Tag Archives: national security

Fear of the Enemy Within: Unrestricted Surveillance

The Supreme Court declined to hear a constitutional challenge to a secretive government surveillance program, dealing a setback to privacy groups including the American Civil Liberties Union ahead of a looming debate in Congress over whether to renew the law that authorizes the intelligence tool.

In a brief order issued on February 2023, the high court said it wouldn’t hear arguments challenging the legality of the National Security Agency program known as “Upstream,” in which the intelligence agency collects and monitors internet communications without obtaining search warrants. Classified details about the program were among those exposed a decade ago by former intelligence contractor Edward Snowden, who has been charged with theft of government property and violating espionage laws and lives in Russia.

The legal challenge was brought by Wikimedia, the nonprofit owner of the Wikipedia online encyclopedia. Wikimedia was represented by lawyers at the ACLU, Cooley LLP and the Knight First Amendment Institute at Columbia University. Wikimedia’s lawyers urged the high court to rein in the “state secrets privilege,” a legal doctrine that allows the government to shut down lawsuits that could jeopardize sensitive national-security information. 

“The Supreme Court’s refusal to grant our petition strikes a blow against an individual’s right to privacy and freedom of expression—two cornerstones of our society and the building blocks of Wikipedia,” said James Buatti, Wikimedia’s legal director, in a statement.

Excerpts from  Jan Wolfe  and Dustin Volz, Justices Won’t Hear Challenged to NSA Surveillance, Feb. 22, 2023

Exploiting Digital Fingerprints: Military

Backed by a $5.6 million grant from the US Defense Advanced Research Projects Agency, a  team at Stanford is embarking on a four-year project to better understand and model complex communication patterns in social networks in real time…The new project is called MEGA: Modern Graph Analysis for Dynamic Networks, and is led by Associate Professor Ashish Goel.   A team of seven principal investigators… will develop algorithms which model human communication and detect subtle patterns in huge data sets from social media.

DARPA is interested because, from a national security standpoint, big data holds the promise of recognizing threats in unusual or suspicious social interactions of terrorists and other foreign adversaries.   Our daily social communication is spread across many forms of interaction. E-mails, tweets, text messages and Facebook posts define our modern social lives. More than ever, information about this correspondence and behavior can be collected, stored, and made available to computer scientists.With access to billions of tweets, e-mails and text messages, a project like MEGA can build reliable mathematical models of social phenomena, like the way news spreads through a network for instance, or even how people choose their social connections, Goel said.

One goal of the MEGA project is to model human online behavior and find how it shapes social networks… The second component of MEGA’s research: writing the step-by-step procedures for processing distributed data in real time….Some of their algorithms and programs will be passed directly to DARPA to be used in a security context…

Excerpt, DARPA Grant Will Help Stanford Dig Deep into the Big Data in Social Networks, Stanford.edu, April 24, 2013

 

Torture Techniques in Clandestine Prisons

The al Qaeda suspects who were subjected to so-called harsh interrogation techniques, and the lawyers charged with defending them at the Guantanamo Bay military tribunals, are not allowed to talk about the treatment they consider torture.  Defense attorneys say that and other Kafkaesque legal restrictions on what they can discuss with their clients and raise in the courtroom undermine their ability to mount a proper defense on charges that could lead to the death penalty.  Those restrictions will be the focus of a pretrial hearing that convenes this week.  Prosecutors say every utterance of the alleged al Qaeda murderers, and what their lawyers in turn pass on to the court, must be strictly monitored precisely because of the defendants’ intimate personal knowledge of highly classified CIA interrogation methods they endured in the agency’s clandestine overseas prisons.  Defense attorneys called that view extreme.  “Everything is presumptively top secret. So if my client had a tuna fish sandwich for lunch, I couldn’t tell you that,” Cheryl Bormann, who represents defendant Walid bin Attash, said after the May arraignment of the men charged with plotting the 9/11 attacks on the World Trade Center.  At one point in the arraignment, another of bin Attash’s attorneys, Air Force Captain Michael Schwartz, was explaining why his client refused to cooperate. Just when things got interesting, a security officer cut the audio feed to the media and others observing the proceedings from behind a soundproof glass wall with a 40-second audio delay.  “The reason for that is the torture that my client was subjected to by the men and women wearing the big-boy pants down at the CIA, it makes it impossible …,” Schwartz said during the blocked portion of the arraignment, according to a partial transcript later declassified.  Prosecutors have said in court filings that any revelations about the defendants’ interrogations could cause “exceptionally grave damage.”

Civil libertarians argue that if those interrogation methods really are top secret, then the CIA had no business revealing them to al Qaeda suspects.  Defense attorneys will challenge the secrecy rules at the pretrial hearing that begins on Wednesday at the Guantanamo Bay U.S. Naval Base.  Prosecutors have about 75,000 pages of evidence to turn over to defense attorneys in the 9/11 case, but they won’t do it until the judge, Army Colonel James Pohl, issues protective orders aimed at safeguarding the material.

Hundreds of men suspected of supporting al Qaeda or the Taliban were rounded up in Afghanistan, Pakistan and elsewhere and shipped to Guantanamo in response to the September 11 attacks. (Of the 779 men who have been held at Guantanamo since the prison operation began in 2002, 168 remain.)  The CIA took custody of the “high-value” captives believed to have top-level information that could help the U.S. and its allies prevent further attacks.  It held them incommunicado for three or four years and transferred them among secret overseas prisons, questioning them with interrogation methods that defense attorneys say amounted to torture and which the Obama administration has since banned.  Some details of the program, including waterboarding, mock executions and sleep deprivation, have already been disclosed by Bush and the CIA itself. Jose Rodriguez, a former CIA official, recently defended them in news interviews to promote his book, “Hard Measures: How Aggressive CIA Action After 9/11 Saved American Lives.”

Yet in both the 9/11 case and that of Abd al Rahim al Nashiri, who is accused of sending suicide bombers to ram a boat full of explosives into the side of the USS Cole off Yemen in 2000, the government presumes that every word spoken by the defendants, in the past and in the future, is classified at the highest level — “Top Secret,” with a “Sensitive Compartmented Information,” which is routinely shortened to TS/SCI.  The defendants’ words are also “born classified,” a status their lawyers said has previously been used only to safeguard details about nuclear weapons. So are all documents and legal motions related to their cases, which cannot be made public unless they’re cleared by a Department of Defense Security Classification Review team.  How that team works is a secret.  “I’ve never seen them. I’ve never communicated (with them). No one has ever been able to tell me that,” said James Connell, a lawyer for 9/11 defendant Ali Abdul Aziz Ali.  The Pentagon would say only that the review team includes both civilians and uniformed military personnel and that it can take up to 15 business days to make its decisions.

Proscribed topics include details of the defendants’ capture, where they were held and under what conditions, the names and descriptions of anyone who transferred, detained or interrogated them and the methods used to get information from them, according to the court documents.

Defense lawyers say the classification system used at Guantanamo violates President Barack Obama’s 2009 order that prohibits using secrecy labels to conceal lawbreaking or prevent political embarrassment. They say it also “eviscerates” the legal defense protections Congress set down in the law that authorizes the Guantanamo tribunals.  The government’s secrecy rules mean that every lawyer, paralegal and expert on the prosecution and defense teams must undergo an extensive background check and obtain a TS/SCI clearance. Once they get clearance, they are briefed on what has to stay secret. The document that forms the basis of the presumptive classification is itself secret.  “It is ridiculous,” said Army Captain Jason Wright, one of the lawyers for accused 9/11 mastermind Khalid Sheikh Mohammed. “The briefing is classified, so I can’t discuss what I can and cannot discuss.”

Mohammed’s lawyers have asked the UN special rapporteur for torture, Juan E. Mendez, to investigate claims that their client was tortured. But they could only share with Mendez the information that has been publicly declassified.  “We are prohibited from sharing any details of his mistreatment, even to the special rapporteur,” Wright said.

The American Civil Liberties Union has filed a challenge arguing that the government has no legal authority to classify information that it not only disclosed to the defendants but forced them to learn.  “The question here is: Can the government subject people to torture and abuse and then prevent them from talking about it?” said Hina Shamsi, director of the ACLU’s National Security Project.  The ACLU said the claim of broad authority to gag defendants infringes on the American public’s right to open trials and goes far beyond what the courts have allowed, namely that censorship must be narrowly tailored and aimed at protecting a compelling government interest.

Excerpt, Jane Sutton and Josh Meyer, Insight: At Guantanamo tribunals, don’t mention the “T” word, Reuters, Aug. 20, 2012

Who is Trapwire? CIA’s surveillance machinery

Trapwire is the name of a program revealed in the latest Wikileaks bonanza—it is the mother of all leaks, by the way….. “Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology—and have installed it across the U.S. under the radar of most Americans, according to emails hacked by Anonymous.  Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company (has been acquired by Cubic corporation) staffed with elite from America’s intelligence community.  The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented. The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.”  So: those spooky new “circular” dark globe cameras installed in your neighborhood park, town, or city—they aren’t just passively monitoring. They’re plugged into Trapwire and they are potentially monitoring every single person via facial recognition.

Excerpts, David Seaman, WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network, Businessinsider.com, Aug. 10, 2012

See also Top Secret America

The Essence of Imperialism: Australia in the Pacific

Nor is it the first time Vanuatu has clashed with the Australian Federal Police (AFP). In 2004 its government closed down the AFP offices in the capital, Port Vila, and expelled officers, after allegations that they were spying and interfering with domestic politics. The AFP’s main concerns in Vanuatu have been over the country marketing itself vigorously as an international tax haven, and over the risk posed by the volatile Vanuatu Mobile Force, the paramilitary wing of the local police force. Protecting Australia’s national interests under the guise of so-called capacity-building can quickly lead to tensions.

The AFP’s activities in Vanuatu have been part of a broader expansion over the past decade of Australian policing across the Pacific. Peacekeeping missions to Timor-Leste since 1999 and to the Solomon Islands, beginning in 2003, boosted police numbers. In the past decade, the AFP has trebled in size and increased its budget fivefold. The AFP commissioner now has an influential role on the Australian cabinet’s national-security committee. In Australia most domestic policing is carried out by state police forces, leaving the federal force largely free, outside aboriginal communities in the Northern Territory, to focus on international deployments.

Their efforts have often led to accusations of heavy-handedness. In 2005 a mission to Papua New Guinea was abandoned after that country’s Supreme Court ruled that legal immunities granted to AFP officers were unconstitutional. In 2006 the Solomon Islands’ police chief, Shane Castles, an Australian, was sacked and declared an “undesirable immigrant” after a raid by his police officers on the office of the prime minister. That raid was connected with the AFP’s long-standing pursuit of the Solomon Islands’ then attorney-general, Julian Moti, on charges of sex with an underage girl. Mr Moti was deported to Australia in 2007, arrested and brought before the courts. In December 2011 the High Court threw the case out, finding that Australian officials had colluded in Mr Moti’s illegal deportation.

The Australian Federal Police in the Pacific: Booting out big brother, Economist, May 19, 2012, at 49

The Kill List and Body Count: Drones

Just days after taking office, the president [Obamaa] got word that the first strike under his administration had killed a number of innocent Pakistanis. “The president was very sharp on the thing, and said, ‘I want to know how this happened,’ “ a top White House adviser recounted.  In response to his concern, the C.I.A. downsized its munitions for more pinpoint strikes. In addition, the president tightened standards, aides say: If the agency did not have a “near certainty” that a strike would result in zero civilian deaths, Mr. Obama wanted to decide personally whether to go ahead.

The president’s directive reinforced the need for caution, counterterrorism officials said, but did not significantly change the program. In part, that is because “the protection of innocent life was always a critical consideration,” said Michael V. Hayden, the last C.I.A. director under President George W. Bush.  It is also because Mr. Obama embraced a disputed method for counting civilian casualties that did little to box him in. It in effect counts all military-age males in a strike zone as combatants, according to several administration officials, unless there is explicit intelligence posthumously proving them innocent.  Counterterrorism officials insist this approach is one of simple logic: people in an area of known terrorist activity, or found with a top Qaeda operative, are probably up to no good. “Al Qaeda is an insular, paranoid organization — innocent neighbors don’t hitchhike rides in the back of trucks headed for the border with guns and bombs,” said one official, who requested anonymity to speak about what is still a classified program.

This counting method may partly explain the official claims of extraordinarily low collateral deaths. In a speech last year Mr. Brennan, Mr. Obama’s trusted adviser, said that not a single noncombatant had been killed in a year of strikes. And in a recent interview, a senior administration official said that the number of civilians killed in drone strikes in Pakistan under Mr. Obama was in the “single digits” — and that independent counts of scores or hundreds of civilian deaths unwittingly draw on false propaganda claims by militants.

But in interviews, three former senior intelligence officials expressed disbelief that the number could be so low. The C.I.A. accounting has so troubled some administration officials outside the agency that they have brought their concerns to the White House. One called it “guilt by association” that has led to “deceptive” estimates of civilian casualties.  “It bothers me when they say there were seven guys, so they must all be militants,” the official said. “They count the corpses and they’re not really sure who they are.”

Excerpt, JO BECKER and SCOTT SHANE, Secret ‘Kill List’ Proves a Test of Obama’s Principles and Will, NY Times, May 29, 2012