Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged declassified-docs

Rss Feed Group items tagged

Paul Merrell

James Clapper Confirms VADM Mike Rogers Needlessly Obfuscated in Confirmation Hearing |... - 0 views

  • On Friday, James Clapper finally provided Ron Wyden an unclassified response to a question he posed on January 29, admitting that the NSA conducts back door searches. (via Charlie Savage) As reflected in the August 2013 Semiannual Assessment of Compliance with Procedures and Guidelines Issued Pursuant to Section 702, which we declassified and released on August 21, 2013, there have been queries, using U.S. person identifiers, of communications lawfully acquired to obtain foreign intelligence by targeting non U.S. persons reasonably believed to be located outside the U.S. pursuant to Section 702 of FISA. It has taken just 9 months for Clapper to admit that, contrary to months of denials, the NSA (and FBI, which he doesn’t confirm but which the Report makes clear, as well as the CIA) can get the content of Americans’ communications without a warrant. But Clapper’s admission that this fact was declassified in August should disqualify Vice Admiral Mike Rogers from confirmation as CyberComm head (I believe he started serving as DIRNSA head, which doesn’t require confirmation, yesterday). Because it means Rogers refused to answer a question the response to which was already declassified.
  • Udall: If I might, in looking ahead, I want to turn to the 702 program and ask a policy question about the authorities under Section 702 that’s written into the FISA Amendments Act. The Committee asked your understanding of the legal rationale for NASA [sic] to search through data acquired under Section 702 using US person identifiers without probable cause. You replied the NASA–the NSA’s court approved procedures only permit searches of this lawfully acquired data using US person identifiers for valid foreign intelligence purposes and under the oversight of the Justice Department and the DNI. The statute’s written to anticipate the incidental collection of Americans’ communications in the course of collecting the communications of foreigners reasonably believed to be located overseas. But the focus of that collection is clearly intended to be foreigners’ communications, not Americans. But declassified court documents show that in 2011 the NSA sought and obtained the authority to go through communications collected under Section 702 and conduct warrantless searches for the communications of specific Americans. Now, my question is simple. Have any of those searches been conducted?
  • Rogers: I apologize Sir, I’m not in a position to answer that as the nominee. Udall: You–yes. Rogers: But if you would like me to come back to you in the future if confirmed to be able to specifically address that question I will be glad to do so, Sir. Udall: Let me follow up on that. You may recall that Director Clapper was asked this question in a hearing earlier this year and he didn’t believe that an open forum was the appropriate setting in which to discuss these issues. The problem that I have, Senator Wyden’s had, and others is that we’ve tried in various ways to get an unclassified answer — simple answer, yes or no — to the question. We want to have an answer because it relates — the answer does — to Americans’ privacy. Can you commit to answering the question before the Committee votes on your nomination?
  • ...3 more annotations...
  • Rogers: Sir, I believe that one of my challenges as the Director, if confirmed, is how do we engage the American people — and by extension their representatives — in a dialogue in which they have a level of comfort as to what we are doing and why. That is no insignificant challenge for those of us with an intelligence background, to be honest. But I believe that one of the takeaways from the situation over the last few months has been as an intelligence professional, as a senior intelligence leader, I have to be capable of communicating in a way that we are doing and why to the greatest extent possible. That perhaps the compromise is, if it comes to the how we do things, and the specifics, those are perhaps best addressed in classified sessions, but that one of my challenges is I have to be able to speak in broad terms in a way that most people can understand. And I look forward to that challenge. Udall: I’m going to continue asking that question and I look forward to working with you to rebuild the confidence. [my emphasis]
  • I assume that now that Clapper has given him the okay to discuss unclassified topics with Congress, Rogers will now provide a forthright answer, all the while claiming he was ignorant about the answer at the time (fine! then make me DIRNSA because I know more about it!). But Rogers’ response went far beyond such an answer. He refused — not just in the hearing but even after it — to commit to answering a question with a completely unclassified answer. And as I pointed out in this post, his written answers were even more obfuscatory. I don’t get a vote. But I think this should disqualify him as a nominee.
  • Update: Here’s the exchange in Rogers’ questions for the record on back door searches. What is your understanding of the legal rationale for NSA to search through data acquired under section 702 using U.S. Persons identifiers without probable cause? Information acquired by NSA under Section 702 of FI SA must be handled in strict accordance with minimization procedures adopted by the Attorney General and approved by the Foreign Intelligence Surveillance Court. As required by the statute and certifications approving Section 702 acquisitions, such activities must be limite d to targeting non-U.S. persons reasonably believed to be located outside the United States . NSA’s Court-approved procedures only permit searches of this lawfully acquired data using U.S. person identifiers for valid foreign intelligence purposes and under the oversight of the Department of Justice and Office of Director of National Intelligence.
Paul Merrell

Paul Offers NDAA Amendment to Drive Release of 28 Pages | 28Pages.org - 0 views

  • Following through on intentions he announced earlier this week, Senator Rand Paul today offered an amendment to the pending National Defense Authorization Act (NDAA) that would require the president to declassify 28 pages on foreign government links to the 9/11 hijackers. The language is identical to S.1471, the bill Paul introduced on Monday with Senators Ron Wyden and Kirsten Gillibrand. In a story on Paul’s new move, The Hill’s Julian Hattem said the proposed amendment “heightens the profile of the fight and may increase the stakes for the opponents.”
  • While there are a growing number of vocal champions of the declassification of the 28 pages, those who want the 28 pages kept under wraps have worked quietly and effectively out of public view. As we wrote earlier this year, “It’s likely that among the most powerful of those unseen opponents of 9/11 transparency are two strange bedfellows: The Kingdom of Saudi Arabia—which has fueled the growth of terror, and the U.S. intelligence community—which is charged with thwarting terror.” Paul’s amendment to the must-pass NDAA could force some of those opponents—and, more specifically, their Senate allies—out of the shadows.
  • However, the language may also offer President Obama an opportunity to continue his administration’s refusal to release the 28 pages, as it says he is not required to declassify sources and methods if that release would “result in imminent lawless action or comprise presently on-going national security operations.”
  • ...1 more annotation...
  • In 2003, Bush invoked “sources and methods” when defending his decision to classify the pages, saying “Declassification of that part of a 900-page document would reveal sources and methods that would make it harder for us to win the war on terror. … It would help the enemy if they knew our sources and methods.” Among many who have read the 28 pages, Congressman Walter Jones denies that declassification would harm national security in any way, pointing to other motives for the secrecy. “There’s nothing in it about national security. It’s about the Bush administration and its relationship with the Saudis,” Jones told The New Yorker.
Paul Merrell

Newly declassified documents reveal how U.S. agreed to Israel's nuclear program - Diplo... - 0 views

  • The Obama administration this week declassified papers, after 45 years of top-secret status, documenting contacts between Jerusalem and Washington over American agreement to the existence of an Israeli nuclear option. The Interagency Security Classification Appeals Panel (ISCAP), which is in charge of approving declassification, had for decades consistently refused to declassify these secrets of the Israeli nuclear program. The documents outline how the American administration worked ahead of the meeting between President Richard Nixon and Prime Minister Golda Meir at the White House in September 1969, as officials came to terms with a three-part Israeli refusal – to sign the Non-Proliferation Treaty; to agree to American inspection of the Dimona nuclear facility; and to condition delivery of fighter jets on Israel’s agreement to give up nuclear weaponry in exchange for strategic ground-to-ground Jericho missiles “capable of reaching the Arab capitals” although “not all the Arab capitals.”
  • The officials – cabinet secretaries and senior advisers who wrote the documents – withdrew step after step from an ambitious plan to block Israeli nuclearization, until they finally acceded, in internal correspondence – the content of the conversation between Nixon and Meir is still classified – to recognition of Israel as a threshold nuclear state. In fact, according to the American documents, the Nixon administration defined a double threshold for Israel’s move from a “technical option” to a “possessor” of nuclear weapons. The first threshold was the possession of “the components of nuclear weapons that will explode,” and making them a part of the Israel Defense Forces operational inventory.
  • The second threshold was public confirmation of suspicions internationally, and in Arab countries in particular, of the existence of nuclear weapons in Israel, by means of testing and “making public the fact of the possession of nuclear weapons.” Officials under Nixon proposed to him, on the eve of his conversation with Meir, to show restraint with regard to the Israeli nuclear program, and to abandon efforts to get Israel to cease acquiring 500-kilometer-range missiles with one-ton warheads developed in the Marcel Dassault factory in France, if it could reach an agreement with Israel on these points.
  • ...2 more annotations...
  • The Johnson and Nixon administrations concluded that, in talks with Rabin, it had been stated in a manner both “explicit and implicit” that “Israel wants nuclear weapons, for two reasons: First, to deter the Arabs from striking Israel; and second, if deterrence fails and Israel were about to be overrun, to destroy the Arabs in a nuclear Armageddon.”
  • According to the documents, the Nixon administration believed that Israel’s acquisition of nuclear weapons would spur the Arab countries to acquire their own such weapons within 10 years, through private contracts with scientists and engineers in Europe. Moreover, “deeply rooted in the Arab psyche is the concept that a settlement will be possible only when there is some parity in strength with Israel. A ‘kamikaze’ strike at the Dimona facilities cannot be ruled out,” the document states.
  •  
    "The Johnson and Nixon administrations concluded that, in talks with Rabin, it had been stated in a manner both 'explicit and implicit' that 'Israel wants nuclear weapons, for two reasons: First, to deter the Arabs from striking Israel; and second, if deterrence fails and Israel were about to be overrun, to destroy the Arabs in a nuclear Armageddon.'" Which just goes to show that Israel's leadership was very bit as looney-tunes as the U.S. leadership was with its "MAD" Mutually Assured Destruction strategy. What is there about democracy that permits psychopaths to acquire the power they so insanely crave? Humanity would have far better odds of surviving the next 100 years if all members of Congress now chosen by voting were instead chosen from the general population at random and limited to a single term. Then let Congress choose the President and Vice President from five people also randomly chosen. That would also result in a Congress far more representative of the People's interests. Anyone with a rudimentary understanding of Statistics could prove that mathematically. To boot, that would take care of the campaign finance issues, since there wouldn't be any elections for federal office. Give me 24 hours notice and I'll have the necessary constitutional amendments written. Let's call them the No More Lunatics Running This Asylum Amendments. Or with a bit more thought we could have a name with an acronym that's more descriptive, something like the SANE Amendments. Let's see: the Save America from Nutjobs Evermore Amendments, or ....   Never mind for now. You do the political organizing to get the Amendments adopted and let me know when. I'll crank out the wordsmith work product for the Amendments.  Sheesh! As I've said for years, if it be true that Man was was created in the image of the Creator, that is irrefutable proof that the Creator is as dumb as a doornail and insane to boot. "[I]t it is not really possible to deter Arab leaders when they themse
Paul Merrell

CIA Seeks More Time to Declassify Interrogation Documents - Secrecy News - 0 views

  • The Central Intelligence Agency today asked a court to allow more time to declassify its response to the Senate Select Committee on Intelligence report on CIA rendition, detention and interrogation (RDI) activities, which itself is undergoing a time-consuming declassification review. “This complex process requires the careful review of over 500 pages of highly classified material. In addition, sufficient time must be allowed not only for coordination with other agencies, but — after completion of declassification review — for implementation of security measures to ensure the safety of U.S. personnel and facilities overseas,” according to a May 15 motion filed by the government in a FOIA lawsuit brought by the ACLU. “Due to the fluid nature of this process, aspects of which are beyond the CIA’s control, the Agency does not yet have a firm date by which it can complete the processing of the CIA Response [to the SSCI report] and the so-called Panetta Report, although it hopes the declassification review and accompanying processing of those documents can be completed this summer.” The CIA therefore requested an extension of time to respond, to which the ACLU plaintiffs did not consent.
  • With respect to the Senate Intelligence Committee report itself, the government promised an “expeditious” declassification review of the executive summary, findings, and conclusions. “While all declassification decisions are guided by the need to protect national security interests, the President has expressed a clear intent to declassify as much of the executive summary, findings, and conclusions of the SSCI Report as possible, and intends the declassification process to be expeditious,” the government motion said. According to an April 18 letter from then-White House counsel Katherine Ruemmler, appended to the new motion, “The President supports making public the Committee’s important review of the historical RDI program, as he believes that public scrutiny and debate will help to inform the public understanding of the program and to ensure that such a program will not be contemplated by a future administration.
  •  
    Horse puckey. The quoted article is misleading, attempting to conflate two distinct sets of documents that the Court ordered the CIA to disclose after removing all properly classified information. The duty to disclose segregable portions of  records that are not classified has been in place since the early 70s. It should have been done without a lawsuit having been filed and litigated. I.e.,it was a court order the CIA knew was coming since it first received the FOIA request from the ACLU. One set is the CIA response to the Senate Committee. The other set is the DoJ's Office of Legal Counsel memoranda on the legality of torture techniques. not documents documenting the torture itself and not the CIA response to the Senate Committee. Even if he CIA really needed more time for the documents in the Senate group, the legal memoranda could be shorn of classified information in a mater of hours, not days, weeks, or months.  It's the legal memoranda disclosure that CIA and DOJ are really trying to delay. At least two of them were written and/or signed by a former head of the DoJ Office of Legal Counsel whose nomination to the First Circuit Court of Appeals is now pending in Congress. And it's crystal clear that he signed memoranda arguing that torture was legal, which bears directly on his fitness to become a federal appellate judge. It takes a lawyer without ethics or morality to argue that torture is legal. It's not, under either U.S. law or the Geneva Conventions governing warfare. Neither  is grabbing people and turning them over to other governments for torture.  Those memoranda will establish that the nominee is a war criminal. We know this because we have already had a preview in the form of a white paper on the topic released by the White House last year that it's known the same nominee had worked on. And the legal arguments in that white paper are preposterous.   The delay attempt is transparently in aid of pushing that nomination through Congress before
Paul Merrell

It's WWIII between CIA and Senate | TheHill - 0 views

  • Senators on Wednesday expressed alarm at explosive allegations that the CIA might have spied on their computers to keep tabs on their controversial review of Bush-era “enhanced interrogation” techniques.ADVERTISEMENTLawmakers from both parties said that if the allegations against the CIA prove true, intelligence officials might have violated the law — and certainly violated the separation of powers enshrined in the Constitution.“I’m assuming that’s it’s not true, but if it is true, it should be World War III in terms of Congress standing up for itself against the CIA, ” Sen. Lindsey Graham (R-S.C.) told The Hill.Intelligence Committee Chairwoman Dianne Feinstein (D-Calif.) confirmed Wednesday that the CIA inspector general was investigating accusations that the covert agency had peered into the panel’s computers. But she didn’t comment on reports that the investigator has referred the matter to the Justice Department.Senate Armed Services Committee Chairman Carl Levin (D-Mich.), an ex officio member of the Intelligence panel, said the charge of spying is “extremely serious.”“There are laws against intruding and tampering, hacking into, accessing computers without permission. And that law applies to everybody,” he said.Brennan in a statement said he was "dismayed" by the “spurious allegations,” which he said were "wholly unsupported by the facts."
  • His statement was released Wednesday evening as McClatchy reported that the computer spying was allegedly discovered when the CIA confronted the Senate Intelligence panel about documents removed from the agency’s headquarters."I am very confident that the appropriate authorities reviewing this matter will determine where wrongdoing, if any, occurred in either the Executive Branch or Legislative Branch," Brennan said.“Until then, I would encourage others to refrain from outbursts that do a disservice to the important relationship that needs to be maintained between intelligence officials and congressional overseers."The allegations escalated a long-simmering feud between Democrats on the Intelligence panel and the CIA over the committee’s classified interrogation report, which provides an exhaustive look at the treatment of detainees in the years after Sept. 11.Sen. Mark Udall (Colo.) and two other Democrats on the Intelligence panel have criticized the CIA and its director, John Brennan, for blocking their efforts to declassify the 6,300-page investigation.“The CIA tried to intimidate the Intelligence Committee, plain and simple,” Udall said. “I’m going to keep fighting like hell to make sure the CIA never dodges congressional oversight again.”
  • Senators have said their review, which was completed in December 2012, is harshly critical of interrogation techniques such as waterboarding, concluding that they were ineffective and did not contribute to the capture of Osama bin Laden.Udall and other Democrats say the report needs to be released because it will "set the record straight" about the use of techniques that critics say amount to torture.While Democrats on the panel backed the report’s findings, most of the Intelligence Committee Republicans dissented.The CIA has objected to some of the report’s conclusions as well, though Udall says its internal review contradicts the agency’s public statements.Sen. Martin Heinrich (D-N.M.), who has joined Udall in pressing for the release of the report, said the allegations about CIA spying show the lengths that the agency will go to protect itself.“I think it’s been pretty clear that the CIA will do just about anything to make sure that this detention and interrogation report doesn’t come out,” Heinrich told The Hill.
  • ...3 more annotations...
  • Other Republicans on the Intelligence panel said the spying charges should be investigated, but they expressed concerns about the leak of the inspector general investigation.“I have no comment. You should talk to those folks that are giving away classified information and get their opinion,” Intelligence Committee Vice Chairman Saxby Chambliss (R-Ga.) said when asked about the alleged intrusions.Sen. Ron Wyden (D-Ore.) appeared to allude to the CIA snooping at an Intelligence Committee hearing last month when he asked Brennan whether the Computer Crimes and Abuse Act applied to the agency.Wyden said Wednesday that Brennan responded in a letter the law did apply.“The Act, however, expressly ‘does not prohibit any lawfully authorized investigative, protective, or intelligence activity … of an intelligence agency of the United States,’ ” Brennan wrote in the letter that Wyden released.McClatchy news service reported that the Intelligence Committee determined earlier this year the CIA had monitored computers it provided to the panel to review top-secret reports, cables and other documents.It’s still unclear whether the alleged monitoring would have violated the law.
  • Udall sent a letter to President Obama on Tuesday calling for declassification of the committee’s report, where he alleged the CIA’s “unprecedented action against the committee” was tied to agency's internal review of the interrogation policies.Udall first raised issues with the internal review of the interrogation techniques at the confirmation hearing of Caroline Krass's nomination as CIA general counsel, which took place in December.He said that the review, conducted under former CIA Director Leon Panetta, corroborated the findings of the Senate Intelligence report and contradicted the public statements from the agency.Udall has placed a procedural hold on Krass’s nomination and told reporters Wednesday that it would remain in place until the CIA meets his requests for more information about the internal review.White House press secretary Jay Carney declined to comment on the spying allegations Wednesday, referring questions to the CIA and Department of Justice.Carney said that "as a general matter," the White House was in touch with the Intelligence Committee."For some time, the White House has made clear to the chairmen of the Senate Select committee on intelligence that the summary and conclusions of the final RDI report should be declassified with any redactions necessary to protect national security," he said.
  • Heinrich said he hoped the CIA intrusions, if confirmed, would push the White House to get involved in the dispute between the agency and the committee over the report.“It would be easy for me to get very upset about these allegations, but I think we need to keep our eye on that ball, because that is a really important historical issue, and people need to understand who made what decisions and why,” he said.
  •  
    Jack Kennedy had the right idea: abolish the CIA.
Paul Merrell

The al Qaeda Files: Bin Laden Documents Reveal a Struggling Organization - The Intercept - 0 views

  • Palm oil cultivation in West Africa, climate change, and how to kill Americans more effectively than cigarettes. These were the issues on Osama bin Laden’s mind in his final years as he struggled to direct the terrorist group’s activities from his hideout in Pakistan, according to newly released files retrieved from the compound where he was killed. Direct communications between the al Qaeda leader and his inner circle were entered as evidence in a terrorism trial recently concluded in Brooklyn, New York, effectively doubling the amount of publicly available documents recovered from bin Laden’s final hideout. Together the newly disclosed documents paint a picture of a man who, despite being holed up for years in his high-walled compound in the garrison town of Abbottabad, Pakistan, maintained a hands-on role managing al Qaeda in the face of a crippling “espionage war” and mounting bureaucratic obstacles. The emergence of the documents marks just the second time since the historic 2011 raid, which ended in the death of bin Laden, that documentary evidence recovered from his compound has been made public; 17 other documents were declassified and released to West Point’s Combating Terrorism Center in 2012.
  • The new documents were entered as evidence in the federal trial of Abid Naseer, a Pakistani national convicted of plotting with al Qaeda to carry out a bomb attack in Manchester, England between 2008 and 2009; Naseer is not mentioned in the documents. U.S. attorneys used the recovered documents to support the testimony of an FBI agent who was present when a team of U.S. Navy SEALs returned bin Laden’s body and the materials they recovered from his compound to a U.S. base in Afghanistan.
  •  
    But are the docs real or forgeries? The evidence that the Abbotabad raid killed bin Laden is beyond thin. 
Paul Merrell

Presence of U.S. Nuclear Weapons in Okinawa - 0 views

  • Also posted today are recently released CIA documents containing bogus information about Iraq’s nuclear programs
  • Two CIA reports on Iraq and its weapons activities produced during the months after 9/11; the CIA had denied both in their entirety. Neither treated Iraq as a significant threat, but both made claims which would become part of the justification for the 2003 war: that Iraq 1) had acquired aluminum tubes for gas centrifuges and 2) had deployed mobile biological laboratories, claims which were later disproven.
  • Documents 5A-B: Iraq through CIA Eyes after 9/11 A: Central Intelligence Agency, “The Iraq Threat,” 15 December 2001, SPWR [Senior Publish When Ready] 12501-07, Top Secret, excised copy B: Central Intelligence Agency, Senior Executive Memorandum [SEM], “In Response to a query about the status of Iran’s nuclear program,” 11 January 2002, Top Secret, excised copy Source: MDR request to CIA These two high-level CIA assessments from late 2001 and early 2002 demonstrate the lack of solid intelligence regarding Iraq’s WMD programs during the run-up to the 2003 war in Iraq.[3] There was a marked gap between the empirical information which the CIA could report, and be certain about, and the threat assessments which analysts were tasked to produce. Worst-case outcomes are proposed, then quickly undermined by admitting the lack of any intelligence to support doomsday scenarios. “The worst case scenario is illicit acquisition of sufficient fissile material, uranium or plutonium, to allow Baghdad to produce a crude nuclear weapon within a year. CIA has not detected a dedicated Iraqi effort to obtain fissile material from another government or on the black market but Baghdad could be expected to entertain any offers it deems credible” [SEM].
  • ...2 more annotations...
  • The memoranda also indicate a significant disparity between what was probable, and what was feared. The analysts were most confident assessing that Saddam Hussein could be developing nuclear capabilities in just under ten years. Iraq might produce a “nuclear weapon, potentially late this decade,” the SEM notes. The SPWR, on the other hand, concludes: “Iraq is trying to jump-start a clandestine uranium enrichment program to produce the fissile material for a weapon, potentially by late this decade.” Those assessments were produced in the shadow of the failure of U.S. intelligence to detect Saddam Hussein’s clandestine nuclear program before the Gulf War. CIA analysts were hesitant to conclude that Iraq was not an immediate threat, yet they had little evidence indicating the existence of an Iraqi nuclear program that genuinely posed a hazard. “Saddam never abandoned his nuclear weapons program, but reporting on Iraqi efforts to revive it is limited. Iraq continues to employ effective denial and deception measures and there are no indicators that Baghdad has embarked on an extensive nuclear weapons effort as it did before the Gulf War” [SEM]. The released paragraphs addressing Iraq’s support of terrorism failed to mention al-Qaeda, surprising in light of claims from Bush Administration officials that Iraq was linked to terrorism and September 11. The Senior Executive Memorandum notes: “Baghdad has reduced its reliance on surrogates, preferring instead to use its own intelligence services for sensitive terrorist operations,” making a connection to non-Iraqi terrorist groups, including al-Qaeda, doubtful. Within Iraq, the 2001 memo notes how Saddam maintained a “multilayered and pervasive security apparatus.” The underground networks were critical to the anti-American insurgency that developed following the 2003 U.S. invasion, fragments of which have since evolved into the Islamic State. 
  • Despite their equivocal findings, these reports are evidence of the intelligence failure which contributed to the U.S. war. For example, CIA analysts linked the procurement of aluminum tubes to the potential development of centrifuges for uranium enrichment – an assertion later seized on by top officials as evidence that Iraq was trying to reconstitute its nuclear weapons program. Interestingly, intelligence analysts at the Department of Energy disagreed with this CIA contention, instead assessing that the aluminum tubes in question were much more likely intended for more benign purposes. However this disagreement did not appear to receive a full vetting during the lead-up to the 2003 war. Just as dubious were the CIA statements about mobile biological warfare laboratories, information that can be traced back to the notorious dissembler Curveball.
Paul Merrell

The Latest Rules on How Long NSA Can Keep Americans' Encrypted Data Look Too Familiar |... - 0 views

  • Does the National Security Agency (NSA) have the authority to collect and keep all encrypted Internet traffic for as long as is necessary to decrypt that traffic? That was a question first raised in June 2013, after the minimization procedures governing telephone and Internet records collected under Section 702 of the Foreign Intelligence Surveillance Act were disclosed by Edward Snowden. The issue quickly receded into the background, however, as the world struggled to keep up with the deluge of surveillance disclosures. The Intelligence Authorization Act of 2015, which passed Congress this last December, should bring the question back to the fore. It established retention guidelines for communications collected under Executive Order 12333 and included an exception that allows NSA to keep ‘incidentally’ collected encrypted communications for an indefinite period of time. This creates a massive loophole in the guidelines. NSA’s retention of encrypted communications deserves further consideration today, now that these retention guidelines have been written into law. It has become increasingly clear over the last year that surveillance reform will be driven by technological change—specifically by the growing use of encryption technologies. Therefore, any legislation touching on encryption should receive close scrutiny.
  • Section 309 of the intel authorization bill describes “procedures for the retention of incidentally acquired communications.” It establishes retention guidelines for surveillance programs that are “reasonably anticipated to result in the acquisition of [telephone or electronic communications] to or from a United States person.” Communications to or from a United States person are ‘incidentally’ collected because the U.S. person is not the actual target of the collection. Section 309 states that these incidentally collected communications must be deleted after five years unless they meet a number of exceptions. One of these exceptions is that “the communication is enciphered or reasonably believed to have a secret meaning.” This exception appears to be directly lifted from NSA’s minimization procedures for data collected under Section 702 of FISA, which were declassified in 2013. 
  • While Section 309 specifically applies to collection taking place under E.O. 12333, not FISA, several of the exceptions described in Section 309 closely match exceptions in the FISA minimization procedures. That includes the exception for “enciphered” communications. Those minimization procedures almost certainly served as a model for these retention guidelines and will likely shape how this new language is interpreted by the Executive Branch. Section 309 also asks the heads of each relevant member of the intelligence community to develop procedures to ensure compliance with new retention requirements. I expect those procedures to look a lot like the FISA minimization guidelines.
  • ...6 more annotations...
  • This language is broad, circular, and technically incoherent, so it takes some effort to parse appropriately. When the minimization procedures were disclosed in 2013, this language was interpreted by outside commentators to mean that NSA may keep all encrypted data that has been incidentally collected under Section 702 for at least as long as is necessary to decrypt that data. Is this the correct interpretation? I think so. It is important to realize that the language above isn’t just broad. It seems purposefully broad. The part regarding relevance seems to mirror the rationale NSA has used to justify its bulk phone records collection program. Under that program, all phone records were relevant because some of those records could be valuable to terrorism investigations and (allegedly) it isn’t possible to collect only those valuable records. This is the “to find a needle a haystack, you first have to have the haystack” argument. The same argument could be applied to encrypted data and might be at play here.
  • This exception doesn’t just apply to encrypted data that might be relevant to a current foreign intelligence investigation. It also applies to cases in which the encrypted data is likely to become relevant to a future intelligence requirement. This is some remarkably generous language. It seems one could justify keeping any type of encrypted data under this exception. Upon close reading, it is difficult to avoid the conclusion that these procedures were written carefully to allow NSA to collect and keep a broad category of encrypted data under the rationale that this data might contain the communications of NSA targets and that it might be decrypted in the future. If NSA isn’t doing this today, then whoever wrote these minimization procedures wanted to at least ensure that NSA has the authority to do this tomorrow.
  • There are a few additional observations that are worth making regarding these nominally new retention guidelines and Section 702 collection. First, the concept of incidental collection as it has typically been used makes very little sense when applied to encrypted data. The way that NSA’s Section 702 upstream “about” collection is understood to work is that technology installed on the network does some sort of pattern match on Internet traffic; say that an NSA target uses example@gmail.com to communicate. NSA would then search content of emails for references to example@gmail.com. This could notionally result in a lot of incidental collection of U.S. persons’ communications whenever the email that references example@gmail.com is somehow mixed together with emails that have nothing to do with the target. This type of incidental collection isn’t possible when the data is encrypted because it won’t be possible to search and find example@gmail.com in the body of an email. Instead, example@gmail.com will have been turned into some alternative, indecipherable string of bits on the network. Incidental collection shouldn’t occur because the pattern match can’t occur in the first place. This demonstrates that, when communications are encrypted, it will be much harder for NSA to search Internet traffic for a unique ID associated with a specific target.
  • This lends further credence to the conclusion above: rather than doing targeted collection against specific individuals, NSA is collecting, or plans to collect, a broad class of data that is encrypted. For example, NSA might collect all PGP encrypted emails or all Tor traffic. In those cases, NSA could search Internet traffic for patterns associated with specific types of communications, rather than specific individuals’ communications. This would technically meet the definition of incidental collection because such activity would result in the collection of communications of U.S. persons who aren’t the actual targets of surveillance. Collection of all Tor traffic would entail a lot of this “incidental” collection because the communications of NSA targets would be mixed with the communications of a large number of non-target U.S. persons. However, this “incidental” collection is inconsistent with how the term is typically used, which is to refer to over-collection resulting from targeted surveillance programs. If NSA were collecting all Tor traffic, that activity wouldn’t actually be targeted, and so any resulting over-collection wouldn’t actually be incidental. Moreover, greater use of encryption by the general public would result in an ever-growing amount of this type of incidental collection.
  • This type of collection would also be inconsistent with representations of Section 702 upstream collection that have been made to the public and to Congress. Intelligence officials have repeatedly suggested that search terms used as part of this program have a high degree of specificity. They have also argued that the program is an example of targeted rather than bulk collection. ODNI General Counsel Robert Litt, in a March 2014 meeting before the Privacy and Civil Liberties Oversight Board, stated that “there is either a misconception or a mischaracterization commonly repeated that Section 702 is a form of bulk collection. It is not bulk collection. It is targeted collection based on selectors such as telephone numbers or email addresses where there’s reason to believe that the selector is relevant to a foreign intelligence purpose.” The collection of Internet traffic based on patterns associated with types of communications would be bulk collection; more akin to NSA’s collection of phone records en mass than it is to targeted collection focused on specific individuals. Moreover, this type of collection would certainly fall within the definition of bulk collection provided just last week by the National Academy of Sciences: “collection in which a significant portion of the retained data pertains to identifiers that are not targets at the time of collection.”
  • The Section 702 minimization procedures, which will serve as a template for any new retention guidelines established for E.O. 12333 collection, create a large loophole for encrypted communications. With everything from email to Internet browsing to real-time communications moving to encrypted formats, an ever-growing amount of Internet traffic will fall within this loophole.
  •  
    Tucked into a budget authorization act in December without press notice. Section 309 (the Act is linked from the article) appears to be very broad authority for the NSA to intercept any form of telephone or other electronic information in bulk. There are far more exceptions from the five-year retention limitation than the encrypted information exception. When reading this, keep in mind that the U.S. intelligence community plays semantic games to obfuscate what it does. One of its word plays is that communications are not "collected" until an analyst looks at or listens to partiuclar data, even though the data will be searched to find information countless times before it becomes "collected." That searching was the major basis for a decision by the U.S. District Court in Washington, D.C. that bulk collection of telephone communications was unconstitutional: Under the Fourth Amendment, a "search" or "seizure" requiring a judicial warrant occurs no later than when the information is intercepted. That case is on appeal, has been briefed and argued, and a decision could come any time now. Similar cases are pending in two other courts of appeals. Also, an important definition from the new Intelligence Authorization Act: "(a) DEFINITIONS.-In this section: (1) COVERED COMMUNICATION.-The term ''covered communication'' means any nonpublic telephone or electronic communication acquired without the consent of a person who is a party to the communication, including communications in electronic storage."       
Gary Edwards

The Empire Takes a Hit: NSA Update - 2 views

........................................................................................ NSA Conversation with retired lawyer and Open Source legal expert, "Marbux". ...........................

Federal-Reserve-Bankster-Cartel NSA

started by Gary Edwards on 15 Jun 13 no follow-up yet
Paul Merrell

Reagan's Iran-Contra affair 30 years later has lessons for Trump - 0 views

  • Exactly thirty years ago, President Ronald Reagan announced to the nation – after weeks of denials – that members of his White House staff had engaged in a web of covert intrigue linking illicit U.S. support for a guerrilla war in Central America with an illegal and politically explosive arms-for-hostages bargain with the Islamic Republic of Iran. The revelation quickly led to a new phrase – “Iran-Contra” – which became synonymous with political hubris, government incompetence, and dishonesty in the public sphere. Over the years, the National Security Archive has published major document collections, books, and web postings about Iran-Contra that expand on all of these areas of inquiry (see links in left column). Today, the Archive posts a selection of materials that spotlight the last of the elements above – deceitfulness – whose relevance has sadly become more pronounced after a bruising political season marked by examples and allegations of widespread public contempt for facts, evidence and the truth.
  • Today’s focus also follows Oxford Dictionaries’ selection earlier this month of the term “post-truth” as its Word of the Year, a choice it traced indirectly to the Reagan-era scandal: “Post-truth seems to have been first used in this meaning in a 1992 essay by the late Serbian-American playwright Steve Tesich in The Nation magazine. Reflecting on the Iran-Contra scandal and the Persian Gulf War, Tesich lamented that ‘we, as a free people, have freely decided that we want to live in some post-truth world.’” (See The Nation, January 6/13, 1992)  The historical record, including thousands of documents and hundreds of hours of testimony that are not possible to reproduce here, bears out the connection between the attitudes evident during the mid-1980s and what Americans have been witnessing in 2016. The Iran-Contra affair inundated national news coverage starting a few weeks before the November 1986 press conference (as stories about the Contra and Iran operations leaked out) and lasting through Summer 1987. A galvanized media that had faced criticisms for its lax treatment of Reagan seemed eager to make up for it now that it finally had a story of Watergate proportions. Picking up on aspects of secret administration policy that only a few intrepid reporters had noticed before, TV and print outlets uncovered sometimes shocking new information about the lengths to which the Reagan administration had gone to press the Contra war in and around Nicaragua without authorization from Congress. Similar disclosures came out about National Security Council staff-supervised contacts with Iranian intermediaries and Israeli counterparts, along with covert missile shipments from U.S. military stocks to Iran. Various committees in Congress hastily held hearings that produced more discoveries along the same lines. Eventually, a joint congressional select committee was convened and an independent counsel appointed by the courts, both of which uncovered volumes of invaluable documentary evidence of what had transpired, including:
Paul Merrell

Declassified Docs: NSA Misled Court (and Themselves) About Spying on Americans | Killer... - 1 views

  •  
    The infamous 2011 FISA Court opinion finding that NSA and the FBI were massively violating U.S. citizens' 4th Amendment rights is finally released in heavily redacted form. It is a shocker, repeatedly finding that the Feds had misrepresented facts to the court. 
Paul Merrell

Feinstein promotes bill to strengthen NSA's hand on warrantless searches | World news |... - 0 views

  • A Senate bill promoted as a surveillance reform would codify the ability of the National Security Agency to search its troves of foreign phone and email communications for Americans’ information, and permit law enforcement agencies to search the vast databases as well. The Fisa Improvements Act, promoted by Dianne Feinstein, the California Democrat who chairs the Senate intelligence committee, would both make permanent a loophole permitting the NSA to search for Americans’ identifying information without a warrant – and, civil libertarians fear, contains an ambiguity that might allow the FBI, the DEA and other law enforcement agencies to do the same thing. “For the first time, the statute would explicitly allow the government to proactively search through the NSA data troves of information without a warrant,” said Michelle Richardson, the surveillance lobbyist for the ACLU.
  • “It may also expand current practices by allowing law enforcement to directly access US person information that was nominally collected for foreign intelligence purposes. This fourth amendment back door needs to be closed, not written into stone.” Feinstein’s bill passed the committee on an 11 to 4 vote on 31 October. An expanded report on its provisions released by the committee this week added details about the ability of both intelligence and law enforcement to sift through foreign communications databases that it accumulates under section 702 of the Fisa Amendments Act of 2008. Section 6 of Feinstein’s bill blesses what her committee colleague Ron Wyden, the Oregon Democrat and civil libertarian, has called the “backdoor search provision,” which the Guardian revealed thanks to a leak by Edward Snowden.  The section permits intelligence agencies to search “the contents of communications” collected primarily overseas for identifying information on US citizens, resident aliens and people inside the US, provided that the “purpose of the query is to obtain foreign intelligence information or information necessary to understand foreign intelligence information or to assess its importance.”
  • Section 6 bills itself as a “restriction,” but it would not stop the NSA from performing the warrantless search, merely requiring intelligence agencies to log their queries and make them “available for review” to Congress, the Fisa court, the Justice Department and inspectors general inside the executive branch. Additionally, the report on Section 6 explicitly states that the provision “does not limit the authority of law enforcement agencies to conduct queries of data acquired pursuant to Section 702 of Fisa for law enforcement purposes.” There is ambiguity surrounding whether the FBI can currently search through the NSA’s foreign communications databases, or is reliant on the NSA to pass on information from the databases relevant to the bureau. A declassified Fisa court document from 2011 refers to “FBI minimization procedures,” but it is unclear what those procedures are. A copy of the FBI minimization procedures from 2009, acquired by the ACLU under the Freedom of Information Act is almost completely redacted. So is the section in the government’s most recent report on its Section 702 collection dealing with the FBI’s role, though it contains references to how the FBI “receive[s] … unminimized Section 70 acquired communications” from the NSA. 
  • ...1 more annotation...
  • Feinstein’s bill “seems to imply there is currently some authority for law enforcement to query the database, which [intelligence community] officials have not mentioned in any of their remarks on Section 702,” said Alan Butler, an attorney with the Electronic Privacy Information Center. The provision is also unclear about whether law enforcement agencies can search through the foreign communications databases for information on US persons. Feinstein’s office did not respond to a request for clarification by deadline. The ambiguity concerns civil libertarians, as it opens a door for law enforcement agencies to sidestep warrant requirements. “If Senator Feinstein or other congressional supporters of this bill believe that it would in fact expand law enforcement access to the database, that would be an unjustified expansion of surveillance over Americans,” Butler said.
Paul Merrell

Lawfare › The NSA Documents: The Entire Series - 0 views

  • Our series on the NSA documents now being complete, I thought I would collect all of the posts together in one place. Here are the documents themselves. And here are our seven posts commenting on them: The Introduction Summary of the October 2011 FISC Opinion Summary of the November 2011 FISC Opinion Summary of the September 2012 FISC Opinion Summary of Statements to Congress Summary of the Minimization Procedures Summary of the Semi-Annual Compliance Report Now that the series is done, I will turn to the question of
  •  
    Someone had the sense and time to collect them all. The linked site has many NSA/privacy research resources 
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

U.S. Military Bans The Intercept - The Intercept - 0 views

  • A portion of an email (redacted and slightly altered to protect the source) sent to staff last week at a U.S. Marine Corps installation directing employees not to read this web site. The U.S. military is banning and blocking employees from visiting The Intercept in an apparent effort to censor news reports that contain leaked government secrets. According to multiple military sources, a notice has been circulated to units within the Army, Navy, Air Force, and Marine Corps warning staff that they are prohibited from reading stories published by The Intercept on the grounds that they may contain classified information. The ban appears to apply to all employees—including those with top-secret security clearance—and is aimed at preventing classified information from being viewed on unclassified computer networks, even if it is freely available on the internet. Similar military-wide bans have been directed against news outlets in the past after leaks of classified information.
  • A directive issued to military staff at one location last week, obtained by The Intercept, threatens that any employees caught viewing classified material in the public domain will face “long term security issues.” It suggests that the call to prohibit employees from viewing the website was made by senior officials over concerns about a “potential new leaker” of secret documents. The directive states: We have received information from our higher headquarters regarding a potential new leaker of classified information.  Although no formal validation has occurred, we thought it prudent to warn all employees and subordinate commands.  Please do not go to any website entitled “The Intercept” for it may very well contain classified material. As a reminder to all personnel who have ever signed a non-disclosure agreement, we have an ongoing responsibility to protect classified material in all of its various forms.  Viewing potentially classified material (even material already wrongfully released in the public domain) from unclassified equipment will cause you long term security issues.  This is considered a security violation.
  • A military insider subject to the ban said that several employees expressed concerns after being told by commanders that it was “illegal and a violation of national security” to read publicly available news reports on The Intercept. “Even though I have a top secret security clearance, I am still forbidden to read anything on the website,” said the source, who spoke on condition of anonymity due to the sensitivity of the subject.  “I find this very disturbing that they are threatening us and telling us what websites and news publishers we are allowed to read or not.”
  • ...2 more annotations...
  • In an emailed statement, Defense Department spokeswoman Lt. Col. Valerie Henderson said that she had not been able to establish whether the DoD had been the source of “any guidance related to your website.” Henderson added, however, that “DoD personnel have an obligation to safeguard classified information. Classified information, whether made public by unauthorized disclosure, remains classified until declassified by an appropriate government authority. DoD is committed to preventing classified information from being introduced onto DoD’s unclassified networks.” Earlier this month, after the publication of two Intercept stories revealing classified details about the vast scope of the government’s watchlisting program, Reuters reported that “intelligence officials were preparing a criminal referral” over the leaks.
  • The ban on The Intercept appears to have come in the aftermath of those stories, representing the latest in a string of U.S. military crackdowns on news websites that have published classified material. Last year, the Army admitted that it was blocking parts of The Guardian’s website after it published secret documents from former National Security Agency contractor Edward Snowden. In 2010, WikiLeaks and several major news organizations were subject to similar measures after the publication of leaked State Department diplomatic files. Flanagan, the Marine Corps spokesman, told The Intercept that The Washington Post was also blocked by some military agencies last year after it published documents from Snowden revealing covert NSA surveillance operations. “Just because classified information is published on a public website, that doesn’t mean military people with security clearance have the ability to download it,” Flanagan said.
  •  
    Enforced ignorance of the U.S. military. The official reason is a bucket that doesn't hold water. Despite official "classified" status, public is public. Any enemy can read it, so why should our military be barred from doing so. The real reason, I suspect, is protecting morale. 
1 - 16 of 16
Showing 20 items per page