Posts

DOD Complains about “Speculative” Risk of Bulk Collection

Maybe I have a sick sense of humor.

But I laughed at the irony of this NYT story about how Edward Snowden used a web-crawler to scrape data from the NSA’s servers.

In paragraphs 28 and 29 (of 29), Defense Intelligence Agency head Michael Flynn admits what he has avoided admitting in public hearings: he has no fucking clue what Snowden took.

The head of the Defense Intelligence Agency, Lt. Gen. Michael T. Flynn, told lawmakers last week that Mr. Snowden’s disclosures could tip off adversaries to American military tactics and operations, and force the Pentagon to spend vast sums to safeguard against that. But he admitted a great deal of uncertainty about what Mr. Snowden possessed.

“Everything that he touched, we assume that he took,” said General Flynn, including details of how the military tracks terrorists, of enemies’ vulnerabilities and of American defenses against improvised explosive devices. He added, “We assume the worst case.”

DOD doesn’t actually know what Snowden took. They know he had access to a bunch of files on military operations.

But that leaves open the question of how Mr. Snowden chose the search terms to obtain his trove of documents, and why, according to James R. Clapper Jr., the director of national intelligence, they yielded a disproportionately large number of documents detailing American military movements, preparations and abilities around the world.

But DOD doesn’t know whether he just touched them, or took them with him. It doesn’t know whether he deleted any he took before turning them over to journalists.

For his part, Snowden says DOD’s claims he deliberately took military information are unfounded.

In his statement, Mr. Snowden denied any deliberate effort to gain access to any military information. “They rely on a baseless premise, which is that I was after military information,” Mr. Snowden said.

Snowden suggests any military information he got, he got incidentally. DOD will just have to trust him.

Nevertheless, DOD will assume the worst because that’s the only way to protect DOD equities — and indeed, the lives of our military service members (that is, if Flynn’s claims are true; given his track record I don’t necessarily believe they are).

The necessity of protecting people and secret plans because of a potential risk is actually not funny at all. Indeed, it points to the problem inherent with bulk collection conducted in secret: Those potentially targeted by it have to assume the worst to protect themselves.

Mind you, if Sam Alito were a fair and balanced kind of guy, he’d tell DOD to suck it up. The risk of this bulk collection inflicting harm on military operations is speculative.

Respondents’ claim of future injury is too speculative to establish the well-established requirement that certain injury must be “certainly impending.”

But I think Alito is wrong. I definitely don’t fault DOD for adjusting to potential risks given the lack of certainty over which of their most sensitive secrets bulk collection has compromised.

If it is a problem that Snowden touched or maybe even incidentally collected data that could cause DOD great harm — if it is understandable that DOD would assume and prepare for the worst — then NSA needs to shut down its own indiscriminate scraping of data from all over the world. Because it is imposing the same kinds of risk and costs and worries to private individuals all over the world.

Update: Eli Lake got sources who received DIA’s briefing on their Snowden report to distinguish between what DIA knows and what they’re just assuming.

An EPIC Effort to Combat the Dragnet

The Electronic Privacy Information Center has filed a writ of mandamus to SCOTUS to overturn the Section 215 order turning over all of Verizon’s call records to the NSA.

Let me be clear: this is a moon shot. I’m doubtful it’ll work. A really helpful post at SCOTUSblog on the effort emphasizes how unusual this is.

EPIC’s move is the boldest of a number of legal challenges to NSA that have been filed around the country by privacy defenders in the wake of Snowden’s public disclosure of some of the details of NSA surveillance.  EPIC filed under a Supreme Court rule that permits “extraordinary” filings directly in the Supreme Court, without first making a trip through a lower court, when “exceptional circumstances warrant the exercise of the Court’s discretionary powers” and an adequate remedy cannot be obtained “from any other court.”  The history of such Rule 20 requests shows that few are granted.  The Court’s own rules say that the power to grant such pleas is “sparingly exercised.”

All that said, IMO the filing is very well crafted, and worth reading with attention.

Name check the key Justices

I first got sucked in by the way the introduction invokes two recent cases on these issues.

The records acquired by the NSA under this Order detail the daily activities, interactions, personal and business relationships, religious and political affiliations, and other intimate details of millions of Americans. “Awareness that the Government may be watching chills associational and expressive freedoms. And the Government’s unrestrained power to assemble data that reveal private aspects of identity is susceptible to abuse.” United States v. Jones, 132 S. Ct. 945, 956 (2012) (Sotomayor, J., concurring). As Justice Breyer has recently noted, “the Government has the capacity to conduct electronic surveillance of the kind at issue.” Clapper v. Amnesty Int’l, USA, 133 S.Ct. 1138, 1158- 59 (2013) (citing, inter alia, Priest & Arkin, A Hidden World, Growing Beyond Control, Wash. Post, July 19, 2010, at A1 (reporting that the NSA collects 1.7 billion e-mails, telephone calls and other types of communications daily)). And because the NSA sweeps up judicial and Congressional communications, it inappropriately arrogates exceptional power to the Executive Branch.

Sotomayor is the one Justice who “gets” the implications of this dragnet; her opinion in Jones summarized where an ideal SCOTUS would be on these issues. If this is going to work Sotomayor is going to need to hold the hands of the other Justices and walk them through this risk. And Breyer is a key swing, a vote likely to support law and order without a good argument to the contrary.

And notice the way EPIC slipped in the separation of powers argument right there?

The motion also name checks two more crucial Justices, Republicans who have supported civil liberties issues on key cases in the past. Most importantly, it invokes Scalia’s recent warning against a panopticon in Maryland v. King (the DNA case).

Even admirable ends do not justify the creation of a panopticon. See Maryland v. King, 569 U.S. __, 133 S.Ct. 1958, 1989 (2013) (Scalia, J., dissenting) (“Solving unsolved crimes is a noble objective, but it occupies a lower place in the American pantheon of noble objectives than the protection of our people from suspicionless lawenforcement searches.”).

Read more

SCOTUS Limits Privacy Act Just as NCTC Expands Access to US Person Data

Well, this is rather inauspicious timing.

The conservatives on SCOTUS have sharply limited the teeth of the Privacy Act–limiting damages to out-of-pocket damages.

The Supreme Court has dealt privacy advocates a huge setback. By a 5-3 majority, the court ruled that people who sue the government for invading their privacy can only recover out-of-pocket damages. And whistle-blower lawyers say that leaves victims who suffer emotional trouble and smeared reputations with few if any options.

Justice Samuel Alito and all four of his conservative colleagues turned back a challenge from a pilot named Stan Cooper. (Justice Elena Kagan did not participate in the case.)

Cooper said the Social Security Administration, which was sending him disability benefits, had improperly shared his HIV status with transportation officials.

In 1974, while the abuses of Watergate were fresh in people’s minds, Congress made that kind of unauthorized information-sharing illegal under the Privacy Act. The law said the U.S. had to pay actual damages to victims.

But in Wednesday’s ruling, Alito said actual damages represent monetary harm, not mental or emotional distress.

That’s absurd, according to the dissent by Justice Sonia Sotomayor. Sotomayor said that means people who suffer severe emotional distress can’t get any money — but people with minor out-of-pocket expenses can.

The whole point of the Privacy Act was to impose some kind of real penalty on the government for using the damage it collects on you in a way that ends up hurting you. Without pain or suffering damages, it will make it very difficult for aggrieved people to find legal representation to sue the government for violations. And without pain and suffering damages, the penalties would generally be so small, in any case, as to make violating your privacy the cost of doing business.

And of course, this happens just as the government decided to make its agency databases accessible to the National Counterterrorism Center for data mining to find terrorists. The Privacy Act would have been one of the few limits on what the government can do with this data. For example, the Guidelines on this new access warns that “All disseminations under these Guidelines must be … permissible under the Privacy Act,” which would normally limit dissemination (in this context) to law enforcement purposes. But now that Alito has gutted the protections of the Privacy Act, there is less to prevent some gung ho counterterrorism professional to leak information about who looks like a terrorist when you data mine their personal data. Or to use the now-collated information (the Privacy Act protections allowing you to see your own data reside with the originator here, which I suspect will mean you don’t get to see what your data gets collated with) for more personal, nefarious purpose.

These two events are unrelated. SCOTUS didn’t do this because of the government’s new power grab at NCTC. But SCOTUS’ decision does make that power grab still more dangerous.

Note: For those of you interested in these issues, I urge you to stop by FDL’s Book Salon on Saturday at 5. Tim Weiner will speak about his generally very good book, Enemies. The salon will be particularly interesting, though, because the ACLU’s Mike German will host. Not only does German’s FBI background make him an ideal reviewer of this history of the FBI’s abuses, but he’s probably the best person to address the book’s most glaring fault: inaccurate and wildly over-optimistic treatment of the FBI’s Domestic Investigations and Operations Guide.

John Yoo: Stupid Political Hack AND Craven Addington Disciple

If ever there were a doubt that John Yoo was not just a craven lackey for David Addington, but also a stupid political hack, his op-ed today puts that doubt to rest. After whining about how mean the Senate Judiciary Committee was to Robert Bork and Clarence Thomas and John Roberts (!) and Sam Alito, Yoo launches into the kind of fantastic ravings you’d expect from Glenn Beck.

Republicans can also use the filibuster to return the federal government to its proper role in our constitutional system. When Obama chose Sonia Sotomayor for the Supreme Court last year, the jury was still out on the president. It wasn’t clear if Obama was a moderate technocrat, as much of the electorate hoped, or if he was a man of the left, as Republicans feared.

That answer is now clear. At home, Obama has launched a broad campaign to redistribute wealth and engineer social change. He and his large congressional majorities enacted a wasteful $800 billion stimulus, increased the national debt by 50 percent in two years, and nationalized the health-care sector – fully one-sixth of the economy.

On national security, Obama kept to the Bush-Petraeus drawdown schedule for Iraq and reluctantly surged troops to Afghanistan. But he has tried his best to fit the war against al-Qaeda into the box reserved for criminal activities: He promised to shut down Guantanamo Bay, abjured tough questioning tactics, loosed a special prosecutor on CIA interrogators, announced a civilian trial in New York City for 9/11 plotter Khalid Sheikh Mohammed, and automatically treated al-Qaeda’s Christmas Day bomber as a criminal suspect.

[snip]

The GOP will earn public support for its actions, but more important it will be returning the Supreme Court to the original meaning and purpose of the Constitution. The framers wanted the federal government to play a limited role in domestic affairs, and an energetic one to protect the national security against unforeseen emergencies and war. They did not establish a government to redistribute income or impose a socialistic vision of regulated markets. The Constitution’s preamble declares its purpose: to “provide for the common defense” and “promote the general welfare,” not balance the common defense and promote special interests. If President Obama doesn’t send the Senate a nominee who understands those words, the Supreme Court vacancy could be another issue to await the results of the November elections.

John Yoo, apparently, had no problem with the way George Bush redistributed wealth to the very rich with the Wall Street Bailout and huge cuts in the estate tax. And he seems to have missed the news that Obama has embraced the kind of tools of unchecked executive power–including the ability to target American citizens for death with no due process–that John Yoo loves. And how cute that John Yoo now questions the kind of civilian trials that Bush used with Richard Reid and (eventually) Jose Padilla.

But what I’m most amused by is Yoo’s critique of Obama’s choice to forgo torture (kind of).

[He] abjured tough questioning tactics, loosed a special prosecutor on CIA interrogators…

You see, John Yoo has always pretended he neutrally read the law when he wrote his torture memos. He claimed, repeatedly, that he just did the legal analysis and had no stake in the policy decision. He suggested that he didn’t care, one way or another, whether Bush and Cheney embraced torture, he was just the lawyer doing analysis in isolation from those policy questions. He further has claimed that he only approved limited torture, not the techniques described by the press (which happen to match what the CIA IG saw on the torture tapes).

Read more