Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged intelligence-activities

Rss Feed Group items tagged

Paul Merrell

The CIA Just Declassified the Document That Supposedly Justified the Iraq Invasion | VI... - 0 views

  • Thirteen years ago, the intelligence community concluded in a 93-page classified document used to justify the invasion of Iraq that it lacked "specific information" on "many key aspects" of Iraqi President Saddam Hussein's weapons of mass destruction (WMD) programs.But that's not what top Bush administration officials said during their campaign to sell the war to the American public. Those officials, citing the same classified document, asserted with no uncertainty that Iraq was actively pursuing nuclear weapons, concealing a vast chemical and biological weapons arsenal, and posing an immediate and grave threat to US national security. Congress eventually concluded that the Bush administration had "overstated" its dire warnings about the Iraqi threat, and that the administration's claims about Iraq's WMD program were "not supported by the underlying intelligence reporting." But that underlying intelligence reporting — contained in the so-called National Intelligence Estimate (NIE) that was used to justify the invasion — has remained shrouded in mystery until now.
  • The CIA released a copy of the NIE in 2004 in response to a Freedom of Information Act (FOIA) request, but redacted virtually all of it, citing a threat to national security. Then last year, John Greenewald, who operates The Black Vault, a clearinghouse for declassified government documents, asked the CIA to take another look at the October 2002 NIE to determine whether any additional portions of it could be declassified.The agency responded to Greenewald this past January and provided him with a new version of the NIE, which he shared exclusively with VICE News, that restores the majority of the prewar Iraq intelligence that has eluded historians, journalists, and war critics for more than a decade. (Some previously redacted portions of the NIE had previously been disclosed in congressional reports.)
  • For the first time, the public can now read the hastily drafted CIA document [pdf below] that led Congress to pass a joint resolution authorizing the use of military force in Iraq, a costly war launched March 20, 2003 that was predicated on "disarming" Iraq of its (non-existent) WMD, overthrowing Saddam Hussein, and "freeing" the Iraqi people.A report issued by the government funded think-tank RAND Corporation last December titled "Blinders, Blunders and Wars" said the NIE "contained several qualifiers that were dropped…. As the draft NIE went up the intelligence chain of command, the conclusions were treated increasingly definitively."
  • ...1 more annotation...
  • Thirteen years ago, the intelligence community concluded in a 93-page classified document used to justify the invasion of Iraq that it lacked "specific information" on "many key aspects" of Iraqi President Saddam Hussein's weapons of mass destruction (WMD) programs.But that's not what top Bush administration officials said during their campaign to sell the war to the American public. Those officials, citing the same classified document, asserted with no uncertainty that Iraq was actively pursuing nuclear weapons, concealing a vast chemical and biological weapons arsenal, and posing an immediate and grave threat to US national security. 
  •  
    Confirmation that the intelligence was being fixed around the goal, but also that Bush2 and his administration stretched even that intelligence report beyond recognition. 
Paul Merrell

Lavon Affair - Wikipedia, the free encyclopedia - 0 views

  • The Lavon Affair refers to a failed Israeli covert operation, code named Operation Susannah, conducted in Egypt in the Summer of 1954. As part of the false flag operation,[1] a group of Egyptian Jews were recruited by Israeli military intelligence for plans to plant bombs inside Egyptian, American and British-owned civilian targets, cinema, library and American educational center. The attacks were to be blamed on the Muslim Brotherhood, Egyptian Communists, "unspecified malcontents" or "local nationalists" with the aim of creating a climate of sufficient violence and instability to induce the British government to retain its occupying troops in Egypt's Suez Canal zone.[2] The operation caused no casualties, except for those members of the cell who committed suicide after being captured.
  • After Israel publicly denied any involvement in the incident for 51 years, the surviving agents were officially honored in 2005 by being awarded certificates of appreciation by Israeli President Moshe Katzav.[3]
  • In the early 1950s, the United States initiated a more activist policy of support for Egyptian nationalism; this was often in contrast with British policies of maintaining its regional hegemony. Israel feared that this policy, which encouraged Britain to withdraw its military forces from the Suez Canal, would embolden Egyptian President Nasser's military ambitions towards Israel. Israel first sought to influence this policy through diplomatic means but was frustrated.[4] In the summer of 1954 Colonel Binyamin Gibli, the chief of Israel's military intelligence, Aman, initiated Operation Susannah in order to reverse that decision. The goal of the Operation was to carry out bombings and other acts of terrorism in Egypt with the aim of creating an atmosphere in which the British and American opponents of British withdrawal from Egypt would be able to gain the upper hand and block the British withdrawal from Egypt.
  • ...8 more annotations...
  • According to historian Shabtai Teveth, who wrote one of the more detailed accounts, the assignment was "To undermine Western confidence in the existing [Egyptian] regime by generating public insecurity and actions to bring about arrests, demonstrations, and acts of revenge, while totally concealing the Israeli factor. The team was accordingly urged to avoid detection, so that suspicion would fall on the Muslim Brotherhood, the Communists, 'unspecified malcontents' or 'local nationalists'."[2]
  • The top-secret cell, Unit 131,[5] which was to carry out the operation, had existed since 1948 and under Aman since 1950. At the time of Operation Susannah, Unit 131 was the subject of a bitter dispute between Aman (military intelligence) and Mossad (national intelligence agency) over who should control it. Unit 131 operatives had been recruited several years before, when the Israeli intelligence officer Avram Dar arrived in Cairo undercover as a British citizen of Gibraltar called John Darling. He had recruited several Egyptian Jews who had previously been active in illegal emigration activities and trained them for covert operations.
  • Aman decided to activate the network in the Spring of 1954. On July 2, the cell firebombed a post office in Alexandria,[6] and on July 14, it bombed the libraries of the U.S. Information Agency in Alexandria and Cairo and a British-owned theater.
  • Before the group began the operation, Israeli agent Avri Elad (Avraham Zeidenberg) was sent to oversee the operations. Elad assumed the identity of Paul Frank, a former SS officer with Nazi underground connections. Avri Elad allegedly informed the Egyptians, resulting in the Egyptian Intelligence Service following a suspect to his target, the Rio Theatre, where a fire engine was standing by. Egyptian authorities arrested this suspect, Philip Natanson, when his bomb accidentally ignited prematurely in his pocket. Having searched his apartment, they found incriminating evidence and names of accomplices to the operation.
  • Several suspects were arrested, including Egyptian Jews and undercover Israelis. Colonel Dar and Elad had managed to escape. Two suspects, Yosef Carmon and Hungarian-born Israeli Meir Max Bineth committed suicide in prison.
  • The Egyptian trial began on December 11 and lasted until January 27, 1955; two of the accused (Moshe Marzouk and Shmuel Azar) were condemned to execution by hanging, two were acquitted, and the rest received lengthy prison terms. The trial was criticised in Israel as a show trial, although strict Israeli military censorship of the press, at the time, meant that the Israeli public was kept in the dark about the facts of the case and, in fact, were led to believe that the defendants were innocent.[7] There were allegations that evidence had been extracted by torture.[8] After serving seven-year jail sentences, two of the imprisoned operatives (Meir Meyuhas and Meir Za'afran) were released in 1962. The rest were eventually freed in February 1968, in a secret addendum to a prisoner of war exchange.
  • Soon after the affair, Mossad chief Isser Harel expressed suspicion to Aman concerning the integrity of Avri Elad. Despite his concerns, Aman continued using Elad for intelligence operations until 1956, when he was caught trying to sell Israeli documents to the Egyptians. Elad was tried in Israel and sentenced to 10 years imprisonment. During Elad's imprisonment in Ayalon Prison, the media were only able to refer to him as the "The Third Man" or "X" due to government censorship.[9] In 1976, whilst living in Los Angeles, Elad publicly identified himself as the "Third Man" from the Lavon Affair.[9] In 1980, Harel publicly revealed evidence that Elad had been turned by the Egyptians even before Operation Susannah.
  • Operation Susannah and the Lavon Affair turned out to be disastrous for Israel in several ways: Israel lost significant standing and credibility in its relations with the United Kingdom and the United States that took years to repair.[11] The political aftermath caused considerable political turmoil in Israel that affected the influence of its government.[12] In March 2005, Israel publicly honored the surviving operatives, and President Moshe Katsav presented each with a certificate of appreciation for their efforts on behalf of the state, ending decades of official denial by Israel.[13]
Paul Merrell

French and Spanish intelligence aided NSA spying - report - RT News - 0 views

  • Electronic surveillance which the European media and politicians blamed on the NSA was also carried out by their own intelligence services, as part of a wide-ranging allied security effort, according to US officials. European spy agencies collected phone records in war zones and areas outside their borders and shared information with the NSA, US officials said on Tuesday, as part of wider efforts to protect allied soldiers and civilians, according to a report in the Wall Street Journal. This is a markedly different version of events to what has been reported in Europe and throws up questions about the level of European involvement in global surveillance.
  • However, these efforts are separate to the US program which targeted foreign leaders, including Angela Merkel. There has so far been no comment from either the French or Spanish authorities or from the NSA.
  • But James Clapper, the director of National Intelligence said that the notion that the NSA had eavesdropped on the phone calls of 70 million French citizens was false and that the allegations were based on “inaccurate and misleading information regarding US foreign intelligence activities.” But he didn’t provide any other explanation. US intelligence officials have, according to the Wall Street Journal, privately said that the disclosures by the European press put them in a difficult position. They are keen to put the record straight but to do so would expose the activities of their allies’ intelligence activities. US officials also say that the leaked documents that the Le Monde story was based on were not supplied by the NSA, but rather were NSA data received from French intelligence. The US reached the conclusion that the phone records the French had collected were from outside France and were then shared with the NSA. There was a similar story for the documents citied in El Mundo, the officials said. There are considerable diplomatic sensitivities of outing partner services, which the NSA relies on for a considerable amount of intelligence. A public exposure of European complicity may spark domestic outrage in Europe and threaten co-operation with the US in future.
  •  
    Finger-pointing by the U.S. Intelligence Community is good news, a strong sign that the Western nation's surveillance conspiracy is fragmenting. When one defendant blames another, their front is no longer united. 
Paul Merrell

George Bush was "angry" when US intelligence said Iran hadn't got an active nuclear wea... - 0 views

  • In the National Intelligence Estimate, Iran: Nuclear Intentions and Capabilities, produced in November 2007, the 16 US intelligence services expressed the consensus view that Iran hadn’t got an active nuclear weapons programme at that time.  That is still their view today.   As he revealed in his memoir Decision Points, instead of being pleased that Iran was almost certainly not developing nuclear weapons, President Bush was “angry” that his intelligence services had expressed this view.  He was “angry” because it cut the ground from under his efforts to gain international support for what he termed “dealing with Iran”, which clearly went beyond ensuring that it did not possess nuclear weapons.  The NIE had a big impact, he concluded – and not a good one.   His full comments on the NIE in Decision Points are as follows:
  • In November 2007, the intelligence community produced a National Intelligence Estimate on Iran’s nuclear program. It confirmed that, as we suspected, Iran had operated a secret nuclear weapons program in defiance of its treaty obligations. It also reported that, in 2003, Iran had suspended its covert effort to design a warhead – considered by some to be the least challenging part of building a weapon.  Despite the fact that Iran was testing missiles that could be used as a delivery system and had announced its resumption of uranium enrichment, the NIE opened with an eye-popping declaration: “We judge with high confidence that in fall 2003, Tehran halted its nuclear weapons program.”   The NIE’s conclusion was so stunning that I felt certain it would immediately leak to the press. As much as I disliked the idea, I decided to declassify the key findings so that we could shape the news stories with the facts. The backlash was immediate. Ahmadinejad hailed the NIE as “a great victory.”  Momentum for new sanctions faded among the Europeans, Russians, and Chinese. As New York Times journalist David Sanger rightly put it, “The new intelligence estimate relieved the international pressure on Iran – the same pressure that the document itself claimed had successfully forced the country to suspend its weapons ambitions.”   In January 2008, I took a trip to the Middle East, where I tried to reassure leaders that we remained committed to dealing with Iran. Israel and our Arab allies found themselves in a rare moment of unity. Both were deeply concerned about Iran and furious with the United States about the NIE. In Saudi Arabia, I met with King Abdullah and members of the Sudairi Seven, the influential full brothers of the late King Fahd.   “Your Majesty, may I begin the meeting?” I said. “I’m confident that every one of you believes that I wrote the NIE as a way of avoiding taking action against Iran.”
  • No one said a word. The Saudis were too polite to confirm their suspicion aloud.   “You have to understand our system,” I said. “The NIE was produced independently by our intelligence community. I am as angry about it as you are.”   The NIE didn’t just undermine diplomacy.  It also tied my hands on the military side. There were many reasons I was concerned about undertaking a military strike on Iran, including its uncertain effectiveness and the serious problems it would create for Iraq’s fragile young democracy. But after the NIE, how could I possibly explain using the military to destroy the nuclear facilities of a country the intelligence community said had no active nuclear weapons program?   I don’t know why the NIE was written the way it was. I wondered if the intelligence community was trying so hard to avoid repeating its mistake on Iraq, that it had underestimated the threat from Iran.  I certainly hoped that intelligence analysts weren’t trying to influence policy. Whatever the explanation, the NIE had a big impact – and not a good one.
Paul Merrell

The Only Thing We Have to Fear Is -- The CIA | War Is A Crime .org - 0 views

  • Fifty years ago, exactly one month after John Kennedy was killed, the Washington Post published an op-ed titled “Limit CIA Role to Intelligence.” The first sentence of that op-ed on Dec. 22, 1963, read, “I think it has become necessary to take another look at the purpose and operations of our Central Intelligence Agency.” It sounded like the intro to a bleat from some liberal professor or journalist. Not so. The writer was former President Harry S. Truman, who spearheaded the establishment of the CIA 66 years ago, right after World War II, to better coordinate U.S. intelligence gathering. But the spy agency had lurched off in what Truman thought were troubling directions.
  • Is this why the President feels he cannot fire his clumsily devious Director of National Intelligence James Clapper, who had to apologize to Congress for giving “clearly erroneous” testimony in March? Is this why he allows National Security Agency Director Keith Alexander and counterparts in the FBI to continue to mislead the American people, even though the intermittent snow showers from Snowden show our senior national security officials to have lied — and to have been out of control? This may be small solace to President Obama, but there is no sign that the NSA documents that Snowden’s has released include the Senate Intelligence Committee’s 6,300-page report on CIA torture. Rather, that report, at least, seems sure to be under Obama’s and Senate Intelligence Committee chair Dianne Feinstein’s tight control.
  • But Kennedy stuck to his guns, so to speak. He fired Dulles and his co-conspirators a few months after the abortive invasion, and told a friend that he wanted to “splinter the CIA into a thousand pieces and scatter it into the winds.” The outrage was very obviously mutual.
  • ...11 more annotations...
  • Truman concluded the op-ed with an admonition that was as clear as the syntax was clumsy: “I would like to see the CIA restored to its original assignment as the intelligence arm of the President, and that whatever else it can properly perform in that special field – and that its operational duties be terminated or properly used elsewhere.” The importance and prescient nature of that admonition are even clearer today, a half-century later.
  • After Kennedy was murdered in Dallas, the patrician, well-connected Dulles got himself appointed to the Warren Commission and took the lead in shaping the investigation of JFK’s assassination. Documents in the Truman Library show that Dulles also mounted a small domestic covert action of his own to neutralize any future airing of Truman’s and Souers’s warnings about covert action.
  • As the de facto head of the Warren Commission, Dulles was perfectly positioned to protect himself and his associates, were any commissioners or investigators — or journalists — tempted to question whether Dulles and the CIA played a role in killing Kennedy. And so, the question: Did Allen Dulles and other “cloak-and-dagger” CIA operatives have a hand in John Kennedy’s assassination and in then covering it up? In my view, the best dissection of the evidence pertaining to the murder appeared in James Douglass’s 2008 book, JFK and the Unspeakable. After updating and arraying the abundant evidence, and conducting still more interviews, Douglass concludes that the answer is Yes.
  • The mainstream media had an allergic reaction to Douglass’s book and gave it almost no reviews. It is, nevertheless, still selling well. And, more important, it seems a safe bet that President Barack Obama knows what it says and maybe has even read it. This may go some way toward explaining why Obama has been so deferential to the CIA, NSA, FBI and the Pentagon. Could this be at least part of the reason he felt he had to leave the Cheney/Bush-anointed torturers, kidnappers and black-prison wardens in place, instructing his first CIA chief Leon Panetta to become, in effect, the agency’s lawyer rather than leader.
  • Sadly, those concerns that Truman expressed in that op-ed — that he had inadvertently helped create a Frankenstein monster — are as valid today as they were 50 years ago, if not more so.
  • But the timorous President has a big problem. He is acutely aware that, if released, the Senate committee report would create a firestorm – almost certainly implicating Obama’s CIA Director John Brennan and many other heavy-hitters of whom he appears to be afraid. And so Obama has allowed Brennan to play bureaucratic games, delaying release of the report for more than a year, even though its conclusions are said to closely resemble earlier findings of the CIA’s own Inspector General and the Constitution Project (see below).
  • Hat tip to the New Yorker’s Jane Mayer, who took the trouble to read the play-by-play of testimony to the Senate Intelligence Committee by former CIA General Counsel (2009-2013) Stephen W. Preston, nominated (and now confirmed) to be general counsel at the Department of Defense. Under questioning by Sen. Mark Udall, D-Colorado, Preston admitted outright that, contrary to the CIA’s insistence that it did not actively impede congressional oversight of its detention and interrogation program, “briefings to the committee included inaccurate information related to aspects of the program of express interest to Members.”
  • That “inaccurate information” apparently is thoroughly documented in the Senate Intelligence Committee report which, largely because of the CIA’s imaginative foot-dragging, cost taxpayers $40 million. Udall has revealed that the report (which includes 35,000 footnotes) contains a very long section titled “C.I.A. Representations on the C.I.A. Interrogation Program and the Effectiveness of the C.I.A.’s Enhanced Interrogation Techniques to Congress.” Preston also acknowledged that the CIA inadequately informed the Justice Department on interrogation and detention. He said, “CIA’s efforts fell well short of our current practices when it comes to providing information relevant to [the Office of Legal Counsel]’s legal analysis.”
  • As Katherine Hawkins, the senior investigator for last April’s bipartisan, independent report by the Constitution Project’s Task Force on Detainee Treatment, noted in an Oct. 18, 2013 posting, the memos from acting OLC chief, Steven Bradbury, relied very heavily on now-discredited CIA claims that “enhanced interrogation” saved lives, and that the sessions were carefully monitored by medical and psychological personnel to ensure that detainees’ suffering would not rise to the level of torture. According to Hawkins, Udall complained – and Preston admitted – that, in providing the materials requested by the committee, “the CIA removed several thousand CIA documents that the agency thought could be subjected to executive privilege claims by the President, without any decision by Obama to invoke the privilege.”
  • Worse still for the CIA, the Senate Intelligence Committee report apparently destroys the agency’s argument justifying torture on the grounds that there was no other way to acquire the needed information save through brutalization. In his answers to Udall, Preston concedes that, contrary to what the agency has argued, it can and has been established that legal methods of interrogation would have yielded the same intelligence. Is anyone still wondering why our timid President is likely to sit on the Senate Intelligence Committee report for as long as he can? Or why he will let John Brennan redact it to a fare-thee-well, if he is eventually forced to release some of it by pressure from folks who care about things like torture?
  • It does appear that the newly taciturn CIA Director Brennan has inordinate influence over the President in such matters – not unlike the influence that both DNI Clapper and NSA Director Alexander seem able to exert. In this respect, Brennan joins the dubious company of the majority of his predecessor CIA directors, as they made abundantly clear when they went to inordinate lengths to prevent their torturer colleagues from being held accountable. (Also, see “CIA Torturers Running Scared,” Sept. 20, 2009; or “Are Presidents Afraid of the CIA?” Dec. 29, 2009)
Paul Merrell

McCain Proposes New Select Committee on NSA Leaks - Secrecy News - 0 views

  • A resolution introduced yesterday by Sen. John McCain would establish a new Senate Select Committee to investigate the unauthorized disclosures of classified information on National Security Agency collection programs and their implications for national policy. The McCain resolution is framed broadly and touches on many issues besides leaks, including intelligence policy, congressional oversight, the role of contractors, the constitutionality of current intelligence programs, and more. The resolution asserts that “senior officials in the intelligence community may have misled Congress or otherwise obfuscated the nature, extent, or use of certain intelligence-collection programs, operations, and activities of the National Security Agency, including intelligence-collection programs affecting Americans.” “[T]he provision of incomplete or inaccurate information by officials of the intelligence community has inhibited effective congressional oversight of certain intelligence-collection programs, operations, and activities of the National Security Agency, including intelligence-collection programs affecting Americans, and undermined congressional and public support of these programs,” the resolution stated.
  • Moreover, “some such programs, operations, and activities that are the subject matter of the unauthorized disclosures may not have been authorized, or may have exceeded that which was authorized, by law, or may not have been permitted under the Constitution of the United States.” The proposed new select committee would investigate the unauthorized disclosures and assess how they occurred, the damage to U.S. national security that resulted, and how such damage could be mitigated. The committee would review the role of intelligence contractors and the adequacy of current management controls.
  • The committee would evaluate the legality, constitutionality, and efficacy of the NSA collection programs that have been disclosed. It would also consider “the need for greater transparency and more effective congressional oversight of intelligence community activities,” and whether existing laws are sufficient “to safeguard the rights and privacies of citizens of the United States.” In proposing a new select committee, Senator McCain is implicitly declaring that existing oversight procedures are inadequate, and that a new, more fundamental approach is required. The prospects for the McCain proposal to become a reality are uncertain.
  •  
    Reading the McCain resolution left me with mixed feelings. As worded, the proposed Select Committee is largely aimed at the right subjects but suffers somewhat from focus on a rather diffuse set of individual trees rather than on the forest. I.e., the topic should be definition of digital privacy rights and their vindication but focuses instead on NSA reform. The most worrisome aspect is the absence of a mechanism to ensure that the few Senators who have taken the lead in protection of civil liberties would become members of the Select Committee; rather, appointments to the Select Committee are parceled out to be made various existing Committee chairs and ranking minority members, plus top ranking Senators of both parties.   But this could also be the 2014 counterpart to the 1975 Church Committee that resulted in significant reform of U.S. spy agencies, albeit the spy agencies seem to have managed to work their way around those reforms.  
Paul Merrell

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

Senators accuse government of using 'secret law' to collect Americans' data | World new... - 0 views

  • A bipartisan group of 26 US senators has written to intelligence chiefs to complain that the administration is relying on a "secret body of law" to collect massive amounts of data on US citizens.The senators accuse officials of making misleading statements and demand that the director of national intelligence James Clapper answer a series of specific questions on the scale of domestic surveillance as well as the legal justification for it.In their strongly-worded letter to Clapper, the senators said they believed the government may be misinterpreting existing legislation to justify the sweeping collection of telephone and internet data revealed by the Guardian."We are concerned that by depending on secret interpretations of the Patriot Act that differed from an intuitive reading of the statute, this program essentially relied for years on a secret body of law," they say.
  • "This and misleading statements by intelligence officials have prevented our constituents from evaluating the decisions that their government was making, and will unfortunately undermine trust in government more broadly."This is the strongest attack yet from Congress since the disclosures began, and comes after Clapper admitted he had given "the least untruthful answer possible" when pushed on these issues by Senators at a hearing before the latest revelations by the Guardian and the Washington Post.In a press statement, the group of senators added: "The recent public disclosures of secret government surveillance programs have exposed how secret interpretations of the USA Patriot Act have allowed for the bulk collection of massive amounts of data on the communications of ordinary Americans with no connection to wrongdoing."
  • They said: "Reliance on secret law to conduct domestic surveillance activities raises serious civil liberty concerns and all but removes the public from an informed national security and civil liberty debate." A spokesman for the office of the director of national intelligence (ODNI) acknowledged the letter. "The ODNI received a letter from 26 senators this morning requesting further engagement on vital intelligence programs recently disclosed in the media, which we are still evaluating. The intelligence and law enforcement communities will continue to work with all members of Congress to ensure the proper balance of privacy and protection for American citizens."The letter was organised by Oregan Democrat Ron Wyden, a member of the intelligence committee, but includes four Republican senators: Mark Kirk, Mike Lee, Lisa Murkowski and Dean Heller.
  • ...3 more annotations...
  • They ask Clapper to publicly provide information about the duration and scope of the program and provide examples of its effectiveness in providing unique intelligence, if such examples exist.The senators also expressed their concern that the program itself has a significant impact on the privacy of law-abiding Americans and that the Patriot Act could be used for the bulk collection of records beyond phone metadata."The Patriot Act's 'business records' authority can be used to give the government access to private financial, medical, consumer and firearm sales records, among others," said a press statement.In addition to raising concerns about the law's scope, the senators noted that keeping the official interpretation of the law secret and the instances of misleading public statements from executive branch officials prevented the American people from having an informed public debate about national security and domestic surveillance.
  • The senators said they were seeking public answers to the following questions in order to give the American people the information they need to conduct an informed public debate. The specific questions include:• How long has the NSA used Patriot Act authorities to engage in bulk collection of Americans' records? Was this collection underway when the law was reauthorized in 2006?• Has the NSA used USA Patriot Act authorities to conduct bulk collection of any other types of records pertaining to Americans, beyond phone records?• Has the NSA collected or made any plans to collect Americans' cell-site location data in bulk?• Have there been any violations of the court orders permitting this bulk collection, or of the rules governing access to these records? If so, please describe these violations.
  • A bipartisan group of 26 US senators has written to intelligence chiefs to complain that the administration is relying on a "secret body of law" to collect massive amounts of data on US citizens.The senators accuse officials of making misleading statements and demand that the director of national intelligence James Clapper answer a series of specific questions on the scale of domestic surveillance as well as the legal justification for it.In their strongly-worded letter to Clapper, the senators said they believed the government may be misinterpreting existing legislation to justify the sweeping collection of telephone and internet data revealed by the Guardian."We are concerned that by depending on secret interpretations of the Patriot Act that differed from an intuitive reading of the statute, this program essentially relied for years on a secret body of law," they say."This and misleading statements by intelligence officials have prevented our constituents from evaluating the decisions that their government was making, and will unfortunately undermine trust in government more broadly."
Paul Merrell

Ron Wyden: the future of NSA programs is being determined now | World news | theguardia... - 0 views

  • Privacy advocates pressed Barack Obama to end the bulk collection of Americans’ communications data at a series of meetings at the White House on Thursday, seizing their final chance to convince him of the need for meaningful reform of sweeping surveillance practices. A key US senator left one meeting at the White House with the impression that President Obama has yet to decide on specific reforms. “The debate is clearly fluid,” senator Ron Wyden of Oregon, a longtime critic of bulk surveillance, told the Guardian after the meeting. “My sense is the president, and the administration, is wrestling with these issues,” Wyden said. Other groups were meeting presidential aides on Thursday afternoon, including the representatives of the American Civil Liberties Union, the Electronic Privacy Information Center (Epic) and the Open Technology Institute. Expectations were mounting that Obama will propose changing the National Security Agency’s controversial database of all domestic phone call records.
  • Wyden, a member of the Senate intelligence committee, said he viewed the coming days and weeks, ahead of an announcement by Obama about the future scope of surveillance, to be decisive for the debate triggered by NSA whistleblower Edward Snowden.  “What I’d say to Americans is that the future of these programs is being determined now,” Wyden said. “For those like me, who believe that security and liberty are not mutually exclusive, this is the time to weigh in.”
  • Speaking after the meeting with legislators, White House spokesman Jay Carney described the conversation as an opportunity for Obama to “solicit their input”, rather than brief them on his decisions about the future scope of surveillance activities.  The White House held meetings on Wednesday with the leadership of the intelligence agencies, including NSA director Keith Alexander and director of national intelligence James Clapper, as well as with Obama’s privacy and civil liberties advisory group. On Friday, Obama’s staff is expected to meet representatives of major technology firms, ostensibly to continue deliberations.  Shortly before the legislators’ meeting began, two of the attendees, House intelligence committee leaders Mike Rogers of Michigan and Dutch Ruppersberger of Maryland, issued a statement describing a classified Defense Department report that they said alleged that Snowden’s leaks –which they said totaled 1.7m intelligence files and impacted intelligence operations of all military branches – could “gravely impact” US national security. 
  • ...4 more annotations...
  • A spokesman for the Defense Intelligence Agency, which spearheaded the report, said the report was an “initial assessment”, and the work of the Information Review Task Force was “ongoing”. But neither the House intelligence committee leaders nor the DIA would provide additional information substantiating the allegations of Snowden’s impact.  “The report is classified and is not releasable,” said the DIA spokesman, who would not agree to be quoted by name. The classified interim assessment was delivered to the House and Senate intelligence committees on 6 January, and the DIA spokesman said there is no deadline for a final report, nor a mandate to make such a report public. 
  • Snowden's attorney, Ben Wizner, described the report as an attack on the journalism produced by the Snowden disclosures. "In truth, Mike Rogers is only indirectly attacking Snowden. He’s directly attacking the journalists who have reported on these revelations. There is not a shred of evidence that any adversary has had any access to any document other than those published by journalists, and they haven't contradicted that," Wizner told the Guardian. "We shouldn’t have any confidence in the accuracy of this innuendo. The government has shown time and again they have very little idea of what Snowden had access to."
  • Speaking outside the White House after a separate meeting with Obama, senator Rand Paul also stepped up his calls for government leniency toward Snowden, contrasting his treatment with Clapper, who has admitted misleading the Senate about surveillance. "Those who call for some sort of frontier justice for [Snowden] need to understand the laws needs to apply equally," Paul told reporters. "James Clapper by all accounts committed perjury which is punishable by five years in prison and if you want to throw the book at Snowden, it's a little hard to say 'Oh, but we're not going to do anything about James Clapper lying to Congress.'"
  • Asked if he was making a direct comparison, Paul added: "It's not my job to compare them or contrast what they did, but what James Clapper did has greatly harmed the credibility of the intelligence agencies ... he has really greatly damaged the intelligence community. It's arguable." After meeting with Obama, Wyden saw the debate over surveillance winding toward a conclusion. “This is crunch time. The decisions are going to be made in the very near future,” Wyden said. “The president made clear he wanted to hear from us. I’m going to keep urging members of Congress and the public to stand on the side of real reform and end intrusive surveillance practices that in effect violate the liberties of our people without making us safer.”
  •  
    Wyden  says it's time to get involved. Wyden is one of my senators and is about to get an email informing him that if he believes Barack Obama is the person who will decide this issue, he'd better think that over a bit more.  
Paul Merrell

NSA loophole allows warrantless search for US citizens' emails and phone calls | World ... - 0 views

  • The National Security Agency has a secret backdoor into its vast databases under a legal authority enabling it to search for US citizens' email and phone calls without a warrant, according to a top-secret document passed to the Guardian by Edward Snowden.The previously undisclosed rule change allows NSA operatives to hunt for individual Americans' communications using their name or other identifying information. Senator Ron Wyden told the Guardian that the law provides the NSA with a loophole potentially allowing "warrantless searches for the phone calls or emails of law-abiding Americans".The authority, approved in 2011, appears to contrast with repeated assurances from Barack Obama and senior intelligence officials to both Congress and the American public that the privacy of US citizens is protected from the NSA's dragnet surveillance programs.
  • The intelligence data is being gathered under Section 702 of the of the Fisa Amendments Act (FAA), which gives the NSA authority to target without warrant the communications of foreign targets, who must be non-US citizens and outside the US at the point of collection.The communications of Americans in direct contact with foreign targets can also be collected without a warrant, and the intelligence agencies acknowledge that purely domestic communications can also be inadvertently swept into its databases. That process is known as "incidental collection" in surveillance parlance.But this is the first evidence that the NSA has permission to search those databases for specific US individuals' communications.
  • Wyden, an Oregon Democrat on the Senate intelligence committee, has obliquely warned for months that the NSA's retention of Americans' communications incidentally collected and its ability to search through it has been far more extensive than intelligence officials have stated publicly. Speaking this week, Wyden told the Guardian it amounts to a "backdoor search" through Americans' communications data."Section 702 was intended to give the government new authorities to collect the communications of individuals believed to be foreigners outside the US, but the intelligence community has been unable to tell Congress how many Americans have had their communications swept up in that collection," he said."Once Americans' communications are collected, a gap in the law that I call the 'back-door searches loophole' allows the government to potentially go through these communications and conduct warrantless searches for the phone calls or emails of law-abiding Americans."
  • ...2 more annotations...
  • A secret glossary document provided to operatives in the NSA's Special Source Operations division – which runs the Prism program and large-scale cable intercepts through corporate partnerships with technology companies – details an update to the "minimization" procedures that govern how the agency must handle the communications of US persons. That group is defined as both American citizens and foreigners located in the US."While the FAA 702 minimization procedures approved on 3 October 2011 now allow for use of certain United States person names and identifiers as query terms when reviewing collected FAA 702 data," the glossary states, "analysts may NOT/NOT [not repeat not] implement any USP [US persons] queries until an effective oversight process has been developed by NSA and agreed to by DOJ/ODNI [Office of the Director of National Intelligence]."The term "identifiers" is NSA jargon for information relating to an individual, such as telephone number, email address, IP address and username as well as their name.The document – which is undated, though metadata suggests this version was last updated in June 2012 – does not say whether the oversight process it mentions has been established or whether any searches against US person names have taken place.
  • Exclusive: Spy agency has secret backdoor permission to search databases for individual Americans' communications
Paul Merrell

Leaked memos reveal GCHQ efforts to keep mass surveillance secret | UK news | The Guardian - 0 views

  • The UK intelligence agency GCHQ has repeatedly warned it fears a "damaging public debate" on the scale of its activities because it could lead to legal challenges against its mass-surveillance programmes, classified internal documents reveal.Memos contained in the cache disclosed by the US whistleblower Edward Snowden detail the agency's long fight against making intercept evidence admissible as evidence in criminal trials – a policy supported by all three major political parties, but ultimately defeated by the UK's intelligence community.Foremost among the reasons was a desire to minimise the potential for challenges against the agency's large-scale interception programmes, rather than any intrinsic threat to security, the documents show.
  • The papers also reveal that:• GCHQ lobbied furiously to keep secret the fact that telecoms firms had gone "well beyond" what they were legally required to do to help intelligence agencies' mass interception of communications, both in the UK and overseas.• GCHQ feared a legal challenge under the right to privacy in the Human Rights Act if evidence of its surveillance methods became admissible in court.• GCHQ assisted the Home Office in lining up sympathetic people to help with "press handling", including the Liberal Democrat peer and former intelligence services commissioner Lord Carlile, who this week criticised the Guardian for its coverage of mass surveillance by GCHQ and America's National Security Agency.The most recent attempt to make intelligence gathered from intercepts admissible in court, proposed by the last Labour government, was finally stymied by GCHQ, MI5 and MI6 in 2009.
  • Another top GCHQ priority in resisting the admission of intercepts as evidence was keeping secret the extent of the agency's co-operative relationships with telephone companies – including being granted access to communications networks overseas.In June, the Guardian disclosed the existence of GCHQ's Tempora internet surveillance programme. It uses intercepts on the fibre-optic cables that make up the backbone of the internet to gain access to vast swaths of internet users' personal data. The intercepts are placed in the UK and overseas, with the knowledge of companies owning either the cables or landing stations.The revelations of voluntary co-operation with some telecoms companies appear to contrast markedly with statements made by large telecoms firms in the wake of the first Tempora stories. They stressed that they were simply complying with the law of the countries in which they operated.
  • ...6 more annotations...
  • In reality, numerous telecoms companies were doing much more than that, as disclosed in a secret document prepared in 2009 by a joint working group of GCHQ, MI5 and MI6.Their report contended that allowing intercepts as evidence could damage relationships with "Communications Service Providers" (CSPs).In an extended excerpt of "the classified version" of a review prepared for the Privy Council, a formal body of advisers made up of current and former cabinet ministers, the document sets out the real nature of the relationship between telecoms firms and the UK government."Under RIPA [the Regulation of Investigatory Powers Act 2000], CSPs in the UK may be required to provide, at public expense, an adequate interception capability on their networks," it states. "In practice all significant providers do provide such a capability. But in many cases their assistance – while in conformity with the law – goes well beyond what it requires."
  • GCHQ's internet surveillance programme is the subject of a challenge in the European court of human rights, mounted by three privacy advocacy groups. The Open Rights Group, English PEN and Big Brother Watch argue the "unchecked surveillance" of Tempora is a challenge to the right to privacy, as set out in the European convention on human rights.That the Tempora programme appears to rely at least in part on voluntary co-operation of telecoms firms could become a major factor in that ongoing case. The revelation could also reignite the long-running debate over allowing intercept evidence in court.GCHQ's submission goes on to set out why its relationships with telecoms companies go further than what can be legally compelled under current law. It says that in the internet era, companies wishing to avoid being legally mandated to assist UK intelligence agencies would often be able to do so "at little cost or risk to their operations" by moving "some or all" of their communications services overseas.
  • As a result, "it has been necessary to enter into agreements with both UK-based and offshore providers for them to afford the UK agencies access, with appropriate legal authorisation, to the communications they carry outside the UK".The submission to ministers does not set out which overseas firms have entered into voluntary relationships with the UK, or even in which countries they operate, though documents detailing the Tempora programme made it clear the UK's interception capabilities relied on taps located both on UK soil and overseas.There is no indication as to whether the governments of the countries in which deals with companies have been struck would be aware of the GCHQ cable taps.
  • Evidence that telecoms firms and GCHQ are engaging in mass interception overseas could stoke an ongoing diplomatic row over surveillance ignited this week after the German chancellor, Angela Merkel, accused the NSA of monitoring her phone calls, and the subsequent revelation that the agency monitored communications of at least 35 other world leaders.On Friday, Merkel and the French president, François Hollande, agreed to spearhead efforts to make the NSA sign a new code of conduct on how it carried out intelligence operations within the European Union, after EU leaders warned that the international fight against terrorism was being jeopardised by the perception that mass US surveillance was out of control.Fear of diplomatic repercussions were one of the prime reasons given for GCHQ's insistence that its relationships with telecoms firms must be kept private .
  • Telecoms companies "feared damage to their brands internationally, if the extent of their co-operation with HMG [Her Majesty's government] became apparent", the GCHQ document warned. It added that if intercepts became admissible as evidence in UK courts "many CSPs asserted that they would withdraw their voluntary support".The report stressed that while companies are going beyond what they are required to do under UK law, they are not being asked to violate it.Shami Chakrabarti, Director of Liberty and Anthony Romero Executive Director of the American Civil Liberties Union issued a joint statement stating:"The Guardian's publication of information from Edward Snowden has uncovered a breach of trust by the US and UK Governments on the grandest scale. The newspaper's principled and selective revelations demonstrate our rulers' contempt for personal rights, freedoms and the rule of law.
  • "Across the globe, these disclosures continue to raise fundamental questions about the lack of effective legal protection against the interception of all our communications."Yet in Britain, that conversation is in danger of being lost beneath self-serving spin and scaremongering, with journalists who dare to question the secret state accused of aiding the enemy."A balance must of course be struck between security and transparency, but that cannot be achieved whilst the intelligence services and their political masters seek to avoid any scrutiny of, or debate about, their actions."The Guardian's decision to expose the extent to which our privacy is being violated should be applauded and not condemned."
  •  
    The Guardian lands another gigantic bomb squarely on target, with massive potential for diplomatic, political, and financial disruption. Well done, Guardian. 
Paul Merrell

Did Certain Foreign Governments Facilitate the 9/11 Attacks? by Justin Raimondo -- Anti... - 0 views

  • Some thirteen years after the event, the shadow of the 9/11 terrorist attacks on the World Trade Center in Manhattan and the Pentagon still darkens our world. The legacy of that terrible day has impacted not only our foreign policy, bequeathing to a new generation an apparently endless "war on terrorism," it also has led directly to what is arguably the most massive assault on our civil liberties since the Alien and Sedition Acts. Getting all the information about what happened that day – and why it happened – is key to understanding the course we have taken since. This was supposed to have been the purpose of the 9/11 Commission, whose massive report is now looked to as the primary source on the subject. Yet there is another, far more specific investigative report, the one issued by the intelligence committees of both houses of Congress, entitled "Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001." If you actually take the time to read the report, all goes along swimmingly (except for occasional redactions) until you get to p. 369, whereupon the text is blacked out for the next twenty-eight pages.
  • Some thirteen years after the event, the shadow of the 9/11 terrorist attacks on the World Trade Center in Manhattan and the Pentagon still darkens our world. The legacy of that terrible day has impacted not only our foreign policy, bequeathing to a new generation an apparently endless "war on terrorism," it also has led directly to what is arguably the most massive assault on our civil liberties since the Alien and Sedition Acts. Getting all the information about what happened that day – and why it happened – is key to understanding the course we have taken since. This was supposed to have been the purpose of the 9/11 Commission, whose massive report is now looked to as the primary source on the subject. Yet there is another, far more specific investigative report, the one issued by the intelligence committees of both houses of Congress, entitled "Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001." If you actually take the time to read the report, all goes along swimmingly (except for occasional redactions) until you get to p. 369, whereupon the text is blacked out for the next twenty-eight pages.
  • Do you get the impression someone has something to hide? The censored section is entitled "Finding, Discussion and Narrative Regarding Certain Sensitive National Security Matters," and the introduction – left largely intact – is instructive: "Through its investigation, the Joint Inquiry developed information suggesting specific sources of foreign support for some of the September 11 hijackers while they were in the United States. The Joint Inquiry’s review confirmed that the Intelligence Community also has information, much of which has yet to be independently verified, concerning these potential sources of support. In their testimony, neither CIA nor FBI officials were able to address definitively the extent of such support for the hijackers globally or within the United States or the extent to which such support, if it exists, is knowing or inadvertent in nature."
  • ...1 more annotation...
  • What’s in the 28 censored pages of the Joint Inquiry into 9/11? We don’t know for sure – but if Israel is involved, then we do know why they won’t let us read those pages. Representatives Jones, Lynch, and Massie have sparked a movement to declassify the 28 pages: go here for more information. This is a fight we need to win – but we can only do it by raising a huge stink. Call or write your congressional representatives and urge them to join the three congressmen who are fighting for your right to know. And spread the word.
  •  
    Eloquent essay on the 60 Israeli "students" swept up by the FBI right after 9/11 then as swiftly shuttled onto airliners bound for Israel. It's a plea for the declassification of the 28 pages censored from the public version of the Congressional Intelligence Committees joint report on "Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001." The essay's theme is wrapped around the preface to the censored pages mention of plural "sources of foreign support for some of the September 11 hijackers[.]" And it uses reported information about the  60 "students" and some statements by members of Congress who have read the 28 pages to argue there is a strong whiff that Israel was one of those plural sources of support. But the essay otherwise does not address the large mound of circumstantial evidence of Israel's involvement. I've got a lot of notes and links on that issue, so may blog about that later.
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

NSA 'secret backdoor' paved way to U.S. phone, e-mail snooping | Politics and Law - CNE... - 0 views

  • The National Security Agency created a "secret backdoor" so its massive databases could be searched for the contents of U.S. citizens' confidential phone calls and e-mail messages without a warrant, according to the latest classified documents leaked by Edward Snowden. A report in the Guardian on Friday quoted Sen. Ron Wyden, an Oregon Democrat who serves on the Senate Intelligence Committee, as saying the secret rule offers a loophole allowing "warrantless searches for the phone calls or emails of law-abiding Americans." That appears to confirm what Rep. Jerrold Nadler, a New York Democrat, said in June after receiving a classified briefing from administration officials a few days earlier on the extent of the NSA's domestic surveillance operations. If the NSA wants "to listen to the phone," an analyst's decision is sufficient, without any other legal authorization required, Nadler said he had been told during the briefing. "I was rather startled," said Nadler, an attorney who serves on the House Judiciary Committee.
  • FBI Director Robert Mueller responded by assuring Nadler, according to a transcript of the hearing, that to "listen to the phone," the government would need "a particularized order" from the Foreign Intelligence Surveillance Court -- a claim that is contradicted by today's Guardian report and other documents. Mueller has been succeeded by James Comey, who was confirmed last month by the Senate. In response to a CNET article at the time, Director of National Intelligence James Clapper released a statement saying: "The statement that a single analyst can eavesdrop on domestic communications without proper legal authorization is incorrect and was not briefed to Congress." Clapper never elaborated, however, on what "proper" authorization would be. Today's top-secret document leaked by Snowden reveals that "procedures approved on 3 October 2011 now allow for use of certain United States person names and identifiers as query terms when reviewing collected FAA 702 data."
  • FAA 702 is a reference to section 702 of a 2008 law that amended the Foreign Intelligence Surveillance Act. Those amendments created a warrantless surveillance process that could be employed by NSA analysts, but Congress never intended it to be used domestically against American citizens: A congressional report accompanying the law claimed it allows electronic surveillance only of "persons located outside the United States in order to acquire foreign intelligence information." In reality, though, the Obama Justice Department has devised secret interpretations of FAA 702 carving out loopholes in what were intended to be strict privacy safeguards. One loophole revealed in June shows that NSA, CIA, and FBI analysts are granted broad access to data vacuumed up by the world's most powerful intelligence agency -- but are supposed to follow certain "targeting" and "minimization" procedures to limit the number of Americans who become individual targets of warrantless surveillance.
  • ...2 more annotations...
  • Today's disclosures appear to be at odds with what President Obama has said over the last two months in defense of NSA surveillance. "What I can say unequivocally is that if you are a U.S. person, the NSA cannot listen to your telephone calls and the NSA cannot target your e-mails," Obama has said. Earlier reports have indicated that the NSA has the ability to record nearly all domestic and international phone calls -- in case an analyst needed to access the recordings in the future. A Wired magazine article last year disclosed that the NSA has established "listening posts" that allow the agency to collect and sift through billions of phone calls through a massive new data center in Utah, "whether they originate within the country or overseas." That includes not just metadata, but also the contents of the communications.
  • AT&T and other telecommunications companies that allow the NSA to tap into their fiber links receive absolute immunity from civil liability or criminal prosecution, thanks to Section 702 of the FISA Amendments Act, which Congress renewed in 2012. It says that any civil lawsuit "against any person for providing assistance to an element of the intelligence community...shall be promptly dismissed." Section 702 of the law says surveillance may be authorized by the attorney general and director of national intelligence without prior approval by the secret Foreign Intelligence Surveillance Court -- in practice, this means analysts at the NSA and other agencies with intelligence functions -- as long as minimization requirements and general procedures blessed by the court are followed. It's unclear whether the court has approved the "secret backdoor" allowing Americans' e-mail and phone messages to be targeted for domestic surveillance.
Paul Merrell

New Intel Doc: Do Not Be 'Led Astray' By 'Commonly Understood Definitions' - The Intercept - 0 views

  • New evidence of the intelligence community’s intentionally deceptive use of the English language was released today in the form of a Defense Intelligence Agency document that instructs analysts to use words that do not mean what they appear to mean. The section of the DIA’s “intelligence law handbook” on the “Collection of Information about United States Persons” opens like this: To begin the journey, it is necessary to stop first and adjust your vocabulary. The terms and words used in DoD 5240.1-R have very specific meanings, and it is often the case that one can be led astray by relying on the generic or commonly understood definitions of a particular word. DoD 5240.1-R — entitled “Procedures Governing the Activities of DOD Intelligence Components that Affect United States Persons” – is the Department of Defense document that implements Executive Order 12333, the unilateral presidential directive first signed by President Reagan that authorizes government agencies to covertly sweep up vast amounts of private data from overseas communications. The plainspoken employee handbook was one several documents about Executive Order 12333 the ACLU obtained through a Freedom of Information Act lawsuit and released today. See also today’s Intercept story: “The Ghost of Ronald Reagan Authorizes Most NSA Spying”
  • Here is the handbook explaining how not to be led astray: For example, “collection of information” is defined in the Dictionary of the United States Army Terms (AR 310- 25) as: “The process of gathering information for all available sources and agencies. ” But, for the purposes of DoD 5240 .1-R, information is “collected” – only when it has been received for use by an employee of a DoD intelligence component in the course of his official duties… (and) an employee takes some affirmative action that demonstrates an intent to use or retain the information. So, we see that “collection of information” for DoD 5240.1-R purposes is more than “gathering” – it could be described as “gathering, plus … “. For the purposes of DoD 5240.1-R, “collection” is officially gathering or receiving information, plus an affirmative act in the direction of use or retention of that information.
  • For good measure, there’s this footnote: In addition, data acquired by electronic means is “collected” only when it is processed into intelligible form…;What constitutes an intelligible form may be somewhat problematic. Analysts can even gather information and keep it for up to six months without it counting as having been “collected”, as long as it’s being “held or forwarded to a supervisory authority, solely for the purpose of making a determination about its collectability.” Although the intelligence community’s astonishing abuse of words has been frequently noted, particularly in the context of surveillance, this may be the first time we’ve actually seen an instruction manual.
  • ...1 more annotation...
  • And as it happens, it comes right in the middle of a couple pieces I’m writing about another linguistic perversion, the non-denial denial. (My exegesis of CIA director John Brennan’s latest ran on Friday; more examples from recent history should be out tomorrow.) The intelligence community’s redefinition of terms inspired the ACLU’s Jameel Jaffer and Brett Max Kaufman last year to author a ”lexicon for decoding the true meaning of what NSA officials say” which includes nifty non-intuitive recastings of terms such as surveillance, relevant, targeted, incidental and inadvertent. There’s also a “Guide to the Deceptions, Misinformation, and Word Games Officials Use to Mislead the Public About NSA Surveillance” that Trevor Timm wrote for the Electronic Frontier Foundation, and Mike Masnick’s more tongue in check “NSA-To-English Dictionary” from Techdirt.
Paul Merrell

Senate Intel Committee Blocks Former Staffer From Talking To Press About Oversight Proc... - 0 views

  • The Senate Select Committee on Intelligence has taken the unusual step of actively blocking a former committee aide from talking to TPM about congressional oversight of the intelligence community. At issue isn’t classified sources and methods of intelligence gathering but general information about how the committee functions — and how it should function. The committee’s refusal to allow former general counsel Vicki Divoll to disclose unclassified information to a reporter was the first and only time it has sought to block her from making public comments, based on her experience as one of its most senior aides, since she left Capitol Hill in 2003.
  • The committee’s decision comes amid fallout from leaks of classified National Security Agency documents by ex-NSA contractor Edward Snowden. In light of the Snowden revelations about the country’s secret surveillance programs, TPM was reporting a story based on interviews with members of Congress and current and former aides about the successes and pitfalls of intelligence oversight on Capitol Hill. The goal was to answer some basic questions for readers: How does a classified process differ from public oversight? What challenges do the combination of government secrecy, classified briefings, and strict committee protocols present to legislators trying to control the nation’s sprawling intelligence apparatus?
  • While Divoll remains legally barred from disclosing classified information, she is also still subject to a non-disclosure agreement with the Senate Intelligence Committee that bars her from discussing committee-sensitive business. Out of an abundance of caution, Divoll also conferred with the committee on Friday about her interview with TPM. She anticipated that the committee would approve the interview, noting that in her post-government career, both the committee and the CIA had never done more than request minor tweaks when she brought them pieces of her writing for pre-publication review. This, she believed, would be a similar process. But for the first time in her career, the committee took the extraordinary step, on a bipartisan basis, of declaring the interview’s entire contents a violation of her non-disclosure agreement and effectively forbade her from putting any of it on the record. “The committee has reviewed your submission … and objected to any publication of the information contained therein,” she was told. Specifically the committee claimed the information she provided TPM was both “out of date” and “committee sensitive.” Angered by the committee’s decision, Divoll sought Friday to have it reversed. The committee declined. TPM agreed to honor her request that we leave her comments off the record.
  •  
    Whoo-weee! Even non-classified information is secret on the Senate Intelligence Committee. Too bad that Congress never saw fit to make itself subject to the Freedom of Information Act.  :-)
Paul Merrell

Edward Snowden: A 'Nation' Interview | The Nation - 0 views

  • Snowden: That’s the key—to maintain the garden of liberty, right? This is a generational thing that we must all do continuously. We only have the rights that we protect. It doesn’t matter what we say or think we have. It’s not enough to believe in something; it matters what we actually defend. So when we think in the context of the last decade’s infringements upon personal liberty and the last year’s revelations, it’s not about surveillance. It’s about liberty. When people say, “I have nothing to hide,” what they’re saying is, “My rights don’t matter.” Because you don’t need to justify your rights as a citizen—that inverts the model of responsibility. The government must justify its intrusion into your rights. If you stop defending your rights by saying, “I don’t need them in this context” or “I can’t understand this,” they are no longer rights. You have ceded the concept of your own rights. You’ve converted them into something you get as a revocable privilege from the government, something that can be abrogated at its convenience. And that has diminished the measure of liberty within a society.
  • From the very beginning, I said there are two tracks of reform: there’s the political and the technical. I don’t believe the political will be successful, for exactly the reasons you underlined. The issue is too abstract for average people, who have too many things going on in their lives. And we do not live in a revolutionary time. People are not prepared to contest power. We have a system of education that is really a sort of euphemism for indoctrination. It’s not designed to create critical thinkers. We have a media that goes along with the government by parroting phrases intended to provoke a certain emotional response—for example, “national security.” Everyone says “national security” to the point that we now must use the term “national security.” But it is not national security that they’re concerned with; it is state security. And that’s a key distinction. We don’t like to use the phrase “state security” in the United States because it reminds us of all the bad regimes. But it’s a key concept, because when these officials are out on TV, they’re not talking about what’s good for you. They’re not talking about what’s good for business. They’re not talking about what’s good for society. They’re talking about the protection and perpetuation of a national state system. I’m not an anarchist. I’m not saying, “Burn it to the ground.” But I’m saying we need to be aware of it, and we need to be able to distinguish when political developments are occurring that are contrary to the public interest. And that cannot happen if we do not question the premises on which they’re founded. And that’s why I don’t think political reform is likely to succeed. [Senators] Udall and Wyden, on the intelligence committee, have been sounding the alarm, but they are a minority.
  • The Nation: Explain the technical reform you mentioned. Snowden: We already see this happening. The issue I brought forward most clearly was that of mass surveillance, not of surveillance in general. It’s OK if we wiretap Osama bin Laden. I want to know what he’s planning—obviously not him nowadays, but that kind of thing. I don’t care if it’s a pope or a bin Laden. As long as investigators must go to a judge—an independent judge, a real judge, not a secret judge—and make a showing that there’s probable cause to issue a warrant, then they can do that. And that’s how it should be done. The problem is when they monitor all of us, en masse, all of the time, without any specific justification for intercepting in the first place, without any specific judicial showing that there’s a probable cause for that infringement of our rights.
  • ...14 more annotations...
  • The Nation: Every president—and this seems to be confirmed by history—will seek to maximize his or her power, and will see modern-day surveillance as part of that power. Who is going to restrain presidential power in this regard? Snowden: That’s why we have separate and co-equal branches. Maybe it will be Congress, maybe not. Might be the courts, might not. But the idea is that, over time, one of these will get the courage to do so. One of the saddest and most damaging legacies of the Bush administration is the increased assertion of the “state secrets” privilege, which kept organizations like the ACLU—which had cases of people who had actually been tortured and held in indefinite detention—from getting their day in court. The courts were afraid to challenge executive declarations of what would happen. Now, over the last year, we have seen—in almost every single court that has had this sort of national-security case—that they have become markedly more skeptical. People at civil-liberties organizations say it’s a sea change, and that it’s very clear judges have begun to question more critically assertions made by the executive. Even though it seems so obvious now, it is extraordinary in the context of the last decade, because courts had simply said they were not the best branch to adjudicate these claims—which is completely wrong, because they are the only nonpolitical branch. They are the branch that is specifically charged with deciding issues that cannot be impartially decided by politicians. The power of the presidency is important, but it is not determinative. Presidents should not be exempted from the same standards of reason and evidence and justification that any other citizen or civil movement should be held to.
  • Since the revelations, we have seen a massive sea change in the technological basis and makeup of the Internet. One story revealed that the NSA was unlawfully collecting data from the data centers of Google and Yahoo. They were intercepting the transactions of data centers of American companies, which should not be allowed in the first place because American companies are considered US persons, sort of, under our surveillance authorities. They say, “Well, we were doing it overseas,” but that falls under a different Reagan-era authority: EO 12333, an executive order for foreign-intelligence collection, as opposed to the ones we now use domestically. So this one isn’t even authorized by law. It’s just an old-ass piece of paper with Reagan’s signature on it, which has been updated a couple times since then. So what happened was that all of a sudden these massive, behemoth companies realized their data centers—sending hundreds of millions of people’s communications back and forth every day—were completely unprotected, electronically naked. GCHQ, the British spy agency, was listening in, and the NSA was getting the data and everything like that, because they could dodge the encryption that was typically used. Basically, the way it worked technically, you go from your phone to Facebook.com, let’s say—that link is encrypted. So if the NSA is trying to watch it here, they can’t understand it. But what these agencies discovered was, the Facebook site that your phone is connected to is just the front end of a larger corporate network—that’s not actually where the data comes from. When you ask for your Facebook page, you hit this part and it’s protected, but it has to go on this long bounce around the world to actually get what you’re asking for and go back. So what they did was just get out of the protected part and they went onto the back network. They went into the private network of these companies.
  • The Nation: The companies knew this? Snowden: Companies did not know it. They said, “Well, we gave the NSA the front door; we gave you the PRISM program. You could get anything you wanted from our companies anyway—all you had to do was ask us and we’re gonna give it to you.” So the companies couldn’t have imagined that the intelligence communities would break in the back door, too—but they did, because they didn’t have to deal with the same legal process as when they went through the front door. When this was published by Barton Gellman in The Washington Post and the companies were exposed, Gellman printed a great anecdote: he showed two Google engineers a slide that showed how the NSA was doing this, and the engineers “exploded in profanity.” Another example—one document I revealed was the classified inspector general’s report on a Bush surveillance operation, Stellar Wind, which basically showed that the authorities knew it was unlawful at the time. There was no statutory basis; it was happening basically on the president’s say-so and a secret authorization that no one was allowed to see. When the DOJ said, “We’re not gonna reauthorize this because it is not lawful,” Cheney—or one of Cheney’s advisers—went to Michael Hayden, director of the NSA, and said, “There is no lawful basis for this program. DOJ is not going to reauthorize it, and we don’t know what we’re going to do. Will you continue it anyway on the president’s say-so?” Hayden said yes, even though he knew it was unlawful and the DOJ was against it. Nobody has read this document because it’s like twenty-eight pages long, even though it’s incredibly important.
  • The big tech companies understood that the government had not only damaged American principles, it had hurt their businesses. They thought, “No one trusts our products anymore.” So they decided to fix these security flaws to secure their phones. The new iPhone has encryption that protects the contents of the phone. This means if someone steals your phone—if a hacker or something images your phone—they can’t read what’s on the phone itself, they can’t look at your pictures, they can’t see the text messages you send, and so forth. But it does not stop law enforcement from tracking your movements via geolocation on the phone if they think you are involved in a kidnapping case, for example. It does not stop law enforcement from requesting copies of your texts from the providers via warrant. It does not stop them from accessing copies of your pictures or whatever that are uploaded to, for example, Apple’s cloud service, which are still legally accessible because those are not encrypted. It only protects what’s physically on the phone. This is purely a security feature that protects against the kind of abuse that can happen with all these things being out there undetected. In response, the attorney general and the FBI director jumped on a soap box and said, “You are putting our children at risk.”
  • The Nation: Is there a potential conflict between massive encryption and the lawful investigation of crimes? Snowden: This is the controversy that the attorney general and the FBI director were trying to create. They were suggesting, “We have to be able to have lawful access to these devices with a warrant, but that is technically not possible on a secure device. The only way that is possible is if you compromise the security of the device by leaving a back door.” We’ve known that these back doors are not secure. I talk to cryptographers, some of the leading technologists in the world, all the time about how we can deal with these issues. It is not possible to create a back door that is only accessible, for example, to the FBI. And even if it were, you run into the same problem with international commerce: if you create a device that is famous for compromised security and it has an American back door, nobody is gonna buy it. Anyway, it’s not true that the authorities cannot access the content of the phone even if there is no back door. When I was at the NSA, we did this every single day, even on Sundays. I believe that encryption is a civic responsibility, a civic duty.
  • The Nation: You really think that if you could go home tomorrow with complete immunity, there wouldn’t be irresistible pressure on you to become a spokesperson, even an activist, on behalf of our rights and liberties? Indeed, wouldn’t that now be your duty? Snowden: But the idea for me now—because I’m not a politician, and I do not think I am as effective in this way as people who actually prepare for it—is to focus on technical reform, because I speak the language of technology. I spoke with Tim Berners-Lee, the guy who invented the World Wide Web. We agree on the necessity for this generation to create what he calls the Magna Carta for the Internet. We want to say what “digital rights” should be. What values should we be protecting, and how do we assert them? What I can do—because I am a technologist, and because I actually understand how this stuff works under the hood—is to help create the new systems that reflect our values. Of course I want to see political reform in the United States. But we could pass the best surveillance reforms, the best privacy protections in the history of the world, in the United States, and it would have zero impact internationally. Zero impact in China and in every other country, because of their national laws—they won’t recognize our reforms; they’ll continue doing their own thing. But if someone creates a reformed technical system today—technical standards must be identical around the world for them to function together.
  • The Nation: Creating a new system may be your transition, but it’s also a political act. Snowden: In case you haven’t noticed, I have a somewhat sneaky way of effecting political change. I don’t want to directly confront great powers, which we cannot defeat on their terms. They have more money, more clout, more airtime. We cannot be effective without a mass movement, and the American people today are too comfortable to adapt to a mass movement. But as inequality grows, the basic bonds of social fraternity are fraying—as we discussed in regard to Occupy Wall Street. As tensions increase, people will become more willing to engage in protest. But that moment is not now.
  • The Nation: Some years ago, The Nation did a special issue on patriotism. We asked about a hundred people how they define it. How do you define patriotism? And related to that, you’re probably the world’s most famous whistleblower, though you don’t like that term. What characterization of your role do you prefer? Snowden: What defines patriotism, for me, is the idea that one rises to act on behalf of one’s country. As I said before, that’s distinct from acting to benefit the government—a distinction that’s increasingly lost today. You’re not patriotic just because you back whoever’s in power today or their policies. You’re patriotic when you work to improve the lives of the people of your country, your community and your family. Sometimes that means making hard choices, choices that go against your personal interest. People sometimes say I broke an oath of secrecy—one of the early charges leveled against me. But it’s a fundamental misunderstanding, because there is no oath of secrecy for people who work in the intelligence community. You are asked to sign a civil agreement, called a Standard Form 312, which basically says if you disclose classified information, they can sue you; they can do this, that and the other. And you risk going to jail. But you are also asked to take an oath, and that’s the oath of service. The oath of service is not to secrecy, but to the Constitution—to protect it against all enemies, foreign and domestic. That’s the oath that I kept, that James Clapper and former NSA director Keith Alexander did not. You raise your hand and you take the oath in your class when you are on board. All government officials are made to do it who work for the intelligence agencies—at least, that’s where I took the oath.
  • As for labeling someone a whistleblower, I think it does them—it does all of us—a disservice, because it “otherizes” us. Using the language of heroism, calling Daniel Ellsberg a hero, and calling the other people who made great sacrifices heroes—even though what they have done is heroic—is to distinguish them from the civic duty they performed, and excuses the rest of us from the same civic duty to speak out when we see something wrong, when we witness our government engaging in serious crimes, abusing power, engaging in massive historic violations of the Constitution of the United States. We have to speak out or we are party to that bad action.
  • The Nation: Considering your personal experience—the risks you took, and now your fate here in Moscow—do you think other young men or women will be inspired or discouraged from doing what you did? Snowden: Chelsea Manning got thirty-five years in prison, while I’m still free. I talk to people in the ACLU office in New York all the time. I’m able to participate in the debate and to campaign for reform. I’m just the first to come forward in the manner that I did and succeed. When governments go too far to punish people for actions that are dissent rather than a real threat to the nation, they risk delegitimizing not just their systems of justice, but the legitimacy of the government itself. Because when they bring political charges against people for acts that were clearly at least intended to work in the public interest, they deny them the opportunity to mount a public-interest defense. The charges they brought against me, for example, explicitly denied my ability to make a public-interest defense. There were no whistleblower protections that would’ve protected me—and that’s known to everybody in the intelligence community. There are no proper channels for making this information available when the system fails comprehensively.
  • The government would assert that individuals who are aware of serious wrongdoing in the intelligence community should bring their concerns to the people most responsible for that wrongdoing, and rely on those people to correct the problems that those people themselves authorized. Going all the way back to Daniel Ellsberg, it is clear that the government is not concerned with damage to national security, because in none of these cases was there damage. At the trial of Chelsea Manning, the government could point to no case of specific damage that had been caused by the massive revelation of classified information. The charges are a reaction to the government’s embarrassment more than genuine concern about these activities, or they would substantiate what harms were done. We’re now more than a year since my NSA revelations, and despite numerous hours of testimony before Congress, despite tons of off-the-record quotes from anonymous officials who have an ax to grind, not a single US official, not a single representative of the United States government, has ever pointed to a single case of individualized harm caused by these revelations. This, despite the fact that former NSA director Keith Alexander said this would cause grave and irrevocable harm to the nation. Some months after he made that statement, the new director of the NSA, Michael Rogers, said that, in fact, he doesn’t see the sky falling. It’s not so serious after all.
  • The Nation: We have a sense, or certainly the hope, we’ll be seeing you in America soon—perhaps sometime after this Ukrainian crisis ends. Snowden: I would love to think that, but we’ve gone all the way up the chain at all the levels, and things like that. A political decision has been made not to irritate the intelligence community. The spy agencies are really embarrassed, they’re really sore—the revelations really hurt their mystique. The last ten years, they were getting the Zero Dark Thirty treatment—they’re the heroes. The surveillance revelations bring them back to Big Brother kind of narratives, and they don’t like that at all. The Obama administration almost appears as though it is afraid of the intelligence community. They’re afraid of death by a thousand cuts—you know, leaks and things like that.
  • The Nation: You also remind us of [Manhattan Project physicist] Robert Oppenheimer—what he created and then worried about. Snowden: Someone recently talked about mass surveillance and the NSA revelations as being the atomic moment for computer scientists. The atomic bomb was the moral moment for physicists. Mass surveillance is the same moment for computer scientists, when they realize that the things they produce can be used to harm a tremendous number of people. It is interesting that so many people who become disenchanted, who protest against their own organizations, are people who contributed something to them and then saw how it was misused. When I was working in Japan, I created a system for ensuring that intelligence data was globally recoverable in the event of a disaster. I was not aware of the scope of mass surveillance. I came across some legal questions when I was creating it. My superiors pushed back and were like, “Well, how are we going to deal with this data?” And I was like, “I didn’t even know it existed.” Later, when I found out that we were collecting more information on American communications than we were on Russian communications, for example, I was like, “Holy shit.” Being confronted with the realization that work you intended to benefit people is being used against them has a radicalizing effect.
  • The Nation: You’ve given us a lot of time, and we are very grateful, as will be The Nation’s and other readers. But before we end, any more thoughts about your future? Snowden: If I had to guess what the future’s going to look like for me—assuming it’s not an orange jumpsuit in a hole—I think I’m going to alternate between tech and policy. I think we need that. I think that’s actually what’s missing from government, for the most part. We’ve got a lot of policy people, but we have no technologists, even though technology is such a big part of our lives. It’s just amazing, because even these big Silicon Valley companies, the masters of the universe or whatever, haven’t engaged with Washington until recently. They’re still playing catch-up. As for my personal politics, some people seem to think I’m some kind of archlibertarian, a hyper-conservative. But when it comes to social policies, I believe women have the right to make their own choices, and inequality is a really important issue. As a technologist, I see the trends, and I see that automation inevitably is going to mean fewer and fewer jobs. And if we do not find a way to provide a basic income for people who have no work, or no meaningful work, we’re going to have social unrest that could get people killed. When we have increasing production—year after year after year—some of that needs to be reinvested in society. It doesn’t need to be consistently concentrated in these venture-capital funds and things like that. I’m not a communist, a socialist or a radical. But these issues have to be 
addressed.
  •  
    Remarkable interview. Snowden finally gets asked some questions about politics. 
Paul Merrell

The White House Has Been Covering Up the Presidency's Role in Torture for Years - The I... - 0 views

  • On May 10, 2013, John Brennan presented CIA’s response to the Senate Intelligence Committee Torture Report to the President. Official White House Photo by Pete Souza. The fight between the CIA and the Senate Intelligence Committee over the Committee’s Torture Report – which Dan Froomkin covered here – has now zeroed in on the White House. Did the White House order the CIA to withdraw 920 documents from a server made available to Committee staffers, as Senator Dianne Feinstein says the agency claimed in 2010? Were those documents – perhaps thousands of them – pulled in deference to a White House claim of executive privilege, as Senator Mark Udall and then CIA General Counsel Stephen Preston suggested last fall? And is the White House continuing to withhold 9,000 pages of documents without invoking privilege, as McClatchy reported yesterday? We can be sure about one thing: The Obama White House has covered up the Bush presidency’s role in the torture program for years. Specifically, from 2009 to 2012, the administration went to extraordinary lengths to keep a single short phrase, describing President Bush’s authorization of the torture program, secret.
  • As Steven Aftergood, director of the Federation of American Scientists Project on Government Secrecy, noted  in 2009 – shortly after Hayden revealed that torture started as a covert operation – this means there should be a paper trail implicating President Bush in the torture program. “[T]here should be a Presidential ‘finding’ authorizing the program,” he said, “and [] such a finding should have been provided to Congressional overseers.” The National Security Act dictates that every covert operation must be supported by a written declaration finding that the action is necessary and important to the national security. The Congressional Intelligence committees – or at least the Chair and Ranking Member – should receive notice of the finding. But there is evidence that those Congressional overseers were never told that the finding the president signed on September 17, 2001 authorized torture. For example, a letter from then ranking member of the House Intelligence Committee, Jane Harman, to the CIA’s General Counsel following her first briefing on torture asked: “Have enhanced techniques been authorized and approved by the President?” The CIA’s response at the time was simply that “policy as well as legal matters have been addressed within the Executive Branch.”
  • Nevertheless, the finding does exist. The CIA even disclosed its existence in response to the ACLU FOIA, describing it as “a 14-page memorandum dated 17 September 2001 from President Bush to the Director of the CIA pertaining to the CIA’s authorization to detain terrorists.” In an order in the ACLU suit, Judge Alvin K. Hellerstein confirmed that the declaration was “intertwined with” the administration’s effort to keep the language in the Tenet document hidden. When the administration succeeded in keeping that short phrase secret, all effort to release the declaration also ended.
  • ...4 more annotations...
  • Enduring confusion about this particular finding surely exists because of its flexible nature. As Bob Woodward described in Bush at War, CIA Director Tenet asked President Bush to sign “a broad intelligence order permitting the CIA to conduct covert operations without having to come back for formal approval for each specific operation.” As Jane Mayer described in The Dark Side, such an order not only gave the CIA flexibility, it also protected the President. “To give the President deniability, and to keep him from getting his hands dirty, the finding called for the President to delegate blanket authority to Tenet to decide on a case-by-case basis whom to kill, whom to kidnap, whom to detain and interrogate, and how.” When George Tenet signed written guidelines for the CIA’s torture program in 2003, however, he appeared to have deliberately deprived the President of that deniability by including the source of CIA’s authorization – presumably naming the President – in a document interrogators would see. You can’t blame the CIA Director, after all; Tenet signed the Guidelines just as CIA’s Inspector General and DOJ started to review the legality of the torture tactics used against detainees like Abd al-Rahim al-Nashiri, who was threatened with a drill and a gun in violation of DOJ’s ban on mock executions.
  • The White House’s fight to keep the short phrase describing Bush’s authorization of the torture program hidden speaks to its apparent ambivalence over the torture program. Even after President Obama released the DOJ memos authorizing torture – along with a damning CIA Inspector General Report and a wide range of documents revealing bureaucratic discussions within the CIA about torture – the White House still fought the release of the phrase that would have made it clear that the CIA conducted this torture at the order of the president. And it did so with a classified declaration from Jones that would have remained secret had Judge Hellerstein not insisted it be made public. As Aftergood noted, such White House intervention in a FOIA suit is rare. “The number of times that a national security advisor has filed a declaration in a FOIA lawsuit is vanishingly small,” he said. “It almost never happens.” But as ACLU Deputy Legal Director Jameel Jaffer noted of the finding, “It was the original authority for the CIA’s secret prisons and for the agency’s rendition and torture program, and apparently it was the authority for the targeted killing program as well.  It was the urtext.  It’s remarkable that after all this time it’s still secret.”
  • President Obama’s willingness to go to such lengths to hide this short phrase may explain the White House’s curious treatment of potentially privileged documents with the Senate now – describing President Bush’s authorization of the torture program and its seemingly contradictory stance supporting publishing the Torture Report while thwarting its completion by withholding privileged documents. After all, the documents in question, like the reference to the presidential finding, may deprive the President of plausible deniability. Furthermore, those documents may undermine one of the conclusions of the Torture Report. According to Senator Ron Wyden, the Senate Torture Report found that “the CIA repeatedly provided inaccurate information about its interrogation program to the White House.” Perhaps the documents reportedly withheld by the White House undermine this conclusion, and instead show that the CIA operated with the full consent and knowledge of at least some people within the White House. Finally, the White House’s sensitivity about documents involved in the torture program may stem from the structure of the finding. As John Rizzo made clear, the finding authorizes not just torturing, but killing, senior al Qaeda figures. Bob Woodward even reported that that CIA would carry out that killing using Predator drones, a program CIA still conducts. And in fact, when the Second Circuit ultimately ruled to let the White House to keep the authorization phrase secret, it did so because the phrase also relates to “a highly classified, active intelligence activity” and “pertains to intelligence activities unrelated to the discontinued [torture] program.” Given what we know about the September 17, 2001 finding, that may well refer to President Obama’s still active drone program.
  • In any case, the White House’s seemingly contradictory statements about the Torture Report might best be understood by its past treatment of CIA documents. By releasing the DOJ memos and other materials, the White House provided what seemed to be unprecedented transparency about what the CIA had done. But all the while it was secretly hiding language describing what the White House has done.
  •  
    See also U.N. Convention Against Torture, which the U.S. is a party to. http://www.un.org/documents/ga/res/39/a39r046.htm
Paul Merrell

US Intel Agencies Try to Strong-Arm Trump into War With Russia - 0 views

  • Powerful elites are using the credibility of the US Intelligence agencies to demonize Russia and prepare the country for war. This is the real meaning of the “Russia hacking” story which, as yet, has not produced any hard evidence of Russian complicity. Last week’s 25-page report, that was released by the Director of National Intelligence James Clapper, illustrates to what extent intelligence is being “fixed around the policy”.  Just as the CIA generated false information related to Weapons of Mass Destruction to soften public resistance to war with Iraq, so too, the spurious allegations in the DNI’s politically-motivated report are designed to depict Russia as a growing threat to US national security. The timing of the report has less to do with the election of Donald Trump as President than it does with critical developments in Syria where the Russian military has defeated US-proxies in Syria’s industrial hub, Aleppo, rolling back Washington’s 15-year War of Terror and derailing the imperialist plan to control vital resources and pipeline corridors across the Middle East and Central Asia. Russia has become the main obstacle to Washington achieving its strategic vision of pivoting to Asia and maintaining its dominant role into the next century. The Intelligence Community has been coerced into compromising its credibility to incite fear of Russia and to advance the geopolitical ambitions of deep state powerbrokers.
  • The “Russia hacking” flap shows how far the Intel agencies have veered from their original mandate, which is to impartially gather and analyze information that may be vital to US national security. As we have seen in the last two weeks, the leaders of these organizations feel free to offer opinions on  issues that clearly conflict with those of the new President-elect. Trump has stated repeatedly that he wants to reduce tensions and reset relations with Russia, but that policy is being sabotaged by members of the intelligence community, particularly CIA Director John Brennan who appeared just last week on PBS Newshour with Judy Woodruff. Here’s an excerpt from the interview: “We see that there are still a lot of actions that Russia is undertaking that undermine the principles of democracy in so many countries. What has happened in our recent election is not new. The Russians have engaged in trying to manipulate elections in Europe for a number of years… the Russians tried to interfere in our electoral process recently, and were actively involved in that. And that is something that we can’t countenance.” (“Interview with CIA Director John Brennan”,  PBS Newshour)
  • Brennan, of course, provided no evidence for his claims nor did he mention the hundreds of CIA interventions around the world. But Brennan’s accusations are less important than the fact that his appearance on a nationwide broadcast identifies him as a political advocate for policies that conflict with those of the new president. Do we really want unelected intelligence officials — whose job it is to provide the president with sensitive information related to national security– to assume a partisan role in shaping policy? And why would Brennan –whose is supposed to “serve at the pleasure of the president”– accept an invitation to offer his views on Russia when he knew they would be damaging to the new administration? Powerful people behind the scenes are obviously pushing the heads of these intelligence agencies to stick to their ‘anti-Moscow’ narrative to force Trump to abandon his plan for peaceful relations with Moscow.  Brennan isn’t calling the shots and neither are Clapper or Comey. They’re all merely agents serving the interests of establishment plutocrats whose geopolitical agenda doesn’t jibe with that of the incoming administration. If that wasn’t the case, then why would the Intelligence Community stake its reputation on such thin gruel as this Russian hacking gibberish? It doesn’t make any sense. The people who launched this campaign are either supremely arrogant or extremely desperate. Which is it?
  • ...2 more annotations...
  • What’s really going on here?  Why have the Intelligence agencies savaged their credibility just to convince people that Russia is up to no good? The Russia hacking story has more to do with recent developments in Syria than it does with delegitimizing Donald Trump. Aleppo was a real wake up call for the US foreign policy establishment which is beginning to realize that their plans for the next century have been gravely undermined by Russia’s military involvement in Syria. Aleppo represents the first time that an armed coalition of allied states (Russia, Iran, Syria, Hezbollah) have actively engaged US jihadist-proxies and soundly beat them to a pulp. The stunning triumph in Aleppo has spurred hope among the vassal states that Washington’s bloody military juggernaut can be repelled, rolled back and defeated. And if Washington’s CIA-armed, trained and funded jihadists can be repelled, then the elitist plan to project US power into Central Asia to dominate the world’s most populous and prosperous region, will probably fail. In other words, the outcome in Aleppo has cast doubts on Uncle Sam’s ability to successfully execute its pivot to Asia. That’s why the Intel agencies have been employed to shape public perceptions on Russia.  Their job is to prepare the American people for an escalation of hostilities between the two nuclear-armed superpowers. US powerbrokers are determined to intensify the conflict and reverse facts on the ground. (Recent articles by elites at the Council on Foreign Relations and the Brookings Institute reveal that they are as committed to partitioning Syria as ever.)  Washington wants to  reassert its exceptional role as the uncontested steward of global security and the lone ‘unipolar’ world power.
  • That’s what this whole “hacking” fiasco is about. The big shots who run the country are trying to strong-arm ‘the Donald’ into carrying their water so the depredations can continue and Central Asia can be transformed into a gigantic Washington-dominated corporate free trade zone where the Big Money calls the shots and Capital reigns supreme. That’s their dreamstate, Capitalist Valhalla. They just need Trump to get-with-the-program so the bloodletting can continue apace.
‹ Previous 21 - 40 of 370 Next › Last »
Showing 20 items per page