Congress's Right to Counsel in Intelligence Oversight
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
CJR - Iraqgate, by Russ W
CJR - Iraqgate, by Russ W. Baker March/April 1993 | Contents IRAQGATE The Big One That (Almost) Got Away Who Chased it -- and Who Didn't by Russ W. Baker Baker, a member of the adjunct faculty at Columbia University's Graduate School of Journalism, is a free-lance writer who regularly contributes to The Village Voice. Research assistance was provided by Julie Asher in Washington and Daniel Eisenberg in New York. ABC News Nightline opened last June 9 with words to make the heart stop. "It is becoming increasingly clear," said a grave Ted Koppel, "that George Bush, operating largely behind the scenes throughout the 1980s, initiated and supported much of the financing, intelligence, and military help that built Saddam's Iraq into the aggressive power that the United States ultimately had to destroy." Is this accurate? Just about every reporter following the story thinks so. Most say that the so-called Iraqgate scandal is far more significant then either Watergate or Iran-contra, both in its scope and its consequences. And all believe that, with investigations continuing, it is bound to get bigger. Why, then, have some of our top papers provided so little coverage? Certainly, if you watched Nightline or read the London Financial Times or the Los Angeles Times, you saw this monster grow. But if you studied the news columns of The Washington Post or, especially, The New York Times, you practically missed the whole thing. Those two papers were very slow to come to the story and, when they finally did get to it, their pieces all too frequently were boring, complicated,and short of the analysis readers required to fathom just what was going on. -
Case 1:13-Cv-03994-WHP Document 42-1 Filed 09/04/13 Page 1 of 15
Case 1:13-cv-03994-WHP Document 42-1 Filed 09/04/13 Page 1 of 15 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK AMERICAN CIVIL LIBERTIES UNION; AMERICAN CIVIL LIBERTIES UNION FOUNDATION; NEW YORK CIVIL LIBERTIES UNION; and NEW YORK CIVIL LIBERTIES UNION FOUNDATION, Plaintiffs, v. No. 13-cv-03994 (WHP) JAMES R. CLAPPER, in his official capacity as Director of National Intelligence; KEITH B. ALEXANDER, in his ECF CASE official capacity as Director of the National Security Agency and Chief of the Central Security Service; CHARLES T. HAGEL, in his official capacity as Secretary of Defense; ERIC H. HOLDER, in his official capacity as Attorney General of the United States; and ROBERT S. MUELLER III, in his official capacity as Director of the Federal Bureau of Investigation, Defendants. BRIEF AMICI CURIAE OF THE REPORTERS COMMITTEE FOR FREEDOM OF THE PRESS AND 18 NEWS MEDIA ORGANIZATIONS IN SUPPORT OF PLAINTIFFS’ MOTION FOR A PRELIMINARY INJUNCTION Of counsel: Michael D. Steger Bruce D. Brown Counsel of Record Gregg P. Leslie Steger Krane LLP Rob Tricchinelli 1601 Broadway, 12th Floor The Reporters Committee New York, NY 10019 for Freedom of the Press (212) 736-6800 1101 Wilson Blvd., Suite 1100 [email protected] Arlington, VA 22209 (703) 807-2100 Case 1:13-cv-03994-WHP Document 42-1 Filed 09/04/13 Page 2 of 15 TABLE OF CONTENTS TABLE OF AUTHORITIES .......................................................................................................... ii STATEMENT OF INTEREST ....................................................................................................... 1 SUMMARY OF ARGUMENT…………………………………………………………………1 ARGUMENT……………………………………………………………………………………2 I. The integrity of a confidential reporter-source relationship is critical to producing good journalism, and mass telephone call tracking compromises that relationship to the detriment of the public interest……………………………………….2 A There is a long history of journalists breaking significant stories by relying on information from confidential sources…………………………….4 B. -
A Public Accountability Defense for National Security Leakers and Whistleblowers
A Public Accountability Defense For National Security Leakers and Whistleblowers The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yochai Benkler, A Public Accountability Defense For National Security Leakers and Whistleblowers, 8 Harv. L. & Pol'y Rev. 281 (2014). Published Version http://www3.law.harvard.edu/journals/hlpr/files/2014/08/ HLP203.pdf Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:12786017 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP A Public Accountability Defense for National Security Leakers and Whistleblowers Yochai Benkler* In June 2013 Glenn Greenwald, Laura Poitras, and Barton Gellman be- gan to publish stories in The Guardian and The Washington Post based on arguably the most significant national security leak in American history.1 By leaking a large cache of classified documents to these reporters, Edward Snowden launched the most extensive public reassessment of surveillance practices by the American security establishment since the mid-1970s.2 Within six months, nineteen bills had been introduced in Congress to sub- stantially reform the National Security Agency’s (“NSA”) bulk collection program and its oversight process;3 a federal judge had held that one of the major disclosed programs violated the -
NATIONAL JOURNAL: What Bush Was Told About Iraq (03/02/2006) 6/18/09 4:28 PM
NATIONAL JOURNAL: What Bush Was Told About Iraq (03/02/2006) 6/18/09 4:28 PM ADMINISTRATION What Bush Was Told About Iraq By Murray Waas, National Journal © National Journal Group Inc. Thursday, March 2, 2006 Two highly classified intelligence reports delivered directly to President Bush before the Iraq war cast doubt on key public assertions made by the president, Vice President Cheney, and other administration officials as justifications for invading Iraq and toppling Saddam Hussein, according to records and knowledgeable sources. The first report, delivered to Bush in early October The president received highly classified 2002, was a one-page summary of a National Intelligence Estimate that discussed whether intelligence reports containing information at Saddam's procurement of high-strength aluminum odds with his justifications for going to war. tubes was for the purpose of developing a nuclear weapon. Among other things, the report stated that the Energy Department and the State Department's Bureau of Intelligence and Research believed that the tubes were "intended for conventional weapons," a view disagreeing with that of other intelligence agencies, including the CIA, which believed that the tubes were intended for a nuclear bomb. The disclosure that Bush was informed of the DOE and State dissents is the first evidence that the president himself knew of the sharp debate within the government over the aluminum tubes during the time that he, Cheney, and other members of the Cabinet were citing the tubes as clear evidence of an Iraqi nuclear program. Neither the president nor the vice president told the public about the disagreement among the agencies. -
Cultural Intelligence in Covert Operatives
OVERT ACCEPTANCE: CULTURAL INTELLIGENCE IN COVERT OPERATIVES CHIP MICHAEL BUCKLEY A Thesis Submitted to the Faculty of Mercyhurst University In Partial Fulfillment of the Requirements for The Degree of MASTER OF SCIENCE IN APPLIED INTELLIGENCE RIDGE SCHOOL FOR INTELLIGENCE STUDIES AND INFORMATION SCIENCE MERCYHURST UNIVERSITY ERIE, PENNSYLVANIA JANUARY 2015 RIDGE SCHOOL FOR INTELLIGENCE STUDIES AND INFORMATION SCIENCE MERCYHURST UNIVERSITY ERIE, PENNSYLVANIA OVERT ACCEPTANCE: CULTURAL INTELLIGENCE IN COVERT OPERATIVES A Thesis Submitted to the Faculty of Mercyhurst University In Partial Fulfillment of the Requirements for The Degree of MASTER OF SCIENCE IN APPLIED INTELLIGENCE Submitted By: CHIP MICHAEL BUCKLEY Certificate of Approval: ___________________________________ Stephen Zidek, M.A. Assistant Professor The Ridge School of Intelligence Studies and Information Science ___________________________________ James G. Breckenridge, Ph.D. Associate Professor The Ridge School of Intelligence Studies and Information Science ___________________________________ Phillip J. Belfiore, Ph.D. Vice President Office of Academic Affairs January 2015 Copyright © 2015 by Chip Michael Buckley All rights reserved. iii DEDICATION To my father. iv ACKNOWLEDGEMENTS I would like to acknowledge a number of important individuals who have provided an extraordinary amount of support throughout this process. The faculty at Mercyhurst University, particularly Professor Stephen Zidek, provided invaluable guidance when researching and developing this thesis. My friends and classmates also volunteered important ideas and guidance throughout this time. Lastly, my family’s support, patience, and persistent inquiries regarding my progress cannot be overlooked. v ABSTRACT OF THE THESIS Overt Acceptance: Cultural Intelligence in Covert Operatives A Critical Examination By Chip Michael Buckley Master of Science in Applied Intelligence Mercyhurst University, 2014 Professor S. -
New Yorker Launches Online Anonymous Tip System 15 May 2013
New Yorker launches online anonymous tip system 15 May 2013 will be open-source, and we are very glad to be the first to bring it out into the world, fully implemented." Swartz, an activist who committed suicide in January as he faced a potential prison sentence for breaking into a university research database, developed the system with Kevin Poulsen, a former hacker who is now an editor at Wired magazine. The New Yorker said the system was designed to avoid putting media organizations at the center of investigations of news leaks. "Readers and sources have long sent documents to the magazine and its reporters, from letters of complaint to classified papers," Davidson said. The New Yorker magazine is diplayed in an Upper East Side newstand in New York on October 9, 2012. The "But, over the years, it's also become easier to New Yorker magazine on Wednesday unveiled a new trace the senders... Strongbox addresses that; as online system for anonymous whistleblower tips, based it's set up, even we won't be able to figure out on technology developed by the late Internet activist where files sent to us come from. If anyone asks Aaron Swartz and a former hacker. us, we won't be able to tell them." The system aims to encourage the anonymous submission of newsworthy information, in the The New Yorker magazine on Wednesday manner of WikiLeaks and other Internet sites. unveiled a new online system for anonymous whistleblower tips, based on technology developed The Wall Street Journal set up its own tip system in by the late Internet activist Aaron Swartz and a May 2011 called SafeHouse. -
Who Watches the Watchmen? the Conflict Between National Security and Freedom of the Press
WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment. -
The Underlying Theme of Alan Dershowitz's Writing and Teaching
Visibility, Accountability and Discourse as Essential to Democracy: The Underlying Theme of Alan Dershowitz's Writing and Teaching The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Alan M. Dershowitz, Visibility, Accountability and Discourse as Essential to Democracy: The Underlying Theme of Alan Dershowitz's Writing and Teaching, 71 Alb. L. Rev. 731 (2008). Published Version http://www.albanylawreview.org/Articles/Vol71_3/71.3.0731- Dershowitz.pdf Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:34901211 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA ARTICLES VISIBILITY, ACCOUNTABILITY AND DISCOURSE AS ESSENTIAL TO DEMOCRACY: THE UNDERLYING THEME OF ALAN DERSHOWITZ'S WRITING AND TEACHING Alan M. Dershowitz* I have been writing about the law and justice for half a century. My first published law review piece appeared in 1960 as a student note in the Yale Law Journal.1 Since that time, I have published nearly thirty books and hundreds of articles covering a wide range of legal, philosophical, historical, psychological, biblical, military, educational, and political issues. Until I listened to the excellent papers presented at this conference on my work, I had never realized-at least on a conscious level-that a single, underlying theme, with multiple variations, runs through nearly all of my writings. As a response to those papers, I will seek to articulate that theme, show how it pervades my writing and teaching, identify some of its roots in the teachings of my own mentors, try to defend its fundamental correctness, and point to several weaknesses and limitations that remain to be considered before I complete my life's work. -
The Lincoln Humanities Journal Panopticon: Surveillance
LHJ The Lincoln Humanities Journal Fall 2016 | Volume 4 Panopticon: Surveillance, Suspicion, Fear Editor ABBES MAAZAOUI Annual publication of the College of Arts, Humanities and Social Sciences, Lincoln University of Pennsylvania. All rights reserved. ISSN 2474-7726 (print) ISSN 2474-7726 (online) 4 The Lincoln Humanities Journal (LHJ) The Lincoln Humanities Journal, ISSN 2474-7726 (print), ISSN 2474-7726 (online), is an interdisciplinary double blind peer-reviewed journal published once a year by the College of Arts, Humanities and Social Sciences of Lincoln University of Pennsylvania. Its main objective is to promote interdisciplinary studies by providing an intellectual platform for international scholars to exchange ideas and perspectives. Each volume is focused on a pre- selected theme in the fields of arts, humanities, the social sciences, and contemporary culture. Preference is given to topics of general interest that lend themselves to an interdisciplinary approach. Manuscripts should conform to the MLA style. Submissions may be made by e-mail to the editor at [email protected]. The preferred language is English. The journal is published both online and in print, in November-December of each year. Editor ABBES MAAZAOUI Lincoln University Editorial Board J. KENNETH VAN DOVER Lincoln University ERIK LIDDELL Eastern Kentucky University KIRSTEN C. KUNKLE Scholar & Opera Singer HÉDI JAOUAD Skidmore College EZRA S. ENGLING Eastern Kentucky University JEAN LEVASSEUR Bishop’s University, Canada The Lincoln Humanities Journal 5 TABLE -
Anonymous Javascript Cryptography and Cover Traffic in Whistleblowing Applications
DEGREE PROJECT IN COMPUTER SCIENCE AND ENGINEERING, SECOND CYCLE, 30 CREDITS STOCKHOLM, SWEDEN 2016 Anonymous Javascript Cryptography and Cover Traffic in Whistleblowing Applications JOAKIM UDDHOLM KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF COMPUTER SCIENCE AND COMMUNICATION Anonymous Javascript Cryptography and Cover Traffic in Whistleblowing Applications JOAKIM HJALMARSSON UDDHOLM Master’s Thesis at NADA Supervisor: Sonja Buchegger, Daniel Bosk Examiner: Johan Håstad Abstract In recent years, whistleblowing has lead to big headlines around the world. This thesis looks at whistleblower systems, which are systems specifically created for whistleblowers to submit tips anonymously. The problem is how to engineer such a system as to maximize the anonymity for the whistleblower whilst at the same time remain usable. The thesis evaluates existing implementations for the whistle- blowing problem. Eleven Swedish newspapers are evaluated for potential threats against their whistleblowing service. I suggest a new system that tries to improve on existing sys- tems. New features includes the introduction of JavaScript cryp- tography to lessen the reliance of trust for a hosted server. Use of anonymous encryption and cover traffic to partially anonymize the recipient, size and timing metadata on submissions sent by the whistleblowers. I explore the implementations of these fea- tures and the viability to address threats against JavaScript in- tegrity by use of cover traffic. The results show that JavaScript encrypted submissions are viable. The tamper detection system can provide some integrity for the JavaScript client. Cover traffic for the initial submissions to the journalists was also shown to be feasible. However, cover traffic for replies sent back-and-forth between whistleblower and journalist consumed too much data transfer and was too slow to be useful. -
Loving the Cyber Bomb? the Dangers of Threat Inflation in Cybersecurity Policy
No. 11-24 April 2011 WORKING PAPER LOVING THE CYBER BOMB? THE DANGERS OF THREAT INFLATION IN CYBERSECURITY PolICY By Jerry Brito and Tate Watkins The ideas presented in this research are the authors’ and do not represent official positions of the Mercatus Center at George Mason University. LOVING THE CYBER BOMB? THE DANGERS OF THREAT INFLATION IN CYBERSECURITY POLICY Jerry Brito*& Tate Watkins** INTRODUCTION Over the past two years there has been a steady drumbeat of alarmist rhetoric coming out of Washington about potential catastrophic cyberthreats. For example, at a Senate Armed Services Committee hearing last year, Chairman Carl Levin said that ―cyberweapons and cyberattacks potentially can be devastating, approaching weapons of mass destruction in their effects.‖1 Proposed responses include increased federal spending on cybersecurity and the regulation of private network security practices. The rhetoric of ―cyber doom‖2 employed by proponents of increased federal intervention, however, lacks clear evidence of a serious threat that can be verified by the public. As a result, the United States may be witnessing a bout of threat inflation similar to that seen in the run-up to the Iraq War. Additionally, a cyber-industrial complex is emerging, much like the military-industrial complex of the Cold War. This complex may serve to not only supply cybersecurity solutions to the federal government, but to drum up demand for them as well. Part I of this article draws a parallel between today‘s cybersecurity debate and the run-up to the Iraq War and looks at how an inflated public conception of the threat we face may lead to unnecessary regulation of the Internet. -
Strange Bedfellows Strange Bedfellows Evan N
Strange Bedfellows Strange Bedfellows Evan N. Resnick U.S Bargaining Behavior with Allies of Convenience Throughout history, states have periodically made common cause with bitter adversaries for the purpose of confronting even more urgent national security threats. Although the term “alliance of convenience” has been widely used to depict these tenu- ous strategic partnerships, the dynamics of such alliances have yet to be sys- tematically explored by international relations scholars and U.S. policymakers. This is puzzling, given that alliances with unsavory, unreliable, and dangerous enemies—including Louis XVI’s France during the American Revolutionary War, Joseph Stalin’s Soviet Union during World War II, Mao Zedong’s China during the Cold War, and Saddam Hussein’s Iraq during the Iran-Iraq War— have repeatedly proven necessary to thwart a host of even greater near-term threats to the United States and its interests since the country’s founding. A crucial yet heretofore unexamined puzzle stemming from this recurrent phenomenon pertains to the terms on which the United States’ alliances of convenience have been consummated and maintained. Historically, in the face of shared threats, has the United States tended to exact a high price for its mili- tary cooperation with allies of convenience, or, more troubling, has it borne the heavier burden of creating and sustaining such partnerships? The answer to this question carries salient implications for current and future U.S. national security policy. As U.S. hegemony continues to erode as a result of a severe economic recession, rising government debt, and the continu- ing costs of the military interventions in Afghanistan and Iraq, U.S.