Posts

The Government Doesn’t Want to Talk about Collecting Domestic Communications under FAA

On Friday, the government appealed the 2nd Circuit’s decision that Amnesty International and other NGOs and individuals have standing to challenge the FISA Amendments Act. I’ll have a post on the implications of their substantive argument shortly. But in the meantime, I wanted to note what they’re not even addressing.

The image to the left is a fragment of the government’s references to statutes and regulation mentioned in its brief; it’s the part of the list referring to the part of the FAA in question. As you can see, it almost–but not quite–lists every clause of the law.

One clause notably missing from the almost-sequential list above is 1881a(b)(4), which reads,

[An acquisition authorized under subsection (a)] may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States;

And while it mentions clauses that refer back to this restriction (for example, 1881a(c)(1), 1881a(d), 1881a(g)(2)(A)(i), etc), it never goes back and includes this language–the requirement that the government not intentionally acquire communications that are located entirely within the US–in its argument. (There are other clauses the brief ignores, a number of which pertain to oversight of the certifications the government has made; I may return to these at a future time.)

Or, to put it another way, the government never admits that the FAA permits the purportedly unintentional collection of entirely domestic communication.

And yet that is a part of this lawsuit. The original complaint in this suit invoked this clause:

An acquisition under section 702(a) may not … “intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States

[snip]

Moreover, the Attorney General and the DNI may acquire purely domestic communications as long as there is uncertainly about the location of one party to the communications.

And the 2nd Circuit opinion (authored by Gerard Lynch) referenced this clause:

“Targeting procedures” are procedures designed to ensure that an authorized acquisition is “limited to targeting persons reasonably believed to be located outside the United States,” and is designed to “prevent the intentional acquisition of any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States.”

[snip]

In addition, the certification must attest that the surveillance complies with statutory limitations providing that it:

[snip]

(4) may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States;

[snip]

Under the FAA, in contrast to the preexisting FISA scheme, the FISC may not monitor compliance with the targeting and minimization procedures on an ongoing basis. Instead, that duty falls to the AG and DNI, who must submit their assessments to the FISC, as well as the congressional intelligence committees and the Senate and House Judiciary Committees.

[snip]

But the government has not asserted, and the statute does not clearly state, that the FISC may rely on these assessments to revoke earlier surveillance authorizations.

Now, to some degree, the government might argue it ignored the clause prohibiting intentional–but not accidental–targeting of domestic communications because the plaintiffs’ primary basis for establishing standing is their frequent communication with likely targets overseas. As I’ll show, the government wants to make this case about a particular definition of a target, and key to that argument is a claim that it is impossible for the plaintiffs to be targets.

Yet therein lies one of the key problems with their argument, given that 1881a(b)(4) only prohibits the plaintiffs from being intentional targets; the FAA very pointedly did not prohibit the government from keeping US person information it “unintentionally” collected. In fact, Mike McConnell and Michael Mukasey started issuing veto threats when Russ Feingold tried to restrict the ongoing use of domestic communications identified as such after the fact.

Finally, in the one case that approved this kind of collection (though under the Protect America Act, not the FAA) used targeting procedures to substitute for particularity required under the Fourth Amendment. Under PAA, those procedures were not mapped out by law; under FAA they are, partly in the clause the government wants to ignore.

And yet, remarkably, the government doesn’t want that clause to be part of its discussion with SCOTUS. Seeing as how even the FISA Court of Review finds that substitute for particularity–the targeting procedures–to be a key part of compliance with the Fourth Amendment, you’d think that would be relevant.

DOJ’s Untracked Email Spying

As Wired reports, DOJ blew off the requirement that it tell Congress how many pen registers and trap and trace devices they used for the entire Bush Administration.

[…]the Justice Department was not following the law and had not provided Congress with the material at least for years 2004 to 2008. On the flip side, Congress was not exercising its watchdog role, thus enabling the Justice Department to skirt any oversight whatsoever on an increasingly used surveillance method that does not require court warrants, according to Justice Department documents obtained via the Freedom of Information Act.

But just as interesting as DOJ’s failure to follow the law on disclosing these surveillance tools are two details from the emails Chris Soghoian liberated to make all this clear.

First, note the December 23, 2009 email from Janet Webb (on PDF 4) revealing that DOJ’s agencies weren’t tracking email pen registers (that is, lists of who was emailing each other), and one of them–they speculate DEA–still wasn’t in 2009.

FBI only began keeping computer intercept stats a couple of years ago. The other agency may be DEA.

From which we might assume DEA is engaging in a ton of email tracking they don’t want to tell anyone about?

Wired suggests why they may not be tracking such information.

Another feature of [the Electronic Communication Privacy Act] had once protected Americans’ electronic communications from the government’s prying eyes, but it has become so woefully outdated that it now grants the authorities nearly carte blanche powers to obtain Americans’ e-mail stored in the cloud, such as in Gmail or Hotmail — without a court warrant.

That is, we probably should assume these email numbers are so small–and DEA isn’t tracking them at all–because they’re just taking them, with no court oversight at all.

The other detail to remember about these reports is they include only criminal surveillance, not intelligence surveillance. Russ Feingold staffer Lara Flint makes that clear in her request, and DOJ staffer Mark Agrast makes it clear in his response. They’re getting that information via other means, presumably NSLs or Section 215.

So while they’re hiding a lot of the cloud computer spying they’re doing in the name of criminal investigations, that doesn’t even scratch the surface of the degree to which they’re tracking who emails whom.

Russ Feingold Was Proved Fucking Right

A number of you have been asking for my intro of Russ Feingold last Thursday. Here it is. Now that I’ve had a chance to see it I realize I had a number of misstatements (and a number of places where I glossed necessary detail–I guess I speak like I blog, for better or worse).

Feingold For Governor: Scott Walker & WI GOP’s War On Good Beer

I don’t know what the fine Cheese and Brat heads up in Wisconsin did to piss off the political gods, but they have been blighted. It was bad enough to cause national outrage and solidarity when extreme right wing movement conservative Governor Scott Walker and the crazed GOP majorities in the state legislature started attacking the working men and women of Wisconsin’s unions, teachers, cops and firefighters. But now they have gone a bridge too damn far.

And that is why I am supporting Russ Feingold in a recall election against Walker, and you should too.

Scott Walker and the Wisconsin Republicans are declaring war on quality craft beer. From ThinkProgress:

Tucked into Wisconsin Gov. Scott Walker’s (R) much-discussed budget was a little-noticed provision to overhaul the state’s regulation of the beer industry. In a state long associated with beer, the provision will make it much more difficult for the Wisconsin’s burgeoning craft breweries to operate and expand their business by barring them from selling directly to restaurants and liquor stores, and preventing them from selling their own product onsite.

The new provision treats craft brewers — the 60 of whom make up just 5 percent of the beer market in Wisconsin — like corporate mega-brewers, forcing them to use a wholesale distributor to market their product. Under the provision, it would be illegal, for instance, for a small brewer located near a restaurant to walk next door to deliver a case of beer. They’ll have to hire a middle man to do it instead.

And, so, what corporate moneyed hacks are Walker and the Wisconsin GOP blowing this time? From OpenMarket.Org:

The biggest backer of the bill is SABMiller, or as it is known in the US, MillerCoors. They have been pushing the measure, they say, in order to protect the vitality of Wisconsin beer in the face of a hostile invasion from their main national competitor, AB InBev, aka Anheuser-Busch. InBev has reportedly begun a nationwide campaign to purchase distributors in many states, something that MillerCoors says threatens all other brewers’ ability to get their beers in bars and on shelves. That’s the line that MillerCoors is peddling, but craft brewers in Wisconsin say they, and their ever increasing presence in the beer market, is the true target of the proposal.

So, the one thing we will not tolerate here is an attack on quality beer. Nawt gonna happen. there was some yammering here last night about whether so and so or no and no would or wouldn’t vote for Feingold – apparently for President, it was hard to tell. But here, Wheelies and Wheelers, is a real decision point. Would you trade Russ Feingold for Scott Walker? Because that decision is a real possibility for the Wisconsonites.

That is a deal that should be made all day, and all night, long.

As you know, our very own lovely and talented Marcy T. Wheeler introduced guest of honor Sen. Russell Feingold last night at the gala session of Netroots Nation 2011 in Minneapolis, Minnesota. As I am just arriving in Minneapolis as I post, and lord knows what trouble we may get into over the extended weekend (may even be beer drinking), be advised there will be substantive blogging here at Emptywheel, but the timing of the posts may be a bit, ahem, unusual. Hopefully Mary will also be supplying some coverage.

Netroots Nation: Marcy Wheeler Introduces Guest of Honor Russell Feingold

.

.

As most of you know by now, Netroots Nation 2011 is in full swing in the beautiful hamburg of Minneapolis Minnesota. Earlier today, our own Jane Hamsher appeared front and center with Dan Choi on a DADT panel. Tonight FDL takes center stage again, in a big way, with our own Marcy Wheeler having the distinct pleasure of introducing the guest of honor for the main festivities for the evening, Senator Russell Feingold.

Russ Feingold is a hero, and for good reason, to progressives. Russ was one, if not the only one, of the Democratic Senate, make that Senate as a whole, who really stood up for civil liberties in the face of the bipartisan onslaught that has occurred over the last decade, both under George Bush and Barack Obama.

So, please join me, Firedoglake, Netroots Nation, and the progressive enterprise as Marcy Wheeler welcomes one of us: Senator Russell Feingold. The video is a live stream of the event, I am not sure when Marcy and Russ will be up.

The PATRIOT Act Vote: One Quarter of the Way to a Fourth Amendment

The final vote in the Senate opposing yet another sunset of the PATRIOT act was 72-23-5, meaning we’re almost a quarter of the way to regaining some semblance of a Fourth Amendment.

Heh.

Those voting against the forever PATRIOT?

Akaka (D-HI)

Baucus (D-MT)

Begich (D-AK)

Bingaman (D-NM)

Brown (D-OH)

Cantwell (D-WA)

Coons (D-DE)

Durbin (D-IL)

Franken (D-MN)

Harkin (D-IA)

Heller (R-NV)

Lautenberg (D-NJ)

Leahy (D-VT)

Lee (R-UT)

Merkley (D-OR)

Murkowski (R-AK)

Murray (D-WA)

Paul (R-KY)

Sanders (I-VT)

Tester (D-MT)

Udall (D-CO)

Udall (D-NM)

Wyden (D-OR)

Though note we’re not really a quarter of the way to a Fourth Amendment. Most of these Dems, I suspect, oppose the passage of another sunset without a debate. Some are particularly pissed about the latest interpretation of Section 215. But most still support the concept of PATRIOT powers.

Which means we’re not really making all that much progress.

One aspect of today’s vote I did find interesting, however, was that five Republicans voted against tabling Rand Paul’s gun amendment (limiting the use of Section 215 to get gun records), but voted in favor of the overall sunset. These five are: Barrasso (WY), DeMint (SC), Enzi (WY), Moran (KS), and Shelby (AL).

In other words, these men seem to object only to the use of super government powers when it threatens their gun rights, but not their First Amendment, nor their financial privacy, nor their associations.

While I happen to think figuring out what kind of guns suspected terrorists are buying is a reasonable use of a counter-terrorism law, if we have to have one, I am curious whether this vote will make gun nuts realize that their privacy’s at stake, too (though Saxby Chambliss got up to make it clear that domestic terrorists–like the right wing terrorists who might most object to using PATRIOT to collect gun purchase records–were not at risk). This vote also has the makings of one that TeaParty politicians might use to distinguish themselves from other Republicans.

Because right now, opposition to PATRIOT excesses is still mostly a Democratic issue (though Rand Paul definitely took the leadership role Russ Feingold would have had in the past). Until more Republicans join Paul, Heller, and Lee in opposing PATRIOT, it’ll remain on the books, particularly so long as we have a Democratic President whom Democratic Senators are happy to have wielding such power.

Update: After a half hour of debate, the extension passed the House 250-153.

Did Thomas Drake Include Privacy Concerns in His Complaints to DOD’s Inspector General?

I’ve been reviewing the docket on Thomas Drake’s case to see whether it touches on the privacy concerns Drake had about NSA’s post-9/11 activities.

It appears it doesn’t, even while there was an ongoing dispute about whether or not Drake will have access to the materials he submitted to the DOD Inspector General in support of claims that the ThinThread program operated more effectively than the Trailblazer program that Michael Hayden chose to enrich SAIC with instead (the Judge ruled that material would be admissible, but not a formal whistleblower defense, which Drake wasn’t trying to do anyway).

There are a couple of reasons why the silence, in the legal filings, about privacy concerns is interesting (aside from the fact that it’s a focus of Jane Mayer’s article.

First, because the two-sentence summary of the conclusion of the DOD IG Report on Trailblazer and ThinThread that the defense provides in a filing doesn’t address privacy.

In 2004, after more than a year of fact-finding, the Inspector General issued its initial audit findings. In a report entitled, “Requirements for the Trailblazer and Thinthread Systems,” the auditors concluded that “the National Security Agency is inefficiently using resources to develop a digital network exploitation system that is not capable of fully exploiting the digital network intelligence available to analysts from the Global Information Network . . . (T)he NSA transformation effort may be developing a less capable long-term digital network exploitation solution that will take longer and cost significantly more to develop.” The NSA continued to support the “less capable” program and its successor.

Which suggests the IG Report may not have addressed the claim that, in addition to being less efficient at “connecting the dots” than ThinThread, Trailblazer also offered none of the privacy protections ThinThread had.

That’s important because the government argued that Drake couldn’t claim to be a whistleblower because, by 2007, the issues at hand were resolved. They’re arguing both that any whistleblower claims would be mooted because Turbulence, Trailblazer’s successor, integrated “significant portions” of ThinThread, and that the debate was “over” by 2007, when Drake was (according to the indictment) serving as a source for Baltimore Sun reporter Siobhan Gorman.

In or about December 2004, the DOD IG completed its audit of [Trailblazer], including the allegations raised in the complaint letter. The NSA responded in August 2004 and February 2005, stating that based on the judgments of NSA’s experienced technical experts, the allegations were unfounded. Nonetheless, NSA agreed to incorporate significant portions of [ThinThread] into [Trailblazer] as a result of the DOD IG recommendations, thus largely mooting the issues raised in the complaint. In addition, starting in late 2005 and early 2006, the NSA transitioned away from [Trailblazer] to [Turbulence], another corporate architecture solution for Signals Intelligence collection.

[snip]

Just as importantly, by 2007, the timeframe of the charges in this case, there was no imminent harm faced by the defendant, because [Trailblazer] had incorporated elements of [ThinThread], and also because NSA had transitioned away from [Trailblazer] to [Turbulence].

[snip]

The defendant’s actions had no impact in the debate regarding the efficacy of [Trailblazer and ThinThread], because NSA had begun transitioning to [Turbulence] by 2006. Put simply, the debate was over.

There’s a lot going on in this passage. Obviously, the government is trying to claim that since Drake was allegedly collecting information for Gorman in 2007, he couldn’t claim he was whistleblowing.

Mind you he was not claiming he was whistleblowing, in the legal sense. He was only trying to get the IG materials to prove that’s why he collected three of the documents he’s accused of willingly keeping; basically, he’s arguing that if he overlooked three documents out of 5 boxes worth originally collected for the IG–and did not retain the really classified materials–that he basically just overlooked the three documents, rather than willfully retained them.

And the government is playing funny with dates. After all, they say Drake served as a source for Gorman from February 27, 2006, to November 28, 2007. The key story about ThinThread Drake served as a source for was dated May 18, 2006. And one of the charges accuses Drake of obstruction for shredding other documents. So not only is the 2007 date bogus because it igonores debates ongoing in 2006, but the government suggests that either Drake would be guilty for illegally retaining information, or obstructing an investigation. Moreover, Drake maintains he inadvertently included the three IG-related documents in the several boxes of unclassified materials, so the fact the debate was over is pointless.

Moreover, the successor to Trailblazer, Turbulence, was suffering from the same management problems Trailblazer had, as the defense notes just after citing the IG Report. The government wants to pretend the shift from Trailblazer to Turbulence ended the complaints about management problems, but it didn’t.

But then there’s the way the government portrays the IG complaint: efficacy. As I laid out the other day, there are four ways, Gorman’s sources claim, that ThinThread was better than Trailblazer:

The program the NSA rejected, called ThinThread, was developed to handle greater volumes of information, partly in expectation of threats surrounding the millennium celebrations. Sources say it bundled together four cutting-edge surveillance tools. ThinThread would have:

* Used more sophisticated methods of sorting through massive phone and e-mail data to identify suspect communications.

* Identified U.S. phone numbers and other communications data and encrypted them to ensure caller privacy.

* Employed an automated auditing system to monitor how analysts handled the information, in order to prevent misuse and improve efficiency.

* Analyzed the data to identify relationships between callers and chronicle their contacts. Only when evidence of a potential threat had been developed would analysts be able to request decryption of the records.

In other words, privacy was just one of three ways ThinThread was better than Trailblazer, according to Gorman’s sources.

But that’s not the aspect the government seems to address. That is, the government seems to be saying that, because Turbulence adopted some of the approaches of ThinThread that made it more efficient at analysis, Drake can’t complain. The suggestion is (though we can’t know because of the secrecy) privacy is not, like efficacy, an adequate reason to blow the whistle. Neither privacy, nor the Constitution.

And that’s interesting for two more reasons. First, because the government references a notebook of documents Drake provided that had nothing to do with the IG Report.

There was, for example, a notebook of documents provided by the defendant, many of which had nothing to do with the IG’s audit, but this notebook was destroyed before the case began, and after the IG completed its audit.

Is it playing games with the scope of the audit? That is, did Drake provide materials on privacy, which the IG didn’t include within the scope of its report? If so, the IG’s destruction of the notebook, in violation of DOD’s document retention policy, is all the more interesting.

Then, finally, the debates about privacy continued into 2007 and 2008. In August 2007, specifically, Mike McConnell nixed a Democratic version of the Protect America Act because it required the government to tell FISA judges what the plan for minimizing US person data is and allowed the judges to review for compliance. Debates on how to fix PAA continued throughout the fall and into the following year, with Russ Feingold and Sheldon Whitehouse both trying to make real improvements on the minimization requirements.

The government seems to want to say that Drake’s privacy concerns aren’t a valid whistleblowing concern. Because, I guess, government officials aren’t allowed to whistleblow about citizens’ rights.

Are 95% of People Investigated Under New FBI Guidelines Innocent, but Entered into Database?

The NYT liberated the specific answer to a question that Russ Feingold asked in March 2009, but which DOJ didn’t respond to until November 2010, when Feingold was a lame duck Senator. At issue were new investigative guidelines Attorney General Michael Mukasey issued in late 2008, on his way out the door, which allowed the FBI to investigate Americans for First Amendment reasons so long as that First Amendment reason was not the only reason they were being investigated.

Here’s how the ACLU described the new guidelines:

Under the new “assessment” authority, FBI agents can investigate anyone they choose, so long as they claim they are acting to prevent crime, protect national security, or collect foreign intelligence, with absolutely no requirement of a factual connection between their authorizing purpose and the conduct of the individuals they are investigating. FBI agents can start “assessments” without any supervisory approval, and without reporting to FBI headquarters or the Department of Justice. The Guidelines do not require the FBI to keep records regarding when “assessments” are opened or closed and “assessments” have no time limitation. The FBI can even start an “assessment” of you simply to determine if you would make a good FBI informant. Innocence no longer protects ordinary Americans from being subjected to a wide range of intrusive investigative techniques. The techniques include:

  • collecting information from online sources, including commercial databases.
  • recruiting and tasking informants to gather information about you.
  • using FBI agents to surreptitiously gather information from you or your friends and neighbors without revealing their true identity or true purpose for asking questions.
  • having FBI agents follow you day and night for as long as they want.

So in response to Feingold’s questions about how many assessments had been initiated and closed, FBI responded:

The FBI has initiated 11,667 Type 1 and Type 2 assessments, 3,062 of which are ongoing. 427 preliminary and full investigations have been opened based upon information developed in these Type 1 and Type 2 assessments. 480 Type 3, 4, 5, and 6 assessments have been initiated, of which 422 remain open.

To do the math, 95% of the Type 1 and 2 assessments that have been closed have resulted in no further investigation, suggesting the FBI was on a wild goose hunt.

But here’s the tricky thing: the FBI records on those people can be entered into FBI’s investigative databases!

Even if information obtained during an assessment does not warrant opening a predicated investigation, the FBI may retain personally identifying information for criminal and national security purposes. In this context, the information may eventually serve a variety of valid analytic purposes as pieces of the overall criminal or intelligence picture are developed to detect and disrupt criminal and terrorist activities. In addition, such information may assist FBI personnel in responding to questions that may subsequently arise as to the nature and extent of the assessment and its results, whether positive or negative. Furthermore, retention of such information about an individual collected in the course of an assessment will alert other Divisions or Field Offices considering conducting an assessment on the same individual that the particular individual is not a criminal or national security threat. As such, retaining personally identifying information collected in the course of an assessment will also serve to conserve resources and prevent the initiation of unnecessary assessments and other investigative activities.

So that says the FBI may be entering those 95% innocent people into a database with personally identifiable information.

Now, to be fair, FBI also mandates that these personally identifying information contain a warning that the person “does not warrant further FBI investigation at this time.”

As a result: (i) when records retained in an assessment specifically identify an individual or group whose possible involvement in criminal or national security threatening activity was checked out through the assessment; and (ii) the assessment turns up no sufficient basis to justify further investigation of the individual or group, then the records must be clearly annotated as follows: “It is noted that the individual or group identified during the assessment does not warrant further FBI investigation at this time. It is recommended that this assessment be closed.”

And, as Charlie Savage notes, the numbers FBI gave Feingold may not be all that accurate.

Some aspects of the statistics are hazy, officials cautioned.

Read more

In 2004, the White House Considered FISA’s Exclusivity Provision to Be Top Secret

As I have noted before, there are a number of paragraphs in the May 6, 2004 Goldsmith memo authorizing warrantless wiretapping that appear to be badly overclassified. Not only were many of the same paragraphs printed, almost verbatim, in unclassified fashion, in the White Paper released in January 2006. But many of those paragraphs contain nothing more than discussions of published statute.

Now, I hope to do a follow-up to this post on whether I’m right about this overclassification. But thus far, in asking around, no one outside of government has been able to see the logic behind the classification markings on some of these paragraphs, and the people who should know were unable to explain it.

The Overclassification of the March 13, 2003 Torture Memo

Now, I’m not just talking outtamyarse about the possibility that this is overclassified; the Bush Administration has a history of improper classification. It was a particular issue with the March 14, 2003 Yoo DOD Torture Memo. Here’s how former head of Information Security Oversight Office Bill Leonard described the classification of the memo at Russ Feingold’s 2008 secret law hearing:

The March 14, 2003, memorandum on interrogation of enemy combatants was written by DoJ’s Office of Legal Counsel (OLC) to the General Counsel of the DoD. By virtue of the memorandum’s classification markings, the American people were initially denied access to it. Only after the document was declassified were my fellow citizens and I able to review it for the first time. Upon doing so, I was profoundly disappointed because this memorandum represents one of the worst abuses of the classification process that I had seen during my career, including the past five years when I had the authority to access more classified information than almost any other person in the Executive branch. The memorandum is purely a legal analysis – it is not operational in nature. Its author was quoted as describing it as “near boilerplate.”! To learn that such a document was classified had the same effect on me as waking up one morning and learning that after all these years, there is a “secret” Article to the Constitution that the American people do not even know about.

Here are Leonard’s specific complaints about the memo:

In this instance, the OLC memo did not contain the identity of the official who designated this information as classified in the first instance, even though this is a fundamental requirement of the President’s classification system. In addition, the memo contained neither declassification instructions nor a concise reason for classification, likewise basic requirements. Equally disturbing, the official who designated this memo as classified did not fulfill the clear requirement to indicate which portions are classified and which portions are unclassified, leading the reader to question whether this official truly believes a discussion of patently unclassified issues such as the President’s Commander-in-Chief authorities or a discussion of the applicability to enemy combatants of the Fifth or Eighth Amendment would cause identifiable harm to our national security. Furthermore, it is exceedingly irregular that this memorandum was declassified by DoD even though it was written, and presumably classified, by DoJ.

Mind you, the Goldsmith memo is not as bad as the March 2003 memo. As we’ll see, every single paragraph includes a classification mark (though I believe some–if not many–of those are specious). But like the March 2003 memo, this one does not describe who classified it, when it could be declassified, nor a reason for declassification. And as I explained, the people who should be able to offer an explanation (like DOJ) are unable to.

When Feingold asked about the improper classification of the March 2003 memo (see PDF 53-54), DOJ explained,

Because none of the attorneys who participated in preparing the March 2003 memorandum remains at the Department of Justice, no current DOJ employees have first-hand knowledge of the circumstances surrounding the classification of that memorandum. We have consulted the Acting General Counsel of the Department of Defense and understand from him that the memorandum was classified under the authority of DoD using that agency’s classification authority because the memorandum related to the guidance of a DoD working group charged with developing recommendations of the Secretary of Defense concerning a range of possible interrogation techniques for use with alien unlawful combatant detained at Guantanamo Bay.

In other words, they claimed the memo was classified under derivative classification of the DOD Detainee Working Group.

Derivative of the Original White House Authorizations

That background helps us at least surmise what is claimed to have happened with this memo.  It says on its front page it was,

Derived from: “Presidential Authorization for Specified Electronic Surveillance Activities During a Limited Period to Detect and Prevent Acts of Terrorism Within the United States,” dated Oct. 4, 2001, and subsequent related Presidential authorizations [at least one line redacted]

In other words, this memo tells us it was derived from the original White House authorization of October 4, 2001 (note, not the John Yoo memo authorizing the program from the same date). From that, it’s a safe bet that, given that OLC is not a classification originator (that is, Jack Goldsmith couldn’t have classified this memo without violating the sometimes-pixie-dusted EO on classification), the White House (you know, someone like Dick Cheney?) must have classified this document as the originator of the documents of which it was a derivative.

Which brings us to what I believe to be either arbitrary, or badly manipulative, determinations of which paragraphs are classified.

Let’s start with one of my favorite examples. Page 20, footnote 17 reads, in its entirety,

17 See also 50 U.S.C. 1810 (providing for civil liability as well). (TS//SI[redacted]//NF)

Someone in government–almost certainly someone in the White House–claimed in 2004 that the mere citation of one clause of the FISA legislation and the admission that its plain language meant violation of FISA called for (in addition to the criminal penalties described in the body of the text, also classified Top Secret) civil penalties was Top Secret and compartmented.

Read more

Will DOJ Finally Finish Its “Review” of Faulty White Paper on Illegal Wiretapping on Monday?

Steven Aftergood reports that, as of December 10, DOJ was still “reviewing” the flawed January 2006 white paper that the Bush Administration used to retroactively claim the 2001 Authorization to Use Military Force also authorized Bush to ignore FISA.

In June 2009, Senator Russ Feingold (D-WI) asked the Obama Administration to rescind certain classified legal opinions issued by the Justice Department Office of Legal Counsel (OLC) that asserted legal justifications for the Bush Administration’s warrantless wiretapping program.

But more than a year and a half later, those OLC opinions remain under review and no action has been taken to invalidate them, the Justice Department indicated in a newly published hearing volume.

[snip]

In a December 2010 response (pdf, at pp. 29-30) that has just been published, DOJ repeated that “The Department is still conducting its review, and will work with you and your staff to provide a better sense regarding the timing of the completion of the review.” (at pp. 29-30)

Now, Aftergood suggests that, without Feingold around to nag DOJ twice a year, this is where things will remain, with the white paper under permanent review (sort of the same way torture is under permanent “investigation”).

But a review that continues indefinitely is practically indistinguishable from no review at all.  And since Senator Feingold has now left the Senate, the Department will not be working with him and his staff to resolve this issue.  All that remains is the Senator’s warning about the hazards of embracing “unsupportable claims of executive power.”

And he may well be right.

But I wonder whether, some time years from now, we will learn that DOJ ended up completing its review and deciding to keep the white paper around about next Monday, March 7.

After all, Feingold was likely not the only one nagging DOJ to ditch the white paper.

David Kris was probably doing so too.

Even as the white paper was being written, now Assistant Attorney General for National Security David Kris tried to persuade members of the Bush Administration their effort to legitimize the program was problematic. And within two weeks after the white paper was released, Kris wrote a very clear debunking of the white paper. He demolished the Administration’s effort to claim AUMF authorized the program.

In sum, I do not believe the statutory law will bear the government’s weight. It is very hard to read the AUMF as authorizing “electronic surveillance” in light of the nearly simultaneous enactment of the Patriot Act. It is essentially impossible to read it as repealing FISA’s exclusivity provision. And the AUMF suffers further in light of FISA’s express wartime provisions. Even with the benefit of constitutional avoidance doctrine, I do not think Congress can be said to have authorized the NSA surveillance.

And while his final conclusion was more gentle, predicting the program would be “met with … hostility,” Kris made it clear that, though he didn’t know all the facts about the program, it was probably constitutionally suspect.

So I would imagine Kris has been pushing DOJ to “review” this dubious white paper since he rejoined DOJ.

But Friday is his last day. With Marty Lederman’s departure last summer and Dawn Johnsen’s abandonment by the Administration, Kris’ departure will mean the last of the noted defenders of the rule of law will be gone from DOJ. Along with Russ Feingold, seemingly the last real defender of the Constitution in Congress.

So Monday morning, nothing–no one–will be there to stop DOJ from simply declaring “Mission Accomplished” of making the white paper, rather than Congressionally-passed statute, the law of the land.