DOD Uses Sequester to Excuse 5 Year Delay in Implementing Basic Network Security

More than 22 months ago, I wrote a post analyzing Congressional testimony describing the gaping holes in DOD network security 3 years after a nasty malware infection and a year after the publication of Collateral Murder by WikiLeaks.

Almost two years later, Assistant Secretary of Defense Zachary Lemnios says sequestration might hold up improving network security on classified and unclassified networks.

Zachary J. Lemnios, the assistant secretary of defense for research and engineering, was asked by Sen. Rob Portman (R-Ohio) to describe the “most significant” impacts on cybersecurity that could follow from the anticipated cuts to the Pentagon’s budget.

Mr. Lemnios replied that “cuts under sequestration could hurt efforts to fight cyber threats, including […] improving the security of our classified Federal networks and addressing WikiLeaks.”

This is news not just for the specific details offered about how bad DOD’s network security remains (click through for more details). But also for the tacit admission that 3 years after a breach DOD considers tantamount to aiding the enemy, and 5 years after a malware infection that badly affected DOD’s networks in Iraq, DOD still hasn’t completed security enhancements to its networks.

DOJ Used the Open Access Guerilla Manifesto to Do More than Justify Prosecution, They Justified a Search of Aaron Swartz’ Home

Yesterday, the HuffPo caught up to reporting I did in January, reporting that DOJ used Aaron Swartz’ 2008  Guerilla Open Access Manifesto to justify their investigation of him.

A Justice Department representative told congressional staffers during a recentbriefing on the computer fraud prosecution of Internet activist Aaron Swartz that Swartz’s “Guerilla Open Access Manifesto” played a role in the prosecution, sources told The Huffington Post.

[snip]

The “Manifesto,” Justice Department representatives told congressional staffers, demonstrated Swartz’s malicious intent in downloading documents on a massive scale.

[snip]

Reich told congressional staffers that the Justice Department believed federal prosecutors acted in a reasonable manner, according to the sources. He also made clear that prosecutors were in part influenced by wanting to deter others from committing similar offenses.

When considering punishment, courts are supposed to impose an “adequate deterrence to criminal conduct” under federal statute. Swartz’s “Manifesto,” prosecutors said they believed, made clear that he intended to share the academic articles widely.

But there’s something the HuffPo is still missing.

Not only does the Guerilla Manifesto advocate doing a lot of things that may well be legal — the biggest exception is the one most applicable, downloading scientific journals and upload them to file sharing networks…

And look at the passage from the Manifesto they quote in the brief, which appears in this larger passage.

There is no justice in following unjust laws. It’s time to come into the light and, in the grand tradition of civil disobedience, declare our opposition to this private theft of public culture.

We need to take information, wherever it is stored, make our copies and share them with the world. We need to take stuff that’s out of copyright and add it to the archive. We need to buy secret databases and put them on the Web. We need to download scientific journals and upload them to file sharing networks. [my emphasis]

In context, much of the manifesto advocates for things that are perfectly legal: sharing documents under Fair Use. Taking information that is out of copyright and making it accessible. Purchasing databases and putting them on the web.

Aside from sharing passwords, about the only thing that might be illegal here (depending on copyright!) is downloading scientific journals and uploading them to file sharing networks.

But it’s the way the government used Swartz’ manifesto legally. They used it, as far as I’ve found, primarily to justify HOW they investigated Swartz.

They used it in a brief rebutting his effort to suppress a number of searches they had done in the investigation.

And that’s significant because of an oddity in the investigation. The government, at first, wasn’t all that quick to investigate Swartz. The let the actual evidence of the alleged crime just sit for weeks and weeks. Read more

Jane Harman Now Targeting Individual CyberTargets with Drone Court

Jane Harman’s advocacy for a drone court suffers from the same problem I touched on here (and will lay out at more length in the next day or so): before you can have a Drone and/or Targeted Killing Court, you need some law the court will apply. Harman seems to envision just applying the standards the Executive — not Congress — came up with, which isn’t how Schoolhouse Rock taught me the government is supposed to work.

Congress, in her model, would just be fully apprised of what goes on in the Drone and/or Targeted Killing Court, not write law to limit what can be approved.

But I’m more interested — alarmed, really — by the way Harman seamlessly adds cybertargeting to her advocacy.

The FISA court, renamed the CT Court, could also oversee drones and cyber. A FISA court application must show that specific individuals are connected to a foreign power – which is defined, in part, as a group engaged in international terrorism. Drone and cyber applications could (1) list the individual/cyber target against whom the lethal operation is directed and (2) submit a finding of probable cause that the individual/cyber target is connected to a foreign power, is in a senior operational capacity and poses an imminent threat of violent attack against the United States.

Approved applications for drone strikes and cyberattacks would need to be renewed after a certain period, and discontinued if evidence is presented that the targets no longer meet the criteria. [my emphasis]

Granted, it would have been nice if the government had had to go to a court to explain why a publisher like WikiLeaks should be targeted with a persistent DNS attack, assuming that’s what happened. But given that both our FISA targeting and our targeting killing targeting probably allow for far too much abuse of the First Amendment, I’m not convinced the FISA Court would have noted the problem with that incident of prior restraint.

More generally, though, isn’t Harman’s neat inclusion of cyber targeting here a hint that our cyberattacks have gone beyond just Iran and WikiLeaks?

Five Questions for John Brennan

I’m sure I could grill John Brennan for hours. But after a lot of thought, here are the five questions I believe most important that should be asked of him Today.

1) Do you plan to continue lying to Americans?

You have made a number of demonstrable lies to the American people, particularly regarding the drone program and the Osama bin Laden raid. Most egregiously in 2011, you claimed “there hasn’t been a single collateral death” in almost a year from drone strikes; when challenged, you revised that by saying, “the U.S. government has not found credible evidence of collateral deaths,” even in spite of a particularly egregious case of civilian deaths just months earlier. On what basis did you make these assertions? What definition of civilian were you using in each assertion? (More background)

In addition, in a speech purportedly offering transparency on the drone program, you falsely suggested we know the identities of all people targeted by drones. Why did you choose to misrepresent the kind of intelligence we use in some strikes?

2) What was the intelligence supporting the first attempt to kill Anwar al-Awlaki?

The US government’s first attempt to kill Anwar al-Awlaki with a drone strike was December 24, 2009. WikiLeaks cables make it clear that Awlaki was a primary target of that strike, not just intended collateral damage. Yet the Webster report makes clear that on that day — that is, until the Underwear Bomber attempt the next day — the Intelligence Community did not consider Awlaki to be operational. Thus, the strike seems to have been approved before he fulfilled the criteria of the white paper released the other day, which authorizes the targeting of senior operational leaders of groups like AQAP. What was the legal basis for targeting this American citizen at a time when the IC did not believe him to be operational? (More background)

3) Will your close friendships with Saudis cloud your focus on the US interest?

In a fawning profile the other day, Daniel Klaidman nevertheless laid out the following points:

  • You considered Yemen to be a “domestic conflict.”
  • You opposed signature strikes in the country.
  • You nevertheless approved signature strikes in Yemen because of personal entreaties from people you know from when you were stationed on the Arabian peninsula in the 1990s.

In addition, recent reports have confirmed that the drone strike that killed Anwar al-Awlaki was launched from Saudi territory.

Were the personal entreaties you responded to from Yemenis or Saudis (or both)?

What role did the Saudis have in the Awlaki strike? Did they have an operational role?

As someone with such close ties to liaison sources, how have you and will you manage to prioritize the interests of the United States over the interests of friends you have from two decades ago?

To what degree is your intelligence sharing — especially with the Saudis — a stovepipe that creates the same risks of intelligence failures that got us into the Iraq War? (More background)

4) What role did you have in Bush’s illegal wiretap program?

The joint Inspector General report on the illegal wiretap program reported that entities you directed — the Terrorist Threat Integration Center in 2003 and 2004, and the National Counterterrorism Center in 2004 and 2005 — conducted the threat assessments for the program.

What role did you have, as the head of these entities, in the illegal wiretapping of Americans? To what extent did you know the program violated FISA? What role did you have in counseling Obama to give telecoms and other contractors immunity under the program? What influence did you have in DOJ decisions regarding suits about the illegal program, in particular the al-Haramain case that was thrown out even after the charity had proved it had been illegally wiretapped? Did you play any role in decisions to investigate and prosecute whistleblowers about this and other programs, notably Thomas Drake? (More background)

5) Did you help CIA bypass prohibitions on spying domestically with the NYPD intelligence (and other) programs?

In your additional prehearing questions, you admit to knowing about CIA’s role in setting up an intelligence program that profiled Muslims in New York City. What was your role in setting up the program? As someone with key oversight over personnel matters at the time, did you arrange Larry Sanchez’ temporary duty at the NYPD or CIA training for NYPD detectives?

Have you been involved in any similar effort to use CIA resources to conduct domestic spying on communities of faith? You said the CIA provides (among other things) expertise to local groups spying on Americans. How is this not a violation of the prohibition on CIA spying on Americans?  (More background)

Update: I realized that I have left out a caveat in Brennan’s drone lies — he was talking in the previous year. I’ve fixed that.

When All You Have Is a CyberHammer, You Have to Expect to Go to War against Nails

There are two things about this NYT article describing Obama’s new cyberwar policy that deserve note.

A secret legal review on the use of America’s growing arsenal of cyberweapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad, according to officials involved in the review.

[snip]

The rules will be highly classified, just as those governing drone strikes have been closely held.

First, according to the WaPo, the government has conducted a search of any and all government officials who have had contact with the lead author of the story, David Sanger.

Investigators, they said, have conducted extensive analysis of the e-mail accounts and phone records of current and former government officials in a search for links to journalists.

Frankly, I think the WaPo is naively ignoring the real possibility, given the updates to DOJ’s Domestic Investigations and Operations Guide, that DOJ has accessed Sanger’s email records directly.

Nevertheless, however they’ve gotten that information, the government now has a pretty good idea who speaks to David Sanger. Presumably, folks who talk to Sanger — particularly those privy to secret workings of the White House — are cognizant of this fact.

From that I assume it’s likely — though by no means certain — that the Administration is not that unhappy about having an article boasting about its aggressive cyberwar stance, even while noting that the details of it will be remain legally classified.

Meanwhile, I’m struck by this claim.

Mr. Obama is known to have approved the use of cyberweapons only once, early in his presidency, when he ordered an escalating series of cyberattacks against Iran’s nuclear enrichment facilities.

Sure, there’s only been the one attack (or rather the serial set of attacks) on Iran.

But I’m struck — particularly in the wake of DOJ’s filing making it clear they’re investigating WikiLeaks as a spy, while refusing to tell us what laws it is using to conduct that investigation — that there has been a rather notable cyberattack whose author we don’t know: the DDOS attacks on WikiLeaks as it first started to release the WikiLeaks cables, and then again last summer (a group called AntiLeaks claimed credit for the second one).

As Jack Goldsmith and Thomas Rid both point out, the Administration appears to be badly fumbling cyber defense (largely because the private sector doesn’t want to play along and the Administration isn’t prepared to make them), but they are very aggressively pursuing cyberoffense. Perhaps, as Goldsmith suggests, this leak to the journalist whose contacts are being monitored is intended to deter attacks on the US (though I’m not sure how a story in a newspaper that the Chinese have hacked is going to scare the Chinese from doing what they have been doing for years).

But if the US is so intent on bragging about its offensive capability, isn’t it time we learned the scope of that offensive capability? Shouldn’t we finally know whether the government took down a publisher’s website?

The International Manhunt for WikiLeaks

One of the things DOJ is protecting from FOIA in Electronic Privacy Information Center’s suit is information other governments have shared with the US on the investigation.

According to FBI’s David Harvey, this includes classified information from foreign governments.

(45) E.O. 13526, § 1.4(b) authorizes the classification of foreign government information. E.O. 13526, § 6.1(s) defines foreign government information as: “(1) information provided to the United States Government by a foreign government or governments, an international organization of governments, or any element thereof, with the expectation that the information, the source of the information, or both, are to be held in confidence; (2) information produced by the United States Government pursuant to or as a result of a joint arrangement with a foreign government or governments, or an international organization of governments, or any element thereof, requiring that the information, the arrangement, or both, are to be held in confidence; or (3) information received and treated as ‘foreign government information’ under the terms of a predecessor order.”

(46) Many foreign governments do not officially acknowledge the existence of some of their intelligence and security services, or the scope of their activities or the sensitive information generated by them. The free exchange of information between United States intelligence and law enforcement services and their foreign counterparts is predicated upon the understanding that these liaisons, and information exchanged between them, must be kept in confidence.

(47) The release of official United States Government documents that show the existence of a confidential relationship with a foreign government reasonably could be expected to strain relations between the United States and the foreign governments and lead to diplomatic, political, or economic retaliations. A breach of this relationship can be expected to have at least a chilling effect on the free flow of vital information to the United States intelligence and law enforcement agencies, which may substantially reduce their effectiveness. Although the confidential relationship of the United States with certain countries may be widely reported, they are not officially acknowledged. (48) Disclosure of such a relationship predictably will result in the careful analysis and possible compromise of the information by hostile intelligence services. The hostile service may be able to uncover friendly foreign intelligence gathering operations directed against it or its allies. This could lead to the neutralization of friendly allied intelligence activities or methods or the death of live sources, cause embarrassment to the supplier of the information, or result in economic or diplomatic retaliation against both the United States and the supplier of the information.

(49) Even if the government from which certain information is received is not named in or identifiable from the material it supplies, the danger remains that if the information were to be made public, the originating government would likely recognize the information as material it supplied in confidence. Thereafter, it would be reluctant to entrust the handling of its information to the discretion of the United States.

(50) The types of classified information provided by foreign government intelligence components can be categorized as: (a) information that identifies a named foreign government and detailed information provided by that foreign government; (b) documents received from a named foreign government intelligence agency and classified “Secret” by that agency; and (c) information that identifies by name, an intelligence component of a specific foreign government, an official of the foreign government, and information provided by that component official to the FBI.

[snip]

(51) The cooperative exchange of intelligence information between the foreign governments and the FBI was, and continues to be, with the express understanding that the information will be kept classified and not released to the public. Disclosure of the withheld information would violate the FBI’s promise of confidentiality. Read more

DOJ: We Can’t Tell Which Secret Application of Section 215 Prevents Us From Telling You How You’re Surveilled

As Mike Scarcella reported yesterday, the government has moved for summary judgment in an Electronic Privacy Information Center FOIA suit for details on the government’s investigation into WikiLeaks. EPIC first FOIAed these materials in June 2011. After receiving nothing, they sued last January.

The government’s motion and associated declarations would be worth close analysis in any case. All the more so, though, in light of the possibility that the government conducted a fishing expedition into WikiLeaks as part of its Aaron Swartz investigation, almost certainly using PATRIOT Act investigative techniques. The government’s documents strongly suggest they’re collecting intelligence on Americans, all justified and hidden by their never ending quest to find some excuse to throw Julian Assange in jail.

EPIC’s FOIA asked for information designed to expose whether innocent readers and supporters of WikiLeaks had been swept up in the investigation. It asked for:

  1. All records regarding any individuals targeted for surveillance for support for or interest in WikiLeaks;
  2. All records regarding lists of names of individuals who have demonstrated support for or interest in WikiLeaks;
  3. All records of any agency communications with Internet and social media companies including, but not limited to Facebook and Google, regarding lists of individuals who have demonstrated, through advocacy or other means, support for or interest in WikiLeaks; and
  4. All records of any agency communications with financial services companies including, but not limited to Visa, MasterCard, and PayPal, regarding lists of individuals who have demonstrated, through monetary donations or other means, support or interest in WikiLeaks. [my emphasis]

At a general level, the government has exempted what files it has under a 7(A) (ongoing investigation) exemption, while also invoking 1 (classified information), 3 (protected by statute), 5 (privileged document), 6 (privacy), 7(C) (investigative privacy), 7(D) (confidential source, which can include private companies like Visa and Google), 7(E) (investigative techniques), and 7(F) (endanger life or property of someone) exemptions.

No one will say what secret law they’re using to surveil Americans

But I’m most interested in how all three units at DOJ — as reflected in declarations from FBI’s David Hardy, National Security Division’s Mark Bradley, and Criminal Division’s John Cunningham — claimed the files at issue were protected by statute.

None named the statute in question. All three included some version of this statement, explaining they could only name the statute in their classified declarations.

The FBI has determined that an Exemption 3 statute applies and protects responsive information from the pending investigative files from disclosure. However, to disclose which statute or further discuss its application publicly would undermine interests protected by Exemption 7(A), as well as by the withholding statute. I have further discussed this exemption in my in camera, ex parte declaration, which is being submitted to the Court simultaneously with this declaration

In fact, it appears the only reason that Cunningham submitted a sealed declaration was to explain his Exemption 3 invocation.

And then, as if DOJ didn’t trust the Court to keep sealed declarations secret, it added this plaintive request in the motion itself.

Defendants respectfully request that the Court not identify the Exemption 3 statute(s) at issue, or reveal any of the other information provided in Defendants’ ex parte and in camera submissions.

DOJ refuses to reveal precisely what EPIC seems to be seeking: what kind of secret laws it is using to investigate innocent supporters of WikiLeaks.

By investigating a publisher as a spy, DOJ gets access to PATRIOT Act powers, including Section 215

There’s a very very large chance that the statute in question is Section 215 of the PATRIOT Act (or some other national security administrative subpoena). After all, the FOIA asked whether DOJ had collected business records on WikiLeaks supporters, so it is not unreasonable to assume that DOJ used the business records provision to do so.

Moreover, the submissions make it very clear that the investigation would have the national security nexus to do so. While the motion itself just cites a Hillary Clinton comment to justify its invocation of national security, both the FBI and the NSD declarations make it clear this is being conducted as an Espionage investigation by DOJ counterintelligence people, which — as I’ve been repeating for over two years — gets you the full PATRIOT Act toolbox of investigative approaches.

Media outlets take note: The government is, in fact, investigating a publisher as a spy. You could be next.

Read more

Did the MIT Police Stake Out Aaron Swartz’ Home on January 6, 2011?

One of the details I’ve been puzzled by in the Aaron Swartz story is how MIT Police Captain Albert Pierce happened to locate Aaron on January 6, 2011. After all, Aaron was filmed in the circuit closet at 12:32 PM, but left by 12:34. He went from there to MIT’s Student Center, where he plugged his computer in again. MIT must have lost track of him, because they didn’t find his computer until 3PM, and they found it by looking for the computer ID, not by tracking Aaron’s path. Aaron wasn’t found until 2:11, when Pierce saw him riding his bike down Massachusetts Avenue.

What are the chances, I’ve been wondering, that this Captain–possibly in the company of Secret Service Agent Michael Pickett (the NYT seems to suggest they were together; the arrest report suggests Pickett got called in)–found Aaron just riding down Mass Ave?.

I think Saul has provided the answer.

The map above shows the location of the two MIT buildings (in the lower right) and where Aaron was arrested on Lee Street (Saul did a more complete map here, also showing the Secret Service office). The fourth dot shows where Aaron lived at the time: 950 Mass Ave.

In other words, Pierce just happened to be less than two blocks away from Aaron’s home when he spotted him.

That would solve one mystery, but raises another one: how did they ID Aaron?

Though that one is pretty easy to solve, too. After all, when the CPD and Secret Service first checked the laptop on January 4, they fingerprinted the computer. In addition, they had pictures from Swartz’ entry that day.

It would have been very easy to find a picture of Aaron. I’m more curious whether authorities had his fingerprint on file, though. I guess we’ll learn that when his full FBI file gets liberated.

In any case, if Pierce was, in fact, staking out Aaron’s house (what is the MIT cops’ authority to do that, anyway?), then it would suggest they knew exactly who he was before they arrested him.

Update: The affidavit used to get a warrant for Aaron’s USB made this claim.

An MIT police officer who had seen several pictures taken by the covert camera in Building 16’s network wiring closet saw Aaron Swartz on a bicycle near MIT, approximately half an hour after the “ghost laptop” had been connected in Building W20.

Yep, that’s a load of half-truth.

Leaked Details of MIT Investigation

The NYT reports details that must come from MIT’s investigation–though the spokesperson insists it’s a review–of its involvement in Aaron Swartz’ arrest and conviction.

There are a few I find of particular interest.

First, MIT claims it learned that Aaron was still downloading JSTOR materials on January 3.

However, on Jan. 3, 2011, according to internal M.I.T. documents obtained by The New York Times, the university was informed that the intruder was back — this time downloading documents very slowly, with a new method of access, so as not to alert the university’s security experts.

Court documents say JSTOR informed MIT about this around Christmas.

The NYT references “a security expert” analyzing MIT’s network.

Early on Jan. 4, at 8:08 a.m., according to Mr. Halsall’s detailed internal timeline of the events, a security expert was able to locate that new method of access precisely — the wiring in a network closet in the basement of Building 16, a nondescript rectangular structure full of classrooms and labs that, like many buildings on campus, is kept unlocked.

This is a detail I’ve long wondered about: who was the expert and what tools did she or he use?

And then there’s the thoroughly unsurprising news that Michael Pickett was with MIT’s head cop when they found Aaron on January 6, 2011.

A little after 2 p.m., according to the government, Mr. Swartz was spotted heading down Massachusetts Avenue within a mile of M.I.T. After being questioned by an M.I.T. police officer, he dropped his bike and ran (according to the M.I.T. timeline, he was stopped by an M.I.T. police captain and Mr. Pickett).

Anyone want to bet they were using some fancy surveillance to find Aaron?

Our Government’s UnPATRIOTic Investigation of Aaron Swartz

As I noted back in December 2010, as soon as Eric Holder declared WikiLeaks’ purported crime to be Espionage, it opened up a whole slew of investigative methods associated with the PATRIOT Act. It allowed the government to use National Security Letters to get financial and call records. It allowed them to use Section 215 orders to get “any tangible thing.” And all that’s after FISA Amendments Act, which permits the government to bulk collect “foreign intelligence” on a target overseas–whether or not that foreign target is suspected of Espionage–that includes that target’s communications with Americans. The government may well be using Section 215 to later access the US person communications that have been collected under an FAA order, though that detail is one the government refuses to share with the American people.

At no point would a judge have the opportunity to challenge Holder’s assertion that a website publishing documents offered up anonymously is engaged in Espionage. All it would take is Holder’s assertion that it was, and those investigative powers would become available.

No matter how many Americans got sucked up into that investigation.

Which is why I find it interesting that Aaron Swartz’ lawyers were asking, last summer–but got only indirect answers–about how the government had collected some of the evidence, particularly emails, turned over to the grand jury.

This paragraph asked the government to “identify the origin of any and all statements of Aaron Swartz including but not limited to emails, text messages, chats, documents, memoranda or letters, i.e., to identify the source from which each statement was received and the legal procedure used to obtain each such statement of the defendant.” Swartz has received in discovery internet memoranda and chats purporting to be from him. For example, the discovery contains a number of chats on googlegroups.com which contain entries which facially indicate that Swartz was a participant in the communications. The discovery also contains a number of emails which on their faces indicate that they were either to or from Swartz. Swartz requires the additional information requested – the source of these statements and the procedure used by the government to obtain them – to enable him to move to suppress such statements if grounds exist to do so, which he cannot determine without the requested information.

The government offered this explanation.

In Paragraph 15, the defendant would require the government to identify the origin of any and all statements of Aaron Swartz in its possession and the legal procedure used to obtain the statements. All of the emails, text messages, chat sessions, and documents containing statements provided by the defendant relevant to this case were obtained either from individuals with whom the defendant communicated or from publicly available websites stored on the Internet. No emails, texts messages, chat logs, or documents were obtained from Internet service providers using orders under 18 U.S.C. 2703(d). As previously represented to defense counsel, there was no court-authorized electronic surveillance in this case. [my emphasis]

The government admits the defense has asked for the content and origin of all Aaron’s statement in its possession. In response, it described how it had gotten Aaron’s statements relevant to this case–which may well be just a subset of Aaron’s statements in their possession. It also says that it did not obtain any of his statements (presumably referring to the larger potential universe) using 18 USC 2703(d), which is how DOJ demanded Twitter information on four WikiLeaks figures in late 2010 to early 2011. It suggests everything it got relevant to this case was either willingly from people involved in private conversations with him–though it didn’t say whether it asked for them specifically or not–or from publicly available places. And it alludes to an earlier representation to the defense about whether or not it had intercepted Aaron’s communications in this case.

I believe these are the representations in question, which comes from early discovery discussions in August 2011.

C. Electronic Surveillance under Local Rule 1 16.1 (C)(l)(c)

No oral, wire, or electronic communications of the defendant as defined in 18 U.S.C. § 2510 were intercepted relating to the charges in the indictment.

D. Consensual Interceptions under Local Rule 1 16.1 (C)(l)(d)

There were no interceptions (as the term “intercept” is defined in 18 U.S.C. § 2510(4)) of wire, oral, or electronic communications relating to the charges contained in the indictment, made with the consent of one of the parties to the communication in which the defendant was intercepted or which the government intends to offer as evidence in its case-in-chief.

As you can see, in this statement the government made in August 2011 anticipated some of the same dodges the government was making in June 2012.

But in the earlier statement, the limitation on its assertions are even narrower than the later one. Whereas by June 2012 they were making assertions about “this case” in general, when they first discussed the issue, they discussed only the communications related to “the charges contained in the indictment” (though presumably they may have still been considering other charges).

Also, the second paragraph makes it very clear it is discussing intercepts only as defined under the Title III definition for intercept, which pertains to communications collected in transit. I’m not sure what the government considers communications collected under FISA and stored, though I would not be surprised, given all the discussions about the government yoking Section 215 onto FAA if they had some creative treatment of those US person communications.

None of that is proof that they had accessed Swartz’ communications via other means or, indeed, that they have any communications outside those pertaining directly to JSTOR downloads.

But their very careful hedges sure seem to leave that possibility open.