Book Read Free

The Rights of the People

Page 30

by David K. Shipler


  In fact, the inspector general found, not a single subpoena had been requested, most of the letters were issued in nonemergency situations, and “there sometimes were no open or pending national security investigations tied to the request.” The FBI didn’t even keep track of whether NSLs were ultimately issued after the exigent letters were sent, relying on the phone company to maintain such records. And when attorneys in the Justice Department’s National Security Law Branch learned of the practice and tried to stop it, the Counterterrorism Division’s Communications Analysis Unit went through the motions of applying for National Security Letters after the fact, without telling the lawyers that the phone information had already been received.

  The same thing happened on a smaller scale when nineteen “certificate letters,” instead of NSLs, were sent to a federal reserve bank in search of federal wire transfers by 244 people. Prompted by the Justice Department’s investigation, Federal Reserve attorneys conceded that the records should not have been provided on the basis of the certificate letters.

  Even where proper procedures were followed, the justification for issuing National Security Letters could be flimsy, as in a request stating merely, “The subject is in contact with the subjects of other international terrorism investigations. These subscriber and toll billing records are being requested to determine the identity of others with whom the subject communicates.”39 The chief division counsel who received this sparse application for an NSL turned it down but circulated the text among twenty-two other FBI chief division counsels to collect their views. Thirteen agreed that it should be rejected, but nine said they would approve it. One of those who would have turned it down told investigators that nothing had caused more friction in his twenty years with the FBI than the questions he had raised about NSL requests.

  The criteria were so loosely constructed that the National Security Law Branch felt it necessary to post this sardonic guidance on its Web site in March 2006, after the Patriot Act was reauthorized: “A perfunctory recitation that (1) the subject is the target of the investigation, (2) he has a telephone, and (3) therefore, it follows that an NSL for his telephone records is relevant to the authorized investigation will not suffice. Otherwise, any target with a telephone or a bank account is subject to an NSL. And that is not the standard for issuance of an NSL.”40

  A BIGGER HAYSTACK

  Following the revelations in the 1970s about FBI snooping, the agency reportedly stopped amassing huge files on people who were not part of criminal or counterintelligence investigations. In the first place, everything was on paper, one former agent noted, and warehouse space was limited. But it doesn’t take warehouses to store data in a computer age, and since 9/11, law enforcement and intelligence officers have understood one very bold lesson: They risk more criticism from Congress and the public by missing an attack than by violating privacy.

  So, they collect. “As a criminal investigator, my goal is to gather evidence necessary to prosecute a bad guy,” to get “one step closer to putting that guy in handcuffs and going to court,” said Mike German, the former undercover agent who infiltrated domestic militia groups for the FBI. “As an intelligence investigator, your goal is to collect. The evaluation of a criminal investigator is based on actual success. But a collector, they’re measured by how fat their file is. And if you collect every day in and day out, you’re going to have a fat file—and particularly if it’s all classified, you don’t have anybody looking over your shoulder. And if you’re mindful of protecting civil liberties and are judicious, your files are not going to be so fat.”

  Computer systems obviously make it easier to share intelligence information. Unsourced records obtained from NSLs—including those on innocent people not being investigated—are uploaded into databases accessible by 34,000 officials throughout government in U.S. Attorneys’ offices, the Drug Enforcement Administration, the Federal Bureau of Prisons, Homeland Security, and the CIA, as well as state and local law enforcement agencies that are part of joint terrorism task forces throughout the country.

  The FBI and other collectors claim to have enhanced their capacity to analyze the burgeoning mass of information, but German has his doubts. “That was the lesson of 9/11,” he said, “and unfortunately people didn’t catch that.” Some fifty or sixty officials in the CIA and the NSA had known that two of the nineteen hijackers had arrived in the United States, but nobody told the FBI.41 Since then, impediments to sharing may have been reduced, but the inundation of information has remained overwhelming, producing few significant prosecutions, German noted. “Is that really an efficient use of all those agents and all that money?”

  It’s hard to make a case that the extensive collection and sharing of data have made agencies smarter and more agile. They failed to search multiple databases and consolidate scattered intelligence reports on a Nigerian student, Umar Farouk Abdulmutallab, whose radicalization had prompted his father to visit the U.S. Embassy and warn the CIA. The young man’s multiple-entry U.S. visa wasn’t withdrawn, he wasn’t placed on the no-fly list, and he wasn’t even given extra screening in Amsterdam before he boarded a Northwest flight to Detroit on Christmas Day of 2009, explosives hidden in his underwear. A blast that would have brought down the plane over Michigan was narrowly averted when the bomb fizzled and passengers subdued him. A preliminary investigation into the intelligence failure hinted at the burdens created by over-collecting. “The information that was available to analysts, as is usually the case, was fragmentary and embedded in a large volume of other data,” said the report. President Obama instructed officials to examine “how to meet the challenge associated with exploiting the ever-increasing volume of information available to the Intelligence Community.”42

  One example of wasted resources was witnessed by Lawrence Wright, author of a book on al-Qaeda, when he was visited at home by FBI agents inquiring about calls he’d made to Egypt. One of the conversations, with a relative of Ayman al-Zawahiri, Osama bin Laden’s deputy, was summarized in an intelligence database, he was told by an official. “I was surprised, because the FISA law stated that my part of the conversation should have been ‘minimized’—redacted or rendered anonymous—because I am an American citizen,” the author wrote.

  Wright had done a profile of Zawahiri for The New Yorker and was contacted by the relative, an architect in Cairo, to ask “if I could learn whether all of Zawahiri’s children were dead.” The FBI told him erroneously that they were, Wright passed the misinformation to the relative, and the call was monitored and filed. “He’s a terrorist, or he’s associated with terrorists,” said Mike McConnell, director of national intelligence, when Wright told him the story. “Now, if I’m targeting, I’m looking at his number. If he places a call, I listen. If he gets called, I listen. I don’t know who is going to call him, but once I got it, I gotta deal with it. Turns out it is Larry Wright. You would have been reported as ‘U.S. Person 1.’ You would never have been identified, except if the FBI learns that this unidentified U.S. person is talking to a known terrorist. Then the FBI would go in and request the identity of U.S. 1. The NSA would have to go through a process to determine if the request was legitimate. So here’s what I think—I’m guessing. You called a bad guy, the system listened, tried to sort it out, and they did an intel report because it had foreign-intelligence value. That’s our mission.”43

  The same was true of the domestic surveillance against civil rights activists, the Black Panthers, the Weathermen, and various antiwar organizers decades ago, recalled Jerry Berman, who worked for the American Civil Liberties Union. “They didn’t prevent zilch,” he said. “And the reason they didn’t prevent zilch is the FBI had records on everybody, and they didn’t know what was important.”

  Captain Jeffery Herold, head of intelligence for the Washington, D.C., police department’s Office of Homeland Security and Counterterrorism, told me the same thing when I asked if too much information was coming through. “Oh, my God. Turn it off. I’ll get three hundred e-
mails a day,” so many that his unit does nothing about most of them. “We have to hire analysts to analyze it. If you get too much, which threat are you going to follow?” He wouldn’t say how they decide, except, “You look at what’s possible. Do those capabilities exist? Can they really fly airplanes into the World Trade Center?”

  The ACLU has a favorite metaphor to describe the absurdity of trying to catch a terrorist through the insatiable collection of personal information on vast numbers of people: You don’t find a needle in a haystack by increasing the size of the haystack.

  In its study of National Security Letters, the Office of the Inspector General attempted valiantly to portray their usefulness. They were called “indispensable” and “our bread and butter” by unnamed FBI officials who claimed that the information on phone, Internet, and financial records could connect groups and individuals with one another by following money and communications. Leads were generated for joint terrorism task forces and foreign governments, information was used to induce cooperation by suspects, and targets of investigations were exonerated by agents who closed cases more confidently after using NSLs to eliminate concerns.

  Most examples supporting such claims, given by the Justice Department and the FBI, have been less than definitive. The inspector general found that twenty-seven of the forty-six FBI divisions studied had used NSL evidence to refer counterterrorism targets for prosecution, but because the FBI’s records were in disarray, it was impossible to document how effective the NSLs had been in those cases. Information in criminal files was not tagged as deriving from NSLs, and most charges labeled “terrorism” were actually for fraud, immigration offenses, and money laundering.

  If those don’t sound like grave threats to national security, consider this: The median sentence under the “terrorism” rubric was twenty-eight days during the first two years after 9/11, dropping to twenty days through May 31, 2006. Furthermore, Justice Department attorneys declined to prosecute 67 percent of the “terrorism” cases brought to them by the FBI during the five years through 2008, an unusually high percentage that rose over time.44

  Rachel Brand, a young right-wing ideologue who served as assistant attorney general in the Bush administration, made sweeping public statements about the usefulness of FISA orders and NSLs in heading off terrorist attacks, promised me examples, and never delivered. Her spokeswoman, Kimberly A. Smith, was repeatedly waved off by superiors as she rummaged around in the thicket of the Justice Department for more than a year, and came up with nothing beyond press-release platitudes—no level of detail sufficient to permit true evaluations. Nor was an FBI spokeswoman, Angela Bell, able to find a good case after eight months of searching—at least not one the FBI was willing to cite as an example of FISA orders and NSLs that had prevented violence. (After she gave up trying, FISA surveillance led to the arrest of an Afghan immigrant, Najibullah Zazi, accused of buying chemicals to manufacture bombs; he pleaded guilty.)45

  The dearth of obvious cases doesn’t necessarily mean that NSLs are ineffective, perhaps just that nobody in the FBI really knows how valuable they have been. The inspector general reported that National Security Letters were employed as an initial step in gathering skeletal evidence before applying for a secret FISA warrant from a judge. An investigation has to start somewhere, after all, and the NSL is a relatively easy instrument to use at the outset.

  A more traditional tool, the grand jury subpoena, carries pluses and minuses from the FBI’s perspective. It can be issued quickly, but it requires enough cause for a grand jury to be convened. It is more likely to be obeyed promptly, the study found, but it can be leaked to the press and the public. And if a judge turns down a criminal warrant or subpoena, agents fear, courts may look askance if the FBI later seeks a FISA warrant or issues a National Security Letter. The judicial branch is evidently less offended if its oversight is evaded beforehand.

  NSLs have been most useful in tracing finances. The FBI used them to get the bank records of convenience stores that were conduits for funds through the informal hawaladar transfer system to the Middle East, and allegedly on to al-Qaeda, the inspector general reported. The government opened fire with a broad battery of charges against storekeepers who had sent two individuals millions of dollars. Prosecutors replayed an old strategy: If you can’t get the Mafia boss on a murder charge, get him for tax evasion. The storekeepers were accused of “money laundering, sale of untaxed cigarettes, check cashing fraud, illegal sale of pseudoephedrine (the precursor ingredient used to manufacture methamphetamine), unemployment insurance fraud, welfare fraud, immigration fraud, income tax violations, and sale of counterfeit merchandise.”

  Looking at credit reports, the FBI was also able to track the address changes of subjects in a terrorism investigation who were uprooted by Hurricane Katrina. And financial records established a connection between a prisoner in Guantánamo and the target of another investigation, who was then convicted of providing material support to terrorists.

  Two successful financing cases were made by sharing information between intelligence and law enforcement on Mohammed Ali Hassan Al-Moayad, convicted in March 2005 and sentenced to seventy-five years for funneling millions to Hamas and al-Qaeda, and Enaam Arnaout, the executive director of the Illinois-based Benevolence International Foundation, who pleaded guilty to sending money to help rebels in Bosnia and Chechnya buy military supplies.46 But the Justice Department never offered persuasive details on how essential FISA orders or NSLs were in bringing these prosecutions, so the question remained whether ordinary criminal warrants and wiretaps, consistent with the Bill of Rights, would have been sufficient.

  FISA orders and intelligence sharing were touted by the Justice Department as essential tools in a few dubious prosecutions. A Florida computer science professor, Sami al-Arian, was charged along with three co-defendants with supporting Palestine Islamic Jihad, which had killed more than one hundred people in Israel, including a young American woman. Sections 218 and 504 of the Patriot Act “enabled prosecutors to consider all evidence against al-Arian and his co-conspirators, including evidence obtained pursuant to FISA that provided the necessary factual support for the criminal case,” the Justice Department boasted.47 The evidence was so questionable, however, that a jury failed to convict any of the four, unanimously acquitting al-Arian on nine counts and voting ten to two to acquit on the remaining eight.

  Federal prosecutors weren’t deterred. While al-Arian languished in prison, where he had spent more than three years, they threatened to retry him on those eight counts. To get out of jail and to get out of the country, he pleaded guilty to a lesser charge—conspiring to help people associated with the terrorist group—and accepted deportation (he was a Palestinian born in Kuwait). But when he appeared in court expecting to be released, a federal judge condemned him as a terrorist (as the jury had refused to do) and gave him the maximum sentence, which sent him back behind bars for an additional nineteen months, making fifty-seven all together.

  Then, to turn the screws a bit more, federal prosecutors in Virginia summoned him before a grand jury to testify in another investigation, and when he refused (in the belief that his plea bargain had not required his cooperation) he was cited for contempt of court and given another six months.

  CONTEMPT OF COURT

  At the opaque end of the spectrum most distant from the Fourth Amendment, where searches and surveillance escape review by the judicial branch, the Bush administration stepped far outside the law—even the most permissive law—to enlist the National Security Agency in broad sweeps of electronic communications. There were no established legal ways to do so: no wiretap warrants, no National Security Letters, no classified orders under the Foreign Intelligence Surveillance Act.

  In the panic following September 11, 2001, the White House—understandably eager to learn everything possible about future plots of terrorism—had the CIA director, George Tenet, ask the NSA director, Michael V. Hayden, what more interception and surveillance the NSA
could do. Nothing more within existing authority, Hayden replied. And if he had more authority? Hayden answered by assembling a description of the NSA’s “operationally useful and technologically feasible” capabilities, which became the basis of Bush’s secret plan.48 The program was not designed to fit within the law; instead, the law was interpreted—and then ultimately revised—to accommodate the program.

  Under instructions from Vice President Dick Cheney’s office, a zealous young lawyer in the Justice Department, John Yoo, concocted arguments that were later derided by some who saw his classified memo—a “legal mess” in the words of Jack Goldsmith, who found the sloppy work when he took over the Justice Department’s Office of Legal Counsel.49 Yoo had contended that the president’s constitutional powers as commander in chief conferred the authority, bolstered by the congressional authorization of force following 9/11, to ignore the FISA statute and eavesdrop without applying first to the FISA court. As self-serving as the reasoning was, the program’s chief architect, Cheney’s counsel David Addington, refused to let NSA officials see the legal opinion supposedly justifying their activities—a bizarre turn even for that White House.50

  Convinced that the impediments of FISA and its court put the country at risk, Addington told Goldsmith during a contentious meeting in February 2004, “We’re one bomb away from getting rid of that obnoxious court.” Goldsmith, a conservative himself, seemed stunned by Addington’s contempt for the law. “He and the vice president had abhorred FISA’s intrusion on presidential power ever since its enactment in 1978,” Goldsmith wrote. “After 9/11 they and other top officials in the administration dealt with FISA the way they dealt with other laws they didn’t like: They blew through them in secret based on flimsy legal opinions that they guarded closely so no one could question the legal basis for the operations.”51

 

‹ Prev