Showing posts with label Domestic Spying. Show all posts
Showing posts with label Domestic Spying. Show all posts

Tuesday, August 21, 2007

The Warrantless Debate Over Wiretapping


Published: August 22, 2007


CONGRESS just passed, and President Bush hurriedly signed, a law that amends the legal framework for the electronic interception of various kinds of communication with foreign sources. Almost immediately, commentators concluded that the law was unnecessary, that it authorized a lawless and unprecedented expansion of presidential authority, and that Democrats in Congress cravenly accepted this White House initiative only for the basest political reasons. None of these widely broadcast conclusions are likely to be true.

All sides agree that some legislative fix is required because of changes in telecommunications technology. Where once it made sense to require warrants when one party to a foreign conversation was in America, this ceased to be the case when American routers became the transit points for foreign conversations that might or might not involve a person in the United States.

Once linear, analog, point-to-point communication has been replaced by the disaggregated packets of the Internet, two people talking to each other in Europe could find their conversations going through American switches. It also became difficult to determine the true origin of any communication that was routed through the United States. If a terrorism suspect in Pakistan is having conversations with someone on a computer with a New York Internet protocol address via a chat room run by an Internet service provider in London, where exactly is the intelligence being collected? If the answer is the United States simply because the servers are here, of what possible relevance could that be to the protection of the rights of Americans?



Amending the statute to focus on protecting American people rather than an American address would not have dealt with a larger and more profound problem. The change in the global communications infrastructure is both a driver and a consequence of a change in the nature of conflict. The end of the cold war was brought about in part because of technologies that empowered the individual and whetted people’s appetites for more control over their lives. These same developments also empower networks of terrorists, and the war they will soon be capable of waging has little in common with the industrial warfare of the 20th century. Accordingly, foreign intelligence tasks will also change.

It made sense to require that the person whose communications were intercepted be a spy when the whole point of the interception was to gather evidence to prosecute espionage. This makes much less sense when the purpose of the interception is to determine whether the person is in fact an agent at all. This sort of communications intercept tries to build from a known element in a terror network — a person, a telephone number, a photograph, a safe house, an electronic dead-drop — to some picture of the network itself. By crosshatching vast amounts of information, based on relatively few confirmed elements, it is possible to detect patterns that can expose the network through its benign operations and then focus on its more malignant schemes.

For this purpose, warrants are utterly beside the point. As Judge Richard Posner has put it, “once you grant the legitimacy of surveillance aimed at detection rather than at gathering evidence of guilt, requiring a warrant to conduct it would be like requiring a warrant to ask people questions or to install surveillance cameras on city streets.” Warrants, which originate in the criminal justice paradigm, provide a useful standard for surveillance designed to prove guilt, not to learn the identity of people who may be planning atrocities.

A statutory fix that simply waived the warrant requirement when both parties to a conversation were foreign would scarcely address this problem. Technology is changing the nature of the threat, not merely the mechanics of collection. The statutory change is unnecessary, I suppose, if you believe that there is in fact no real threat, that it’s all hype by the White House to expand its powers — presumably to some other end — and that all we have to fear is fear itself. Doubtless, some people do believe this. If the editorialists and columnists in the news media make this assumption, they should frankly say so (and hold their breath until the next attack).

Furthermore, there is an unstated assumption that warrantless surveillance is lawless surveillance. There is, however, judicial precedent for warrantless searches, even if you can’t tell this from the public debate. The president of the American Bar Association objected to the new statute by sarcastically observing, “The last time I checked, the Fourth Amendment is still in the Bill of Rights,” which he doubtless believed to be a withering salvo.

In fact, there are many instances in which warrantless surveillance has been held to be permissible under the Fourth Amendment. Searches in public schools require neither warrants nor a showing of probable cause. Government offices can be searched for evidence of work-related misconduct without warrants. So can searches conducted at the border, or searches undertaken as a condition of parole. Searches have been upheld in the absence of a warrant where there is no legitimate expectation of privacy. The Clinton administration conducted a warrantless search — lawfully — when it was trying to determine what the spy Aldrich Ames was up to. The day after Pearl Harbor, President Roosevelt authorized the interception of all communications traffic into and out of the United States.

Then there is the widespread charge that Democrats supinely accepted all this on political grounds. There probably were Democrats who adapted their long-held views on the Foreign Intelligence Surveillance Act to political necessity. But these are most obviously to be found on the other side of the vote. Senators Hillary Clinton, Christopher Dodd and Joseph Biden — all of whom are running for president — voted against this legislation, when their records are otherwise quite forceful where national security issues are concerned. With respect to those voting in favor of the statute, I find it hard to believe that Senator Daniel K. Inouye of Hawaii and Senator Jim Webb of Virginia are concerned about appearing insufficiently sensitive to security threats to the country.

Why would we be troubled in any case when a politician in a democracy votes the way he thinks the people want? Polls show that the American public is not as anti-security-minded as the American Civil Liberties Union. That’s why we need an A.C.L.U., I imagine.

One good reason not to want popular politics to guide such decisions arises when the public is not well-informed. Partly this can be laid at the door of the incumbent president, the Great Miscommunicator. But mainly it lies with those people who don’t bother giving reasons, don’t explain or give arguments, who prefer to traduce the people with whom they disagree by attacks on their characters, which are presumed to be insufficiently stalwart.

In Robert M. Gates, the defense secretary, Mike McConnell, the director of national intelligence, and Gen. Michael V. Hayden, the director of central intelligence, we have about as good a team as it is possible to imagine. Most people in Congress know that. Why not assume they are proposing a solution to a real problem? Developments in technology are forcing a long-overdue statutory change — and those developments will be with us long after the politics of the moment have passed.

Philip Bobbitt, a professor of law and the director of the Center for National Security at Columbia University, was a National Security Council senior director from 1998 to 1999.

Read full post and comments:
"The Warrantless Debate Over Wiretapping" >>


Wednesday, January 31, 2007

White House to Release Details on Eavesdropping

Published: January 31, 2007
The New York Times




WASHINGTON, Jan. 31— Bowing to bipartisan pressure from lawmakers, the Justice Department announced today that it was turning over to select members of Congress secret documents detailing the National Security Agency’s domestic eavesdropping program.

The decision came two weeks after Attorney General Alberto R. Gonzales faced withering questions from senators about why the Bush Administration had refused to provide details on the legal underpinnings of the N.S.A. program.

Mr. Gonzales appeared on Capitol Hill the day after the Bush administration announced it had agreed to put the N.S.A. program under the authority of the Foreign Intelligence Surveillance Court, and that the secret court had on Jan. 10 approved a Justice Department request for a wiretap.

The decision to hand over the documents, which Mr. Gonzales confirmed to reporters today, will allow members of the House and Senate intelligence committees -- as well as select congressional leaders -- to review that court order.

The package of documents the Bush administration is giving to lawmakers is also expected to include Justice Department applications for surveillance approvals and the legal briefs submitted to the FISA court.

Lawmakers from both parties applauded the decision, and pledged that the new congress will closely scrutinize the legality of the N.S.A. program.

“Only with an understanding of the contours of the wiretapping program and the scope of the court’s orders can the Judiciary Committee determine whether the administration has reached the proper balance to protect Americans while following the law,” said Vermont Democrat Patrick J. Leahy, chairman of the Senate Judiciary Committee.

Administration officials cautioned today that lawmakers would only receive documents related to the most recent FISA court orders, and should not expect documentation related to future wiretap requests.

“This shouldn’t be construed as any kind of precedent-setting act,” said one Bush administration official, speaking on condition of anonymity because of the sensitive nature of the documents.

“It was made clear to members of Congress that this was viewed as a very unique circumstance,” the official added.

Since Mr. Gonzales appeared on Capitol Hill two weeks ago, Justice Department officials have negotiated privately with lawmakers to arrange the terms of the document release.

At this point, only members of the intelligence committees and certain members of the House and Senate leadership have been briefed on the highly classified N.S.A. program. The Bush administration official said that a special provision would be made to allow the top members of the judiciary committees — who have not been given the classified briefings -- to review the FISA court documents.

Read full post and comments:
"White House to Release Details on Eavesdropping" >>


Sunday, January 14, 2007

Deletions in Army Manual Raise Wiretapping Concerns

Published: January 14, 2007
The New York Times


WASHINGTON, Jan. 13 — Deep into an updated Army manual, the deletion of 10 words has left some national security experts wondering whether government lawyers are again asserting the executive branch’s right to wiretap Americans without a court warrant.

The manual, described by the Army as a “major revision” to intelligence-gathering guidelines, addresses policies and procedures for wiretapping Americans, among other issues.

The original guidelines, from 1984, said the Army could seek to wiretap people inside the United States on an emergency basis by going to the secret court set up by the Foreign Intelligence Surveillance Act, known as FISA, or by obtaining certification from the attorney general “issued under the authority of section 102(a) of the Act.”

That last phrase is missing from the latest manual, which says simply that the Army can seek emergency wiretapping authority pursuant to an order issued by the FISA court “or upon attorney general authorization.” It makes no mention of the attorney general doing so under FISA.

Bush administration officials said that the wording change was insignificant, adding that the Army would follow FISA requirements if it sought to wiretap an American.

But the manual’s language worries some national security experts. “The administration does not get to make up its own rules,” said Steven Aftergood, who runs a project on government secrecy for the Federation of American Scientists.

The Army guidelines were finalized in November 2005, and Mr. Aftergood’s group recently obtained a copy under the Freedom of Information Act. He said he was struck by the omission, particularly because of the recent debate over the National Security Agency’s domestic surveillance program. President Bush has asserted that he can authorize eavesdropping without court warrants on the international communications of Americans suspected of having ties to Al Qaeda.

Like several other national security experts, Mr. Aftergood said the revised guidelines could suggest that Army lawyers had adopted the legal claim that the executive branch had authority outside the courts to conduct wiretaps.

But Thomas A. Gandy, a senior Army counterintelligence official who helped develop the guidelines, said the new wording did not suggest a policy change. The guidelines were intended to give Army intelligence personnel more explicit and, in some cases, more restrictive guidance than the 1984 regulations, partly to help them respond to new threats like computer hackers.

“This is all about doing right and following the rules and protecting the civil liberties of folks,” Mr. Gandy said. “It seeks to keep people out of trouble.”


Read full post and comments:
"Deletions in Army Manual Raise Wiretapping Concerns" >>


Military Is Expanding Its Intelligence Role in U.S.

By ERIC LICHTBLAU and MARK MAZZETTI
Published: January 14, 2007
The New York times


WASHINGTON, Jan. 13 — The Pentagon has been using a little-known power to obtain banking and credit records of hundreds of Americans and others suspected of terrorism or espionage inside the United States, part of an aggressive expansion by the military into domestic intelligence gathering.

The C.I.A. has also been issuing what are known as national security letters to gain access to financial records from American companies, though it has done so only rarely, intelligence officials say.

Banks, credit card companies and other financial institutions receiving the letters usually have turned over documents voluntarily, allowing investigators to examine the financial assets and transactions of American military personnel and civilians, officials say.

The F.B.I., the lead agency on domestic counterterrorism and espionage, has issued thousands of national security letters since the attacks of Sept. 11, 2001, provoking criticism and court challenges from civil liberties advocates who see them as unjustified intrusions into Americans’ private lives.

But it was not previously known, even to some senior counterterrorism officials, that the Pentagon and the Central Intelligence Agency have been using their own “noncompulsory” versions of the letters. Congress has rejected several attempts by the two agencies since 2001 for authority to issue mandatory letters, in part because of concerns about the dangers of expanding their role in domestic spying.

The military and the C.I.A. have long been restricted in their domestic intelligence operations, and both are barred from conducting traditional domestic law enforcement work. The C.I.A.’s role within the United States has been largely limited to recruiting people to spy on foreign countries.

Carl Kropf, a spokesman for the director of national intelligence, said intelligence agencies like the C.I.A. used the letters on only a “limited basis.”

Pentagon officials defended the letters as valuable tools and said they were part of a broader strategy since the Sept. 11 attacks to use more aggressive intelligence-gathering tactics — a priority of former Defense Secretary Donald H. Rumsfeld. The letters “provide tremendous leads to follow and often with which to corroborate other evidence in the context of counterespionage and counterterrorism,” said Maj. Patrick Ryder, a Pentagon spokesman.

Government lawyers say the legal authority for the Pentagon and the C.I.A. to use national security letters in gathering domestic records dates back nearly three decades and, by their reading, was strengthened by the antiterrorism law known as the USA Patriot Act.

Pentagon officials said they used the letters to follow up on a variety of intelligence tips or leads. While they would not provide details about specific cases, military intelligence officials with knowledge of them said the military had issued the letters to collect financial records regarding a government contractor with unexplained wealth, for example, and a chaplain at Guantánamo Bay erroneously suspected of aiding prisoners at the facility.

Usually, the financial documents collected through the letters do not establish any links to espionage or terrorism and have seldom led to criminal charges, military officials say. Instead, the letters often help eliminate suspects.

“We may find out this person has unexplained wealth for reasons that have nothing to do with being a spy, in which case we’re out of it,” said Thomas A. Gandy, a senior Army counterintelligence official.

But even when the initial suspicions are unproven, the documents have intelligence value, military officials say. In the next year, they plan to incorporate the records into a database at the Counterintelligence Field Activity office at the Pentagon to track possible threats against the military, Pentagon officials said. Like others interviewed, they would speak only on the condition of anonymity.

Military intelligence officers have sent letters in up to 500 investigations over the last five years, two officials estimated. The number of letters is likely to be well into the thousands, the officials said, because a single case often generates letters to multiple financial institutions. For its part, the C.I.A. issues a handful of national security letters each year, agency officials said. Congressional officials said members of the House and Senate Intelligence Committees had been briefed on the use of the letters by the military and the C.I.A.

Some national security experts and civil liberties advocates are troubled by the C.I.A. and military taking on domestic intelligence activities, particularly in light of recent disclosures that the Counterintelligence Field Activity office had maintained files on Iraq war protesters in the United States in violation of the military’s own guidelines. Some experts say the Pentagon has adopted an overly expansive view of its domestic role under the guise of “force protection,” or efforts to guard military installations.

“There’s a strong tradition of not using our military for domestic law enforcement,” said Elizabeth Rindskopf Parker, a former general counsel at both the National Security Agency and the C.I.A. who is the dean at the McGeorge School of Law at the University of the Pacific. “They’re moving into territory where historically they have not been authorized or presumed to be operating.”

Similarly, John Radsan, an assistant general counsel at the C.I.A. from 2002 to 2004 and now a law professor at William Mitchell College of Law in St. Paul, said, “The C.I.A. is not supposed to have any law enforcement powers, or internal security functions, so if they’ve been issuing their own national security letters, they better be able to explain how they don’t cross the line.”

The Pentagon’s expanded intelligence-gathering role, in particular, has created occasional conflicts with other federal agencies. Pentagon efforts to post American military officers at embassies overseas to gather intelligence for counterterrorism operations or future war plans has rankled some State Department and C.I.A. officials, who see the military teams as duplicating and potentially interfering with the intelligence agency.

In the United States, the Federal Bureau of Investigation has complained about military officials dealing directly with local police — rather than through the bureau — for assistance in responding to possible terrorist threats against a military base. F.B.I. officials say the threats have often turned out to be uncorroborated and, at times, have stirred needless anxiety.

The military’s frequent use of national security letters has sometimes caused concerns from the businesses receiving them, a counterterrorism official said. Lawyers at financial institutions, which routinely provide records to the F.B.I. in law enforcement investigations, have contacted bureau officials to say they were confused by the scope of the military’s requests and whether they were obligated to turn the records over, the official said.

Companies are not eager to turn over sensitive financial data about customers to the government, the official said, “so the more this is done, and the more poorly it’s done, the more pushback there is for the F.B.I.”

The bureau has frequently relied on the letters in recent years to gather telephone and Internet logs, financial information and other records in terrorism investigations, serving more than 9,000 letters in 2005, according to a Justice Department tally. As an investigative tool, the letters present relatively few hurdles; they can be authorized by supervisors rather than a court. Passage of the Patriot Act in October 2001 lowered the standard for issuing the letters, requiring only that the documents sought be “relevant” to an investigation and allowing records requests for more peripheral figures, not just targets of an inquiry.

Some Democrats have accused the F.B.I. of using the letters for fishing expeditions, and the American Civil Liberties Union won court challenges in two cases, one for library records in Connecticut and the other for Internet records in Manhattan. Concerned about possible abuses, Congress imposed new safeguards in extending the Patriot Act last year, in part by making clear that recipients of national security letters could contact a lawyer and seek court review. Congress also directed the Justice Department inspector general to study the F.B.I.’s use of the letters, a review that is continuing.

Unlike the F.B.I., the military and the C.I.A. do not have wide-ranging authority to seek records on Americans in intelligence investigations. But the expanded use of national security letters has allowed the Pentagon and the intelligence agency to collect records on their own. Sometimes, military or C.I.A. officials work with the F.B.I. to seek records, as occurred with an American translator who had worked for the military in Iraq and was suspected of having ties to insurgents.

After the Sept. 11 attacks, Mr. Rumsfeld directed military lawyers and intelligence officials to examine their legal authorities to collect intelligence both inside the United States and abroad. They concluded that the Pentagon had “way more” legal tools than it had been using, a senior Defense Department official said.

Military officials say the Right to Financial Privacy Act of 1978, which establishes procedures for government access to sensitive banking data, first authorized them to issue national security letters. The military had used the letters sporadically for years, officials say, but the pace accelerated in late 2001, when lawyers and intelligence officials concluded that the Patriot Act strengthened their ability to use the letters to seek financial records on a voluntary basis and to issue mandatory letters to obtain credit ratings, the officials said.

The Patriot Act does not specifically mention military intelligence or C.I.A. officials in connection with the national security letters.

Some F.B.I. officials said they were surprised by the Pentagon’s interpretation of the law when military officials first informed them of it. “It was a very broad reading of the law,” a former counterterrorism official said.

While the letters typically have been used to trace the financial transactions of military personnel, they also have been used to investigate civilian contractors and people with no military ties who may pose a threat to the military, officials said. Military officials say they regard the letters as one of the least intrusive means to gather evidence. When a full investigation is opened, one official said, it has now become “standard practice” to issue such letters.

One prominent case in which letters were used to obtain financial records, according to two military officials, was that of a Muslim chaplain at Guantánamo Bay, Cuba, who was suspected in 2003 of aiding terror suspects imprisoned at the facility. The espionage case against the chaplain, James J. Yee, soon collapsed.

Eugene Fidell, a defense lawyer for the former chaplain and a military law expert, said he was unaware that military investigators may have used national security letters to obtain financial information about Mr. Yee, nor was he aware that the military had ever claimed the authority to issue the letters.

Mr. Fidell said he found the practice “disturbing,” in part because the military does not have the same checks and balances when it comes to Americans’ civil rights as does the F.B.I. “Where is the accountability?” he asked. “That’s the evil of it — it doesn’t leave fingerprints.”

Even when a case is closed, military officials said they generally maintain the records for years because they may be relevant to future intelligence inquiries. Officials at the Pentagon’s counterintelligence unit say they plan to incorporate those records into a database, called Portico, on intelligence leads. The financial documents will not be widely disseminated, but limited to investigators, an intelligence official said.

“You don’t want to destroy something only to find out that the same guy comes up in another report and you don’t know that he was investigated before,” the official said.

The Counterintelligence Field Activity office, created in 2002 to better coordinate the military’s efforts to combat foreign intelligence services, has drawn criticism for some domestic intelligence activities.

The agency houses an antiterrorist database of intelligence tips and threat reports, known as Talon, which had been collecting information on antiwar planning meetings at churches, libraries and other locations. The Defense Department has since tightened its procedures for what kind of information is allowed into the Talon database, and the counterintelligence office also purged more than 250 incident reports from the database that officials determined should never have been included because they centered on lawful political protests by people opposed to the war in Iraq.

After the Sept. 11 attacks, Mr. Rumsfeld directed military lawyers and intelligence officials to examine their legal authorities to collect intelligence both inside the United States and abroad. They concluded that the Pentagon had “way more” legal tools than it had been using, a senior Defense Department official said.

Military officials say the Right to Financial Privacy Act of 1978, which establishes procedures for government access to sensitive banking data, first authorized them to issue national security letters. The military had used the letters sporadically for years, officials say, but the pace accelerated in late 2001, when lawyers and intelligence officials concluded that the Patriot Act strengthened their ability to use the letters to seek financial records on a voluntary basis and to issue mandatory letters to obtain credit ratings, the officials said.

The Patriot Act does not specifically mention military intelligence or C.I.A. officials in connection with the national security letters.

Some F.B.I. officials said they were surprised by the Pentagon’s interpretation of the law when military officials first informed them of it. “It was a very broad reading of the law,” a former counterterrorism official said.

While the letters typically have been used to trace the financial transactions of military personnel, they also have been used to investigate civilian contractors and people with no military ties who may pose a threat to the military, officials said. Military officials say they regard the letters as one of the least intrusive means to gather evidence. When a full investigation is opened, one official said, it has now become “standard practice” to issue such letters.

One prominent case in which letters were used to obtain financial records, according to two military officials, was that of a Muslim chaplain at Guantánamo Bay, Cuba, who was suspected in 2003 of aiding terror suspects imprisoned at the facility. The espionage case against the chaplain, James J. Yee, soon collapsed.

Eugene Fidell, a defense lawyer for the former chaplain and a military law expert, said he was unaware that military investigators may have used national security letters to obtain financial information about Mr. Yee, nor was he aware that the military had ever claimed the authority to issue the letters.

Mr. Fidell said he found the practice “disturbing,” in part because the military does not have the same checks and balances when it comes to Americans’ civil rights as does the F.B.I. “Where is the accountability?” he asked. “That’s the evil of it — it doesn’t leave fingerprints.”

Even when a case is closed, military officials said they generally maintain the records for years because they may be relevant to future intelligence inquiries. Officials at the Pentagon’s counterintelligence unit say they plan to incorporate those records into a database, called Portico, on intelligence leads. The financial documents will not be widely disseminated, but limited to investigators, an intelligence official said.

“You don’t want to destroy something only to find out that the same guy comes up in another report and you don’t know that he was investigated before,” the official said.

The Counterintelligence Field Activity office, created in 2002 to better coordinate the military’s efforts to combat foreign intelligence services, has drawn criticism for some domestic intelligence activities.

The agency houses an antiterrorist database of intelligence tips and threat reports, known as Talon, which had been collecting information on antiwar planning meetings at churches, libraries and other locations. The Defense Department has since tightened its procedures for what kind of information is allowed into the Talon database, and the counterintelligence office also purged more than 250 incident reports from the database that officials determined should never have been included because they centered on lawful political protests by people opposed to the war in Iraq.

Read full post and comments:
"Military Is Expanding Its Intelligence Role in U.S." >>