Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged legal-memos

Rss Feed Group items tagged

Paul Merrell

EXCLUSIVE: Justice Department memo reveals legal case for drone strikes on Americans - ... - 0 views

  • A confidential Justice Department memo concludes that the U.S. government can order the killing of American citizens if they are believed to be “senior operational leaders” of al-Qaida or “an associated force” -- even if there is no intelligence indicating they are engaged in an active plot to attack the U.S.The 16-page memo, a copy of which was obtained by NBC News, provides new details about the legal reasoning behind one of the Obama administration’s most secretive and controversial polices: its dramatically increased use of drone strikes against al-Qaida suspects, including those aimed at American citizens, such as the  September 2011 strike in Yemen that killed alleged al-Qaida operatives Anwar al-Awlaki and Samir Khan. Both were U.S. citizens who had never been indicted by the U.S. government nor charged with any crimes.  
  • The secrecy surrounding such strikes is fast emerging as a central issue in this week’s hearing of White House counterterrorism adviser John Brennan, a key architect of the drone campaign, to be CIA director.  Brennan was the first administration official to publicly acknowledge drone strikes in a speech last year, calling them “consistent with the inherent right of self-defense.” In a separate talk at the Northwestern University Law School in March, Attorney General Eric Holder specifically endorsed the constitutionality of targeted killings of Americans, saying they could be justified if government officials determine the target poses  “an imminent threat of violent attack.” But the confidential Justice Department “white paper” introduces a more expansive definition of self-defense or imminent attack than described  by Brennan or Holder in their public speeches.  It refers, for example, to what it calls a “broader concept of imminence” than actual intelligence about any ongoing plot against the U.S. homeland.  
  • “The condition that an operational  leader present an ‘imminent’ threat of violent attack against the United States does not require the United States to have clear evidence that a specific attack on U.S. persons and interests will take place in the immediate future,” the memo states.Read the entire 'white paper' on drone strikes on Americans
  • ...2 more annotations...
  • Although not an official legal memo, the white paper was represented by administration  officials as a policy document that closely mirrors the arguments of classified memos on targeted killings by the Justice Department’s  Office of Legal Counsel, which provides authoritative legal advice to the president and all executive branch agencies. The administration has refused to turn over to Congress or release those memos publicly -- or even publicly confirm their existence. A source with access to the white paper, which is not classified, provided a copy to NBC News. 
  • Pressure for turning over the Justice Department memos on targeted killings of Americans appears to be building on Capitol Hill amid signs that Brennan will be grilled on the subject at his confirmation hearing before the Senate Intelligence Committee on Thursday.  Advertise | AdChoices On Monday, a bipartisan group of 11 senators -- led by Democrat Ron Wyden of Oregon — wrote  a letter to President Barack Obama asking him to release all Justice Department memos on the subject. While accepting that “there will clearly be circumstances in which the president has the authority to use lethal force” against Americans who take up arms against the country,  it said, “It is vitally important ... for Congress and the American public to have a full understanding of how  the executive branch interprets the limits and boundaries of this authority.”
  •  
    Finally, the lid begins to come off the secret legal memoranda claiming to justify assassinations of U.S. citizens by the Obama regime.
Gary Edwards

Chilling legal memo from Obama DOJ justifies assassination of US citizens - Tea Party - 0 views

  • Chilling legal memo from Obama DOJ justifies assassination of US citizens
  • The president’s partisan lawyers purport to vest him with the most extreme power a political leader can seize (The Guardian) – The most extremist power any political leader can assert is the power to target his own citizens for execution without any charges or due process, far from any battlefield. The Obama administration has not only asserted exactly that power in theory, but has exercised it in practice. In September 2011, it killed US citizen Anwar Awlaki in a drone strike inYemen, along with US citizen Samir Khan, and then, in circumstances that are still unexplained, two weeks later killed Awlaki’s 16-year-old American son Abdulrahman with a separate drone strike in Yemen.
  • a Washington Post article from October reported that the administration is formally institutionalizing this president’s power to decide who dies under the Orwellian title “disposition matrix”.
  • ...15 more annotations...
  • What has made these actions all the more radical is the absolute secrecy with which Obama has draped all of this. Not only is the entire process carried out solely within the Executive branch - with no checks or oversight of any kind – but there is zero transparency and zero accountability. The president’s underlings compile their proposed lists of who should be executed, and the president – at a charming weekly event dubbed by White House aides as “Terror Tuesday” – then chooses from “baseball cards” and decrees in total secrecy who should die. The power of accuser, prosecutor, judge, jury, and executioner are all consolidated in this one man, and those powers are exercised in the dark.
  • The Most Transparent Administration Ever™ has been so fixated on secrecy that they have refused even to disclose the legal memoranda prepared by Obama lawyers setting forth their legal rationale for why the president has this power.
  • During the Bush years, when Bush refused to disclose the memoranda from his Office of Legal Counsel (OLC) that legally authorized torture, rendition, warrantless eavesdropping and the like, leading Democratic lawyers such as Dawn Johnsen (Obama’s first choice to lead the OLC) vehemently denounced this practice as a grave threat, warning that “the Bush Administration’s excessive reliance on ‘secret law’ threatens the effective functioning of American democracy” and “the withholding from Congress and the public of legal interpretations by the [OLC] upsets the system of checks and balances between the executive and legislative branches of government.”
  • But when it comes to Obama’s assassination power, this is exactly what his administration has done. It has repeatedly refused to disclose the principal legal memoranda prepared by Obama OLC lawyers that justified his kill list. It is, right now, vigorously resisting lawsuits from the New York Times and the ACLU to obtain that OLC memorandum. In sum, Obama not only claims he has the power to order US citizens killed with no transparency, but that even the documents explaining the legal rationale for this power are to be concealed. He’s maintaining secret law on the most extremist power he can assert.
  • Last night, NBC News’ Michael Isikoff released a 16-page “white paper”prepared by the Obama DOJ that purports to justify Obama’s power to target even Americans for assassination without due process (the memo is embedded in full below). This is not the primary OLC memo justifying Obama’s kill list – that is still concealed – but it appears to track the reasoning of that memo as anonymously described to the New York Times in October 2011.
  • there are numerous points that should be emphasized about the fundamentally misleading nature of this new memo:
  • 2. Creating a ceiling, not a floor
  • 1. Equating government accusations with guilt
  • 3. Relies on the core Bush/Cheney theory of a global battlefield
  • 4. Expanding the concept of “imminence” beyond recognition
  • The memo is authorizing assassinations against citizens in circumstances far beyond this understanding of “imminence”. Indeed, the memo expressly states that it is inventing “a broader concept of imminence” than is typically used in domestic law. Specifically, the president’s assassination power “does not require that the US have clear evidence that a specific attack . . . will take place in the immediate future”. The US routinely assassinates its targets not when they are engaged in or plotting attacks but when they are at home, with family members, riding in a car, at work, at funerals, rescuing other drone victims, etc.
  • “This is a chilling document” because “it argues that the government has the right to carry out the extrajudicial killing of an American citizen” and the purported limits “are elastic and vaguely defined, and it’s easy to see how they could be manipulated.”
  • 6. Making a mockery of “due process”
  • Stephen Colbert perfectly mocked this theory when Eric Holder first unveiled it to defend the president’s assassination program. At the time, Holder actually said: “due process and judicial process are not one and the same.” Colbert interpreted that claim as follows: “Trial by jury, trial by fire, rock, paper scissors, who cares?Due process just means that there is a process that you do. The current process is apparently, first the president meets with his advisers and decides who he can kill. Then he kills them.”
  • here we are almost a full decade later. And we have the current president asserting the power not merely to imprison or eavesdrop on US citizens without charges or trial, but to order them executed – and to do so in total secrecy, with no checks or oversight.
Paul Merrell

Still Secret: Second Circuit Keeps More Drone Memos From the Public | Just Security - 0 views

  • Secret law has been anathema to our democracy since its Founding, but a federal appeals court just gave us more of it.
  • We might forgive the citizenry’s confusion, though, in attempting to square those principles with the decision by the Second Circuit Court of Appeals, published yesterday, holding that the government may continue to keep secret nine legal memoranda by the Justice Department’s Office of Legal Counsel analyzing the legality of targeted killings carried out by the US government. It was just more than a year ago that the same panel of the same court ordered the government to disclose key portions of a July 2010 OLC memorandum that authorized the targeted killing of an American citizen in Yemen. At the time, the court’s opinion seemed to promise at least a partial solution to a problem straight (as the district court in the same case put it) from Alice in Wonderland: that [a] thicket of laws and precedents … effectively allow the Executive Branch of our Government to proclaim as perfectly lawful certain actions that seem on their face incompatible with our Constitution and laws, while keeping the reasons for its conclusion a secret.
  • Yesterday’s opinion retreats from that promise by keeping much of the government’s law of the targeted killing program secret. (In this and two other cases, the ACLU continues to seek more than 100 other legal memoranda authored by various agencies concerning targeted killing.) It does so in two ways that warrant attention. First, the court suggests that OLC merely gives advice to executive branch agencies, and that OLC’s legal memoranda do not establish the “working law” of the government because agencies might not “adopt” the memoranda’s legal analysis as their own. This argument is legally flawed and, moreover, it flies in the face of the public evidence concerning how the executive branch treats opinions issued by OLC. In an OLC memorandum published, ironically or not, the same day (July 16, 2010) and over the same signature (David Barron’s) as the targeted killing memorandum released at the Second Circuit’s behest last year, the OLC explains that its “central function” is to provide “controlling legal advice to Executive Branch officials.” And not even two weeks ago, the acting head of the OLC told the public that even informally drafted legal advice emanating from his office is “binding by custom and practice in the executive branch,” that “[i]t’s the official view of the office, and that “[p]eople are supposed to and do follow it.”
  • ...2 more annotations...
  • But that’s not what the government told the Second Circuit, and it’s not what the Second Circuit has now suggested is the law. Second, the Second Circuit’s new opinion endorses the continued official secrecy over any discussion of a document that has supplied a purported legal basis for the targeted killing program since almost immediately after the September 11 attacks. The document — a September 17, 2001 “Memorandum of Notification” — is not much of a secret. The government publicly identified it in litigation with the ACLU eight years ago; the Senate Intelligence Committee cited it numerous times in its recent torture report; and the press frequently makes reference to it. Not only that, but the Central Intelligence Agency’s former top lawyer, John Rizzo, freely discussed it in his recent memoir. According to Rizzo, the September 17 MON is “the most comprehensive, most ambitious, most aggressive, and most risky” legal authorization of the last decade and a half — which is saying something. Rizzo explains that the MON authorizes targeted killings of suspected terrorists by the CIA, and in his new book, Power Wars, Charlie Savage reports that the MON is the original source of the controversial (and legally novel) “continuing and imminent threat” standard the government uses to govern the lethal targeting of individuals outside of recognized battlefields. The MON is also likely to have authorized an end run around the assassination “ban” in Executive Order 12333 — a legal maneuver that is discussed in, but almost entirely redacted from, an earlier OLC analysis of targeted killing.
  • In yesterday’s opinion, the Second Circuit upheld the government’s withholding of a 2002 OLC memorandum that “concerns Executive Order 12333,” which almost certainly analyzes the effect of the September 17 MON, as well as of five other memoranda that “discuss another document that remains entitled to protection.” If indeed that “document” is the MON, it would seem to be yet another case of what the DC Circuit pointedly criticized, in a 2013 opinion, as the granting of judicial “imprimatur to a fiction of deniability that no reasonable person would regard as plausible.” In that case, the DC Circuit went on to quote Justice Frankfurter: “‘There comes a point where … Court[s] should not be ignorant as judges of what [they] know as men’ and women.” Last year, the Second Circuit took that admonishment to heart when it published the July 2010 OLC memorandum. Unfortunately, yesterday, rather than once again opening the country’s eyes to the law our government is applying behind closed doors, the Second Circuit closed its own.
Paul Merrell

Drone memo should reverse Gitmo convictions, attorneys claim - RT USA - 0 views

  • Attorneys for a Canadian man who spent a decade detained by the United States military at Guantanamo Bay say details in the Obama administration’s recently released “drone memo” exonerates their client of war crimes.
  • But in a recent court filing [PDF], lawyers for Khadr, now 27, say a just-published US Department of Justice memorandum contains information that directly challenges the American government’s case against their client. Khadr’s attorneys wrote this week that the secret “drone memo” released by the White House last month — the DOJ document that the government relied on to justify the 2010 drone strike in Yemen that killed American citizen and suspected AL-Qaeda member Anwar Al-Awlaki — suggests prosecutors had no place to charge the Canadian teenager with murder in violation of the laws of war after he allegedly killed an American soldier during a firefight in Afghanistan. The DOJ memo itself was a penned by the department’s Office of Legal Counsel in response to the question of whether Central Intelligence Agency officers — who are not members of the US military — can be blamed for war crimes by launching drone strikes. The memo was written in July 2010, and justified the strike that later that year killed Al-Awlaki.
  • "The whole purpose...was to evaluate whether the CIA agents were violating the law," Morison said. "The only reasonable interpretation of that analysis is that there is no such thing (as the common law of war)." On Monday this week, Morrison and the rest of Khadr’s legal counsel, filed a motion in Guantanamo’s appeals court asking that the conviction against their client be vacated.
  • ...2 more annotations...
  • According to a footnote within the memo, released June 24 of this year due to a Freedom of Information Act lawsuit, “lethal activities conducted in accordance with the laws of war, and undertaken in the course of lawfully authorized hostilities, do not violate the laws of war by virtue of the fact that they are carried out in part by government actors who are not entitled to the combatant’s privilege.” "That completely blows away one of the major prongs of the government's theory in all these Guantanamo cases," Sam Morison, Khadr's Pentagon-based lawyer, told The Canadian Press during an interview on Wednesday this week. Although Khadr was charged with violating the “US common law of war” that dates back centuries, his attorneys say the memo concerning CIA drone strikes suggest such legislation simply doesn’t exist.
  • Should Khadr’s attorneys succeed, then a number of cases pertaining to current or former Guantanamo detainees accused of war crimes could be called into question. According to Human Rights Watch, however, only six of the 149 detainees at Gitmo face any formal charges — fewer than the number of prisoners who have died while held there in military custody.
Paul Merrell

Obama ordered to divulge legal basis for killing Americans with drones | Ars Technica - 0 views

  • The Obama administration must disclose the legal basis for targeting Americans with drones, a federal appeals court ruled Monday in overturning a lower court decision likened to "Alice in Wonderland." The Second US Circuit Court of Appeals, ruling in a Freedom of Information Act (FOIA) claim by The New York Times and the American Civil Liberties Union (ACLU), said the administration must disclose the legal rationale behind its claims that it may kill enemies who are Americans overseas.
  • The Obama administration must disclose the legal basis for targeting Americans with drones, a federal appeals court ruled Monday in overturning a lower court decision likened to "Alice in Wonderland." The Second US Circuit Court of Appeals, ruling in a Freedom of Information Act (FOIA) claim by The New York Times and the American Civil Liberties Union (ACLU), said the administration must disclose the legal rationale behind its claims that it may kill enemies who are Americans overseas. "This is a resounding rejection of the government's effort to use secrecy and selective disclosure to manipulate public opinion about the targeted killing program," ACLU Legal Director Jameel Jaffer said in an e-mail. The so-called targeted-killing program—in which drones from afar shoot missiles at buildings, cars, and people overseas—began under the George W. Bush administration. The program, which sometimes kills innocent civilians, was broadened under Obama to include the killing of Americans.
  • Government officials from Obama on down have publicly commented on the program, but they claimed the Office of Legal Counsel's memo outlining the legal rationale about it was a national security secret. The appeals court, however, said on Monday that officials' comments about overseas drone attacks means the government has waived its secrecy argument. "After senior Government officials have assured the public that targeted killings are 'lawful' and that OLC advice 'establishes the legal boundaries within which we can operate,'" the appeals court said, "waiver of secrecy and privilege as to the legal analysis in the Memorandum has occurred" (PDF). The Electronic Privacy Information Center (EPIC), which in a friend-of-the court brief urged the three-judge appeals court to rule as it did, said the decision was a boon for citizen FOIA requests. "It's very helpful. We have a number of cases, including one of our oldest FOIA cases, that involves the warrantless wiretapping memos. The basic premise is when OLC writes a legal memo and when that becomes the known basis for a program, that's the law of the executive branch and cannot be withheld," Alan Butler, EPIC's appellate counsel, said in a telephone interview.
  • ...1 more annotation...
  • The appeals court said the memo may be redacted from revealing which government agencies are behind the attacks, although former CIA Director Leon Panetta has essentially acknowledged that agency's role. Last year, a federal judge blocked the disclosure of the memo. Judge Colleen McMahon of New York said she was ensnared in a "paradoxical situation" in which the law forbade her from ordering the memo's release: The Alice-in-Wonderland nature of this pronouncement is not lost on me; but after careful and extensive consideration, I find myself stuck in a paradoxical situation in which I cannot solve a problem because of contradictory constraints and rules—a veritable catch-22. I can find no way around the thicket of laws and precedents that effectively allow the Executive Branch of our government to proclaim as perfectly lawful certain actions that seem on their face incompatible with our Constitution and laws while keeping the reasons for their conclusion a secret.
  •  
    Unless the Feds successfully seek en banc review or review by the Supreme Court, we will apparently be able to read the infamous DoJ Office of Legal Counsel explaining the legal arguments why Obama may lawfully order drone strikes on U.S. citizens inside nations with which the U.S. is not at war. Let's keep in mind that DoJ claimed that Obama has the power to do that in the U.S. too. According to the Second Circuit's opinion, the ordered disclosure includes a somewhat lengthy section arguing that 18 U.S.C. 1119 and 956 do not apply to Obama. Section 1119 provides, inter alia: "(b) Offense.- A person who, being a national of the United States, kills or attempts to kill a national of the United States while such national is outside the United States but within the jurisdiction of another country shall be punished as provided under sections 1111, 1112, and 1113." Section 956 provides in part: "(a)(1) Whoever, within the jurisdiction of the United States, conspires with one or more other persons, regardless of where such other person or persons are located, to commit at any place outside the United States an act that would constitute the offense of murder, kidnapping, or maiming if committed in the special maritime and territorial jurisdiction of the United States shall, if any of the conspirators commits an act within the jurisdiction of the United States to effect any object of the conspiracy, be punished as provided in subsection (a)(2). "(2) The punishment for an offense under subsection (a)(1) of this section is- (A) imprisonment for any term of years or for life if the offense is conspiracy to murder or kidnap; and (B) imprisonment for not more than 35 years if the offense is conspiracy to maim." There should also be a section explaining away the Constitution's Due Process Clause (protecting life, liberty, and property) and Right to Trial by Jury, as well as exempting the President from international law establishing human rights and l
Paul Merrell

Show Us the Drone Memos - NYTimes.com - 0 views

  • I BELIEVE that killing an American citizen without a trial is an extraordinary concept and deserves serious debate. I can’t imagine appointing someone to the federal bench, one level below the Supreme Court, without fully understanding that person’s views concerning the extrajudicial killing of American citizens.But President Obama is seeking to do just that. He has nominated David J. Barron, a Harvard law professor and a former acting assistant attorney general, to a seat on the United States Court of Appeals for the First Circuit.
  • I believe that all senators should have access to all of these opinions. Furthermore, the American people deserve to see redacted versions of these memos so that they can understand the Obama administration’s legal justification for this extraordinary exercise of executive power. The White House may invoke national security against disclosure, but legal arguments that affect the rights of every American should not have the privilege of secrecy.I agree with the A.C.L.U. that “no senator can meaningfully carry out his or her constitutional obligation to provide ‘advice and consent’ on this nomination to a lifetime position as a federal appellate judge without being able to read Mr. Barron’s most important and consequential legal writing.” The A.C.L.U. cites the fact that in modern history, a presidential order to kill an American citizen away from a battlefield is unprecedented.The Bill of Rights is clear. The Fifth Amendment provides that no one can be “deprived of life, liberty, or property, without due process of law.” The Sixth Amendment provides that “the accused shall enjoy the right to a speedy and public trial, by an impartial jury,” as well as the right to be informed of all charges and have access to legal counsel. These are fundamental rights that cannot be waived with a presidential pen.
  • In battle, combatants engaged in war against America get no due process and may lawfully be killed. But citizens not in a battlefield, however despicable, are guaranteed a trial by our Constitution.
  • ...3 more annotations...
  • While he was an official in the Justice Department’s Office of Legal Counsel, Mr. Barron wrote at least two legal memos justifying the execution without a trial of an American citizen abroad. Now Mr. Obama is refusing to share that legal argument with the American people. On April 30, I wrote to the Senate majority leader, Harry Reid, urging him to delay this nomination, pending a court-ordered disclosure of the first memo I knew about. Since that letter, I have learned more. The American Civil Liberties Union sent a letter to all senators on May 6, noting that in the view of the Senate Intelligence Committee chairwoman, Dianne Feinstein, “there are at least eleven OLC opinions on the targeted killing or drone program.” It has not been established whether Mr. Barron wrote all those memos, but we do know that his controversial classified opinions provided the president with a legal argument and justification to target an American citizen for execution without a trial by jury or due process.
  • No one argues that Americans who commit treason shouldn’t be punished. The maximum penalty for treason is death. But the Constitution specifies the process necessary to convict.Continue reading the main story Continue reading the main story AdvertisementAnwar al-Awlaki was an American citizen who was subject to a kill order from Mr. Obama, and was killed in 2011 in Yemen by a missile fired from a drone. I don’t doubt that Mr. Awlaki committed treason and deserved the most severe punishment. Under our Constitution, he should have been tried — in absentia, if necessary — and allowed a legal defense. If he had been convicted and sentenced to death, then the execution of that sentence, whether by drone or by injection, would not have been an issue. Continue reading the main story 526 Comments But this new legal standard does not apply merely to a despicable human being who wanted to harm the United States. The Obama administration has established a legal justification that applies to every American citizen, whether in Yemen, Germany or Canada.
  • Defending the rights of all American citizens to a trial by jury is a core value of our Constitution. Those who would make exceptions for killing accused American citizens without trial should give thought to the times in our history when either prejudice or fear allowed us to forget due process. During World War I, our nation convicted and imprisoned Americans who voiced opposition to the war. During World War II, the government interned Japanese-Americans.The rule of law exists to protect those who are minorities by virtue of their skin color or their beliefs. That is why I am fighting this nomination. And I will do so until Mr. Barron frankly discusses his opinions on executing Americans without trial, and until the American people are able to participate in one of the most consequential debates in our history. Rand Paul is a Republican senator from Kentucky.
Paul Merrell

DOJ to disclose memo justifying drone strikes on Americans, easing Senate vote on autho... - 0 views

  • In a bid to clear the way for a controversial Senate nominee, the Obama administration signaled it will publicly reveal a secret memo explaining its legal justification for using drones to kill American citizens overseas.  The Justice Department, officials say, has decided not to appeal a Court of Appeals ruling requiring disclosure of a redacted version of the memo under the Freedom of Information Act. ADVERTISEMENTADVERTISEMENT The decision to release the documents comes as the Senate is to vote Wednesday on advancing President Obama's nomination of the memo's author, Harvard professor and former Justice Department official David Barron, to sit on the 1st U.S. Circuit Court of Appeals in Boston. 
  • Sen. Rand Paul, R-Ky., has vowed to fight Barron's confirmation, and some Democratic senators had called for the memo's public release before a final vote. Paul reiterated his opposition on Wednesday.  "I cannot support and will not support a lifetime appointment of anyone who believes it's OK to kill an American citizen not involved in combat without a trial," Paul said in the Senate.  But a key Democratic holdout against Barron's nomination, Sen. Mark Udall D-Colo., announced Tuesday night he will now support Barron because the memo is being released. "This is a welcome development for government transparency and affirms that although the government does have the right to keep national security secrets, it does not get to have secret law," Udall said in a statement.  Sen. Ron Wyden, D-Ore., had also been pushing for public disclosure of Barron's writings and was one of several Democrats who had been refusing to say whether he'd vote for confirmation without it. "That's certainly very constructive," Wyden said when told of the decision not to appeal.
  • Wednesday's expected procedural vote would allow the Senate to move ahead with a final vote on Barron on Thursday. "I think we'll be OK," Senate Majority Leader Harry Reid, D-Nev., said earlier Tuesday. Anwar al-Awlaki, an Al Qaeda leader born in the United States, was killed after being targeted by a drone strike in Yemen in September 2011. Some legal scholars and human rights activists complained that it was illegal for the U.S. to kill American citizens away from the battlefield without a trial. The White House had agreed under the pressure to show senators unredacted copies of all written legal advice written by Barron regarding the potential use of lethal force against U.S. citizens in counterterrorism operations. Until now, the administration has fought in court to keep the writings from public view. But administration officials said that Solicitor General Donald Verrilli Jr. decided this week not appeal an April 21 ruling requiring disclosure by the 2nd U.S. Circuit Court of Appeals in New York and that Attorney General Eric Holder concurred with his opinion.
  • ...2 more annotations...
  • The release could take some time, since the redactions are subject to court approval. And the administration also is insisting that a classified ruling on the case also be redacted to protect information classified for national security, but not the legal reasoning, one of the officials said. The drone strike that killed al-Awlaki also killed another U.S. citizen, Samir Khan, an Al Qaeda propagandist. Al-Awlaki's 16-year-old son, Abdulrahman, was killed the following month in another drone attack. The American Civil Liberties Union and two reporters for The New York Times, Charlie Savage and Scott Shane, filed a FOIA suit. In January 2013, U.S. District Court Judge Colleen McMahon ruled that she had no authority to order the documents disclosed, although she chided the Obama administration for refusing to release them. But a three-judge appeals court panel noted that after McMahon ruled, senior government officials spoke about the subject. The panel rejected the government's claim that the court could not consider official disclosures made after McMahon's ruling, including a 16-page Justice Department white paper on the subject and public comments by Obama in May in which he acknowledged his role in the al-Awlaki killing, saying he had "authorized the strike that took him out."
  • The ACLU urged senators in a letter Tuesday not to move forward on the confirmation vote until they have a chance to see any Barron memos on the administration's drone program, not just those involving U.S. citizens. Paul issued a statement Tuesday saying he still opposes Barron's nomination. "I rise today to say that there is no legal precedent for killing American citizens not directly involved in combat and that any nominee who rubber stamps and grants such power to a president is not worthy of being placed one step away from the Supreme Court," Paul said in remarks prepared for delivery on the Senate floor Wednesday provided by his office.
  •  
    But still they push ahead, with a plan for a final vote on Barron's nomination Thursday, before the public gets to see the memos [plural].
Paul Merrell

Court Grants Secrecy for Memo on Phone Data - NYTimes.com - 0 views

  • A federal appeals court on Friday ruled that the Obama administration may continue to withhold a Justice Department memo that apparently opened a loophole in laws protecting the privacy of consumer data.The memo establishes the legal basis for telephone companies to hand over customers’ calling records to the government without a subpoena or court order, even when there is no emergency, according to a 2010 report by the Justice Department’s inspector general. The details of the legal theory, and the circumstances in which it could be invoked, remain unclear. Related Coverage F.B.I. Made ‘Blanket’ Demands for Phone RecordsMARCH 13, 2008 F.B.I. Violated Rules in Obtaining Phone Records, Report SaysJAN. 20, 2010 C.I.A. Is Said to Pay AT&T for Call DataNOV. 7, 2013 The ruling, by the United States Court of Appeals for the District of Columbia Circuit, came down on the side of a broad conception of the executive branch’s power to keep secret its interpretation of what the law permits it to do. The ruling may make it easier for the government to shield other memos by the Justice Department’s powerful Office of Legal Counsel from disclosure under the Freedom of Information Act.
  • The document at issue is a classified memo issued by the Office of Legal Counsel on Jan. 8, 2010. A report later that year by the Justice Department’s inspector general at the time, Glenn A. Fine, disclosed the memo’s existence and its broad conclusion that telephone companies may voluntarily provide records to the government “without legal process or a qualifying emergency,” notwithstanding the Electronic Communications Privacy Act.
  • The F.B.I. had asked for the memo as part of an investigation by Mr. Fine into problems with the bureau’s use of so-called exigent letters to obtain telephone and financial records without following any legal procedures.
Paul Merrell

Let's check James Comey's Bush years record before he becomes FBI director | Laura Murp... - 0 views

  • Comey is lionised in DC for one challenge over liberties. Yet he backed waterboarding, wire-tapping and indefinite detention
  • It had the air of Hollywood. On the night of 10 March 2004, James Comey, the nominee to lead the FBI for the next ten years, rushed to the hospital bedside of his terribly ill boss, Attorney General John Ashcroft.There, he eventually confronted White House Chief of Staff Andrew Card and White House Counsel Alberto Gonzales, who were trying to get the pancreatitis-stricken Ashcroft to renew a still secret and illegal surveillance program on Americans' electronic communications. Neither Ashcroft nor Comey, then acting attorney general because of Ashcroft's condition, would reauthorize the program. When Gonzales authorized the program to go forward without a Justice Department certification, Comey threatened to resign, along with his staff and FBI Director Robert Mueller.The threats worked: President Bush blinked, and Comey won modifications to the secret surveillance program that he felt brought it into compliance with the law. This event, now the stuff of DC legend, has solidified Comey's reputation as a "civil liberties superhero", in the words of CNN's Jake Tapper, and may be one of the reasons President Obama nominated him Friday to be the next director of the FBI.
  • There's one very big problem with describing Comey as some sort of civil libertarian: some facts suggest otherwise. While Comey deserves credit for stopping an illegal spying program in dramatic fashion, he also approved or defended some of the worst abuses of the Bush administration during his time as deputy attorney general. Those included torture, warrantless wiretapping, and indefinite detention.On 30 December 2004, a memo addressed to James Comey was issued that superseded the infamous memo that defined torture as pain "equivalent in intensity to the pain accompanying serious physical injury, such as organ failure". The memo to Comey seemed to renounce torture but did nothing of the sort. The key sentence in the opinion is tucked away in footnote 8. It concludes that the new Comey memo did not change the authorizations of interrogation tactics in any earlier memos.In short, the memo Comey that approved gave a thumbs-up on waterboarding, wall slams, and other forms of torture – all violations of domestic and international law.
  • ...3 more annotations...
  • Then, there's warrantless wiretapping. Many media reports describe that Comey's defiant stand at Ashcroft's bedside was in opposition to the warrantless wiretapping of Americans international communications. But we simply do not know exactly what Comey opposed, or why or what reforms he believed brought the secret program within the rule of law. We do, however, know that Comey was read into the program in January 2004.While, to his credit, he immediately began raising concerns, the program was still in existence when the New York Times exposed it in December 2005. This was a year and a half after Comey's hospital showdown with Gonzales and Card. In fact, the warrantless wiretapping program was supported by a May 2004 legal opinion (pdf) produced by the Justice Department's Office of Legal Counsel and signed off by Comey, which replaced the 2001 legal opinion Comey had problems with.This, of course, raises the question: just what illegal surveillance program did Comey oppose so much he would resign over it? Last weekend, the Washington Post provided a new theory: the Marina program, which collects internet metadata. Now, the Senate has an opportunity to end the theorizing and find out what exactly Comey objected to. It's a line of questioning that senators should focus doggedly on, in light of the recent revelations in the Post and the Guardian.
  • The final stain on Comey's record was his full-throated defense of the indefinite military detention of an American citizen arrested on American soil. In a June 2004 press conference, Comey told of Jose Padilla, an alleged al-Qaida member accused of plotting to detonate a dirty bomb as well as blow up apartment buildings in an American city. By working for al-Qaida, Padilla, Comey argued, could be deprived of a lawyer and indefinitely detained as an enemy combatant on a military brig off the South Carolina coast for the purpose of extracting intelligence out of him. It turned out that Padilla was never charged with the list of crimes and criminal associations pinned on him by Comey that day. When Padilla was finally convicted – in a federal court – in August 2007, it wasn't for plotting dirty bomb attacks or blowing up apartment buildings. Rather, he was convicted of material support of terrorism overseas. During his indefinite military detention, Padilla was tortured.
  • Everyone has a backstory, and the confirmation process should ensure the American public hears all relevant background information, both good and bad, when Comey appears before the Senate. Senators should insist that Comey explain his role during the Bush era and repudiate policies he endorsed on torture, indefinite detention, and illegal surveillance.The new FBI director will be around for the next decade. We need one who will respect the constitution and the rule of law; not one who will use discredited and illegal activities in the name of justice and safety.
  •  
    Comey's not right for the FBI directorship this time around. The nation needs an FBI Director and Comey's role in government surveillance, torture, warrantless wiretapping, extraordinary rendition, and indefinite detention of a U.S. citizen. That's too much to get sorted out any time soon given the government shroud of secrecy on those topics. 
Paul Merrell

Redactions in U.S. Memo Leave Doubts on Data Surveillance Program - NYTimes.com - 0 views

  • The Justice Department has released a newly declassified version of a May 2004 legal memo approving the National Security Agency’s Stellarwind program, a set of warrantless surveillance and data collection activities that President George W. Bush secretly authorized after the terrorist attacks of Sept. 11, 2001. But questions about the program remain.A more heavily redacted version of the memo had been released in 2011 as part of Freedom of Information Act lawsuits by the American Civil Liberties Union and the Electronic Privacy Information Center. The new version includes previously censored references to the existence of the data collection related to Americans’ phone calls and emails.
  • The Obama administration voluntarily reprocessed the memo from Jack Goldsmith, the head of the Justice Department’s Office of Legal Counsel, in light of the fact that it had declassified the existence of the bulk phone and email data programs last year after leaks by Edward J. Snowden, a former N.S.A. contractor.The fuller release adds to the public record of an important historical episode. However, the government continued to redact crucial portions of the memo that would answer a primary remaining question about the history of Stellarwind: What prompted the Justice Department to conclude in early 2004 that one aspect of the program, which collected records about Americans’ emails in bulk, was illegal — even though it permitted other aspects, like warrantless wiretapping and the bulk collection of Americans’ phone records, to continue?“They have continued to keep redacted something very significant,” said Jameel Jaffer, a lawyer with the A.C.L.U.
  • The Justice Department’s conclusion that the email metadata program was illegal led to a March 2004 confrontation between White House and department officials in the hospital room of Attorney General John Ashcroft, after which nearly the entire top leadership of the department threatened to resign, prompting President Bush to agree to changes.
  • ...1 more annotation...
  • parts of what had happened began to become public, starting with a December 2005 article in The New York Times that revealed the warrantless wiretapping portion of the program. The bulk phone and email metadata programs, however, remained secret until 2013, when they came to light in leaks by Mr. Snowden.While the basic existence of the March 2004 crisis has been known, it was not until Mr. Snowden’s leaks that it became clear that it pertained only to the Internet metadata program. However, it has remained murky what Mr. Goldsmith objected to in light of his willingness to bless the rest of Stellarwind based on a sweeping theory of presidential wartime powers.Those portions of the memo remain redacted in the newly released version.
Gary Edwards

Sony leaks reveal Hollywood is trying to break DNS, the backbone of the internet | The ... - 0 views

  • You could still type http://www.piratebay.se into your browser, but without a working DNS record, you wouldn't be able to find the site itself. If a takedown notice could blacklist a site from every available DNS provider, the URL would be effectively erased from the internet.
  • No one's ever tried to issue a takedown notice like that, but this latest memo suggests the MPAA is looking into it as a potentially powerful new tool in the fight against piracy. "A takedown notice program, therefore, could threaten ISPs with potential secondary liability in the event that they do not cease connecting users to known infringing material through their own DNS servers," the letter reads. "While not making it impossible for users to reach pirate sites (i.e., a user could still use a third-party DNS server), it could make it substantially more complicated for casual infringers to reach pirate sites if their ISPs decline to assist in the routing of communications to those sites." The full document is embedded below.
  • The MPAA’s legal argument centers on the claim that DNS records are working as an index or directory rather than simply routing data. If that argument holds, then the DNS links could be vulnerable to the same takedown notices used to strike torrent links from Google searches. The net effect would be similar to site-blocking, making it as easy to unplug a URL as it is to take down a YouTube video. It would also cast DNS providers as legally responsible for all the sites on the web, the same way YouTube is responsible for every video uploaded to its network. For many providers, simply managing the flood of notices might create a logistical nightmare.
  •  
    "Most anti-piracy tools take one of two paths: they either target the server that's sharing the files (pulling videos off YouTube or taking down sites like The Pirate Bay) or they make it harder to find (delisting offshore sites that share infringing content). But leaked documents reveal a frightening line of attack that's currently being considered by the MPAA: What if you simply erased any record that the site was there in the first place? A BOLD CHALLENGE TO THE BASIC ENGINEERING OF THE INTERNET To do that, the MPAA's lawyers would target the Domain Name System (DNS) that directs traffic across the internet. The tactic was first proposed as part of the Stop Online Piracy Act (SOPA) in 2011, but three years after the law failed in Congress, the MPAA has been looking for legal justification for the practice in existing law and working with ISPs like Comcast to examine how a system might work technically. If the system works, DNS-blocking could be the key to the MPAA's long-standing goal of blocking sites from delivering content to the US. At the same time, it represents a bold challenge to the basic engineering of the internet, threatening to break the very backbone of the web and drawing the industry into an increasingly nasty fight with Google. The Domain Name System is a kind of phone book for the internet, translating URLs like http://www.theverge.com into IP addresses like 192.5.151.3. Given a URL string, your computer will turn to a DNS server (often run by a local ISP or a third party like Google) to find the IP address of the corresponding server. Much like the phone book, that function is usually treated as a simple an engineering task - but a memo commissioned by the MPAA this August sketches out a legal case for blocking infringing sites from the DNS records entirely, like wiping unsavory addresses out of the phone book. You could still type http://www.piratebay.se into your browser, but without a working DNS record, you wouldn't be able to find the
Paul Merrell

Senators clash with Justice Department lawyer over CIA intelligence memos | World news ... - 0 views

  • An argument about a secret congressional committee's ability to review the US intelligence agencies exploded into rare public view on Tuesday as angry senators demanded legal memos from a nominee to run the CIA's legal office. Caroline Krass, a top justice department lawyer, sparked the ire of several Senate intelligence committee members by claiming that crucial legal opinions about intelligence matters were beyond the scope of the committee. Asked directly and repeatedly if the Senate panel was entitled to the memos, which several senators claimed were crucial for performing their oversight functions, Krass replied: "I do not think so, as a general matter." Dianne Feinstein, the California Democrat who chairs the committee, suggested that Krass placed her nomination as CIA general counsel in jeopardy. "You are going to encounter some heat in that regard," Feinstein said.
  • The Senate intelligence committee, whose public hearings are increasingly rare, is usually a bastion of support for the CIA and its sister intelligence agencies. The exception is the committee's prolonged fight with the CIA over a 6,300-page report on the agency's torture of terrorism detainees in its custody since 9/11. The committee has prepared its report for years; the former chairman, Jay Rockefeller of West Virginia, said the classified version contains 50,000 footnotes. For a year, the panel has sought to release a public version that multiple members of the panel say documents both the brutality of CIA torture and what they have called "lies" told by the CIA to the oversight committees in Congress and the rest of the executive branch concerning its torture practices. CIA director John Brennan, who was a senior CIA official during the years scrutinised by the committee, is resisting release of the report. The CIA has told reporters that the report contains numerous factual errors, which Senator Mark Udall, a Colorado Democrat on the panel, said on Tuesday was a "misleading" and self-serving description of differences of "interpretation" between the agency and the committee. "I'm more confident than ever in the factual accuracy" of the torture report, Udall said.
  • The panel said at the hearing that the CIA is stalling on the provision of documents to the committee that will help it complete its work. Krass, a former White House official who worked alongside Brennan there, did not assure the committee she would help provide them. Krass said the general counsel of the CIA had a "duty and obligation to make sure the committee understands the legal basis" for CIA activities. She worried that disclosure of the legal memos themselves would inhibit the executive branch from candidly discussing policy proposals for fear of embarrassing public disclosure. Several senators found Krass's statement insufficient. Carl Levin, a Michigan Democrat who has investigated torture while serving on the Armed Services Committee as well, asked if the committee was "entitled" to the opinions as a matter of oversight. Krass said her "caveated answer" was, "I do not think so, as a general matter." It is unclear if the committee will reject Krass's nomination. But the two-hour exchange highlighted the difficulties the intelligence committees can face in getting basic factual information from the intelligence agencies they are tasked with overseeing.
  • ...1 more annotation...
  • Those difficulties carry over to the ongoing controversy about the NSA's bulk surveillance activities, Udall and his colleague Ron Wyden of Oregon have charged. But they are the only dissenters on a committee that has been stalwart in favour of the NSA, even as the committee is feuding with the CIA. Feinstein got Krass to say she disagreed with a federal judge's opinion on Monday that the NSA's bulk surveillance of US phone data was likely unconstitutional. Krass, who would have a limited ability to oversee that program at CIA but likely has insight into it through her Justice Department role, disputed Judge Richard Leon's assessment that such constitutional protections surround that data. "I have a different view about the Fourth Amendment," Krass said. Feinstein said she agreed with Krass, but said no one on the committee wished to contravene the constitution, urging the Supreme Court to settle the issue.
  •  
    John Kennedy had the right idea: abolish the CIA. 
Paul Merrell

Revealed: Senate report contains new details on CIA black sites | Al Jazeera America - 0 views

  • A Senate Intelligence Committee report provides the first official confirmation that the CIA secretly operated a black site prison out of Guantánamo Bay, two U.S. officials who have read portions of the report have told Al Jazeera. The officials — who spoke on condition of anonymity because the 6,600-page report on the CIA’s detention and interrogation program remains classified — said top-secret agency documents reveal that at least 10 high-value targets were secretly held and interrogated at Guantánamo’s Camp Echo at various times from late 2003 to 2004. They were then flown to Rabat, Morocco, before being officially sent to the U.S. military’s detention facility at Guantánamo in September 2006. In September 2006, President George W. Bush formally announced that 14 CIA captives had been transferred to Guantánamo and would be prosecuted before military tribunals. He then acknowledged for the first time that the CIA had been operating a secret network of prisons overseas to detain and interrogate high-value targets.
  • The Senate report, according to Al Jazeera’s sources, says that the CIA detained some high-value suspects on Diego Garcia, an Indian Ocean island controlled by the United Kingdom and leased to the United States. The classified CIA documents say the black site arrangement at Diego Garcia was made with the “full cooperation” of the British government. That would confirm long-standing claims by human rights investigators and journalists, whose allegations — based on flight logs and unnamed government sources — have routinely been denied by the CIA. The CIA and State Department declined Al Jazeera’s requests for comment. The Intelligence Committee last week voted 11 to 3 to declassify the report’s 480-page executive summary and 20 conclusions and findings, which incorporate responses from Republican members of the committee and from the CIA. The executive summary will undergo a declassification review, led by the CIA, with input from the State Department and the Office of the Director of National Intelligence, the U.S. officials said. The panel’s chairwoman, Democratic Sen. Dianne Feinstein, said in a statement last Thursday that the full 6,600-page report, with 37,000 footnotes, “will be held for declassification at a later time.”
  • Leaked details of the committee’s report have caused waves in countries like Poland, where the CIA is known to have operated a black site prison — which Polish officials continue to deny having known about. The U.S. officials who spoke to Al Jazeera said that the Senate report reveals 20 prisoners were secretly detained in Poland from 2002 to 2005. They added that Polish officials recently sought assurances from diplomats and visiting U.S. officials that the Senate report would conceal details about Poland’s role in allowing the CIA black site to be operated on Polish soil. Al Jazeera’s sources said U.S. officials reassured their Polish counterparts last year that it was almost certain that the declassified version of the report would not identify the countries that cooperated with the CIA’s detention and interrogation program.
  • ...6 more annotations...
  • According to the Senate report, Al Jazeera’s sources said, a majority of the more than 100 detainees held in CIA custody were detained in secret prisons in Afghanistan and Morocco, where they were subject to torture methods not sanctioned by the Justice Department. Those methods are recalled by the report in vivid narratives lifted from daily logs of the detention and interrogation of about 34 high-value prisoners. The report allegedly notes that about 85 detainees deemed low-value passed through the black sites and were later dumped at Guantánamo or handed off to foreign intelligence services. More than 10 of those handed over to foreign intelligence agencies “to face terrorism charges” are now “unaccounted for” and presumed dead, the U.S. officials said. The Senate report says more than two dozen of these men designated low-value had, in fact, been wrongfully detained and rendered to other countries on the basis of intelligence obtained from CIA captives under torture and from information shared with CIA officials by other governments, both of which turned out to be false. The report allegedly singles out a top CIA official for botching a handful of renditions and outlines agency efforts to cover up the mistakes. The Senate report allegedly accuses “senior CIA officials” of lying during multiple closed-session briefings to members of Congress from 2003 to 2005 about the use of certain “enhanced” interrogation techniques. The report says an agency official lied to Congress in 2005 when he insisted the U.S. was adhering to international treaties barring cruel and degrading treatment of prisoners, the U.S. officials told Al Jazeera.
  • The report not only accuses certain CIA officials of deliberately misleading Congress; Al Jazeera’s sources say it also suggests that the agency sanctioned leaks to selected journalists about phantom plots supposedly disrupted as a result of information gained through the program in order to craft a narrative of success. The Senate report, like a 2009 Senate Armed Services Committee report (PDF), says Air Force psychologists under contract to the CIA reverse-engineered a decades-old resistance-training program taught to U.S. airmen known as survival evasion resistance escape (SERE). According to a SERE training document obtained by Al Jazeera titled “Coercive Exploitation Techniques,” Air Force personnel were taught that communist regimes used “deprivations” of “food, water, sleep and medical care” as well as “the use of threats” in order to weaken a captive’s mental and physical ability to resist interrogation. “Isolation” would be used, according to the SERE program, to deprive the “recipient of all social support” so that he develops a “dependency” on his interrogator. And “physical duress, violence and torture” are used to weaken “mental and physical ability to resist exploitation.” Ironically, perhaps, the SERE document (displayed below) notes that such techniques were used by the Soviet Union, China and North Korea to obtain false confessions.
  • Senate investigators allegedly obtained from the CIA a 2003 “business plan,” written by Air Force psychologists James Mitchell and Bruce Jessen, that contained erroneous details about the positive aspects of the enhanced interrogation program and the veracity of the intelligence its extracted from detainees. The “business plan” states that Al-Qaeda captives were “resistant” to “standard” interrogation techniques, an argument the Senate report found lacked merit because torture techniques were used before they were even questioned. Neither Jessen, who lives in Spokane, Wash., nor Mitchell, who resides in Land o’ Lakes, Fla., responded to phone calls or emails for comment. Both men are featured prominently in the Senate’s report, according to U.S. officials.
  • According to Al Jazeera’s sources, Zain Abidin Mohammed Husain Abu Zubaydah was the only captive subjected to all 10 torture techniques identified in an August 2002 Justice Department memo. But the U.S. officials said the Senate report concludes that the methods applied to Abu Zubaydah went above and beyond the guidelines outlined in that memo and were used before the memo establishing their legality was written. The Senate report allegedly adopts part of a narrative from former FBI special agent Ali Soufan, who first interrogated Abu Zubaydah at the black site and wrote in his book “The Black Banners” that Mitchell was conducting an “experiment” on Abu Zubaydah. For example, the August 2002 Justice Department legal memo authorized sleep deprivation for Abu Zubaydah for 11 consecutive days, but Mitchell kept him awake far longer, the U.S. officials said, citing classified CIA cables. Abu Zubaydah was stripped naked, strapped into a chair and doused with cold water to keep him awake. He was then interrogated and asked what he knew, at which point, his attorney told Al Jazeera, Abu Zubaydah was “psychotic” and would have admitted to anything.
  • Additionally, the report allegedly says that Abu Zubaydah was stuffed into a pet crate (the type used to transport dogs on airplanes) over the course of two weeks and routinely passed out, was shackled by his wrists to the ceiling of his cell and subjected to an endless loop of loud music. One former interrogator briefed about Abu Zubaydah’s interrogations from May to July 2002 told Al Jazeera that the music used to batter the detainee’s senses was by the Red Hot Chili Peppers. Abu Zubaydah’s attorney, Brent Mickum, hopes the Senate report’s executive summary will vindicate what he has been saying for years. “My client was tortured brutally well before any legal memo was issued,” Mickum said. He expects the report to “show that my client was a nonmember of Al-Qaeda, contrary to all of the earlier reports by the Bush administration. I am also confident that the report will show that, after he was deemed to be compliant while he was held in Thailand, that he continued to be tortured on explicit orders from the Bush administration.” The Senate report, according to Al Jazeera’s sources, says that CIA interrogators were under an enormous pressure from top agency officials, themselves under pressure from the White House, to use “enhanced” interrogation techniques to obtain information from detainees connecting Iraq and Al-Qaeda.
  • One interrogator who worked for the CIA and the U.S. military during Bush’s tenure and participated in the interrogations of two high-value CIA prisoners told Al Jazeera — speaking on condition of anonymity because he is still employed by the U.S. government — that the “enhanced” interrogation program was “nothing more than the Stanford Prison Experiment writ large.” (The 1971 Stanford University study shocked the public by demonstrating how easily people placed in authority over more vulnerable others resorted to cruelty.) “Interrogators were being pressured — You have to get info from these people,’” the interrogator told Al Jazeera. “There was no consideration that the person we were interrogating may not know. That was always seen as a resistance technique. ‘They [the detainees] must be lying!’ There was pressure on us from above to produce what they wanted. Not a single person I worked with knew how to conduct an interrogation or [had] ever conducted an interrogation.”
Paul Merrell

Leaked memos reveal GCHQ efforts to keep mass surveillance secret | UK news | The Guardian - 0 views

  • The UK intelligence agency GCHQ has repeatedly warned it fears a "damaging public debate" on the scale of its activities because it could lead to legal challenges against its mass-surveillance programmes, classified internal documents reveal.Memos contained in the cache disclosed by the US whistleblower Edward Snowden detail the agency's long fight against making intercept evidence admissible as evidence in criminal trials – a policy supported by all three major political parties, but ultimately defeated by the UK's intelligence community.Foremost among the reasons was a desire to minimise the potential for challenges against the agency's large-scale interception programmes, rather than any intrinsic threat to security, the documents show.
  • The papers also reveal that:• GCHQ lobbied furiously to keep secret the fact that telecoms firms had gone "well beyond" what they were legally required to do to help intelligence agencies' mass interception of communications, both in the UK and overseas.• GCHQ feared a legal challenge under the right to privacy in the Human Rights Act if evidence of its surveillance methods became admissible in court.• GCHQ assisted the Home Office in lining up sympathetic people to help with "press handling", including the Liberal Democrat peer and former intelligence services commissioner Lord Carlile, who this week criticised the Guardian for its coverage of mass surveillance by GCHQ and America's National Security Agency.The most recent attempt to make intelligence gathered from intercepts admissible in court, proposed by the last Labour government, was finally stymied by GCHQ, MI5 and MI6 in 2009.
  • Another top GCHQ priority in resisting the admission of intercepts as evidence was keeping secret the extent of the agency's co-operative relationships with telephone companies – including being granted access to communications networks overseas.In June, the Guardian disclosed the existence of GCHQ's Tempora internet surveillance programme. It uses intercepts on the fibre-optic cables that make up the backbone of the internet to gain access to vast swaths of internet users' personal data. The intercepts are placed in the UK and overseas, with the knowledge of companies owning either the cables or landing stations.The revelations of voluntary co-operation with some telecoms companies appear to contrast markedly with statements made by large telecoms firms in the wake of the first Tempora stories. They stressed that they were simply complying with the law of the countries in which they operated.
  • ...6 more annotations...
  • In reality, numerous telecoms companies were doing much more than that, as disclosed in a secret document prepared in 2009 by a joint working group of GCHQ, MI5 and MI6.Their report contended that allowing intercepts as evidence could damage relationships with "Communications Service Providers" (CSPs).In an extended excerpt of "the classified version" of a review prepared for the Privy Council, a formal body of advisers made up of current and former cabinet ministers, the document sets out the real nature of the relationship between telecoms firms and the UK government."Under RIPA [the Regulation of Investigatory Powers Act 2000], CSPs in the UK may be required to provide, at public expense, an adequate interception capability on their networks," it states. "In practice all significant providers do provide such a capability. But in many cases their assistance – while in conformity with the law – goes well beyond what it requires."
  • GCHQ's internet surveillance programme is the subject of a challenge in the European court of human rights, mounted by three privacy advocacy groups. The Open Rights Group, English PEN and Big Brother Watch argue the "unchecked surveillance" of Tempora is a challenge to the right to privacy, as set out in the European convention on human rights.That the Tempora programme appears to rely at least in part on voluntary co-operation of telecoms firms could become a major factor in that ongoing case. The revelation could also reignite the long-running debate over allowing intercept evidence in court.GCHQ's submission goes on to set out why its relationships with telecoms companies go further than what can be legally compelled under current law. It says that in the internet era, companies wishing to avoid being legally mandated to assist UK intelligence agencies would often be able to do so "at little cost or risk to their operations" by moving "some or all" of their communications services overseas.
  • As a result, "it has been necessary to enter into agreements with both UK-based and offshore providers for them to afford the UK agencies access, with appropriate legal authorisation, to the communications they carry outside the UK".The submission to ministers does not set out which overseas firms have entered into voluntary relationships with the UK, or even in which countries they operate, though documents detailing the Tempora programme made it clear the UK's interception capabilities relied on taps located both on UK soil and overseas.There is no indication as to whether the governments of the countries in which deals with companies have been struck would be aware of the GCHQ cable taps.
  • Evidence that telecoms firms and GCHQ are engaging in mass interception overseas could stoke an ongoing diplomatic row over surveillance ignited this week after the German chancellor, Angela Merkel, accused the NSA of monitoring her phone calls, and the subsequent revelation that the agency monitored communications of at least 35 other world leaders.On Friday, Merkel and the French president, François Hollande, agreed to spearhead efforts to make the NSA sign a new code of conduct on how it carried out intelligence operations within the European Union, after EU leaders warned that the international fight against terrorism was being jeopardised by the perception that mass US surveillance was out of control.Fear of diplomatic repercussions were one of the prime reasons given for GCHQ's insistence that its relationships with telecoms firms must be kept private .
  • Telecoms companies "feared damage to their brands internationally, if the extent of their co-operation with HMG [Her Majesty's government] became apparent", the GCHQ document warned. It added that if intercepts became admissible as evidence in UK courts "many CSPs asserted that they would withdraw their voluntary support".The report stressed that while companies are going beyond what they are required to do under UK law, they are not being asked to violate it.Shami Chakrabarti, Director of Liberty and Anthony Romero Executive Director of the American Civil Liberties Union issued a joint statement stating:"The Guardian's publication of information from Edward Snowden has uncovered a breach of trust by the US and UK Governments on the grandest scale. The newspaper's principled and selective revelations demonstrate our rulers' contempt for personal rights, freedoms and the rule of law.
  • "Across the globe, these disclosures continue to raise fundamental questions about the lack of effective legal protection against the interception of all our communications."Yet in Britain, that conversation is in danger of being lost beneath self-serving spin and scaremongering, with journalists who dare to question the secret state accused of aiding the enemy."A balance must of course be struck between security and transparency, but that cannot be achieved whilst the intelligence services and their political masters seek to avoid any scrutiny of, or debate about, their actions."The Guardian's decision to expose the extent to which our privacy is being violated should be applauded and not condemned."
  •  
    The Guardian lands another gigantic bomb squarely on target, with massive potential for diplomatic, political, and financial disruption. Well done, Guardian. 
Paul Merrell

ACLU files new lawsuit over Obama administration drone 'kill list' | World news | The G... - 0 views

  • As the US debates expanding its campaign against the Islamic State beyond Iraq and Syria, the leading US civil liberties group is intensifying its efforts to force transparency about lethal US counterterrorism strikes and authorities. On Monday, the American Civil Liberties Union (ACLU) will file a disclosure lawsuit for secret Obama administration documents specifying, among other things, the criteria for placement on the so-called “kill list” for drone strikes and other deadly force. Information sought by the ACLU includes long-secret analyses establishing the legal basis for what the administration terms its “targeted killing program” and the process by which the administration determines that civilians are unlikely to be killed before launching a strike, as well as verification mechanisms afterward to establish if the strike in fact has caused civilian deaths.
  • “Over the last few years, the US government has used armed drones to kill thousands of people, including hundreds of civilians. The public should know who the government is killing, and why it’s killing them,” Jameel Jaffer, deputy legal director for the ACLU, told the Guardian.
  • The ACLU suit proceeds after the Obama administration disclosed none of the lethal counterterrorism documentation through a Freedom of Information Act request the civil liberties group launched in October 2013. According to the new lawsuit, the departments of state, justice and defense, as well as the CIA, have stonewalled the ACLU’s requests for nearly 18 months. Recent legal history suggests the ACLU is in for an uphill court struggle. The Obama administration, which has called itself the most transparent in history, has thus far repelled or delayed ACLU lawsuits for disclosure around drone strikes and the 2011 assassination of Anwar al-Awlaki, a US citizen and al-Qaida propagandist. Additionally, the administration is fighting the ACLU on the legality of its bulk surveillance activities and to prevent the release of thousands of graphic photographs detailing Bush-era torture by the CIA and military. Yet the administration has seen the courts chip away at its blanket denials of documents sought by the ACLU. Most of the intelligence community’s disclosures of surveillance memos since Edward Snowden’s revelations have followed the administration’s courtroom losses to the ACLU and other civil-liberties groups. In June, the second circuit court of appeals forced the Department of Justice to release much of a critical 2010 memo blessing the killing of Awlaki. (The ACLU is seeking the release of 10 more major intelligence memos related to targeted killing.)
Paul Merrell

Groups Call for Public Disclosure of the Legal Rationale for US Force Against ISIS - 0 views

  • OpenTheGovernment.org urges you to press for public disclosure of all Office of Legal Counsel memoranda and other legal opinions setting forth the legal rationale for the United States to use military force against the Islamic State in Iraq and Syria (ISIS). Congress cannot meaningfully exercise its Constitutional power to authorize force if the Executive uses secret legal opinions to extend past authorizations in ways that Congress never anticipated or intended. The Obama administration has stated that it already has the authority it needs to launch airstrikes against ISIS in Syria, but has given shifting, incomplete explanations of the source of that authority.
  • Last week, administration officials stated that Congress did not need to vote to authorize strikes against ISIS (also commonly known as ISIL or the Islamic State) because the President could rely on the post-September 11, 2001 Authorization for the Use of Military Force (AUMF). An administration official acknowledged that ISIS had publicly split with Al Qaeda, but said that the AUMF still applied to ISIS based on its past relationship with Al Qaeda, its role in the Iraq war, and ISIS’s “position – supported by some individual members and factions of AQ-aligned groups – that it is the true inheritor of Usama bin Laden’s legacy.”1But the 2001 AUMF does not authorize force against all anti-American terrorist organizations that are arguably “the true inheritors of Usama bin Laden’s legacy.” It authorizes force against “those nations, organizations, or persons [the President] determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons.”2
  • The leadership of ISIS had no known role in the September 11 attacks, and the administration’s recent statements acknowledge that the group first affiliated with Al Qaeda in 2004. The Obama administration has argued for some time that the 2001 AUMF authorized military action against “associated forces” of Al Qaeda even if those affiliates had no role in the September 11 attacks, but has also assured Congress that there were meaningful limits on what constituted an “associated force.” Department of Defense General Counsel Stephen Preston testified to the Senate Foreign Relations Committee in May that to be an “associated force,” a group had to be both (1) an organized, armed group that has entered the fight alongside al-Qa’ida or the Taliban and (2) a co-belligerent with al-Qa’ida or the Taliban in hostilities against the United States or its coalition partners.(3) Al Qaeda specifically disavowed conducting operations with ISIS earlier this year.4 York Times, the administration has said it has no secret intelligence that the groups have reconciled,5 is difficult to understand how it could remain an “associated force.”
  • ...2 more annotations...
  • The Obama administration has said that “2002 Iraq AUMF would serve as an alternative statutory for military action in Iraq—but this is inconsistent with prior administration statements that the basis”6 Iraq war has ended, and that the 2002 AUMF “is no longer used for any U.S. Government activities.”7Administration officials have also cited the President’s power under Article II of the Constitution to act in self-defense of the United States to attack ISIS—but this contradicts its repeated assurances that ISIS does not pose an imminent risk of attack on U.S. soil.8Instead of trying to explain the case for war in confusing and often anonymous soundbites, the Executive Branch should publicly release the OLC memos and other binding written analyses that explain the purported legal basis for strikes against ISIS, and its legal interpretation of the AUMF more generally.
  • When the United States enters a war, the public and Congress need to know who the enemy is, and under what legal authority U.S. forces are operating. It would be unacceptable in a democracy for Congress to authorize force in secret. It is equally unacceptable for the Executive Branch to secretly interpret and expand past Congressional authorizations. Accordingly, we hope you will use the upcoming committee hearing to press for full disclosure of the relevant OLC opinions.
Paul Merrell

Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Propose... - 0 views

  • Clinton’s State Department was getting pressure from President Obama and his White House inner circle, as well as heads of state internationally, to try and cutoff Assange’s delivery of the cables and if that effort failed, then to forge a strategy to minimize the administration’s public embarrassment over the contents of the cables. Hence, Clinton’s early morning November meeting of State’s top brass who floated various proposals to stop, slow or spin the Wikileaks contamination. That is when a frustrated Clinton, sources said, at some point blurted out a controversial query. “Can’t we just drone this guy?” Clinton openly inquired, offering a simple remedy to silence Assange and smother Wikileaks via a planned military drone strike, according to State Department sources. The statement drew laughter from the room which quickly died off when the Secretary kept talking in a terse manner, sources said. Clinton said Assange, after all, was a relatively soft target, “walking around” freely and thumbing his nose without any fear of reprisals from the United States. Clinton was upset about Assange’s previous 2010 records releases, divulging secret U.S. documents about the war in Afghanistan in July and the war in Iraq just a month earlier in October, sources said. At that time in 2010, Assange was relatively free and not living cloistered in in the embassy of Ecuador in London. Prior to 2010, Assange focused Wikileaks’ efforts on countries outside the United States but now under Clinton and Obama, Assange was hammering America with an unparalleled third sweeping Wikileaks document dump in five months. Clinton was fuming, sources said, as each State Department cable dispatched during the Obama administration was signed by her.
  • Following Clinton’s alleged drone proposal, another controversial remedy was floated in the State Department to place a reward or bounty for Assange’s capture and extradition to the United States, sources said. Numbers were discussed in the realm of a $10 million bounty. A State Department source described that staff meeting as bizarre. One minute staffers were inquiring about the Secretary’s blue and black checkered knit sweater and the next minute, the room was discussing the legalities of a drone strike on Assange and financial bounties, sources said. Immediately following the conclusion of the wild brainstorming session, one of Clinton’s top aides, State Department Director of Policy Planning Ann-Marie Slaughter, penned an email to Clinton, Chief of Staff Cheryl Mills, and aides Huma Abebin and Jacob Sullivan at 10:29 a.m. entitled “an SP memo on possible legal and nonlegal strategies re Wikileaks.” “Nonlegal strategies.” How did that phrasing make it into an official State Department email subject line dealing with solving Wikileaks and Assange? Why would the secretary of state and her inner circle be discussing any “nonlegal strategies” for anything whatsoever? Against anyone? Shouldn’t all the strategies discussed by the country’s top diplomat be strictly legal only? And is the email a smoking gun to confirm Clinton was actually serious about pursuing an obvious “nonlegal strategy” proposal to allegedly assassinate Assange? Numerous attempts were made to try and interview and decipher Slaughter’s choice of email wording, however, she could not be reached for comment.
  • Slaughter’s cryptic email also contained an attached document called “SP Wikileaks doc final11.23.10.docx.” That attachment portion of Slaughter’s “nonlegal strategies” email has yet to be recovered by federal investigators and House committee investigators probing Clinton’s email practices while at State. Even Wikileaks does not have the document. Slaughter, however, shed some light on the attachment: “The result is the attached memo, which has one interesting legal approach and I think some very good suggestions about how to handle our public diplomacy.” But did it also include details on the “nonlegal strategies” teased in the subject line? Sources confirm Clinton took the email and attachment with her to the White House for an afternoon meeting with Secretary of Defense Bob Gates and National Security Advisor Tom Donilon prior to an additional evening meeting at the White House. President Obama, sources said, did not attend the early meeting with Gates as he was traveling with Vice President Joe Biden. President Obama did attend the second meeting, however, and Wikileaks and Assange’s planned release of secret cables were discussed at length, sources said. Attending this meeting were President Obama, Clinton, Gates, Donilon, Director of National Intelligence James Clapper, Deputy Secretary of State James Steinberg, Under Secretary of Defense for Policy Michele Flournoy, Chairman of the Joint Chiefs of Staff Admiral “Mike” Mullen, Vice Chairman of the Joint Chiefs of Staff Gen. James Cartwright as well as a half dozen or more various policy aides, sources confirmed. Did Clinton also share her alleged morning query of droning Assange with the members of the National Security Council and the President? Was it discussed among the top secret subjects in the meeting? Or was Clinton planning to conduct or hatch her own secret foreign policy in defiance of the President, a likely violation of the Logan Act?
  • ...3 more annotations...
  • The FBI’s 302 report from Clinton’s email investigation interview, again, specified that Clinton had “many discussions” related to “nominating” drone strikes on individuals: “Clinton could not recall a specific process for nominating a target for a drone strike and recalled much debate pertaining to the concurrence process. Clinton knew there was a role for DOD, State and the CIA but could not provide specifics as to what it was. Due to a disagreement between these agencies, Clinton recalled having many discussions related to nominating an individual for a drone strike. When Clinton exchanged classified information pertaining to the drone program internally at State, it was in her office or on a secure call. When Clinton exchanged classified information pertaining to the drone program externally it was at the White House. Clinton never had a concern with how classified information pertaining to the drone program was handled.” Sources said Clinton’s comments on neutralizing Assange fits a pattern of callousness when combined with the FBI testimony that she often considered droning individuals and then coupled with her reaction to Libyan leader Moammar Gaddafi’s death in Oct. 2011.
  • Unable to legally counter or stop Wikileaks, and likely abandoning any and all legal and “nonlegal strategies,” Clinton and her staff were forced to weather the collateral damage of CableGate. In fact, just five days after Clinton’s meetings on Mahogany Row in the State Department and the White House, Wikileaks began releasing cables to news outlets globally on Sunday November 28, 2010. Shortly after CableGate, the WikiLeaks founder sought refuge from authorities and threats by hiding at the Ecuadorian Embassy in London. Now 45, Assange is in his fifth year living quarantined inside the embassy. Clinton remains the Democratic nominee for the presidency of the United States.
  • Perhaps Democratic political operative Bob Beckel wasn’t a party outlier during this controversial Fox broadcast. Likely, Beckel was projecting what others, including Clinton, had already privately proposed.
Paul Merrell

CIA's Self-Authorization for Ice-Drowning Human Beings | emptywheel - 0 views

  • The WaPo has a story that repeats what I’ve been harping on for over a year (and in some cases, has been clear even longer): the Senate Torture Report shows that CIA repeatedly lied to Congress. There are, however, ugly new details about the torture (though it’s not clear whether they show up in the report): particularly regarding the treatment of Ammar al-Baluchi. If declassified, the report could reveal new information on the treatment of a high-value detainee named Ali Abdul Aziz Ali, the nephew of Khalid Sheik Mohammed, the self-proclaimed mastermind of the Sept. 11 attacks. The Pakistanis captured Ali, known more commonly as Ammar al-Baluchi, on April, 30, 2003, in Karachi and turned him over to the CIA about a week later. He was taken to a CIA black site called “Salt Pit” near Kabul. At the secret prison, Baluchi endured a regime that included being dunked in a tub filled with ice water. CIA interrogators forcibly kept his head under the water while he struggled to breathe and beat him repeatedly, hitting him with a truncheon-like object and smashing his head against a wall, officials said. As with Zubaida and even Nashiri, officials said, CIA interrogators continued the harsh treatment even after it appeared that Baluchi was cooperating. The report notes that two other prisoners — members of the Libyan Islamic Fighting Group — were subjected to similar treatment at the same time.
  • Two other terrorism suspects, from Libya — Mohammed al-Shoroeiya and Khalid al-Sharif — endured similar treatment at Salt Pit, according to Human Rights Watch. One of the men said CIA interrogators “would pour buckets of very cold water over his nose and mouth to the point that he felt he would suffocate. Icy cold water was also poured over his body. He said it happened over and over again,” the report says. CIA doctors monitored their body temperatures so they wouldn’t suffer hypothermia. Ultimately, CIA got DOJ to authorize “water dousing” — in the manner that CIA always got DOJ to approve mere shadows of what they actually did, and the approval more closely matches the description of the LIFG prisoners — in the Bradbury Techniques Memo (see page 10). But not before it got used over and over at the Salt Pit (the same place where water dousing had already contributed to Gul Rahman’s death). Which is, I’m quite certain, one thing that CIA was doing with the Legal Principles document, a set of legal guidelines the CIA wrote for itself (with John Yoo’s freelance help) as the CIA’s legal problems started to mount. As I’ve noted, the first draft of the memos got hand-carried to John Yoo on April 28, 2003, just as these detainees were in the Salt Pit. There were several more discussions internally at CIA in anticipation of litigation before they tried (unsuccessfully) to create a fait accompli with Pat Philbin on June 16, 2003. At that point, the document only generally approved techniques equivalent to those already approved. As CIA would later explain,
  • We rely on the applicable law and OLC guidance to assess the lawfulness of detention and interrogation techniques. For example, using the applicable law and relying on OLC’s guidance, we concluded that the abdominal slap previously discussed with OLC (and mentioned in the June 2003 summary points) is a permissible interrogation technique. Similarly, in addition to the sitting and kneeling stress positions discussed earlier with OLC, the Agency has added to its list of approved interrogation techniques two standing stress positions involving the detainee leaning against a wall. I guess, in similar fashion, John Yoo and his CIA buddies believe ice-drowning is equivalent, as another kind of simulated drowning, to waterboarding, which had been approved? Then the next year, when Scott Muller tried the same trick with Jack Goldsmith — trying to get him to sign off on the techniques CIA had freelanced its own legal opinion — he asked to include water dousing (and another water-based technique and one still-redacted technique) explicitly. Of course, the description of water dousing fell far short of what the CIA was actually doing — dunking men in ice-water repeatedly — though the outlines, especially the concern about detainees ingesting water and hypothermia — show the outlines of the torture such language was meant to gloss. To understand the CIA’s torture program, you have to understand what these bureaucratic maneuvers were meant to cover. Now we know they were intended to authorize controlled drowning of men in ice water.
Paul Merrell

U.S. gives big, secret push to Internet surveillance - CNET - 0 views

  • Senior Obama administration officials have secretly authorized the interception of communications carried on portions of networks operated by AT&T and other Internet service providers, a practice that might otherwise be illegal under federal wiretapping laws. The secret legal authorization from the Justice Department originally applied to a cybersecurity pilot project in which the military monitored defense contractors' Internet links. Since then, however, the program has been expanded by President Obama to cover all critical infrastructure sectors including energy, healthcare, and finance starting June 12. "The Justice Department is helping private companies evade federal wiretap laws," said Marc Rotenberg, executive director of the Electronic Privacy Information Center, which obtained over 1,000 pages of internal government documents and provided them to CNET this week. "Alarm bells should be going off." Those documents show the National Security Agency and the Defense Department were deeply involved in pressing for the secret legal authorization, with NSA director Keith Alexander participating in some of the discussions personally. Despite initial reservations, including from industry participants, Justice Department attorneys eventually signed off on the project.
  • The Justice Department agreed to grant legal immunity to the participating network providers in the form of what participants in the confidential discussions refer to as "2511 letters," a reference to the Wiretap Act codified at 18 USC 2511 in the federal statute books. The Wiretap Act limits the ability of Internet providers to eavesdrop on network traffic except when monitoring is a "necessary incident" to providing the service or it takes place with a user's "lawful consent." An industry representative told CNET the 2511 letters provided legal immunity to the providers by agreeing not to prosecute for criminal violations of the Wiretap Act. It's not clear how many 2511 letters were issued by the Justice Department. In 2011, Deputy Secretary of Defense William Lynn publicly disclosed the existence of the original project, called the DIB Cyber Pilot, which used login banners to inform network users that monitoring was taking place. In May 2012, the pilot was turned into an ongoing program -- broader but still voluntary -- by the name of Joint Cybersecurity Services Pilot, with the Department of Homeland Security becoming involved for the first time. It was renamed again to Enhanced Cybersecurity Services program in January, and is currently being expanded to all types of companies operating critical infrastructure.
  • Another e-mail message from a Justice Department attorney wondered: "Will the program cover all parts of the company network -- including say day care centers (as mentioned as a question in a [deputies committee meeting]) and what are the policy implications of this?" The deputies committee includes the deputy secretary of defense, the deputy director of national intelligence, the deputy attorney general, and the vice chairman of the Joint Chiefs of Staff. "These agencies are clearly seeking authority to receive a large amount of information, including personal information, from private Internet networks," says EPIC staff attorney Amie Stepanovich, who filed a lawsuit against Homeland Security in March 2012 seeking documents relating to the program under the Freedom of Information Act. "If this program was broadly deployed, it would raise serious questions about government cybersecurity practices." In January, the Department of Homeland Security's privacy office published a privacy analysis (PDF) of the program saying that users of the networks of companies participating in the program will see "an electronic login banner [saying] information and data on the network may be monitored or disclosed to third parties, and/or that the network users' communications on the network are not private."
  • ...2 more annotations...
  • Paul Rosenzweig, a former Homeland Security official and founder of Red Branch Consulting, compared the NSA and DOD asking the Justice Department for 2511 letters to the CIA asking the Justice Department for the so-called torture memos a decade ago. (They were written by Justice Department official John Yoo, who reached the controversial conclusion that waterboarding was not torture.) "If you think of it poorly, it's a CYA function," Rosenzweig says. "If you think well of it, it's an effort to secure advance authorization for an action that may not be clearly legal." A report (PDF) published last month by the Congressional Research Service, a non-partisan arm of Congress, says the executive branch likely does not have the legal authority to authorize more widespread monitoring of communications unless Congress rewrites the law. "Such an executive action would contravene current federal laws protecting electronic communications," the report says.
  • An internal Defense Department presentation cites as possible legal authority a classified presidential directive called NSPD 54 that President Bush signed in January 2008. Obama's own executive order , signed in February 2013, says Homeland Security must establish procedures to expand the data-sharing program "to all critical infrastructure sectors" by mid-June. Those are defined as any companies providing services that, if disrupted, would harm national economic security or "national public health or safety."
  •  
    Article is from April 2013, before the Snowden disclosures. 
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
1 - 20 of 45 Next › Last »
Showing 20 items per page