Pakistan Deploys Troops to Beef Up Security at Jail Housing Shakeel Afridi, Key Taliban Figures

As we await word on why the airlines’ SABRE reservation system would go down at exactly the time the US is warning that Undie 3.0 could be underway and the US is evacuating our personnel from Yemen, there are interesting developments on the related world trend of prison breaks.

Recall that one of the large prison breaks of al Qaeda figures took place in Dera Ismail Khan, Pakistan on July 29, with about 250 prisoners escaping. It would appear that Pakistan had very specific advance warning on this attack, but the security personnel who were present did not do their jobs once the attack started. Today, we learn from Dawn that Pakistani Army troops have been dispatched to at least two more jails to beef up security as there appears to be a new intelligence warning addressing all jails in the province of Khyber Pakhtunkhwa:

Amid security threats of militant attacks, Army troops were deployed on Tuesday at Central Jail Peshawar, which holds Dr Shakil Afridi and other high profile Taliban inmates, and Haripur jail.

The military sources confirmed that the troops took over the jail security on the request of the civil administration .

The source added that the deployment would not be for a long period and that the troops would be present at the prisons only to strengthen the security cordon.

/snip/

Other sources said that though security warning was issued for all the jails in Khyber Pakhtunkhwa (KPK) province but Central Jail Peshawar could be the prime target as Dr Shakil Afridi who was convicted of assisting the Central Intelligence Agency (CIA) in obtaining DNA samples of Osama Bin Laden through a fake vaccination campaign was also held in the said prison.

Moreover the founder chief of the outlawed Tehrik Nifaz Sharia-i-Muhammadi (TNSM), Mualana Sufi Mohammad, the former Taliban spokesman Muslim Khan, and a number of other key commanders belinging [sic] to the Swat and Bajaur chapter of the Taliban are also jailed in the Peshawar Central Prison.

Recall that it was pointed out over a year ago that Afridi is under considerable risk being housed in a jail with such high-profile Taliban figures. Despite that risk, though, Afridi managed to be interviewed by Fox News from inside the jail, with the interview published just one day before Benghazi Day. Both Afridi and a number of guards were then retaliated against for allowing the interview to happen.

If an attack occurs on Peshawar Central Jail, it seems likely that Afridi would have a very low prospect of surviving, as both militants inside the jail and those who launch the attack from outside would be highly motivated to see him killed. It would seem to me that Pakistan could stabilize the situation somewhat by moving Afridi to an undisclosed more secure location and then making it known that he has been moved.

Share this entry

Shut Down CyberCommand — US CyberCommander Keith Alexander Doesn’t Think It’s Important

Back on March 12 — in the same hearing where he lied to Ron Wyden about whether the intelligence community collects data on millions of Americans — James Clapper also implied that “cyber” was the biggest threat to the United States.

So when it comes to the distinct threat areas, our statement this year leads with cyber. And it’s hard to overemphasize its significance. Increasingly, state and non-state actors are gaining and using cyber expertise. They apply cyber techniques and capabilities to achieve strategic objectives by gathering sensitive information from public- and private sector entities, controlling the content and flow of information, and challenging perceived adversaries in cyberspace.

That was the big takeaway from Clapper’s Worldwide Threat Assessment. Not that he had lied to Wyden, but that that cyber had become a bigger threat than terrorism.

How strange, then, that the US CyberCommander (and Director of National Security) Keith Alexander mentioned cyber threats just once when he keynoted BlackHat the other day.

But this information and the way our country has put it together is something that we should also put forward as an example for the rest of the world, because what comes out is we’re collecting everything. That is not true. What we’re doing is for foreign intelligence purposes to go after counterterrorism, counterproliferation, cyberattacks. And it’s focused. [my emphasis]

That was it.

The sole mention of the threat his boss had suggested was the biggest threat to the US less than 5 months earlier. “Counterterrorism, counterproliferation, cyberattacks. and it’s focused.”

The sole mention of the threat that his audience of computer security professionals are uniquely qualified to help with.

Compare that to his 27 mentions of “terror” (one — the one with the question mark — may have been a mistranscription):

terrorists … terrorism … terrorist attacks … counterterrorism … counterterrorism … terrorists … counterterrorism … terrorist organizations … terrorist activities … terrorist … terrorist activities … counterterrorism nexus … terrorist actor … terrorist? … terrorism … terrorist … terrorists … imminent terrorist attack … terrorist … terrorist-related actor … another terrorist … terrorist-related activities … terrorist activities … stopping terrorism … future terrorist attacks … terrorist plots … terrorist associations

That was the speech the US CyberCommander chose to deliver to one of the premiere group of cybersecurity professionals in the world.

Terror terror terror.

Sitting among you are people who mean us harm

… US CyberCommander Alexander also said.

Apparently, Alexander and Clapper’s previous intense focus on stopping hacktavists and cyberattacks and cybertheft and cyber espionage have all been preempted by the necessity of scaring people into accepting the various dragnets that NSA has deployed against Americans.

Which, I guess, shows us the true seriousness of the cyber threat.

To be fair to our CyberCommander, he told a slightly different story back on June 27, when he addressed the Armed Forces Communications and Electronics Association International Cyber Symposium.

Sure, he started by addressing Edwards Snowden’s leaks.

But then he talked about a debate he was prepared to have.

I do think it’s important to put that on the table, because as we go into cyber and look at–for cyber in the future, we’ve got to have this debate with our country. How are we going to protect the nation in cyberspace? And I think this is a debate that is going to have all the key elements of the executive branch–that’s DHS, FBI, DOD, Cyber Command, NSA and other partners–with our allies and with industry. We’ve got to figure how we’re going to work together.

How are we going to protect the nation in cyberspace? he asked a bunch of Military Intelligence Industrial Complex types.

At his cyber speech, Alexander also described his plan to build, train, and field one-third of the force by September 30 — something you might think he would have mentioned at BlackHat.

Not a hint of that.

Our US CyberCommander said — to a bunch of industry types — that we need to have a debate about how to protect the nation in cyberspace.

But then, a month later, with the group who are probably most fit to debate him on precisely those issues, he was all but silent.

Just terror terror terror.

Share this entry

On Same Day Alexander Tells BlackHat, “Their Intent Is to Find the Terrorist That Walks Among Us,” We See NSA Considers Encryption Evidence of Terrorism

Screen shot 2013-08-01 at 9.34.18 AM

Thirty minutes into his speech at BlackHat yesterday, Keith Alexander said,

Remember: their intent is not to go after our communications. Their intent is to find the terrorist walks among us.

He said that to a room full of computer security experts, the group of Americans probably most likely to encrypt their communications, even hiding their location data.

At about the same time Alexander made that claim, the Guardian posted the full slide deck from the XKeyscore program it reported yesterday.

How do I find a cell of terrorists that has no connection to known strong-selectors?

Answer: Look for anomalous events

Among other things, the slide considers this an anomalous event indicating a potential cell of terrorists:

  • Someone who is using encryption

Meanwhile, note something else about Alexander’s speech.

13:42 into his speech, Alexander admits the Section 702 collection (this is true of XKeyscore too — but not the Section 215 dragnet, except in its use on Iran) also supports counter-proliferation and cybersecurity.

That is the sole mention in the entire speech of anything besides terrorism. The rest of it focused exclusively on terror terror terror.

Except, of course, yesterday it became clear that the NSA considers encryption evidence of terrorism.

Increasingly, this infrastructure is focused intensively on cybersecurity, not terrorism. That’s logical; after all, that’s where the US is under increasing attack (in part in retaliation for attacks we’ve launched on others). But it’s high time the government stopped screaming terrorism to justify programs that increasing serve a cybersecurity purpose. Especially when addressing a convention full of computer security experts.

But maybe Alexander implicitly admits that. At 47:12, Alexander explains that the government needs to keep all this classified because (as he points into his audience),

Sitting among you are people who mean us harm.

(Note after 52:00 a heckler notes the government might consider BlackHat organizer Trey Ford a terrorist, which Alexander brushes off with a joke.)

It’s at that level, where the government considers legal hacker behavior evidence of terrorism, that all reassurances start to break down.

Update: fixed XKeystroke for XKeyscore–thanks to Myndrage. Also, Marc Ambinder reported on it in his book.

Update: NSA has now posted its transcript of Alexander’s speech. It is 12 pages long; in that he mentioned “terror” 27 times. He mentions “cyber” just once.

Share this entry

Well, at Least DOJ Promised Not to Mine Journalists’ Metadata Going Forward

When I read this passage from DOJ’s new News Media Policy, it caused me as much concern as relief.

The Department’s policies will be revised to provide formal safeguards regarding the proper use and handling of communications records of members of the news media. Among other things, the revisions will provide that with respect to information obtained pursuant to the Department’s news media policy: (i) access to records will be limited to Department personnel who are working on the investigation and have a need to know the information; (ii) the records will be used solely in connection with the investigation and related judicial proceedings; (iii) the records will not be shared with any other organization or individual inside or outside of the government, except as part of the investigation or as required in the course of judicial proceedings; and(iv) at the conclusion of all proceedings related to or arising from the investigation, other than information disclosed in the course of judicial proceedings or as required by law, only one copy of records will be maintained in a secure, segregated repository that is not searchable.

It is nice for the subset of journalists treated as members of news media whose calls get treated under these new policies and not — as still seems possible — under the apparently more permissive guidelines in the FBI’s Domestic Investigations and Operations Guide that when their call and other business records are collected, some of that information will ultimately be segregated in a non-searchable collection. Though why not destroy it entirely, given that the information used for the investigation and court proceedings will not be segregated?

Moreover, this passage represents a revision of previous existing policy.

Which means data from members of the news media may not have been segregated in the past.

When you consider that one of the abuses that led to these new policies included the collection of 20 phone lines worth of data from the AP — far, far more than would be warranted by the investigation at hand — it raises the possibility that DOJ used to do more with the data it had grabbed from journalists than just try to find isolated sources.

Like the two to three hop analysis they conduct on the Section 215 dragnet data.

It’s with that in mind that I’ve been reading the reports that Kiwi troops were wandering around Kabul with records of McClatchy freelancer Jon Stephenson’s phone metadata.

The Sunday Star-Times has learned that New Zealand Defence Force personnel had copies of intercepted phone “metadata” for Stephenson, the type of intelligence publicised by US intelligence whistleblower Edward Snowden. The intelligence reports showed who Stephenson had phoned and then who those people had phoned, creating what the sources called a “tree” of the journalist’s associates.

New Zealand SAS troops in Kabul had access to the reports and were using them in active investigations into Stephenson.

The sources believed the phone monitoring was being done to try to identify Stephenson’s journalistic contacts and sources. They drew a picture of a metadata tree the Defence Force had obtained, which included Stephenson and named contacts in the Afghan government and military.

The sources who described the monitoring of Stephenson’s phone calls in Afghanistan said that the NZSIS has an officer based in Kabul who was known to be involved in the Stephenson investigations.

Last year, when this happened, Stephenson was on the Green-on-Blue beat, He published a story that a massacre in Pashtun lands had been retaliation for the killing of Taliban. He reported on another NATO massacre of civilians. He reported that a minister accused of torture and other abuses would be named Hamid Karzai’s intelligence chief. Earlier last year he had reported on the negotiations over prisoner transfers from the US to Afghan custody.

Now, the original report made a both a credibility and factual error when it said Stephenson’s metadata had been “intercepted.” That has provided the Kiwi military with a talking point on which to hang a non-denial denial — a point Jonathan Landay notes in his coverage of the claims.

Maj. Gen. Tim Keating, the acting chief of New Zealand’s military, said in a statement that no military personnel had undertaken “unlawful interception of private communications.”

“I have asked the officers responsible for our operations in Afghanistan whether they have conducted monitoring of Mr Stephenson . . . and they have assured me that they have not.”

The statement, however, did not address whether metadata, which includes the location from where a call is made, the number and location of the person who is being called and the duration of the call, was collected for Stephenson’s phones. Such data are generally considered business records of a cell phone provider and are obtained without intercepting or real-time monitoring of calls. In the United States, for example, the Foreign Intelligence Surveillance Court has ordered Verizon to deliver such records of all its customers to the National Security Agency on a daily basis.

While under contract to McClatchy, Stephenson used McClatchy cell phones and was in frequent contact with McClatchy editors and other reporters and correspondents. [my emphasis]

Indeed, higher ranking New Zealand politicians are trying to insinuate that Stephenson’s call records would only be collected if he was communicating with terrorists — even while admitting the government did have a document treating investigative journalists like terrorists.

Prime Minister John Key said it’s theoretically possible that reporters could get caught in surveillance nets when the U.S. spies on enemy combatants.

[snip]

Also Monday, New Zealand Defense Minister Jonathan Coleman acknowledged the existence of an embarrassing confidential order that lists investigative journalists alongside spies and terrorists as potential threats to New Zealand’s military. That document was leaked to Hager, who provided a copy to The Associated Press. Coleman said the order will be modified to remove references to journalists.

Finally, New Zealand officials seem to be getting close to blaming this on the US.

“The collection of metadata on behalf of the NZDF by the U.S. would not be a legitimate practice, when practiced on a New Zealand citizen,” Coleman said. “It wouldn’t be something I would support as the minister, and I’d be very concerned if that had actually been the case.”

Thus far, the coverage of the Stephenson tracking has focused on the Kiwi role in all of it. But as Landay notes, Stephenson would have been using McClatchy-provided cell phones at the time, suggesting the US got the records themselves, not by intercepting anything, but simply by asking the carrier, as they did with the AP.

Ultimately, no one is issuing a direct denial that some entity tied to ISAF — whether that be American or New Zealand forces — collected the phone records of a journalist reporting for a US-based outlet to try to identify his non-friendly sources.

So what other journalists have US allies likened to terrorists because they actually reported using both friendly and unfriendly sources?

Share this entry

70% of Pew’s Respondents More Attentive than Pew?

Screen shot 2013-07-29 at 7.53.58 AMYou may have seen that a Pew poll shows, for the first time, more people think the government has gone too far in restricting civil liberties than think it has not gone far enough to protect the country. (Another poll had a similar finding just after the Boston Marathon attack.)

That said, even with concerns about civil liberties, 50% of those polled approve of the collection in the name of terrorism, while 44% disapprove.

While I’m heartened that the country has finally started expressing some concern about civil liberties, I think a detail of the Pew poll is worth noting.

A big chunk of Pew’s readers seem to have a more accurate understanding of the program than Pew’s pollsters.

Screen shot 2013-07-29 at 7.58.50 AMConsider two of its three headline findings: that 70% use data for purposes other than terrorism and that 63% believe the government is collecting more than metadata.

The first question was asked like this:

Do you think this government data collection effort is only being used to investigate terrorism, or do you think the government uses this data for purposes other than terrorism investigations?

The second question was phrased like this:

Just your impression, does this government program only collect data such as phone numbers and e-mail addresses, or is it also collecting what’s actually being said in the calls and e-mails?

The thing is, both of these questions are true: The government collects content under Section 702, including the incidentally collected content of Americans (which they can go back and search on later). And the 702 program collects information for counter-proliferation, cybersecurity, and other foreign intelligence purposes (the metadata program is reportedly limited to terrorism … if you believe all of Iran is a terrorist organization).

That said, only some of the “other purposes” Pew readers cited — such as gathering information for other crimes, and for national security — match the ones the government admits to. They also name political targeting and general control.

But Pew’s report suggests those who thing the government is collecting content are wrong.

And despite the insistence by the president and other senior officials that only “metadata,” such as phone numbers and email addresses, is being collected, 63% think the government is also gathering information about the content of communications – with 27% believing the government has listened to or read their phone calls and emails.

No. They haven’t insisted they’re collecting only metadata. They’ve insisted they’ve only used Section 215 dragnet to collect metadata.

Perhaps the headline of this study ought to be, 70% of Pew’s respondents not snookered by the metadata claim, unlike Pew?

Share this entry

Whatever Should We Do About These New Biotechnology Capabilities?

I've held onto this nifty comic for 30 years, knowing it would come in handy some day.

I’ve held onto this nifty comic for 30 years, knowing it would come in handy some day.

My high school days were filled with intrigue and controversy at the national level. On the political front, the Watergate scandal was playing out, with Nixon resigning in the summer between my junior and senior years. Another drama was also playing out at that time, but I only became fully aware of it a few years after its most dramatic events. In July of 1974, only a month before the Nixon resignation, a remarkable publication (pdf) appeared in the Proceedings of the National Academy of Sciences. First, the paper is remarkable for its lack of an author byline. The members of the committee who authored the publication are listed at the very end. More remarkable still is that the publication marked the announcement of a voluntary moratorium by biological scientists. Several types of constructs using newly developed gene-splicing capabilities would not be attempted until the group had more fully studied the risks involved and come up with a plan for mitigating these risks.

Just under a year later, a follow-up publication (pdf) in the same journal appeared. This time there was an author list (and they finally let a woman join the authors–Maxine Singer had been involved in the discussions all along but was not listed in the 1974 paper). The risk mitigation strategy proposed in this paper has set the stage for the bulk of the work with recombinant DNA that has followed (and which allowed me to get a PhD in Molecular Biology in 1983). In the 1975 paper, Paul Berg and colleagues described a graduated level of biological and physical containment of organisms generated in recombinant DNA experiments, with the level of containment based on the relative risk perceived for the new DNA combinations that were being generated.

It should be noted that the concept of working with dangerous biological organisms was not new at all. Infectious diseases have been studied throughout the history of medicine and so the concept of biological containment of dangerous pathogens was not new to these scientists. They relied on these established practices of containment, which have continued to evolve into the current containment guidelines such as those published by the Centers for Disease Control (pdf) for containing pathogens.

Work with recombinant DNA took off quickly once the moratorium was lifted and a number of wonder drugs are now in use through this technology. Engineered plants are also in widespread use in agriculture, but implementation at least in the case of Bt corn has been mismanaged to the point that resistance is beginning to break out.

Fast forward to my impending old age and a very different sort of moratorium reared its head in a very ugly way in December of 2011. Read more

Share this entry

“People in the Gulf” Talking on Skype

The NatSec twittersphere is abuzz about the fact that the CIA indirectly warned Hezbollah that some al Qaeda operatives were preparing an attack on a location in southern Lebanon.

I’m actually less interested that we felt the need to warn a political entity that we consider a terrorist organization than the other details of the story — and that it is a story Lebanese sources felt free to share with the press.

For example, the report says we intercepted calls between the al Qaeda operatives and “people in the Gulf.”

“They had transcripts of calls made from known al Qaida people in Lebanon to people in the Gulf that included detailed information about the attacks, including the amounts of explosives that had been smuggled into Lebanon,” said one Lebanese intelligence official who is barred from speaking openly to reporters.

McClatchy suggests these al Qaeda figures were calling other al Qaeda figures in this unnamed Gulf country. But why should we assume that? Qatar has been funding al Qaeda linked militants in Syria. Is it possible this story is public because the US wants it known that we’re so tired of Qatar’s support for terrorists we’ll even tip Hezbollah to plans Qatari backed terrorists have made?

Indeed, a comment from a Hezbollah member quoted in the story seems to suggest this warning (and, I would suggest, the publicity surrounding it) is an effort to put the genie we’ve created back in the bottle.

The Hezbollah commander said he thought the warning was more pragmatic.

“The Americans are starting to realize how bad their friends in Syria are, so they’re trying to get out of this mistake,” he said. “They also think that if a bomb goes off in Dahiya, we will blame America and target Americans in Lebanon. That will never happen, but they’re scared of this monster they created.”’

That monster was created with the funding of one of our close allies.

I’m also intrigued by the suggestion that the US managed to collect these calls whereas the Lebanese could not because it was VOIP.

A security contractor familiar with the capabilities of the Lebanese intelligence services said it was likely that the targets had used voice-over-Internet software that the Lebanese services lack the equipment and expertise to decrypt but that poses few problems for the Americans.

“Lebanon lacks the expertise and the technology for that,” said the contractor, who asked not to be further identified because of the sensitivity of his work. “But once the call left Lebanon for the Gulf, the NSA would have automatically been tracking it.”

We’ve just learned the extent to which Microsoft has helped the government access Skype. And the government claims such disclosures have led terrorists to stop using Skype.

Were these terrorists and their friends in the gulf?

Update: Via Twitter, McClatchy reporter and Middle East expert Jonathan Landay says I’m reading way too much into this, and that there is a backstory he cannot share.

So take these musings as off-base ones.

Share this entry

Was Inspire a British-Made Product?

Amid a longer story about one-time Brits stripped of their citizenship and handled according to the Administration Disposition Matrix, Ian Cobain fills out the story of Minh Quang Pham (whose identity in the UK is protected under a legal gag and so is referred to as B2). Among other things, Cobain answers the question I raised here: how Pham materially supported Al Qaeda in the Arabian Peninsula by (we infer) helping to produce Inspire between the time he was arrested upon returning from Yemen in July 2011 and the time the British Home Secretary Theresa May tried to strip him of citizenship in December of that year (see my timelines here): he was out on bail.

On arrival back at Heathrow airport, the Vietnamese-born man was searched by police and arrested when a live bullet was found in his rucksack. A few months later, while he was free on bail, May signed an order revoking his British citizenship.

But that would mean Pham was materially contributing to Inspire at a time when he was in the UK. The Brits have much stronger laws against even possessing Inspire. If we (and by association they) had evidence he was producing Inspire while out on bail, it should be easy to try him there.

Which is part of Pham’s current complaint, as he tries to avoid extradition to the US: he could have and should have been charged in the UK.

Within minutes of SIAC announcing its decision and granting B2 unconditional bail, he was rearrested while sitting in the cells at the SIAC building. The warrant had been issued by magistrates five weeks earlier, at the request of the US Justice Department. Moments after that, the FBI announced that B2 had been charged with five terrorism offences and faced up to 40 years in jail. He was driven straight from SIAC to Westminster magistrates’ court, where he faced extradition proceedings.

B2 continues to resist his removal to the US, with his lawyers arguing that he could have been charged in the UK. Indeed, the allegations made by the US authorities, if true, would appear to represent multiple breaches of several UK laws: the Terrorism Act 2000, the Terrorism Act 2006 and the Firearms Act 1968. Asked why B2 was not being prosecuted in the English courts – why, in other words, the Americans were having this particular headache, and not the British – a Crown Prosecution Service spokesperson said: “As this is a live case and the issue of forum may be raised by the defence in court, it would be inappropriate for us to discuss this in advance of the extradition hearing.”

One of the charges against Pham is that he conspired to obtain military training. Which would seem to rely on Ahmed Warsame’s testimony. But it’s not clear how much of the material support charges Warsame could support, given that Pham’s material support period extends a number of months beyond Warsame’s arrest.

Note, however, that there may be overlap between the UndieBomb 2.0 mole working with AQAP (who may have arrived in AQAP 2 months before Pham left) and the tail end of the charge. In which case they may be shipping Pham to the US to better hide the mole’s role in all this.

Of course, all these charges may primarily be about protecting the mole.

Share this entry

Spying on Americans: A “Team Sport” Since 2004

Screen shot 2013-07-11 at 6.25.06 PMOne of the more colorful revelations in today’s Guardian scoop is the newsletter piece that describes increased sharing of PRISM (Section 702) data with FBI and CIA.

The information the NSA collects from Prism is routinely shared with both the FBI and CIA. A 3 August 2012 newsletter describes how the NSA has recently expanded sharing with the other two agencies.

The NSA, the entry reveals, has even automated the sharing of aspects of Prism, using software that “enables our partners to see which selectors [search terms] the National Security Agency has tasked to Prism”.

The document continues: “The FBI and CIA then can request a copy ofPrism collection of any selector…” As a result, the author notes: “these two activities underscore the point that Prism is a team sport!”

But that’s something that has actually been built into the program for years. While the Joint IG Report on the illegal wiretap program claimed,

NSA also was responsible for conducting the actual collection of information under the PSP and disseminating intelligence reports to other agencies such as the Federal Bureau of Investigation (FBI), the Central Intelligence Agency (CIA), and the Office of the Director of National Intelligence (ODNI) National Counterterrorism Center (NCTC) for analysis and possible investigation.

The Draft NSA IG Report explained,

Coordination with FBI and CIA. By 2004, four FBI integrees and two CIA integrees, operating under SIGINT authorities in accordance with written agreements, were co-located with NSA PSP-cleared analysts. The purpose of co-locating these individuals was to improve collaborative analytic efforts.

And the minimization procedures released by the Guardian (which date to 2009), make it clear NSA can provided unminimized content to CIA and FBI on whatever selectors they request.

6(c)

(1) NSA may provide to the Central Intelligence Agency (CIA) unminimized communications acquired pursuant to section 702 of the Act. CIA will identify to NSA targets for which NSA may provide unminimized communications to CIA. CIA will process any such unminimized communications received from NSA in accordance with CIA minimization procedures adopted by the Attorney General, in consultation with the Director of National Intelligence, pursuant to subsection 702(e) of the Act.

(2) NSA may provide to the FBI unminimized communications acquired pursuant to section 702 of the Act. FBI will identify to NSA targets for which NSA may provide unminimized communications to the FBI. FBI will process any such unminimized communications received from NSA in accordance with FBI minimization procedures  adopted by the Attorney General, in consultation with the Director of National Intelligence, pursuant to subsection 702(e) of the Act.

And none of that should be surprising, given the tasking slide — above — that was first published by the WaPo. FBI, at least, is solidly in the midst of this collection, for a program deemed to be foreign intelligence collection.

There have been a variety of claims about all this team sport participation. But I’m not convinced any of them explain how all this works.

And in perhaps related news, the Fifth Circuit today said that Nidal Hasan could not have access to the FISA material on him, in spite of the fact that William Webster published a 150 page report on it last year. Legally, that material should be utterly distinct from PRISM, since a wiretap on Anwar al-Awlaki would require a specific FISA warrant (and the latest Guardian scoop refers to expanded cooperation since 2012). But I suspect the reason Hasan, the FISA evidence against whom has already been extensively discussed, can’t see it is because we would see what this actually looks like from the FBI side.

DOJ has to protect its team, you know.

Share this entry

Five Additional Questions for Jim Comey

Colleen Rowley has a great list of questions Jim Comey should be asked today in his confirmation hearing (I’ll be live-tweeting it, so follow the twitter feed over there. >>>>>>

Here are five questions I would add:

  1. The May 10, 2005 torture authorization you signed off (as well as the Combined of the same date one you objected to) on was retrospective. What were the circumstances of the treatment of this detainee? Was that detainee water-boarded, in spite of CIA claims only Abu Zubaydah, Ibn Rahim al-Nashiri, and Khalid Sheikh Mohammed were?
  2. Do you believe the High Value Interrogation Group (HIG) should be authorized to use “separation,” including modified sleep deprivation, to coerce confessions?
  3. Do you believe it legal or advisable to delay presentment for detainees interrogated by HIG so as to set up up to two weeks of unsupervised interrogation?
  4. FBI has used the Section 215 authorization — the same law used to collect every American’s phone data — to collect lists of common products that on very rare occasions have been used as precursors to explosives. They could and may well have used the same authority with pressure cookers. Is collecting such a broad sweep of innocent activity in pursuit of terrorists the best way to identify them? What do you believe the appropriate use of Section 215 authority is?
  5. Through the entire financial crisis, it appears the FBI did not use all the investigative tools available, including (with two or three notable exceptions) wiretaps and phone and Internet tracking, when investigating large financial institutions. This appears to be true even when, as with your former employer HSBC, the institution had clear ties to terrorists and Transnational Criminal Organizations. What tools do you believe appropriate to investigate large financial institutions and do you plan to change the approach to investigating financial crime?
Share this entry