espionage Act] states: “Whoever, lawfully having possession of, access to, control over, or being entrusted with any … information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates … the same to any person not entitled to receive it … shall be fined under this title or imprisoned not more than 10 years, or both.”

A transcript obtained by the organization Judicial Watch shows that, at a CIA awards ceremony attended by Boal, Panetta did exactly that. The CIA seems to acknowledge that Panetta accidentally revealed the name of the special forces ground commander who led the operation to kill Osama bin Laden, not knowing that the Hollywood screenwriter was part of an audience cleared to hear him speak. But intent is not relevant to Espionage Act enforcement.

U.S. District Court Judge Leonie Brinkema ruled in my case that evidence of the accidental release of national defense information was inadmissible, and she added that the government did not have to prove that a leak of classified information actually caused any harm to the United States. In other words, the act of disclosing the kind of broad information covered by the Espionage Act is prosecutable regardless of outcome or motive.

The sensitivity of what Panetta revealed is not in question. The spokesman for the former CIA director said Panetta assumed that everyone present at the time of the speech had proper clearance for such a discussion. When the transcript of the speech was released, more than 90 lines had been redacted, implying that Panetta had disclosed a great deal more classified information than the name of an operative.

[snip]

If an intent to undermine U.S. national security or if identifiable harm to U.S. interests are indeed not relevant to Espionage Act enforcement, then the White House and the Justice Department should be in full froth. Panetta should be having his private life dug in to, sifted and seized as evidence, as happened to me and six others under the Obama administration.

[snip]

If Panetta and Cartwright aren’t accountable while Drake, Kim and I have been crucified for harming U.S. national security — all of us accused of or investigated for the same thing: disclosing classified information to parties not authorized to know it — then what does that say about justice in America or White House hypocrisy?

Kiriakou goes on to call for changes in the Espionage Act to focus on issues of intent and harm.

Kiriakou is, of course, correct that he got punished for things that Panetta and Cartwright have (so far, at least) escaped such levels of punishment for. (I’d also add the unnamed real sources for the UndieBomb 2.0 leak, who are being protected by the scapegoating of Donald Sachtleben.)

But I’d go even further. Given reports that FBI is investigating whether Senate Intelligence Committee staffers violated the law for obtaining proof the Agency they oversee was hiding evidence from it, it’s crucial to remember how Kiriakou’s prosecution came about, which I laid out in this post.

It started when CIA officers claimed that when Gitmo defense attorneys provided photos of their clients torturers to them–having independently discovered their identity–the torturers were put at risk. DOJ didn’t believe it was a security risk; CIA disagreed and went to John Brennan. And after Patrick Fitzgerald was brought in to mediate between DOJ and CIA, the prosecution of John Kiriakou resulted.

As a reminder of where this all started, it’s worth reading this March 15, 2010 Bill Gertz article which was, AFAIK, the first public report of the investigation into the John Adams Project. It describes a March 9, 2010 meeting between Fitzgerald and the CIA.

The dispute prompted a meeting Tuesday at CIA headquarters between U.S. Attorney Patrick J. Fitzgerald and senior CIA counterintelligence officials. It is the latest battle between the agency and the department over detainees and interrogations of terrorists.

[snip]

According to U.S. officials familiar with the issue, the current dispute involves Justice Department officials who support an effort led by the American Civil Liberties Union to provide legal aid to military lawyers for the Guantanamo inmates. CIA counterintelligence officials oppose the effort and say giving terrorists photographs of interrogators has exposed CIA personnel and their families to possible terrorist attacks.

[snip]

According to the officials, the dispute centered on discussions for a interagency memorandum that was to be used in briefing President Obama and senior administration officials on the photographs found in Cuba. Justice officials did not share the CIA’s security concerns about the risks posed to CIA interrogators and opposed language on the matter that was contained in the draft memorandum. The memo was being prepared for White House National Security Council aide John Brennan, who was to use it to brief the president.

The CIA insisted on keeping its language describing the case and wanted the memorandum sent forward in that form.

That meeting, of course, would have taken place the day after Fitzgerald was appointed. So immediately after Fitzgerald got put in charge of this investigation, he presumably moderated a fight between DOJ, which didn’t think detainee lawyers pursuing their clients’ torturers via independent means threatened to expose the torturers’ identity directly, and CIA, which apparently claimed to be worried.

What happened with Kiriakou’s sentencing today is many things. But it started as–and is still fundamentally a result of–an effort on the part of CIA to ensure that none of its torturers ever be held accountable for their acts, to ensure that the subjects of their torture never gain any legal foothold to hold them accountable.

Read more

DOJ’s Leaky SCIF Double Standards

McClatchy’s latest in the CIA-Seante Intelligence Committee fight reports that FBI is now investigating Senate Intelligence Committee staffers for unauthorized removal of classified information from CIA’s SCIF.

The FBI is investigating the alleged unauthorized removal of classified documents from a secret CIA facility by Senate Intelligence Committee staff who prepared a study of the agency’s use of harsh interrogation techniques on suspected terrorists in secret overseas detention centers, McClatchy has learned.

[snip]

The FBI investigation stemmed from a request to the Justice Department by the CIA general counsel’s office for a criminal investigation into the removal last fall of classified documents by committee staff from a high-security electronic reading room that they were required to use to review top-secret emails and other materials, people familiar with issue told McClatchy. The existence of the referral was first reported online Thursday afternoon by Time magazine.

[snip]

The investigation request by the CIA general counsel’s office is one of two criminal referrals sent to the Justice Department in connection with the committee’s 6,300-page report, which remains unreleased nearly 15 months after the panel voted to approve its final draft, according to those familiar with the case.

The second was made by CIA Inspector General David Buckley, they said. It relates to the monitoring by the agency of computers that the committee staff used to review millions of classified documents in the electronic reading room set up inside a secret CIA facility in Northern Virginia, they said.

Wow. This removal of a document from a SCIF containing torture documents sure escalated quickly.

Which is particularly remarkable given DOJ’s past response when torture documents walk out of a SCIF, even their own one.

Recall that sometime between 2005 and 2009, at least 10 and possibly as many as 31 documents critical to discussions over the legality of torture disappeared from the Office of Legal Counsel’s very own SCIF.

Some of the documents that went into the production of the torture memos–and should have been reviewed by OPR over the course of its investigation–disappeared some time in the last 5 years.

As I reported last September, after some delay in a FOIA response, Acting head of OLC, David Barron confessed that OLC could not find all of the documents that it had first listed on a 2006 FOIA response.

The problem, as Barron explained in his declaration, seems to stem from three things: CIA, not OLC, did the original FOIA search in 2005 and at that time did not make a copy of the documents responsive to FOIA; for long periods OPR had the documents, lumped in with a bunch of other torture documents, so it could work on is investigation; the documents got shuttled around for other purposes, as well, including other investigations and one trip to the CIA for a 2007 update to the FOIA Vaughn Index. [Here’s the 2007 Vaughn Index and here’s the Vaughn Index that accompanied Barron’s declaration last September.]

And, somewhere along the way, at least 10 documents originally identified in 2005 as responsive to the FOIA got lost.

Poof!

Not only did DOJ apparently do nothing about their own leaky SCIF, they took some time to even tell the ACLU about it. What’s a few sensitive torture documents escaping from their SCIFs after all?

But now, when it’s the CIA being compromised rather than the CIA doing the compromising, things quickly escalate to potentially criminal investigations.

DOJ seems to have a remarkably inconsistent standard response when torture documents disappear from SCIFs. I wonder why that is?

If CIA Pwned SSCI’s Segregated Shared Drive, the Torture Report Should Be FOIA-able

As reader Tom has helpfully reminded me, both Mark Udall’s follow-up questions for Stephen Preston and the CIA’s declaration in ACLU’s FOIA to liberate the Torture Report describe the arrangements CIA required of the Senate Intelligence Committee staffers as they were working on the Torture Report.

Udall described how the CIA insisted on an “unnecessary multi-layered” process that added significantly to the time and cost of the report.

The CIA declined to provide the Senate Select Committee on Intelligence with access to CIA records at the Committee’s secure office space in the Hart Senate Office Building. Instead, the CIA insisted that the Committee review documents at a government building in Virginia. Once the CIA produced relevant documents related to the CIA detention and interrogation program, the CIA then insisted that CIA personnel—and private contractors employed by the CIA—review each document multiple times to ensure unrelated documents were not provided to a small number of fully cleared Committee staff. What role did you play in the decision to employ these unnecessary multi-layered review steps that delayed CIA document production to the Committee at significant governmental expense?

And the CIA declaration emphasizes how SSCI retained complete control over the materials in the Sensitive Compartmented Information Facility in which its staffers had been required to work.

One key principle necessary to this inter-branch accommodation, and a condition upon which SSCI insisted, was that the materials created by SSCI personnel on this segregated shared drive would not become “agency records” even though this work product was being created and stored on a CIA computer system. Specifically, in a 2 June 2009 letter from the SSCI Chairman and Vice Chairman to the CIA Director, the Committee expressly stated that the SSCI’s work product, including “draft and final recommendations, reports or other materials generated by Committee staff or Members, are the property of the Committee” and “remain congressional records in their entirety.” The SSCI further provided that the “disposition and control over these records, even after the completion of the Committee’s review, lies exclusively with the Committee.”

[snip]

Based on this inter-branch accommodation, SSCI personnel used the segregated shared drive to draft the document that is the subject of this litigation. As sections of the report reached a certain stage, the SSCI worked with the CIA information technology and security personnel to transfer these drafts from the segregated shared drive to the SSCI’s secure facilities at the U.S. Capitol complex so that the Committee could complete the drafting process in its workspaces.

Here’s the thing. The purported control SSCI had over the materials in this SCIF is central to CIA’s claim that the Torture Report is not an Agency document and therefore is immune from FOIA.

If SSCI did not have complete control over this material — if CIA could spy on SSCI at will (if, as seems to be the case when viewed in retrospect) — then it guts their argument that the Torture Report is a Congressional document.

If CIA pwned SSCI in that SCIF, then it should make this material (at least the draft reports, before they got moved over to SSCI’s own SCIF) FOIA-able.

So either CIA should be prosecuted for hacking SSCI. Or it should hand over the last draft of the report that resided on servers it felt free to hack into.