Standing Up for Truth and Ben Franklin,Hiding Facts to Thwart

The Courage from Whistle-blowing
Exclusive: Courage, like cowardice, can grow when an action by one person
influences decisions by others, either toward bravery or fear. Thus, the gutsy
whistle-blowing by some NSA officials inspired Edward Snowden to expose
mass data collection on all Americans, recalls ex-CIA analyst Ray McGovern.
By Ray McGovern
When Edward Snowden in early June 2013 began to reveal classified data showing
criminal collect-it-all surveillance programs operated by the U.S. government’s
National Security Agency, former NSA professionals became freer to spell out the
liberties taken with the Bill of Rights, as well as the feckless,
counterproductive nature of bulk electronic data collection.
On Jan. 7, 2014, four senior retired specialists with a cumulative total of 144
years of work with NSA William Binney, Thomas Drake, Edward Loomis, and Kirk
Wiebe prepared a Memorandum for the President providing a comprehensive account
of the problems at NSA, together with suggestions as to how they might be best
addressed.
The purpose was to inform President Obama as fully as possible, as he prepared
to take action in light of Snowden’s revelations.
On Jan. 23, 2015 in Berlin, Binney was honored with the annual Sam Adams Award
for Integrity in Intelligence. Ed Snowden was live-streamed-in for the occasion,
and said, “Without Bill Binney there would be no Ed Snowden.” (Binney had been
among the first to speak out publicly about NSA abuses; apparently that
emboldened Snowden to do what he did.)
Snowden had already said when he fled to Hong Kong in June 2013 that he had
learned an extremely important lesson from the four years of government
persecution/prosecution of Tom Drake; namely, that he, Ed Snowden, had to leave
the country in order to fulfill his mission and to have some reasonable chance
to avoid spending the rest of his life behind bars. (Eventually, all the felony
charges against Drake were dismissed.)
An important take-away lesson from Binney’s and Drake’s boldness and tenacity is
that one never knows what impetus courageous truth-tellers can give to other,
potential whistleblowers like Ed Snowden.
In 1998, Bill Binney, with some 35 years under his belt as a senior NSA
mathematician and cryptologist took on a staggering problem for NSA: how to deal
with the vast amount of data available on the world wide web without burying
intelligence analysts under a haystack of data.
From Binney’s long experience, it seemed clear that selecting information by
using metadata relationships was the smart way to go. As he puts it, “Smart
selection is smart collection.”
This approach was totally different form the word/phrase dictionary-select type
approach in general use even today. Binney’s technique was to use metadata and
some additional rules to define relationships. This enabled discriminate
selection of data from the tens of terabytes twisting in the ether. The approach
focused the collected data around known targets, plus some potential
developmental targets, and yielded much more manageable content for analysts to
deal with.
Missing the Needles
Experience had long since shown that collecting everything in bulk, and using
word/phrase type queries, end up burying analysts in data and making them
dysfunctional.
In some of the internal NSA memos released by Snowden, NSA
analysts complain of the kind of analysis paralysis that makes it extremely
difficult for them to find and address the real threats.
As Snowden has quipped, “The problem with mass surveillance is when you collect
everything, you understand nothing.”
The net result is that people die first. Only then do detectives and law
enforcement go wading into their vast data, focus on possible perpetrators of
the crime and often find related information.
This is, of course, exactly the
reverse of how the security services should proceed assuming the main priority
is to thwart terrorist or other attacks. And yet the U.S. government proceeds
willy-nilly with its SOS (Stasi-On-Steroids) approach.
In sum, success can come only from a focused, disciplined selection of data off
the fiber lines, yielding usable metadata, as Binney and his NSA colleagues
demonstrated.
Indeed, there was quite enough electronic intelligence collected
by THINTHREAD, the collection system Binney and his team created, before 9/11 to
have thwarted the attacks, as NSA senior executive Thomas Drake learned, to his
horror, after the fact.
“Smart selection” techniques can also protect individual privacy, as Binney and
his colleagues likewise showed.
More to the point, this approach can provide a
rich but manageable data environment for analysts to use toward one of the most
important intelligence objectives predicting intentions and capabilities.
This way, one is not reduced to watching attack after attack and then wiping up
the blood and searching data bases for clues to the perpetrators primarily the
job of law enforcement.
Problems With Honesty
Sadly, recent history has shown that the directors of U.S. intelligence services
lie, and that directors of the NSA lie blatantly and suffer zero
consequences. On March 12, 2013 (less than two months before the Snowden
revelations), National Intelligence Director James Clapper lied under oath in
denying that NSA was “wittingly” collecting “any type of data at all on millions
or hundreds of millions of Americans.”
Sen. Ron Wyden, D-Oregon, had put that question to Clapper that day at a formal,
open Senate Intelligence Committee hearing.
Similarly, on June 27, 2013, three weeks after the first Snowden revelations
started coming, then-NSA Director Keith Alexander lied in telling the same
Senate committee that NSA’s bulk telephone surveillance program had thwarted 54
terrorist “plots or events.” On Oct. 2, 2013, Gen. Alexander admitted, in
testimony before the Senate Judiciary Committee, that the number of terrorist
plots thwarted was not 54, but one. (And that particular one cannot bear close
scrutiny.)
The failure to demand accountability for these deceptions proves as if further
proof were needed that the Senate intelligence “oversight” committees has long
since become the Senate intelligence “overlook” committee.
If democracy still means anything, we the people need to devise some kind of
replacement for the sleepy “watchdogs” in Congress who have forfeited their
responsibility to oversee and verify what the intelligence agencies are doing.
Again, Bill Binney has what seem the most sensible and doable suggestions toward
that end.
He has called for a properly cleared technical team, responsible to the courts,
with clearly spelled-out authority to go into any intelligence agency and look
directly into and inspect data bases and the tools in use. This would be a giant
step toward ensuring that we the people through this intrusive inspection regime
could monitor in some rudimentary way what our intelligence agencies are doing.
Binney suggests further that intelligence agencies be required to implement
software to monitor their own networks to detect automatically and to report
immediately violations of law and regulation.
Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church
of the Saviour inner-city Washington. He is co-founder of Veteran Intelligence
Professionals for Sanity (VIPS), and is indebted to VIPS member Bill Binney for
much of the substance of this article, which came from McGovern’s prepared text
for remarks at a conference on Thursday in Moscow, marking the 10th anniversary
of RT’s founding.
Standing Up for Truth and Ben Franklin
Because of the excessive secrecy exercised by the U.S. government,
whistleblowing has become a necessity for American democracy, a reality that
struck home to former FBI official Coleen Rowley and other whistleblowers as
they encountered Benjamin Franklin’s words in Germany.
By Coleen Rowley
Our recent “Stand Up for Truth” whirlwind speaking tour through London, Oslo
(see here and here), Stockholm and Berlin last week as well as webinars, visual
presentations and speaking events in U.S. cities was exhausting but quite
successful.
Truth has always been a difficult and often frustrating business, especially
when that old story line tends to repeat of the naked Emperor continuing to
ignorantly march forward, even after the little boy has yelled the truth. But
someone has to do it!
Throughout the week, we discussed the problem of pernicious governmental,
corporate and other top-down secrecy involved in globalization that enables
large-scale wrongdoing and keeps citizens in the dark about it, making effective
solutions and real democracy, and even our collective security, impossible.
These issues were relevant especially in Germany, given the context of the
details that have emerged about the long-term NSA-BND spy pact targeting
European officials, a scandal now being investigated by a German parliamentary
committee. Of course such scandals only occur when the truth is effectively kept
hidden for decades by powerful institutions.
So how can citizens learn the truth a little sooner? We were able to meet with
Scandinavian officials working with the Committee on Legal Affairs and Human
Rights for the Council of Europe which, significantly, has just completed a
Draft Report on Improving the Protection of Whistleblowers.
In Norway, we were able to speak to the fact that a freedom of speech and debate
institution had just awarded the 2015 Bjørnson Prize, named after a Norwegian
Nobel literature laureate, to Edward Snowden. The academy lauded the American
whistleblower “for his work protecting privacy and for shining a critical light
on US surveillance of its citizens and others” asking the Norwegian cabinet to
protect his visit to Norway in September to receive the prize.
Such acceptance of truth-telling would be a real political challenge, given
Norway’s status as “one of America’s closest allies” but one of their most
respected law firms holds that Snowden cannot be extradited from Norway to the
U.S., since Snowden’s action is a political act to uphold the U.S. constitution,
not a crime. Similarly in Stockholm, our tour sponsors involved in the Right
Livelihood Award “the Alternative Nobel Prize,” whose past laureates include
“Most Dangerous Man” discloser of the Pentagon Papers Daniel Ellsberg (2006) and
Edward Snowden (2014), are pushing for Sweden’s government to ensure safe
passage for Snowden to travel to Sweden to accept his prize.
The final “Quo vadis Democracy?” event venue on our tour produced some real
serendipity as well as irony! We could not help notice the building’s striking
dedication to Ben Franklin as we walked into the Haus de Kulturen de Welt
(“House of the Cultures of the World”), located in the Kongresshalle, a unique
gift from the U.S. to Germany, designed in 1957 by a renowned American
architect.
Known to Berliners as the “pregnant oyster” for its distinctive shape, the Haus
sits next to the German Chancellery, on John Foster Dulles Allee in Berlin
(whence came the irony given the Dulles brothers’ sordid history of world-wide,
illegal exploitation). Triumphing over such perfidy, Franklin’s quote so aptly
reads:
“God grant that not only the love of liberty but a thorough knowledge of the
rights of man may pervade all the nations of the earth so that a philosopher may
set his foot anywhere on its surface and say, ‘this is my country.’
“–Benjamin Franklin (1706-1790)
“To these ideals and to the man who spoke them and lived them this Kongresshalle
is dedicated.”
These days, most Americans have no idea of the buried history behind Benjamin
Franklin’s becoming America’s first whistleblower, long before the word existed
in the English language.
You have to dig deeper than most sanitized American history textbooks to learn
that Benjamin Franklin was publicly vilified in Great Britain after courageously
taking responsibility in 1773, for his “Deep Throat”-like disclosures a year
before, disclosures of secret official correspondence related to a colonial
governor’s corruption and complicity with British repression, the truth of which
was to contribute to the American Revolution.
Two hundred years before there was a Daniel Ellsberg, Chelsea Manning, or Edward
Snowden, an American Founding Father, Benjamin Franklin was treated as a spy and
“incendiary agent,” suffering incredible backlash described as follows by
Franklin biographer H.W. Brands:
“For an hour (Solicitor General of the Lord North ministry, Alexander
Wedderburn) hurled invective at Franklin, branding him a liar, a thief, the
instigator of the insurrection in Massachusetts, an outcast from the company of
all honest men, an ingrate whose attack on [Gov. Thomas] Hutchinson betrayed
nothing less than a desire to seize the governor’s office for himself. So
slanderous was Wedderburn’s diatribe that no London paper would print it.”
No wonder Benjamin Franklin came to love liberty and understand the rights of
man! He had lived it. The courage and spirit of America’s first whistleblower
infused the “Quo vadis, Democracy?” discussion we had later that day with German
politicians charged with investigating the extent of U.S.-German surveillance
cooperation and with other German legal and data privacy researchers.
We each tried to effectively address the important questions: What happens to
the idea of democracy in an age of mass surveillance, data espionage and
collaboration between the German spy agency BND and the U.S. National Security
Agency? How was the NSA scandal received in the United States and Germany and
what can — and must — we learn from this?
In my own seven minutes, in the course of trying to explain how lies and
propaganda fueled the U.S. government’s “going to the dark side” after 9/11, I
ended up butchering Mark Twain’s quote: “A lie can travel halfway round the
world while the truth is putting on its shoes.” I hope I didn’t confuse the
German audience too much. I also hope they stopped on their way out to read the
building’s dedication and take some needed courage from the example of one of
American democracy’s Founding Fathers and its first whistleblower. This type of
courage is again required to stand up for truth.
Coleen Rowley is a retired FBI agent and former chief division counsel in
Minneapolis. She’s now a dedicated peace and justice activist.
Hiding Facts to Thwart Democracy
Over-classification of U.S. government information is a grave threat to the
Republic, giving politicians and bureaucrats the power to hide facts that
aren’t really sensitive but are vital to a meaningful public debate, such as the
IG report on President Bush’s surveillance program, says ex-NSA analyst Kirk
Wiebe.
By Kirk Wiebe
A few weeks ago, as the result of a Freedom of Information Act request by the
New York Times, we were able to view a redacted version of the so-called “Five
IG’s” report, formally entitled “Report on the President’s Surveillance Program”
or PSP, written by the Inspectors General of the Defense Department, the
National Security Agency, the Justice Department, the Central Intelligence
Agency, and the Office of the Director of National Intelligence.
What was most interesting about the portions of the report that were released
was how badly over-classified much of the report originally was. The first
paragraph of the introduction to Volume 1, dated July 10, 2009, was rather
innocuous until you notice the “scratch out” of the original classification,
(TS//SI//OC//NF).
As someone who has worked extensively with classified information, converting it
from raw source materials to forms appropriate for analysis, as well as for
publication to a wide array of intelligence consumers throughout the U.S.
Government, I can tell you without hesitation that it is highly unusual to see
an entire paragraph of an originator-controlled (OC) document rendered
completely unclassified after being initially classified Top Secret.
In fact, I have never seen such a gross change in classification in more than 34
years of intelligence work. First, the terminology making up the classification
of the paragraph in question:
TS means Top Secret (information that if released to an enemy would result in
grave damage to the security of the United States); SI for Special Intelligence
(intelligence derived from signals); OC for Originator Controlled (no changes to
content or classification can be made without the permission of those
originating/publishing the document); NF for NOFORN (no foreign nationals not
even partners as in the “Five Eyes” construct are permitted to see information).
Allow me to emphasize that such over-classification is both extreme and
dangerous because 1) TS is supposed to be used only to notify the reader that
the associated information is of the kind that would most harm the United States
if disclosed, and 2) it undermines the security of true secrets by marking
everything under the sun “TOP SECRET.” It also enables the government to
prosecute unjustly those accused of possessing or mishandling “classified
information.”
Yet, this formerly TS/SI/OC/NF paragraph reads as follows: “In response to the
terrorist attacks of 11 September 2001, on 4 October 2001, President George W.
Bush issued a Top Secret authorization to the Secretary of Defense directing
that the signals intelligence (SIGINT) capabilities of the National Security
Agency (NSA) be used to detect and prevent further attacks in the United States.
The Presidential Authorization stated that an extraordinary emergency existed
permitting the use of electronic surveillance within the United States for
counterterrorism purposes, without a court order, under certain circumstances.
For more than five years, the Presidential Authorization was renewed at 30- to
60-day intervals to authorize the highly classified NSA surveillance program,
which is referred to throughout this report as the President’s Surveillance
Program (PSP).”
While the most important fact coming out of the extensive report (over 700 pages
in length) probably is the confirmation that the NSA was collecting not just
metadata about Americans and foreigners but also content beginning in October
2001 I submit that the pervasive and egregious over-classification of whole
paragraphs within the Five IG’s document is far more troubling and carries with
it potentially wide ramifications affecting legal cases around the country
brought by the U.S. Government that involve the possession or mishandling of
“classified information”.
In just the first 50 pages of the report, there are 29 paragraphs that are
declassified that were originally classified Top Secret, and 26 paragraphs that
are declassified that were originally classified Secret (serious damage to U.S.
security if in the hands of an enemy). Three more examples are:
“(TS//SI//NF) When NSA personnel identified erroneous metadata collection,
usually caused by technical problems or inappropriate application of the
authorization, they were directed to report the violation or incident through
appropriate channels and to delete the collection from all NSA databases. NSA
reported three such violations early in the program and took measures to correct
them.”
The next section refers to information that President George W. Bush’s Attorney
General John Ashcroft provided to U.S. District Judge Royce Lamberth, then
presiding judge of the Foreign Intelligence Surveillance Court, responsible for
issuing secret approval for electronic spying inside the United States.
“ (TS//SI//OC/NF)
Ashcroft provided Lamberth a brief summary of the President’s
decision to create the PSP, and Ashcroft stated that he had determined, based
upon the advice of John Yoo, an attorney in DoJ’s Office of Legal Counsel (OCL),
that the President’s actions were lawful under the Constitution. Ashcroft also
emphasized to Lamberth that the FISC was not being asked to approve the program.
Following Ashcroft’s summary, Hayden described for Lamberth how the program
functioned operationally, Yoo discussed legal aspects of the program, and Baker
proposed procedures for handling international terrorism FISA applications that
contained PSP-derived information. For the next four months, until the end of
his term in May 2002, Lamberth was the only FISC judge read into the PSP.”
“ (TS//SI//OC/NF)
Judge Colleen Kollar-Kotelly succeeded Lamberth as the FISC
Presiding Judge and was briefed on the PSP on 17 May 2002. The briefing was
similar in form and substance to that provided to Lamberth. In response to
several questions from Kollar-Kotelly about the scope of the President’s
authority to conduct warrantless surveillance, DoJ prepared a letter to KollarKotelly, signed by Yoo, that, according to Kollar-Kotelly, ‘set out a broad
overview of the legal authority for conducting [the PSP], but did not analyze
the specifics of the [PSP] program.’ The letter, which Kollar-Kotelly reviewed
at the White House but was not permitted to retain, essentially replicated Yoo’s
2 November 2001 memorandum regarding the legality of the PSP. Kollar-Kotelly was
the only sitting FISC judge read into the PSP until January 2006, when the other
FISC judges were read in.”
Such a pervasive corruption of the classification process runs counter to the
expectation that the Government has an obligation to carry out its
responsibilities with a reasonable measure of propriety; in other words, an
expectation that it must perform in its quasi-contractual obligations to serve
the American people.
Clearly the prevalence of over-classification in a document issued by five
Inspector’s General from within the hallowed halls of the most secret
organizations in the Government is a sign not of occasional error, but of
widespread incompetence, even malfeasance, in the Government’s ability to
properly classify a document containing both classified and unclassified
information as defined by Executive Order 13526, the controlling authority for
government classified information.
Many of these examples suggest classification not because the information is
truly sensitive to national security, but because it is potentially politically
sensitive or embarrassing if discovered by the American public at large.
One can only wonder what the consequences of such willful and reckless overclassification has been in the prosecutions, both past and present, of
defendants left to plead their sentences in cases where the evidence is deemed
classified and the courts have not demanded that the Government defend its
claims that information should indeed be classified.
Kirk Wiebe is a retired National Security Agency senior analyst and recipient of
that Agency’s second highest award the Meritorious Civilian Service Award. As an
employee of NSA, he has sworn to uphold the U.S. Constitution against all
enemies, foreign and domestic. He has worked with colleagues Bill Binney, Ed
Loomis, Tom Drake and Diane Roark to oppose NSA corruption and over-surveillance
since 2001.
Seeing the Stasi Through NSA Eyes
In January when former Western intelligence officials, including from the U.S.
National Security Agency, toured the old offices of East Germany’s Stasi, it was
a look back into a dystopian past but also a chilling reminder of how far modern
surveillance has come in the past quarter century, writes Silkie Carlo.
By Silkie Carlo
The Stasi offices in Berlin have been frozen in time since they were stormed by
activists on Jan. 15, 1990, shortly after the fall of the Berlin Wall three
months earlier. As tourists creep around, room by room, through this monument to
fascism, it feels as though millions of secrets are still ingrained in the
fabric of the chairs and the fibers of the ubiquitous oak furniture.
The museum that now occupies the building is an oddly mundane reminder of
another era: Indistinguishable rooms of desks, phones and filing cabinets,
fenced by aging net curtains filtering the sunlight. It is the walls adorned
with surveillance photos of supposed state enemies, and exhibits of household
gadgets planted with audio recording devices, that color the office’s banality
with a shade of darkness.
But the specter of Big Brother lingers, as I’m reminded by the man who is
accompanying me through the exhibits: William Binney, the former technical
director of the U.S. National Security Agency who helped design mass
surveillance systems for the NSA before spending a decade warning the world
about the risks of those systems.
As we tread past identical desks, retro rotary dial phones, and
electromechanical typewriters, the Stasi’s quaint spying technology reminds him
of his NSA office in the 1980s, he says. Except the NSA today is estimated to
hold one billion times more data than the Stasi held.
“The NSA’s agenda is to control the government, and control the population,”
Binney says.
I had come to the ​Stasi Museum with a group of U.S. and UK intelligence
whistleblowers, who had congregated in Berlin to award Binney with the
2015 ​Sam Adams Award for Integrity in Intelligence. The first award,
presented in 2002, went to former FBI agent Coleen Rowley, who testified to
Congress about intelligence failures prior to 9/11; last year’s award went to
Edward Snowden.
In the years before September 11, Binney, then the technical director of world
geopolitical and military analysis at the NSA, developed a surveillance
program known as ThinThread. A spying tool for the Twenty-first Century, it
was designed to sift global digital signals and procure important intelligence
in a way that the NSA never had.
Because it scanned a sizable amount of international communications traffic, it
swept up Americans’ data in the process; to address that problem, Binney
installed privacy features that anonymized American data, while it scanned for
patterns that suggested a search warrant would be needed to explore the data
further.
Protecting the privacy of Americans was enshrined in the U.S. Constitution and
in the agency’s core directives. “I was giving privacy to everyone in the
world,” he says.
After his creation was tested in the wild in 2000 and 2001, Binney proposed that
ThinThread, which he says cost the NSA only $3.2 million to build, would require
an additional $9.5 million to follow the surveillance targets that the program
identified.
But then-NSA Director Michael Hayden was determined to ditch the program in
favor of another data analysis program called Trailblazer. Proposed around the
same time as ThinThread was born, and developed by a defense contractor
called Science Applications International Corporation with ​close ties to the
NSA, the program collected a much broader swath of information, but lacked
the privacy controls of ThinThread. It was also far more expensive, at a cost
that would ultimately reach an estimated $1.3 billion. Nevertheless, a month
before the attacks of September 11, ThinThread was quietly put aside.
Binney warned that not only was this kind of program unconstitutional, conjuring
“the Stasi on steroids,” but would lead to “data bulk failure,” whereby real
security threats would be lost in the global haystack of information.
Information overload would make terrorist attacks, like the kind that would
happen in Boston and Paris, more difficult to prevent.
Soon after, everything changed. As three World Trade skyscrapers turned to dust
on September 11, so did Americans’ sense of safety. In the days after the
attacks, Bush authorized the NSA and other government agencies to begin
hoovering up every bit of data they could, under a secret wartime decree that
appeared to override the Constitution.
In the last week of September 2001, Binney watched as piles of hardware were
carried into the agency’s SIGINT Automation Research Center in Maryland. These
were the instruments of a new spying system focused on domestic communications,
built on the innovative architecture of ThinThread, Binney would learn.
The new surveillance system, codenamed “Stellar Wind,” would capture data both
outside and inside the U.S., harvesting Americans’ emails, web-browsing data,
telephone communications, and financial transactions. Over the years, the system
would grow, evolve, and be overseen, officially, by a secret court, which is now
charged with approving domestic surveillance searches. (Of the thousands of
surveillance requests to the FISA court in recent years, almost none have been
denied.)
As we walked through the Stasi’s walls of reinforced filing cabinets, it was
hard to visualize this modern data collection. By one estimate, it would require
an estimated 42 trillion Stasi filing cabinets to hold hard copies of all the
NSA’s virtual files.
Binney, who resigned from the NSA in October 2001, speaks of the secret powers
of the state from personal experience. In 2002, he and two other NSA
veterans formally complained to the Department of Defense about what they saw as
fraud, waste, and abuse at the NSA. In 2005, a New York Times report about the
NSA’s surveillance program led the Justice Department to open a leak
investigation. Binney and his fellow whistleblowers became prime suspects.
Although Binney had been cleared of any wrongdoing, in July 2007 the FBI
initiated an eight-hour raid on his home, confiscating a computer, disks, and
personal and business records; as he was coming out of his shower, he says one
agent pointed a gun at his head. Binney, as the most senior intelligence
whistleblower, is certain the U.S. government still keeps a close eye on him.
Binney suggests that the attacks of 9/11 were “allowed to happen.” He explained:
“There’s an agenda that’s after money, and not solving the problem. If you solve
the problem you don’t have the problem to get more money. It gave them all the
money they could want.” Binney insists that the NSA wasn’t just negligent in
preventing 9/11, but is guilty of a “deliberate cover up.”
What he told me next was alarming: that the NSA sought to mislead the 9/11
Commission in its investigation of intelligence failures. Binney said Tom Drake,
a former NSA colleague also turned whistleblower, “took our program, ThinThread,
and ran it on NSA data after 9/11. It showed the dispersal pattern of the people
who actually didn’t hijack the planes,” like suspects and accomplices in the
hijackers’ support network, and “it showed the dispersal of them going back and
getting out of the country. It also showed all those people and where they were
and what they were doing long before 9/11. All the data was there.”
Binney and his former colleagues would detail this failure in their confidential
report to the Pentagon’s Inspector General.
“But NSA suppressed all of that data,” he says. “The first thing they did was
kill the program that Tom used, because it would show all the warts. The
Congressional Investigating Committees didn’t get truth from the intelligence
agencies.”
Drake, who was also touring the Stasi museum with us, told me the NSA has “huge
culpability in the failure to protect the U.S. from the 9/11 attackers, and has
gone to great lengths to suppress the truth.” During his investigation into
ThinThread and data the NSA had, he says, he discovered “all kinds of critical,
actionable intelligence, that painted the tragic picture of what NSA could have
known, should have known, and didn’t share that they did know.”
Years after he warned Congressional investigators about NSA wrongdoing, Drake
also ​became a target of the government’s leak investigation; his home was
raided, and he was charged with violating the Espionage Act, facing 35 years in
prison.
After a lengthy legal battle, the government’s case against him collapsed, but
the agency’s inspector general found that his allegations of NSA retaliation
were unfounded, even though, as McClatchy recently reported, the inspectors
examined only two years out of the ten years detailed in his complaint.
In response to Binney’s accusations of deliberate malfeasance and a cover-up, a
spokesperson for the NSA said that his concerns are a “matter of public record”
and suggested I “review all of the related information that has been in the
public domain for several years.” However, Drake’s testimony to 9/11 Commission
investigators remains classified.
After examining Binney’s claims about the NSA’s choice of Trailblazer over
ThinThread, the Defense Department agreed with him. In ​a 2004 report,
it concluded that Trailblazer had “disregarded important solutions to urgent
security needs,” was “poorly executed” and “overly expensive.” And it found
that ThinThread’s ability to sort through data in 2001 was far superior to that
of Trailblazer in 2004. (Much of the report, including the NSA’s response,
remains classified.)
Hayden himself admitted in 2005 that Trailblazer was hundreds of millions of
dollars over budget. Five years and over a billion dollars later, the program
was terminated, only to be replaced with more powerful mass surveillance
systems, as evidenced by documents provided by Edward Snowden.
The refrain that the NSA collects “just metadata” now? “That’s false,” Binney
says. “I put this ​in a sworn affidavit that I submitted to court. All emails
are collected and the content of about 80 percent of everyone’s phone calls are
recorded. Currently, I think phone calls are stored for about 20 to 30 days.
Although, if you’re targeted for surveillance, you’re screwed. Everything
collected, everything stored.”
Binney alludes to even more extreme intelligence practices that are not yet
public knowledge, including the collection of Americans’ medical data, the
collection and use of client-attorney conversations, and law enforcement
agencies’ “direct access,” without oversight, to NSA databases.
Vanee Vines, an NSA spokeswoman, would not comment directly on Binney’s claims,
but suggested that I “contact other U.S. institutions about law enforcement and
other domestic matters.”
She added that the United States “is not spying on ordinary people who don’t
threaten our national security, and that we take their privacy concerns into
account in our policies and procedures.”
Signals intelligence, she said, is only carried out “where there is a foreign
intelligence or counterintelligence purpose for doing so,” including “terrorist
plots from al-Qaeda, ISIL, and others; the proliferation of weapons of mass
destruction; foreign aggression against ourselves and our allies; and
international criminal organizations.”
Why would the NSA, I asked Binney, want to collect a phone conversation that
Average Joe has with his mother, for instance? “Because Average Joe can turn
into somebody objecting, and you don’t want any opposition. You can’t allow
those people to organize,” he said.
So, what kind of encryption technology does Binney use to communicate now?
“Nothing,” he says. Although Binney broadly agrees with Snowden that “crypto
works,” he knows that the NSA circumvents encryption by targeting the computer
systems of recipients of encrypted mail, and sometimes even breaks encryption,
as revealed in the Snowden documents.
In his acceptance speech, Binney thanked Snowden for his disclosures about
widespread surveillance, since now he and other whistleblowers “can talk about
it more easily.” Despite ​the government’s attempt to gag whistleblowers, he
added, “I will not give up my First Amendment right to free speech, particularly
to speak of information already in the public domain, for anyone.”
The bugging devices we were observing in the Stasi museum looked almost
comedic next to the kind of tools Binney was talking about. The Stasi’s weird
little watering cans with hidden cameras, plug sockets with listening devices,
and steam machines for opening intercepted mail, they looked crude compared to
the all-seeing surveillance apparatus constructed by today’s government spies.
I thought we were visiting Stasi HQ to glimpse at a dystopian past, but the more
I spoke to my fellow museum-goers, it felt like we were looking back at the
beginning of something.
Silkie Carlo is a London based journalist, musician, and co-author of the
book, Information Security for Journalists. [This story originally appeared at
Motherboard.]
Examining the Stasi, Seeing the NSA
Exclusive: For many years, the East German Stasi was viewed as the most
totalitarian of intelligence services, relentlessly spying on its citizens
during the Cold War. But the Stasi’s capabilities pale in comparison to what the
NSA can now do, notes former U.S. intelligence analyst Elizabeth Murray.
By Elizabeth Murray
On a chilly morning in late January 2015,
an unlikely assortment of former U.S.
and U.K. intelligence officers gathered at the former headquarters of the Stasi,
the former East Germany’s Ministerium fuer Staatssicherheit
[Ministry of State
Security], for a tour of Berlin’s “Stasi Museum.”
The delegation – which included ex-officers from the National Security Agency,
the Central Intelligence Agency and British MI5, who count themselves among the
members of the Sam Adams Associates for Integrity in Intelligence (SAAII) – had
traveled to Berlin to confer the 2015 Sam Adams Award for Integrity in
Intelligence on former NSA senior technical director-turned-whistleblower
William Binney, for his role in exposing the extent of mass surveillance of
ordinary citizens in the United States.
In accepting the award, Binney said he resigned from the NSA in 2001 after
realizing that the agency was “purposefully violating the Constitution” with its
“bulk acquisition of data against U.S. citizens … first against U.S. citizens by
the way, not foreigners.”
Binney had worked the Soviet target for nearly 30 years at NSA, “so it was easy
for me to recognize the danger” to democracy and individual freedom posed by
bulk data collection, “that’s what the Stasi did, the KGB did it – every
totalitarian state down through history did that” (albeit with a lot less
technological power than was available to the NSA).
Now, in a strangely fitting yet ironic twist, Binney stood among fellow
whistleblowers in the entrance foyer at the spy headquarters of what was once
the world’s foremost totalitarian surveillance state, one of whose former
operatives, Wolfgang Schmidt, noted wistfully that the current extent of mass
surveillance of the domestic U.S. population would have been a “dream come true”
for the Stasi.
As Stasi Museum tour guide Julia Simoncelli described the inner workings of the
East German intelligence service in great detail, it was telling to observe the
facial expressions of Binney and his whistleblower colleagues as Simoncelli
discussed what had been Stasi’s equivalent of the current U.S. “Insider Threat”
program and the psychological levers used to manipulate citizens into informing
on one another.
“They [the Stasi] figured out that there was a technique far more effective than
force or violence to convince people to inform on one another, and that was to
persuade them that doing so would be ‘good for them’, i.e., a place for their
child at university, career advancement, an apartment, access to Western
luxuries, et cetera,” explained Simoncelli.
The Stasi also made a point of uncovering what motivated a particular person,
including what he/she feared most (anyone who has read Orwell’s 1984’ or seen
the film “The Lives of Others” will have seen vivid examples of how such
information can be exploited).
Annie Machon, a Sam Adams Associate and former MI5 officer who lived in exile
for three years after blowing the whistle on MI5 illegalities along with her
then-partner David Shayler, commented that the techniques used by the Stasi
“brought back a lot of memories for me from the 1990s. Despite it being the
analog [versus digital] era, it was startling how much personal data they could
capture, and how much worse it is now for all of us.”
She observed that the Stasi Museum is “a potent warning from history,” adding
that “the sense of loss of privacy in your own home, when phoning your family,
and when talking to friends who may potentially be turned against you is
corrosive to the human spirit.”
Machon noted that while the former East Germany “is always excoriated as the
worst police state ever,” MI5 was deploying “exactly the same intrusive
techniques as the Stasi against hundreds of thousands of political activists in
the U.K. for decades, and only stopped in the mid-1990s.The penetration levels
were not as high per capita, nor were people snatched and interrogated then
(unless they were Irish) but the paranoid, barricade mentality was equivalent.”
Retired U.S. Army Major Todd Pierce, who served on the defense team for two
Guantanamo Prison detainees in his capacity as a Judge Advocate General (JAG)
officer, stated that “it was the Stasi that led the way in torture techniques,
with us merely adopting theirs.”
The Stasi, Pierce said, “even led the way in teaching us about kidnappingrenditions, as they would kidnap West Germans and rendition them to East Germany
for trial by military court (Military Commissions).”
Former FBI Special Agent Coleen Rowley, a previous recipient of the Sam Adams
Award and Time Magazine’s 2002 Person of the Year for her role in exposing the
FBI failure to share information that might have prevented the 9/11 attacks,
commented that “what jumped out at me from that [Stasi Museum] tour in comparing
all the excessive spying on the personal lives of citizens and oppression and
abuse during that period of East German history was that, despite the use of
different ideologies, religions and loyalty groups, and despite the use of new
spy technologies, what remains constant is this form of ‘control-freak’
perceived need for domination.
“Those in power do tend to be ‘true believers’ in their own noble cause
justifying their terribly wrongful, illegal methods.”
Rowley added that current “FBI-CIA methods against the Muslim community in the
United States are not much different [from Stasi tactics], most likely also
assisted by intelligence unlawfully gained through electronic surveillance to
extort and coerce collusion.”
And, in earlier comments during the Sam Adams Award ceremony, former NSA senior
executive Thomas Drake, who won the Sam Adams Award in 2011 jointly with former
Justice Department attorney Jesselyn Radack, reflected: “Here we are, on what
used to be the front lines of the Cold War, facing the greatest threat in terms
of what we’ve created electronically which is the real prospect of turnkey
tyranny of a digital kind.”
Drake said he “never imagined that the model of the Stasi, which was to know
everything, would turn into the collect-it-all digital dragnet.”
As the former intelligence officers-turned-whistleblowers walked among the wellpreserved offices and conference rooms of a former totalitarian state’s internal
spy apparatus, the sense of deja vu and irony of what the United States of
America has become was clearly not lost on any of them.
Elizabeth Murray served as Deputy National Intelligence Officer for the Near
East in the National Intelligence Council before retiring after a 27-year career
in the U.S. government. She is a member of Veteran Intelligence Professionals
for Sanity (VIPS).
NSA’s Binney Honored for Integrity
Retired National Security Agency official William Binney, who challenged
decisions to ignore the Fourth Amendment in the government’s massive — and
wasteful — collection of electronic data, faced career and legal repercussions.
Because of his courage, he is being honored by former intelligence officials.
Sam Adams Associates for Integrity in Intelligence (SAAII) is pleased to
announce that it has selected retired NSA Technical Director William “Bill”
Binney to receive its 2015 award for integrity in intelligence. The public is
invited to attend the award presentation scheduled to begin at 7 p.m. on Jan.
22at the Berlin Moscow venue, Unter den Linden 52, 10117, Berlin, Germany.
After serving four years in the Army Security Agency during the Vietnam War,
Binney joined the National Security Agency (NSA) in 1970.
He worked there as a
Russia specialist in the operations side of intelligence, starting as an analyst
and ending as Technical Director of NSA’s World Geopolitical & Military Analysis
organization.
He was also co-founder of the NSA’s SIGINT Automation Research Center where he
worked with Ed Loomis, Kirk Wiebe, and others to solve the issues of velocity,
variety, and volume of information in the Information Age. Having expertise in
intelligence analysis, traffic analysis, systems analysis, knowledge management,
and mathematics, Binney has been described as one of the best analysts,
mathematicians and code breakers in the NSA’s history.
As a 36-year intelligence agency veteran, William Binney resigned from the NSA
in 2001 and became a whistleblower after discovering that elements of a datamonitoring program he had helped develop were being used to spy on
Americans. Binney explained that he “could not stay after the NSA began
purposefully violating the Constitution.”
In September 2002, he, along with colleagues,
Wiebe and Loomis, asked the U.S.
Defense Department Inspector General to investigate the NSA for allegedly
wasting “millions and millions of dollars” on Trailblazer, a system intended to
analyze data carried on communications networks such as the Internet. Binney had
been one of the inventors of an alternative, less intrusive and far less
expensive system, ThinThread, which was shelved when Trailblazer was chosen
instead. Trailblazer was declared a failure in 2005.
Later, Binney, Loomis and Wiebe, along with Diane Roark, a senior staffer with
the House Permanent Select Subcommittee on Intelligence staffer, complained to
Congress regarding the fact that NSA was illegally spying on U.S. citizens.
Binney became one of several people investigated as part of an inquiry into the
2005 (Pulitzer prize-winning) exposé by New York Times reporters James Risen
and Eric Lichtblau) on the agency’s warrantless eavesdropping program.
Although Binney was told he was cleared of wrongdoing after three interviews
with FBI agents beginning in March 2007, a dozen agents with guns drawn appeared
at his house a few months later, one of whom entered his bathroom and pointed
his weapon at Binney, who was coming out of the shower.
In that raid, the FBI confiscated a desktop computer, disks, and personal and
business records. The following day, NSA revoked his security clearance, forcing
him to close a business he ran with Loomis and Wiebe.
Despite a serious health condition which has left him a double amputee, Bill
Binney is tireless, pledging to spend the remainder of his years speaking out
and working to reform the gross governmental illegality and stupidity of
intercepting trillions and trillions of communications “transactions”
of innocent persons’ phone calls, emails and other forms of data.
“I should apologize to the American people,” Binney told Jane Mayer of The New
Yorker. “It’s violated everyone’s rights. It can be used to eavesdrop on the
whole world.”
Thanks to NSA whistleblower Edward Snowden, documents detailing the top-secret
surveillance program were published that corroborate what Binney had long said.
Binney was subsequently called as a witness in U.S. lawsuits challenging the
legality of this massive surveillance and also testified to European bodies
including the German Bundestag’s NSA Inquiry Commission, deploring the fact that
“we have moved away from the collection of (relevant) data to the collection of
(non-relevant) data of the 7 billion people on our planet.”
Binney fears the data is being used to “map” or build real-time profiles of
innocent individuals. “So that now I can pull your entire life together from all
those domains and map it out and show your entire life over time,” Binney told
documentarian Laura Poitras in “The Program.” Binney added that the purpose of
the program is “to be able to monitor what people are doing” and with whom they
are doing it.
More background information regarding the “Sam Adams Award for Integrity in
Intelligence” that has been given annually since its inception over 12 years
ago as a way to honor the intelligence work of CIA analyst Sam Adams during the
Vietnam War is available at http://samadamsaward.ch/. The story of CIA analyst
Sam Adams is detailed at http://samadamsaward.ch/history-of-the-sam-adamsaward/.
It is hoped the award will serve to encourage more integrity in intelligence
work — as well as more courage on the part of those in position to blow the
whistle when that work violates the Constitution.
Stifling Dissent on the Upper East Side
Exclusive: Modern U.S. counterinsurgency doctrine doesn’t just target people in
faraway lands where the U.S. military is battling some uprising. It also takes
aim at Americans whose dissent might undermine those wars, possibly explaining
the strange arrest of Ray McGovern, writes retired JAG Major Todd E. Pierce.
By Todd E. Pierce
Did COIN or counterinsurgency doctrine come to New York’s Upper East Side in
late October? One might think so when a critic of retired Gen. David Petraeus
was denied entry to a public event and then roughly arrested by New York police.
On Oct. 30, this generation’s COIN deity David Petraeus and acolytes John Nagl
and Max Boot were to discuss “national security” at an event open to the public
at the Upper East Side Y. However, when former CIA analyst and war critic Ray
McGovern arrived with ticket in hand, he was “neutralized,” as the COIN
practitioners might put it.
McGovern was greeted by a security official who addressed McGovern by name and
seemed to be expecting him. The security official told McGovern he was “not
welcome” and denied him entry, ticket or no ticket. Not only did the security
officer seem to expect McGovern, but NYPD reinforcements were on hand to arrest
McGovern on charges of trespassing, resisting arrest and disorderly conduct.
The 75-year-old ex-CIA analyst, who was suffering from a shoulder injury, had
his arms pulled painfully behind him as he was handcuffed, causing him to scream
in pain. He was then transported to jail where he spent the night on a metal
cot.
McGovern wrote afterward: “But one mystery lingers. The ‘organs of state
security’ (the words used by the Soviets to refer to their intelligence/security
services) were lying in wait for me when I walked into the Y? Why? How on earth
did they know I was coming?”
McGovern’s answer to his own question was that it would seem the group that he
was staying with was the target of an intelligence collection operation. That is
what one would expect the authorities to do to “counter insurgents” in a foreign
nation where U.S. forces operate, as Petraeus’s Counterinsurgency Manual
explains. Or, you might see it in a nation under an authoritarian political
system, what we used to call a Police State before we Americans adopted those
same methods.
But the First Amendment of the U.S. Constitution is supposed to prevent the
suppression of public speech by government or quasi-government officials. That
was the principle at least, until the 9/11 attacks “changed everything.”
Unlimited Powers
On Oct. 23, 2001, six weeks after those attacks, Justice Department officials
Robert Delahunty and John Yoo signed an Office of Legal Counsel Opinion entitled
“Authority for Use of Military Force To Combat Terrorist Activities Within the
United States,” essentially giving President George W. Bush, as the “Commander
in Chief,” the power to impose martial law.
Yoo/Delahunty wrote in that opinion that the Fourth Amendment did not apply to
military operations within the United States, which would logically include
operations by the National Security Agency, an intelligence agency within the
Department of Defense, i.e., surveillance operations against the U.S.
population.
Yoo/Delahunty also claimed: “First Amendment speech and press rights may also be
subordinated to the overriding need to wage war successfully. ‘When a nation is
at war many things that might be said in time of peace are such a hindrance to
its effort that their utterance will not be endured so long as men fight and
that no Court could regard them as protected by any constitutional right.’”
This assertion that the Constitution’s safeguards of a citizen’s rights must be
set aside at a time of war even one as vague as the “war on terror” and must be
replaced by the prerogative power of the military authorities, with the
“Commander in Chief” at the top,
acting under a theory of unlimited
presidential powers, is descriptive of martial law.
Or as the Supreme Court once said, “what is termed martial law, but which would
be better called martial rule, for it is little else than the will of the
commanding general sometimes advanced by men, with more zeal than wisdom and is
at variance with every just notion of a free government.”
All the available evidence, principally the DOD/NSA’s spying-on-citizens
program, would indicate that martial law was instituted under the Bush regime
and remains in place with continued domestic DOD/NSA spying under the Obama
regime. That authority for domestic military operations would logically include
COIN, a menu of tactics so extensive that it covers everything from full-scale
army operations to the control of undesired political speech.
This is what Ray McGovern can be said to have encountered at the Upper East Side
Y. It is irrelevant that no military personnel were on hand, other than retired
military officers. Martial law is not limited to only the military exercising
the prerogative power of the Commander in Chief; it is most successful when
citizens themselves take on the task of enforcing the “Commander’s intent,” in
whole or in part.
Nor is it necessary that martial law be publicly declared. For example, the
removal of the Japanese-Americans from the West Coast during World War II at the
instigation of General John L. DeWitt was an example of martial law. It wasn’t
called that for political purposes, just as it is not called that now, even
though the military, via the DOD’s NSA, continues to conduct a military
operation against U.S. citizens.
The McGovern Case
So here is the logic of a COIN operation and how that can hypothetically be seen
as having been executed against Ray McGovern: Part of COIN theory deals with
control of information, sometimes called “information warfare,” in which the
enemy’s propaganda and other communications are blocked or undermined and your
own messaging is left unchallenged.
From the 2014 version of the COIN Manual, or FM 3-24, “Information Operations”
are defined as information-related capabilities “to influence, disrupt, corrupt,
or usurp the decisionmaking of adversaries and potential adversaries while
protecting our own.” Part of the strategy is for “our own” side to influence a
“target audience” while making sure the enemy is frustrated in similar attempts.
At the Oct. 30 event, Petraeus, Nagl and Boot given the role they’ve played
promoting COIN might very easily see their public speaking through a COIN lens.
Thus, their listeners that evening would constitute a “target audience” whom the
speakers clearly intended to influence. And, Ray McGovern by planning to
challenge Petraeus during the Q-and-A could be viewed as the “enemy” or at least
someone aiding the “enemy” cause.
McGovern, though a longtime intelligence analyst for the U.S. Army and the CIA,
has emerged as an internationally known antiwar political activist who, in 2006,
publicly challenged Defense Secretary Donald Rumsfeld about his false statements
regarding Iraq’s weapons of mass destruction, a confrontation that led evening
news shows, energized domestic critics of the Iraq War and arguably in
Petraeus’s view undermined public support for the war.
FM 3-24 explains, “Threat characteristics involve the activities, and tactics of
an insurgency. Tactics for an insurgency include political activities. The use
of political activities to influence a society is another political activity of
an insurgency.”
These activities include “Demonstrations, propaganda, strikes, and civil
disobedience. Propaganda is one of the most important political tools an
insurgency has” by providing the means for an insurgency “to communicate a
message, often political, to the population.” This allows an “insurgency to
create a narrative of why the government’s actions are not legitimate.”
In other words, McGovern might have asked a pointed question that would counter
the message that Petraeus was seeking to convey to the audience, particularly
that his COIN policies have protected America from its “enemies” and thus must
be continued.
McGovern said his hope was to ask Petraeus, who had been responsible for
training the Iraqi army, why that training had failed to prevent the Iraqi army
from fleeing the battlefield when confronted by militants from the Islamic
State. “Will you come out of retirement and try to do it better this time to
train the Iraqi forces?” McGovern said, describing his intended question.
In other words, McGovern’s question might have popped the inflated bubble around
Petraeus’s reputation and raised doubts about whether the general’s
counterinsurgency warfare had actually done much to protect Americans.
Repression Coming Home
But one may ask, this was at the 92nd St. Y in New York City, not an overseas
country where the U.S. is currently applying COIN? FM 3-24 explains, however: “A
center of gravity (emphasis in original) is the source of power that provides
moral or physical strength, freedom of action, or will to act. Counterinsurgents
must understand their own center of gravity and that of the host nation. In many
cases, political support is the strategic center of gravity for the U.S.”
That is, if political support among the American people for the U.S. military’s
counterinsurgent policies is lost, then the insurgents win, according to this
COIN theory. Much of this thinking stems from the supposed “lessons” of Vietnam
where many generals blamed the U.S. defeat not on their own failings but on the
success of “enemy propaganda.”
The Joint Chiefs of Staff believed that the Vietcong targeted the U.S. media and
American antiwar activists, causing the public to lose faith in and patience
with the war. After the war finally ended, Gen. William Westmoreland and other
generals complained that the U.S. news media gave moral support to the enemy
through critical reporting about the war and helped turn the American people
against the conflict.
But the American people didn’t need the media to tell them about this failed
war; they had evidence from the many funerals of dead servicemen and anecdotal
stories from returning soldiers. Subsequent studies, including by U.S. military
historians, have further debunked the military’s “stabbed-in-the-back”
complaint, blaming the defeat instead on an unwinnable strategy and the
staggering loss of life.
But the “enemy within” myth continued to dominate much of U.S. military’s
thinking about the Vietnam War, including Petraeus’s updated counterinsurgency
manuals and subsequent ones. “In a counterinsurgency, the insurgent often
targets the U.S. population with themes and messages concerning the insurgency,”
FM 3-24 asserts. In other words, American anti-war activists, who question the
U.S. government’s own propaganda themes or who give credence to the arguments
from the other side, are still being viewed as “enemies within” who must be
neutralized.
Of course, this outlook overlooks what has been a central tenet of al-Qaeda’s
strategy to draw the United States deeper into the Middle East in order to
exhaust America financially and militarily, to keep the U.S. locked in this
conflict until it suffers a devastating strategic defeat much as was done to the
Soviet Union in Afghanistan in the 1980s. But to military COIN theorists, like
Petraeus and Boot, al-Qaeda’s scheme is outside the scope of their analytical
ability.
The Information Battlefield
So, in the minds of the totalitarian-oriented COIN theorists, the war is really
about information and the battlefield is everywhere. According to this doctrine,
“Insurgent support activities include communications. These support activities
sustain insurgencies and allow for both military and political actions. They are
enabled by an insurgency’s ability to generate popular support. These networks
can include support from other nations or from population groups outside the
country.”
This paranoid viewpoint is, of course, not unprecedented. Indeed, it has been
common for authoritarian systems to label dissent against their war policies as
support for insurgents or other “subversives.” This attitude has been a common
denominator of nearly all despotic military regimes from Hitler’s Germany to
Pinochet’s Chile to modern Egypt under a variety of military rulers: dissent
equals treason.
In fact, the COIN Manual cites as an example the case of the Tamil Tigers and
the alleged support these insurgents received from civilians of the Tamil
diaspora following ethnic riots against the Tamil people that drove many to flee
Sri Lanka. According to the manual, this global diaspora then became a major
part of the Tamil Tigers’ “propaganda network,” a statement that would be a bit
like charging German Jewish émigrés pre-World War II of being part of an
American “propaganda network” for telling the truth about conditions in Germany.
FM 3-24 does acknowledge that a prerequisite for an insurgency is “Motive” but
adds that grievances alone are not sufficient to spur an insurgency. It takes
leaders “to build a compelling narrative that links grievances to a political
agenda and mobilizes the population to support a violent social movement. When
grievances mobilize a population, they are a root cause of an insurgency. The
presence of a foreign force can be the root cause of an insurgency.”
While all that is well and good and would apply to almost all political
uprisings including the American Revolution the lessons drawn from this current
obsession with “counterinsurgency” veers off into some dangerous directions.
Behind it is the assumption that virtually all insurgencies at least those not
initiated by Washington deserve countering.
Yet, sometimes, indeed often, insurgencies reflect the urgent desires of an
oppressed people for justice, meaning that modern counterinsurgency warfare, as
practiced by Gen. Petraeus and other U.S. strategists, can become just one more
boot on the people’s neck.
It also follows that the COIN’s obsessive practitioners will begin to detect the
enemy within the United States, since the information war is global and the
counterinsurgency operation must protect itself against a loss of political will
among the American people. Thus, a citizen who asserts that the U.S. invasion
and occupation of Iraq was to blame for the Iraqi insurgency could be accused of
enabling the insurgency, being part of the enemy’s “propaganda network.”
In counterinsurgency thinking, “external support” for an insurgency can be
something as vague as “moral support.”
The Insurgent ‘Network’
Another pertinent dynamic identified in the COIN Manual is “Organizational and
Operational Patterns,” which can be almost as ambiguous as “moral support.” It
is explained that “Insurgents may be organized into networks,” a series of
“direct and indirect ties from one entity to a collection of entities. Insurgent
networking extends the range and variety of both insurgent military and
political actions. Networks of communications, people, and activities exist in
all populations and have a measurable impact on the organized governance of a
population and, consequently, military operations.”
So “networks” are not limited to insurgents inside the foreign nation where the
insurgency is active; these “direct and indirect ties” can extend to all
populations and include a variety of friendly, neutral and threat networks, each
meriting its own treatment.
Individuals in a network are called “actors or nodes.” Connections between nodes
are links, and a link between two people is a “dyad.” Understanding dyads is
essential to understand the nature of an insurgency, per the FM 3-24’s doctrine.
This is accomplished through “network mapping, charting, and social network
analysis,” which are “intelligence products that can aid in refined analysis and
course of action developments.” Intelligence collection for this purpose would
be in the manner of total surveillance, electronically and digitally, as the NSA
is alleged to be engaged in globally, including inside the United States.
So what does a counterinsurgent do when encountering a “network?” FM 3-24
prescribes the solution: attack the network.
“Attack the network operations consist of activities that employ lethal and
nonlethal means to support friendly networks, influence neutral networks, and
neutralize threat networks.” Thus, an individual node, a dyad or a larger group
providing external moral support to an insurgency whose root cause is the
presence of U.S. forces in that country or region would be defined as a “threat
network” which would need to be “neutralized.”
At least one type of network as described in the COIN Manual, “friendly,” and
maybe the second sort, “neutral,” were present at the 92nd Street Y when Ray
McGovern approached with a ticket in hand. As an antiwar activist who has called
for U.S. troop withdrawals from countries where U.S. forces have been engaged in
counterinsurgency, Petraeus’s COIN doctrine and its totalitarian view of the
world would put McGovern into the “threat network” as perhaps a “peripheral
node,” even though he does not support any of the insurgents in those conflicts.
But actual support is not required to become part of a “threat network,” just
behavior that causes trouble for the counterinsurgency strategy or that could be
interpreted as undermining the information warfare campaign against the enemy or
that could be seen as lending “moral support.” And, according to the COIN
Manual, these “threat networks” must be neutralized to protect friendly forces
and populations while creating time and space for other counterinsurgency
operations to succeed.
While the talks by Petraeus, Nagl and Boot could be expected to bolster
“friendly networks,” McGovern threatened to undermine that effort by posing a
critical or embarrassing question to Petraeus. Thus, the doctrine called for
taking “direct actions against threats, reducing their functionality and impact,
in order to set conditions for supporting friendly networks and influencing
neutral networks. The goal is to change the perceptions and behaviors of neutral
audiences to support the achievement of U.S., multinational, and host nation
objectives.”
Getting in the Way
According to the doctrine, it is not necessary that the forces neutralizing a
node in a network be military; in fact, “If the police have a reasonable
reputation for competence and impartiality, it may be better for them to execute
urban raids than military forces because the population is more likely to view
their application of force as legitimate.”
Of course, we can’t say for sure at this time what prompted the preemptive
strike against McGovern and his troublesome question. The precise scenario of
who instigated the arrest might emerge from future court proceedings or the
details might always remain a mystery.
Perhaps the incident was not organized by senior practitioners of
counterinsurgency strategy, even though the speakers that night were well versed
in these theories. Another possible interpretation is that some individuals who
simply despise dissent a right-wing goon squad in the mold of old-time fascist
storm troopers took it upon themselves to squelch McGovern’s attempt to exercise
his First Amendment rights.
Either analysis could be correct and might not represent much of a distinction
because COIN doctrine has become something of a secular religion in many
political circles in the United States, a disdain for people who challenge the
government’s assertion of “national security.” That anger at anti-war dissent
has percolated from the top down and gained an official imprimatur through the
“war on terror.”
After all, COIN amounts to the exercise of military rule over a given area while
all forms of force from full-scale army operations to paramilitary killings to
dissemination of propaganda to political activity are used to crush the
resistance.
nd
In the case of neutralizing Ray McGovern at the 92
Street Y on Oct. 30 a
mission carried out by the NYPD and private security operatives the tactics of
COIN doctrine were on display. So was the possible motive: the need to suppress
McGovern’s question that might have undercut the U.S. government’s
counterinsurgency goals.
Todd E. Pierce retired as a Major in the U.S. Army Judge Advocate General (JAG)
Corps in November 2012. His most recent assignment was defense counsel in the
Office of Chief Defense Counsel, Office of Military Commissions.
Filling the Blanks in Snowden’s
‘Citizenfour’
Exclusive: To grasp the full story of Citizenfour, the documentary on Edward
Snowden’s decision to expose NSA spying, you must go back four decades to see
how the reality slowly dawned on Americans that their privacy and freedoms were
at risk, writes James DiEugenio.
By James DiEugenio
In 1974, at about the time President Richard Nixon was resigning due to the
Watergate scandal, director Francis Coppola released his haunting, compelling
film about electronic surveillance, The Conversation. Centered within the lives
of surveillance technicians and the powerful corporate officers who employed
them, Coppola depicted a nightmare world: one fraught with the invisible threat
of electronic spying at almost any place, at any time including in public parks
and inside private hotel rooms.
The film had a remarkable double twist at the end. The protagonist, played by
Gene Hackman, has found out that, unbeknownst to him, the people who hired him
used his work to stage a killing. In turn, they find out about his dangerous
knowledge. The long last scene depicts Hackman literally dismantling his
apartment, trying to find the microphone his murderous employers have placed in
his room.
Coppola has said he never realized his film would play out against the backdrop
of the Watergate scandal, which also had electronic surveillance at its center,
this time politically, with the Republicans spying on the Democratic campaign
headquarters for the 1972 presidential race.
In the wake of the Watergate imbroglio, some of the people on the Watergate
Committee, such as Sen. Howard Baker, were not satisfied with the congressional
investigation led by Sen. Sam Ervin. Baker felt that the role of the CIA in the
two-year long ordeal had been glossed over.
This, plus the exposure of CIA counter-intelligence chief James Angleton’s
domestic operations, gave birth to the Church Committee, headed by Sen. Frank
Church, D-Idaho. It was the first full-scale inquiry into the crimes of the FBI
and CIA.
As a result of the publicity given to that committee (back then such events were
actually covered in the U.S. news media, not mocked and ignored), some reforms
in the monitoring of the intelligence agencies were enacted. After these reforms
were put in place, the Senate decided that there should also be some limits and
controls placed upon electronic surveillance over alleged threats from domestic
enemy operatives inside the United States.
The Birth of FISA
Therefore, a handful of senators, including Ted Kennedy, banded together in 1977
to pass the Foreign Intelligence Surveillance Act. The act allowed for
surveillance of up to one year without a warrant over foreign targets. If one
was not foreign, but an American citizen, a warrant had to be granted within 72
hours.
There was an eponymous special class of courts known as the FISA courts set up
to deal with these cases. To review and issue the warrants, 11 judges are chosen
by the Supreme Court for a period of seven years. When deciding to grant a
warrant, the court usually consists of three judges.
The idea was that no American should be spied upon unless the government showed
some kind of “probable cause” that the American citizen was an agent of a
foreign power or terrorist organization. In other words, the judges were to
provide some safeguard against unwarranted and unjustified spying by the
government, albeit with their deliberations in secret and without an adversarial
proceeding.
Frank Church had seen the awesome power of the FBI, CIA and NSA up close. He had
seen what people like longtime FBI Director J. Edgar Hoover had done to Martin
Luther King Jr., trying to coerce the civil rights leader over his personal
life. Church had been exposed to MH CHAOS, the CIA’s domestic spying on radicals
and the alternative press in the 1960s and 1970s. He had seen the documents on
COINTELPRO, the FBI’s program to infiltrate and then undermine leftist, activist
groups like the Black Panthers.
And Church had been one of the first outsiders to get an in-depth look at just
what the technological capabilities of the National Security Agency were. Even
back in 1975, Church was very much impressed and, at the same time, he was quite
fearful. He made the following memorable quote in regards to the powers of the
NSA:
“If a dictator ever took over, the NSA could enable it to impose a total
tyranny, and there would be no way to fight back. That capability could at any
time be turned around on the American people, and no American would have any
privacy left, such is the capability to monitor everything: telephone
conversations, telegrams, it doesn’t matter.
There would be no place to hide.
“I don’t want to see this country ever go across the bridge. I know the capacity
that is there to make tyranny total in America, and we must see to it that this
agency and all agencies that possess this technology operate within the law and
under proper supervision, so that we never cross over that abyss. That is the
abyss from which there is no return.”
Spying on Dissent
Those comments were probably made because Church found out about Project
Minaret, an early and limited attempt at domestic surveillance which targeted
the communications of famous personages who criticized the Vietnam War, e.g.,
himself and King.
Project Minaret lasted from 1967 to 1973 and ended up targeting about 1,650
American citizens. These names were on Watch Lists made up by the executive
intelligence agencies. There was no judicial oversight and no warrants were
obtained.
With this in mind, Church, Ted Kennedy and others were seeking to balance the
threat of domestic infiltration by foreign powers with some semblance of legal
strictures to protect our fundamental freedoms, so that Coppola’s Kafkaesque
vision did not become an American reality.
This imperfect balance was maintained for about two decades, from the creation
of the FISA courts in 1978 to the start of the new millennium. Very few people
had ever even heard of FISA courts or understood what they did. Then came George
W. Bush and the Al-Qaeda attacks of Sept. 11, 2001. As the saying went,
“everything changed.”
The vast expansion of the NSA’s spying began within a few months of those
attacks. But the American public did not know about it until December 2005. In
fact, President Bush appears to have lied about the program in public when he
made two speeches in April 2004 in which he said any wiretaps his administration
employed necessitated a court order.
He then added, “When we’re talking about chasing down terrorists, we’re talking
about getting a court order before we do so.” He made the same claim at least
three other times.
Then on Dec. 15, 2005, the New York Times published a story that revealed
President Bush had allowed the NSA to “eavesdrop on Americans and others inside
the United States to search for evidence of terrorist activity without courtapproved warrants.” One source for the story said, “This is really a sea change.
It’s almost a mainstay of this country that the NSA only does foreign searches.”
The story was written by James Risen and Eric Lichtblau. And it was revealed
that the Times had sat on it for more than a year. Why? Because the White House
pressured the newspaper not to print it. [See Consortiumnews.com’s “Spying and
the Public’s Right to Know.”]
Scaring the Times
Bush and his aides had used all kinds of intimidation tactics to keep the story
out of print. From saying the paper would be held responsible for any upcoming
successful terrorist attack to threatening another Pentagon Papers-style
lawsuit.
A key reason that the Times changed its mind and published the story in December
2005 was that Risen was including the information in his book, State of War,
scheduled for release in January 2006. The Times editors judged that the
potential embarrassment from continuing to sit on such a newsworthy story
outweighed the risks of offending the Bush administration.
The hidden controversy about the story reveals that a number of people inside
the NSA and the Intelligence Community were disturbed by what Bush had
authorized them to do. And although Risen and Lichtblau used anonymous sources,
the government apparently suspects that one major source for them was Justice
Department lawyer Thomas Tamm and another was Jeffrey Alexander Sterling, a CIA
operations officer.
Sterling is now under indictment for violation of the Espionage Act. Tamm’s
house was raided by the FBI in 2007. Charges were not filed against Tamm,
although the investigation continued until 2011.
It turned out that the release of the Times story and the subsequent legal
skirmishes over the whistleblowers set a pattern in this legal area. Contrary to
popular belief, Edward Snowden was not the first NSA employee to reveal the
illegality of classified programs in the wake of 9/11, just the highest profile
one. The drama around Snowden’s revelations also reflected the reality that, as
the years rolled on, the scope of NSA spying grew exponentially.
The program that Bush authorized in late 2001 was titled STELLARWIND. It allowed
“data mining” of Internet activity, e-mail communications, phone calls financial
transactions. The fact that this was done on a massive scale precluded the
formal vetting done by a FISA court.
Bush’s rationale for this program was that the U.S. had failed to stop the 9/11
attacks because its defenses were too timid, not aggressive enough. For
instance, in the year 2001, FISA granted 932 warrants. What Bush was doing
dwarfed that.
STELLARWIND was briefly discontinued in 2004 when Deputy Attorney General James
Comey refused to renew it while his boss John Ashcroft was in the hospital. To
his credit, when visited in the hospital by Bush’s representatives, Attorney
General Ashcroft himself refused to sign. Bush then got FISA court chief judge
Collen Kollar-Kotelly to approve the program — 30 months after it started. (The
Guardian June 27, 2013)
A Mainstream Scandal
With the release of the Times story in December 2005 and Risen’s book, State of
War, a month later, the controversy was propelled into the major media onto the
front pages and into the lead stories of TV news shows. That’s when the real
trouble began.
The divisive issues were those of civil liberties, civil disobedience and the
fundamental one: were what FISA, Bush and the NSA doing constitutional? Or, if
under the cover of an undeclared “war on terror,” were Frank Church’s fears and
Coppola’s nightmare vision now coming to fruition?
William Binney was one of the very first to protest from the inside in the wake
of the New York Times story. Binney had 32 years in the NSA and was considered
one of the finest cryptographic analysts they had. He had devised a program
called THINTHREAD against incoming foreign communications. But the Bush White
House ordered the NSA to drop the privacy controls on the program that
guaranteed Americans would not be surveilled.
Since Binney understood that spying on Americans was illegal without a warrant,
he and his friend and colleague Kirk Wiebe began making unwelcome entreaties to
Congress and the Defense Department, even a Supreme Court justice. (Vanity Fair,
“The Snowden Saga” May 2014)
As a reward for “going through channels,” Binney and Wiebe were flagged as leak
suspects with their NSA superiors steering the FBI in their direction, Binney
said in an email to me. Binney added that the NSA “apparently got our names form
the DOD IG’s [Inspector General’s] office – as we were the ones to file the DOD
IG complaint about NSA fraud waste and corruption.” (Bureaucratically, the NSA
is under the Defense Department.)
Binney had his house raided by FBI agents. He was dragged out of the shower with
a gun aimed at him. The excuse for the raid was the agents were looking for the
sources for the New York Times story.
NSA Whistleblowers
Thomas Drake was another NSA official who had complained about NSA abuses to
other government agencies. He then went to the newspapers, specifically the
Baltimore Sun. Drake was formally charged under the Espionage Act of 1917. The
government had no real case under that statute, but the expense and time of the
legal ordeal essentially broke up Drake’s life. Today he is employed by an Apple
Store. (ibid)
But the role of Drake goes much further than the Vanity Fair article took it.
That article stated that Drake had exposed waste, fraud and abuse at NSA, which
is only part of the story. He went much further than that.
In a memorandum sent to President Obama on Jan. 7, 2014, predating the Vanity
Fair piece, Drake revealed a major reason why he was charged and why others,
like Binney, resigned. This memorandum was signed by Binney, Drake, former NSA
division chief Ed Loomis, and Kirk Wiebe, former NSA senior analyst. To my
knowledge, Consortiumnews.com was the only outlet that has printed it in its
entirety.
The document states that National Intelligence Director James Clapper lied to
Sen. Ron Wyden on March 12, 2013, during a formal session of the Senate
Intelligence Committee. Wyden asked if the NSA collected any type of data on
millions or hundreds of millions of Americans. Clapper replied in the negative.
Yet this collection was going on since STELLARWIND.
What the memo revealed was that the whole pubic scandal about STELLARWIND was
unnecessary because Binney, Loomis and Wiebe had devised a much better program
called THINTHREAD. This did much the same thing, but it had encryption formulas
entered into it so that records relating to American citizens would remain
secret at least until a FISA court could decide on whether or not probable cause
existed to open them.
The program was also cross-relational: “It united data associated with
terrorists/criminals from all databases.” And it was relatively
cheap. THINTHREAD was developed in-house for a paltry $3 million and could be
fully deployed for about $300 million. But NSA Director Michael Hayden vetoed
this program in favor of an outside contractor’s program called TRAILBLAZER, a
decision made three weeks before the 9/11
attacks.
Bloating a Budget
One of the bureaucratic “advantages” of TRAILBLAZER was that it cost more than
ten times as much as THINTHREAD and allowed the NSA and various members of
Congress thus to show that they were doing more about terrorism and helping out
some favored contractors even though TRAILBLAZER ultimately proved a failure and
a waste of some $3.8 billion.
However, after 9/11, money was really no worry at the NSA. With the FBI and CIA
taking the brunt of the blame for the failure to stop the attacks, Hayden had a
great opportunity to build up the NSA’s budget and image, taking the codebreaking agency into the forefront of the U.S. intelligence community.
After 9/11, Drake tried unsuccessfully to revive THINTHREAD, but failed to
scrape together enough money to complete a THINTHREAD content analysis program
on NSA databases. This was how Drake learned that the NSA’s information on some
of the 9/11 hijackers was not shared outside the agency.
Drake discovered that the NSA had produced a lengthy analytic report that broke
open the entire structure of Al-Qaeda and associated groups, including the
content of phone calls between hijacker Khalid al-Midhar in San Diego with the
known Al-Qaeda safe house communications center in Yemen.
Drake’s information, of course, undermined the whole Bush/Cheney argument that
if the U.S. only had a bulk collection program prior to 9/11, the attacks could
have been prevented. Instead, the problem was an analytical failure to
understand the import of information already collected. Piling on vast amounts
of additional data arguably made the problem worse, burying the analysts in an
unimaginably giant haystack of data and expecting them to locate the crucial
needle.
As Drake noted, it was Vice President Dick Cheney who in pursuit of collecting
as much data as possible got Hayden to violate the Fourth Amendment restrictions
about the NSA’s spying on Americans.
In an ironic twist, Cheney misused the Khalid al-Midhar case transforming it
into an example of how the NSA could have prevented the attacks if it only had
more data when, in fact, the NSA had this information in hand. But contradicting
high-level officials on such sensitive matters will get employees not just
drummed out of an agency, but indicted. As it did Drake.
Snowden and Drake
All of this is apropos to any informed discussion regarding the new film about
Edward Snowden called Citizenfour because Snowden was well aware of what
happened to Drake. Snowden once said people in the NSA were afraid to go public
because of what had been done to Drake.
But why did Snowden approach filmmaker Laura Poitras? In August 2012,
documentary director Poitras released a short film called The Program, which was
billed as a work in progress. It was largely based on interviews with Binney in
which he discusses his work on STELLARWIND and how, unbeknownst to him, that
program was turned on Americans after the 9/11 attacks.
The short film also mentioned a huge depository being built in Utah to house
massive amounts of data gathered by the NSA. Because of her work on this and
other politically relevant films, Poitras told PBS that she was placed on
Homeland Security’s Watch List and that she was frequently detained during
border crossings with her work products searched.
But the first person we see in Citizenfour is not Snowden. Neither is it
Poitras. It is columnist and blogger Glenn Greenwald, because of the three
people Snowden tried to get in contact with to publicize the spy scandal at NSA,
Greenwald was the first. (For some reason, the film leaves out the third person:
Washington Post reporter Barton Gellman.)
The film takes its title from the fact that Snowden used that rubric as his
encrypted email signature when he made some of his initial contact attempts. But
Snowden was too mysterious and vague for Greenwald to deal with. Snowden also
wanted him to employ some exotic encryption devices and sent Greenwald tutorials
on how to use them. Greenwald put them aside and Snowden disappeared back into
the blackness of cyberspace. That was in December of 2012.
Reaching Out
In January 2013, Citizenfour tried again, this time with Poitras. Greenwald had
written about Poitras and her problems with Homeland Security, and Snowden had
seen the film about Binney. Unlike Greenwald, Poitras was familiar with PGP
encryption keys and even more exotic devices.
Snowden assured her, “I am a senior member of the intelligence community. This
will not be a waste of your time.” And this is how the film begins, with Poitras
showing blown-up versions of these enigmatic early emails from an anonymous
source claiming to be high up in the Intel community.
Poitras does not want to continue the communications stateside so she goes to
Berlin to learn more about her anonymous informant. At this point, the film
relates part of the Binney story. It also begins to touch upon the misuse of
FISA courts in the massive overreach of NSA and describes the new storage
facility in Utah.
Somehow Poitras was allowed to film a hearing before a court about the
government’s use of a private phone company, AT&T, to monitor thousands, if not
hundreds of thousands of cell phones. The lawyers for the government clearly do
not want to disclose certain aspects of the program. One of the judges gets the
message and says words to the effect that you would rather us not be here at
all.
Poitras cuts to a briefing by an Occupy Wall Street technology leader. He is
telling a small room full of representatives how the government and the NSA can
trace their calls through their cell phones and also their financial
transactions through their bank cards and credit cards. In other words, the
government can trace their actions day by day to put together where they were at
certain times.
Since we know the Occupy Wall Street movement was under surveillance, this scene
has a chilling overtone to it because it cuts to the quick of what Frank Church
was worried about: NSA surveillance turned on domestic targets for purely
political purposes. In this case, it was the suppression of a leftist populist
movement.
Meeting in Hong Kong
From here Poitras cuts to a series of officials, like Clapper, misrepresenting
the reach and impact of programs like STELLARWIND. We then go to Snowden’s
communications requesting a formal meeting with Poitras and Greenwald in Hong
Kong. This happens on June 3, 2013.
Much of this part of the film is shot in Snowden’s rather small rented room in a
Hong Kong hotel. Poitras is never on camera. But Ewen MacAskill from The
Guardian is. Since the paper employed Greenwald, the whole project came under
the UK newspaper’s purview.
The American editor of the paper, Janine Gibson, wanted a veteran presence in
the mix. So MacAskill is the second person in the room as we watch the renegade
NSA employee begin to disclose some of the deepest secrets of the so-called “war
on terror.”
Snowden talks about one of the things that actually disgusted him while working
for the NSA, that the employees actually got to watch drone strikes in real time
on their desktop computers. They would watch the drones approach the target and
then circle it for, at times, hours on end.
Snowden then says to Greenwald that he does not want the issue to be about him
personally. That is not the way he sees it. To Snowden, this is rather a simple
schematic, it’s State Power vs. Citizen Power. He then adds that the great
promise of the internet has now been compromised because of the use of it as a
tool of surveillance.
Here, I should interject an example to convey how real that Snowden’s issues
are. A few months ago, in advance of a major conference on the Kennedy
assassination in Pittsburgh, a former investigator for the House Select
Committee on Assassinations asked me by email how I got a summary of an
interview that he did with the late David Phillips. Like Snowden, he sent me his
communications encrypted. But even at that, I did not wish to reply online.
When I saw him in person, I explained to him how I got the Top Secret summary
but I had held back from communicating this information by email because of the
chilling effect caused by knowledge about programs like STELLARWIND.
Through the PRISM
As the documentary unfolds, Snowden explains two more programs: TEMPORA, and
PRISM. For TEMPORA, the NSA contracted out work to the British GCHQ, the NSA’s
UK equivalent, to tap into hundreds of the world’s fiber optic network cables,
which allows for spying on more than 600 million telephone actions per day.
But beyond that, the program allows the user to intercept emails, check people’s
access to internet web sites, and see what they are posting on Facebook.
This is conducted through the so-called Five Eyes alliance, the loose union of
the intelligence communities of America, England, Canada, Australia and New
Zealand. Poitras takes her camera to the wind-blown coast of England and shows
how the GCHQ has attached probes to trans-Atlantic cables when they hit British
soil.
Another program, PRISM, is used by the NSA domestically. Snowden secured a 41frame Power Point presentation on it. The aim of this program is to collect
private electronic data belonging to users of major internet carriers like
Gmail, AOL, Skype and YouTube.
With the exposure of PRISM, Snowden cut out one of the most often used defenses
by both the Bush and Obama administrations, namely, that they were collecting
only “metadata,” that is, only the times and durations of communications. PRISM
collects the contents of emails, online chats, cloud-stored files, and much
more.
In fact, PRISM is so intrusive that there is a dispute over whether or not the
aforementioned companies have agreed to let their clients be spied on. The
companies denied they had cooperated with the NSA. But the government says the
FISA courts have issued orders to do so that are presented to the companies in
question. (See, for example, “Everything You need to Know about Prism”, by T.C.
Sottek and Joshua Kopstein, in The Verge, July 17, 2013)
Brad Smith, a general counsel for Microsoft, gave the game away. Quoted for
attribution, he said, “We believe the U.S. Constitution guarantees our freedom
to share more information with the public, yet the government is stopping us.”
(ibid) In other words, these private companies are now under the thumb of the
NSA. But they don’t want to be held liable for a class-action lawsuit on
invasion of privacy.
Real-Time Access
As Snowden notes in the film, PRISM is not just a recording device. It can be
channeled backward and forwards in time. That is, once the target is identified,
PRISM can access all the information from the company’s databank, from the past
to the present and monitor it into the future.
One of the disclosures made by Snowden that had a huge impact and that the film
properly plays up was the fact that Verizon had agreed to turn over records of
millions of its customers to the NSA and FBI. This court order required the
company to turn over on an “ongoing, daily basis” all phone calls in its
systems, both within the U.S. and between the U.S. and other countries. (The
Guardian, June 6, 2013)
This began in April 2013, and was renewed at 90-day intervals. In other words,
it was done under President Obama. Without Snowden, it is unlikely this story
would have ever seen the light of day because the court order expressly barred
Verizon from disclosing the existence of the FBI’s request for the records or
the court order itself. (ibid)
This points out a matter not dealt with in the film. Namely that Chief Justice
John Roberts has stacked the FISA courts with judges who simply will not say no
to any national security request, no matter how much it infringes on privacy and
the Fourth Amendment. They have, for all intents and purposes, become rubber
stamps for administration requests.
As we watch the film, one of the issues Greenwald and Snowden discuss is how
much of the story should be about Snowden, who isn’t seeking out notoriety. He
simply tells Greenwald that he grew up in North Carolina and Maryland and that
he ended up working for the NSA through subcontractor Booz Allen Hamilton.
Snowden’s Biography
But, actually, Snowden’s life is much more interesting than he lets on and in my
view should have been a bigger part of this film. Snowden comes from a military
family. His father and grandfather were both in the Coast Guard, and he was born
in the port town of Elizabeth City, North Carolina. In fact, many of the men in
Snowden clan had careers in either law enforcement or the military.
The family moved to Maryland when Snowden was nine. In high school he became ill
with mononucleosis, dropping out before his sophomore year. At this time, he
became very interested in computer technology and took a number of advanced
classes in community colleges and earned certification as a systems engineer.
He became obsessed with computer technology and tried to tear down systems to
see how they worked. He then reconstructed them so they would work better. He
began hanging out at an online chat room called Ars Technica.
When 9/11 happened, Snowden favored invading Iraq. And in May 2004, he joined
the Army. “I felt I had an obligation as a human being to help free people from
oppression,” he said later. (op. cit. Vanity Fair)
After arriving at Fort
Benning, Georgia, Snowden broke both legs in a training accident. After he was
released from the military, he joined the CIA in 2006.
Snowden himself could not believe it. On Ars Technica he wrote, “I don’t have a
degree of any type. In fact, I don’t even have a high school diploma. . . . and
my co-workers have BSs, MSs and ten to fifteen years of experience. Employers
fight over me. And I’m 22.”
Snowden worked in network security, allowing him to have a top-secret clearance.
Less than a year later, he was transferred to Geneva with a diplomatic cover as
part of the mission to the United Nations. He was given a four-bedroom
government-issue apartment. And in some of his online posts, he said he was
having a very nice time.
But it was also in Geneva that Snowden began to become ambivalent toward his
job. As part of an undercover mission, he saw how the CIA got a banker drunk,
encouraged him to drive, and then after he got in an accident, recruited him as
an informant.
Snowden told The Guardian that he witnessed several instances like this in
Europe and concluded, “Much of what I saw in Geneva really disillusioned me
about how my government functions and what its impact in the world.” (ibid)
Indeed, it was at this point, in about 2008, that Snowden first thought about
leaking confidential documents, in part because he felt that the Democratic
candidate for president, Barack Obama, might change things.
Getting Angry
Shortly after Obama’s election, Snowden left the CIA. To this day, there are
several versions why. But most observers agree that Snowden came back to America
as somewhat of an angry young man. His online posts seem to indicate that he was
rather conservative. For instance, he railed against Social Security.
But Snowden soon landed a job with Dell Computer, and the NSA was one of Dell’s
biggest and most secret clients. Snowden began working on NSA projects in Japan,
and in summer 2010, he was transferred back to Maryland where the NSA is based.
Here he led a team of experts in designing state-of-the-art, cloud-computing
platforms, and also technically sophisticated super computers for breaking
passwords. (ibid)
Snowden then took another step upward and another change of locale. He became a
high-level systems administrator in Hawaii. But there was also a change in the
young man’s attitude. He now wore a sweatshirt sold by the Electronic Frontier
Foundation, whose motto was “Defending your rights in the digital world.”
Snowden also began to complain about the NSA’s unlawful though authorized
surveillance. When he was brushed off, he began to use his clearance and
position as a systems administrator to delve into areas that were not related to
his job description. In the summer of 2012, Snowden made his first illegal
downloads.
Snowden also applied for a job directly with the NSA and was offered a position
though he felt it was not high enough in the bureaucracy. So, he turned it down
and applied for a position at Booz Allen Hamilton, a company owned by the
politically well-connected Carlyle Group. He got a job in cyber security, saying
later: “My position with Booz granted me access to lists of machines all over
the world that the NSA hacked.”
By this time, spring 2013, Snowden was in communication with Greenwald, Poitras
and Gellman. In May, he had all his documents ready to go. To this day, no one
knows how many there were. Snowden kept downloading Top Secret documents until
the end.
Finally, on May 17, he told his girlfriend he was leaving on a business trip. He
went to Honolulu Airport and ended up in Hong Kong. He booked a room at the Mira
in the Kowloon area.
Libertarian Leanings
All of this is only dealt with glancingly in the film, if at all. To me, it
seems of paramount interest because, unlike say the Cambridge Five, the infamous
British spy ring recruited by the Soviet Union, Snowden did what he did not for
ideology but because he was genuinely offended by the NSA’s invasion of
citizens’ privacy.
Politically speaking, Snowden appears to be more or less a moderate with
libertarian leanings. If I were Poitras, I would have insisted some of this
background make it into the film.
There is another aspect of the Snowden saga that I feel was slighted. We watch
as Greenwald tells Snowden not to try and hide his identity. In fact, Snowden
paid for his room at the Mira Hotel in Hong Kong with his own credit card.
Greenwald says words to the effect: just do it out in the open, let them react
to who you are.
Here Citizenfour introduces Julian Assange and Wikileaks, with Assange aware of
the harsh imprisonment of his leading source Pvt. Bradley (now Chelsea) Manning
arranging for Snowden to get out of Hong Kong before the State Department could
close in on him. Assange and his assistant Sarah Harrison get Snowden a flight
to Moscow for a stopover en route to his planned destination in Latin America.
But the U.S. government charges Snowden under the Espionage Act and he has no
choice but to seek asylum in Russia. Since the State Department cancelled
Snowden’s passport, he remains in Russia.
Towards the end of the film, there are two ominous episodes. As Greenwald and
his partner are traveling back to their home in Brazil, his partner is detained
at Heathrow Airport for nine hours, the legal limit without making an arrest.
Journalist Jeremy Scahill then makes an appearance and poses the question: If
one wants to communicate sensitive information today and be sure it’s not
intercepted, how does one do it? The answer is to return to Watergate days, with
conversations in parking lot garages late at night, while avoiding electronic
communications.
The last scene is a bit problematic. Greenwald is visiting Snowden in Russia.
They talk about how many people are on the Watch List today and communicate via
written messages which are then ripped up.
Snowden is shocked at the figure of 1.2 million people, and we see this on a
torn paper. I thought this was all strained. What was the need of communicating
with written messages in Moscow? And both participants must have known the
camera was there. After all it zoomed in for close-ups on the paper. So why rip
up the paper on camera?
This was using the techniques of a dramatic scenarist in a documentary.
Greenwald and Snowden came close to being actors here, rather than participants
in a real-life drama.
There will be future movies on the Snowden story with actual actors playing the
key protagonists, including a feature film by director Oliver Stone. But this
documentary is a creditable first offering in the field.
James DiEugenio is a researcher and writer on the assassination of President
John F. Kennedy and other mysteries of that era. His most recent book
is Reclaiming Parkland.
Ellsberg Discusses Decline of Democracy
Pentagon Papers whistleblower Daniel Ellsberg discussed the threat of National
Security Agency surveillance and the decline of American democracy in a latenight interview that he gave after a lecture at George State University in
Atlanta.
Do you worry about being surveilled?
Oh, I’m sure I’m surveilled in terms of credit card, cell phone, and email, as
is everyone. They collect everything but it doesn’t mean they collect it in
real-time. They want to record it. I’m sure it includes content as well as metadata. When they want to find out about somebody, they just dial it in like
Google and they’ll get someone’s whole life. By the way, they can listen to you
via your iPhone when it’s turned off. And of course the location is traceable.
In short, they are more interested in me.
Now that it’s come out that I’m going to see Snowden, I imagine they’ll be a lot
more interested in me. I don’t expect to take any computers or thumb drives or
anything with me because they would probably confiscate it right away.
Sometimes the public is the problem. Democracy is not foolproof. It’s just
better than the alternatives. I mean the elected Republicans took Congress, how
do you explain that? It sounds like the ethics commission did their job. Obama
appointed people to investigate the NSA after Snowden. They came up with a lot
of recommendations, and he almost entirely ignored it.
You can’t force the person appointed to follow their recommendations, and you
can’t ensure they will make good recommendations. When they do find things out
about the person or the administration that appointed them, they’re less likely
than before to have any of those recommendations followed. If the perpetrator is
in charge of implementing these things, then it’s not going to happen. It’s hard
to find the rationale for the people who elected these Republicans. Yes, the
country doesn’t like the economy. And to a great degree they blame Obama
probably more than his due.
The president usually gets blamed on the economy, whether it’s the weather or
whatever it is. If things are bad, the incumbent will get the blame. To be mad
at him and to elect people who oppose him seems like an understandable thing
except when you realize when they are almost certain to make matters worse. When
things are bad under the incumbent, it’s irrational to elect people who are
almost sure to make them worse. And yet people do that rather liberally. That
shows that the theory of rationality, getting all the information they can and
acting reasonably, is not something that humans should be counted on to do.
For the people to elect Republicans because they don’t like results under Obama
is self-punishing in effect. It’s ignorant. It’s counterproductive and does not
do them credit. I’m in a country that almost elected George W. Bush two times.
That’s quite a charge against any nation. Even if he did steal both elections,
he came close to winning. He got almost half the country.
That’s not easy to explain and it does us no credit as a country and frankly it
means that the chance that we will dig ourselves out of this hole of war, bad
economy, unemployment, and climate, and help the world take on those things, is
very small. We can do what we can and we should do it despite knowing that the
actual chance of success is not high. And when I talk about success, I’m talking
about survival of the species – the survival of our civilization.
As Noam Chomsky said recently, we’re in the twilight of civilization. It must be
hyperbolic, but it isn’t. There’s a very high chance of climatic catastrophe,
which ends urban civilization and large populations. It means a huge deal in the
next century. By huge, I mean most humans. It could not be more serious. It
could not be overstated. Yet this country and other countries are acting in
total denial, as if those problems are entirely trivial. This species and this
country and this civilization are in bad shape and we’re not showing signs of a
willing to do anything to avert catastrophe. And yet the challenge is there.
Whistleblowers have mostly not had an impact on policy, but sometimes they have.
Movements have generally not succeeded, but sometimes they have. The stakes,
being what they are, are definitely worth someone’s life, many lives, to try and
change the process.
The interview was originally posted by Paul DeMerrit at
http://clatl.com/freshloaf/archives/2014/11/19/daniel-ellsberg-the-original-whis
tleblower-on-transparency-politics-and-civilizations-future
Katharine Gun’s Risky Truth-telling
Truth-telling can be a dangerous undertaking, especially when done by government
insiders trying to expose wrongdoing connected to war-making, as British
intelligence official Katharine Gun discovered in blowing the whistle on a preIraq War ploy, writes Sam Husseini.
By Sam Husseini
“I felt it was explosive, it really made me angry when I read it. … I genuinely
hoped that the information would strengthen the people’s voice. … It could
derail the entire process for war.” So said Katharine Gun recently when asked
about information she leaked shortly before the invasion of Iraq.
It wasn’t self-serving hyperbole. Daniel Ellsberg, who himself leaked the
Pentagon Papers, has called Katharine Gun’s leak “the most important and
courageous leak I have ever seen. No one else — including myself — has ever done
what Gun did: tell secret truths at personal risk, before an imminent war, in
time, possibly, to avert it.”
And indeed, Ellsberg had asked for such a leak during this period. He had been
saying during the run-up to the Iraq invasion: “Don’t wait until the bombs start
falling. … If you know the public is being lied to and you have documents to
prove it, go to Congress and go to the press. … Do what I wish I had done before
the bombs started falling [in Vietnam] … I think there is some chance that the
truth could avert war.”
Ellsberg leaked the Pentagon Papers — internal documents which showed a pattern
of U.S. government deception about the Vietnam War — in 1971, though he had the
information earlier. And while the Pentagon Papers, the leaks by Chelsea Manning
to WikiLeaks and Edward Snowden’s National Security Agency leaks were all quite
massive, the Katharine Gun leak was just 300 words. Its power came from its
timeliness.
In October of 2002, the U.S. Congress passed the so-called Authorization for Use
of Military Force Against Iraq Resolution of 2002. In November, the U.S.
government had gotten the United Nations Security Council to pass a threatening
resolution on Iraq, but in most people’s view, it stopped short of actually
authorizing force.
The U.S. ambassador to the U.N. at the time, John Negroponte, said when
resolution 1441 was adopted unanimously: “There’s no ‘automaticity’ and this is
a two-stage process, and in that regard we have met the principal concerns that
have been expressed for the resolution.” That is, the U.S. would intend to come
back for a second resolution if Iraq didn’t abide by a “final opportunity to
comply with its disarmament obligations.”
On Feb. 5, 2003, Colin Powell claimed in his infamous presentation at the UN
that Iraq was hiding weapons of mass destruction. Feb. 15, 2003 saw the greatest
global protests in history, with millions around the world rallying against the
impending Iraq invasion, including over a million near the UN headquarters in
New York City.
It was around this time that Katharine Gun, who worked as a language specialist
at the Government Communications Headquarters, the British equivalent of the
NSA, got a memo from the NSA and then decided to — through intermediaries — leak
it to the media. The brief email read in part:
“As you’ve likely heard by now, the Agency is mounting a surge particularly
directed at the UN Security Council (UNSC) members (minus US and GBR of course)
for insights as to how to membership is reacting to the on-going debate RE:
Iraq, plans to vote on any related resolutions, what related policies/
negotiating positions they may be considering, alliances/ dependencies, etc –
the whole gamut of information that could give US policymakers an edge in
obtaining results favorable to US goals or to head off surprises. … to revive/
create efforts against UNSC members Angola, Cameroon, Chile, Bulgaria and
Guinea, as well as extra focus on Pakistan UN matters.”
The memo outlined that U.S. and British assets should focus on getting
information to pressure member of the UN Security Council to go vote for a war
resolution — material for blackmail to put it bluntly. This internal government
document could show people — especially those who tend to put stock in
government pronouncements — that what President George W. Bush was claiming at
the time: “We are doing everything we can to avoid war in Iraq” — was exactly
backwards. The U.S. government in fact was doing virtually everything it
possibly could to ensure war.
When the British reporters writing the story called the author of the memo,
Frank Koza, a top official at the NSA, they were put through to his office. When
they shared the nature of their phone call, they were told by an assistant they
had “the wrong number.” The reporters noted: “On protesting that the assistant
had just said this was Koza’s extension, the assistant repeated that it was an
erroneous extension, and hung up.”
The story was ignored by the U.S. media, though we at the Institute for Public
Accuracy put out a string of news releases about it. Gun has commented that
Martin Bright, one of the reporters who broke the story for the British
Observer, had been booked on several U.S. TV networks just after the story was
published but they had all quickly cancelled. [See video of an interview with
Gun and Larry Wilkerson, former chief of staff for Colin Powell, on German TV
from last year.]
However, the story did cause headlines around the world — especially in the
countries on the Security Council that the memo listed as targets of the
surveillance. Through whatever combination of authentic anger or embarrassment
at their subservience to the U.S. government being exposed, most of these
governments apparently pealed away from the U.S., and no second UN resolution
was sought by the war planners.
Rather, George W. Bush started the Iraq war with unilateral demands that Saddam
Hussein and his family leave Iraq (and then indicated that the invasion would
commence in any case.)
In 2004, the Observer reported that “surveillance played a role in derailing a
compromise UN resolution in the weeks before the Iraq war. Adolfo Aguilar
Zinser, Mexico’s UN ambassador at the time, has charged that the U.S. spied on a
private meeting of six swing countries on the Security Council aimed at a
compromise. Zinser told the Observer: ‘The meeting was in the evening. They
[U.S. diplomats] call us in the morning before the meeting of the Security
Council and they say: “We appreciate you trying to find ideas, but this is not a
good idea.”‘”
Meanwhile, Katharine Gun had been found out as the leaker shortly after the memo
was published — she has a talent for telling the truth, not so much for covering
up apparently — and spent many months awaiting trial. England has no First
Amendment that might have protected Gun. It does have a repressive Official
Secrets Act, under which she was being prosecuted by the Blair government.
Marcia Mitchell, co-author of The Spy Who Tried to Stop a War: Katharine Gun and
the Secret Plot to Sanction the Iraq Invasion, notes however that at the last
minute, the Blair government, which was about to face elections “with her signed
confession in hand, chose not to present evidence that the invasion of Iraq was,
in fact, legal, a demand by the Defense.”
That is, the British government was afraid of what could come out about the
legality of the Iraq war in a trial. And so Gun, who was newly married when she
exposed the NSA/GCHQ’s activities, was able to avoid jail and continue as a
language instructor. She has since been supportive of Edward Snowden and others
who expose government wrongdoing.
At the UN
The subject of spying at the UN was again highlighted in 2010 from cables leaked
to WikiLeaks by Chelsea (formerly Bradley) Manning. Reuters reported at the
time: “According to one cable, the State Department asked U.S. envoys at U.N.
headquarters and elsewhere to procure credit card and frequent flyer numbers,
mobile phone numbers, email addresses, passwords and other confidential data
from top U.N. officials and foreign diplomats.”
Of course, spying on UN missions by the U.S. is illegal, Vienna Convention on
Diplomatic Relations says: “The receiving State shall permit and protect free
communication on the part of the mission for all official purposes…. The
official correspondence of the mission shall be inviolable.”
Similarly, in 2013, the Guardian reported as G8 leaders meet in Northern
Ireland: “Turkey, South Africa and Russia have reacted angrily to the British
government demanding an explanation for the revelations that their politicians
and senior officials were spied on and bugged during the 2009 G20 summit in
London.” The governments were responding to the Guardian story: “GCHQ
Intercepted Foreign Politicians’ Communications at G20 Summits,” based on Edward
Snowden’s NSA leaks.
Lessons Learned
The Katharine Gun case give us many lessons. First off, it’s a great example to
rebut anyone parroting the establishment line that the NSA’s activities are
based on stopping terrorism, or that they are merely overzealous efforts at
ensuring security, or perhaps typical diplomatic games. Here, the NSA and GCHQ
were spying to try to facilitate an aggressive war — the highest war crime under
the Nuremberg statues.
Similarly, it highlights what great ideals some “whistleblowers” — the term
doesn’t really do justice — are motivated by. And of course, such revealers are
much more threatening to war-makers and others when they are acting in parallel
with movements. Those movements may also help ward off the government attempting
to imprison the whistleblower.
The “rebuttal” that everybody spies and therefore it’s no big deal when the U.S.
or some other government is caught doing so similarly doesn’t hold up. Yes,
virtually every government spies — but you’re not supposed to get caught. And if
a government does get caught, it’s an indication that it’s own people — the very
people who are paid to carry out the surveillance — don’t believe in it and are
willing to put themselves at risk to expose the spying and the underlying
wrongdoing.
Perhaps most importantly, the lesson is not that Katharine Gun’s leak was futile
because the U.S. invaded Iraq — any more than the lesson is that the Feb. 15
global protests were in vain. Rather, more of both could have really changed
things. If global protests had started in 2002, then the congressional
authorization for war in late 2002 could have been prevented. If more people
within the war-making governments had their consciences moved by such movements
and had leaked more critical information, war could have been forestalled.
And, even if the Iraq invasion happened, if global protests had continued and
global solidarity were better coordinated, when it became clear to all that the
WMDs not in Iraq were a contrived pretext for aggression, a sustained revulsion
against the invasion could have led to the war-makers being held accountable,
preventing much suffering in Iraq and elsewhere — and laying the basis for a
world free of war.
Sam Husseini is communications director for the Institute for Public Accuracy.
Follow him on twitter: @samhusseini.