Monday, May 15, 2006

George W. Bush's administration is the worst EVER

It seems that after winning the Cold War we have become what we beheld.

Last week USAToday blew the roof off of the Bush administration. Following in the steps of the WashPost's scoop on secret prisons the CIA had terrorist suspects flown to and tortured, and then the NYTimes scoop on warrantless wiretapping of phone calls in the United States, USAToday revealed that the U.S. government has been actually paying the phone companies for call logs of like every call in the country. No "content" just which was numbers were called and for how long.

So who says that USA Today, with it's extreme templating and short stories has led many old school gutenberg types to portray it as style over substance, deserves to be called by the unfortunate moniker ... McPaper.

So here are a couple articles ... first, the USAToday article. I hate copying, but people need to read this and so to the four of you who ever read this blog it's here. After that is a column from Frank Rich of the NYTimes, which also should be read, because he's saying basically I'd say if I was a 100x better writer and had his eds at the NYTimes.

NSA has massive database of Americans' phone calls
Updated 5/11/2006 10:38 AM ET
By Leslie Cauley, USA TODAY

The National Security Agency has been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth, people with direct knowledge of the arrangement told USA TODAY.

The NSA program reaches into homes and businesses across the nation by amassing information about the calls of ordinary Americans — most of whom aren't suspected of any crime. This program does not involve the NSA listening to or recording conversations. But the spy agency is using the data to analyze calling patterns in an effort to detect terrorist activity, sources said in separate interviews.

"It's the largest database ever assembled in the world," said one person, who, like the others who agreed to talk about the NSA's activities, declined to be identified by name or affiliation. The agency's goal is "to create a database of every call ever made" within the nation's borders, this person added.

For the customers of these companies, it means that the government has detailed records of calls they made — across town or across the country — to family members, co-workers, business contacts and others.

The three telecommunications companies are working under contract with the NSA, which launched the program in 2001 shortly after the Sept. 11 terrorist attacks, the sources said. The program is aimed at identifying and tracking suspected terrorists, they said.

The sources would talk only under a guarantee of anonymity because the NSA program is secret.

Air Force Gen. Michael Hayden, nominated Monday by President Bush to become the director of the CIA, headed the NSA from March 1999 to April 2005. In that post, Hayden would have overseen the agency's domestic call-tracking program. Hayden declined to comment about the program.

The NSA's domestic program, as described by sources, is far more expansive than what the White House has acknowledged. Last year, Bush said he had authorized the NSA to eavesdrop — without warrants — on international calls and international e-mails of people suspected of having links to terrorists when one party to the communication is in the USA. Warrants have also not been used in the NSA's efforts to create a national call database.

In defending the previously disclosed program, Bush insisted that the NSA was focused exclusively on international calls. "In other words," Bush explained, "one end of the communication must be outside the United States."

As a result, domestic call records — those of calls that originate and terminate within U.S. borders — were believed to be private.

Sources, however, say that is not the case. With access to records of billions of domestic calls, the NSA has gained a secret window into the communications habits of millions of Americans. Customers' names, street addresses and other personal information are not being handed over as part of NSA's domestic program, the sources said. But the phone numbers the NSA collects can easily be cross-checked with other databases to obtain that information.

Don Weber, a senior spokesman for the NSA, declined to discuss the agency's operations. "Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide," he said. "However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law."

The White House would not discuss the domestic call-tracking program. "There is no domestic surveillance without court approval," said Dana Perino, deputy press secretary, referring to actual eavesdropping.

She added that all national intelligence activities undertaken by the federal government "are lawful, necessary and required for the pursuit of al-Qaeda and affiliated terrorists." All government-sponsored intelligence activities "are carefully reviewed and monitored," Perino said. She also noted that "all appropriate members of Congress have been briefed on the intelligence efforts of the United States."

The government is collecting "external" data on domestic phone calls but is not intercepting "internals," a term for the actual content of the communication, according to a U.S. intelligence official familiar with the program. This kind of data collection from phone companies is not uncommon; it's been done before, though never on this large a scale, the official said. The data are used for "social network analysis," the official said, meaning to study how terrorist networks contact each other and how they are tied together.

Carriers uniquely positioned

AT&T recently merged with SBC and kept the AT&T name. Verizon, BellSouth and AT&T are the nation's three biggest telecommunications companies; they provide local and wireless phone service to more than 200 million customers.

The three carriers control vast networks with the latest communications technologies. They provide an array of services: local and long-distance calling, wireless and high-speed broadband, including video. Their direct access to millions of homes and businesses has them uniquely positioned to help the government keep tabs on the calling habits of Americans.

Among the big telecommunications companies, only Qwest has refused to help the NSA, the sources said. According to multiple sources, Qwest declined to participate because it was uneasy about the legal implications of handing over customer information to the government without warrants.

Qwest's refusal to participate has left the NSA with a hole in its database. Based in Denver, Qwest provides local phone service to 14 million customers in 14 states in the West and Northwest. But AT&T and Verizon also provide some services — primarily long-distance and wireless — to people who live in Qwest's region. Therefore, they can provide the NSA with at least some access in that area.

Created by President Truman in 1952, during the Korean War, the NSA is charged with protecting the United States from foreign security threats. The agency was considered so secret that for years the government refused to even confirm its existence. Government insiders used to joke that NSA stood for "No Such Agency."

In 1975, a congressional investigation revealed that the NSA had been intercepting, without warrants, international communications for more than 20 years at the behest of the CIA and other agencies. The spy campaign, code-named "Shamrock," led to the Foreign Intelligence Surveillance Act (FISA), which was designed to protect Americans from illegal eavesdropping.

Enacted in 1978, FISA lays out procedures that the U.S. government must follow to conduct electronic surveillance and physical searches of people believed to be engaged in espionage or international terrorism against the United States. A special court, which has 11 members, is responsible for adjudicating requests under FISA.

Over the years, NSA code-cracking techniques have continued to improve along with technology. The agency today is considered expert in the practice of "data mining" — sifting through reams of information in search of patterns. Data mining is just one of many tools NSA analysts and mathematicians use to crack codes and track international communications.

Paul Butler, a former U.S. prosecutor who specialized in terrorism crimes, said FISA approval generally isn't necessary for government data-mining operations. "FISA does not prohibit the government from doing data mining," said Butler, now a partner with the law firm Akin Gump Strauss Hauer & Feld in Washington, D.C.

The caveat, he said, is that "personal identifiers" — such as names, Social Security numbers and street addresses — can't be included as part of the search. "That requires an additional level of probable cause," he said.

The usefulness of the NSA's domestic phone-call database as a counterterrorism tool is unclear. Also unclear is whether the database has been used for other purposes.

The NSA's domestic program raises legal questions. Historically, AT&T and the regional phone companies have required law enforcement agencies to present a court order before they would even consider turning over a customer's calling data. Part of that owed to the personality of the old Bell Telephone System, out of which those companies grew.

Ma Bell's bedrock principle — protection of the customer — guided the company for decades, said Gene Kimmelman, senior public policy director of Consumers Union. "No court order, no customer information — period. That's how it was for decades," he said.

The concern for the customer was also based on law: Under Section 222 of the Communications Act, first passed in 1934, telephone companies are prohibited from giving out information regarding their customers' calling habits: whom a person calls, how often and what routes those calls take to reach their final destination. Inbound calls, as well as wireless calls, also are covered.

The financial penalties for violating Section 222, one of many privacy reinforcements that have been added to the law over the years, can be stiff. The Federal Communications Commission, the nation's top telecommunications regulatory agency, can levy fines of up to $130,000 per day per violation, with a cap of $1.325 million per violation. The FCC has no hard definition of "violation." In practice, that means a single "violation" could cover one customer or 1 million.

In the case of the NSA's international call-tracking program, Bush signed an executive order allowing the NSA to engage in eavesdropping without a warrant. The president and his representatives have since argued that an executive order was sufficient for the agency to proceed. Some civil liberties groups, including the American Civil Liberties Union, disagree.

Companies approached

The NSA's domestic program began soon after the Sept. 11 attacks, according to the sources. Right around that time, they said, NSA representatives approached the nation's biggest telecommunications companies. The agency made an urgent pitch: National security is at risk, and we need your help to protect the country from attacks.

The agency told the companies that it wanted them to turn over their "call-detail records," a complete listing of the calling histories of their millions of customers. In addition, the NSA wanted the carriers to provide updates, which would enable the agency to keep tabs on the nation's calling habits.

The sources said the NSA made clear that it was willing to pay for the cooperation. AT&T, which at the time was headed by C. Michael Armstrong, agreed to help the NSA. So did BellSouth, headed by F. Duane Ackerman; SBC, headed by Ed Whitacre; and Verizon, headed by Ivan Seidenberg.

With that, the NSA's domestic program began in earnest.

AT&T, when asked about the program, replied with a comment prepared for USA TODAY: "We do not comment on matters of national security, except to say that we only assist law enforcement and government agencies charged with protecting national security in strict accordance with the law."

In another prepared comment, BellSouth said: "BellSouth does not provide any confidential customer information to the NSA or any governmental agency without proper legal authority."

Verizon, the USA's No. 2 telecommunications company behind AT&T, gave this statement: "We do not comment on national security matters, we act in full compliance with the law and we are committed to safeguarding our customers' privacy."

Qwest spokesman Robert Charlton said: "We can't talk about this. It's a classified situation."

In December, The New York Times revealed that Bush had authorized the NSA to wiretap, without warrants, international phone calls and e-mails that travel to or from the USA. The following month, the Electronic Frontier Foundation, a civil liberties group, filed a class-action lawsuit against AT&T. The lawsuit accuses the company of helping the NSA spy on U.S. phone customers.

Last month, U.S. Attorney General Alberto Gonzales alluded to that possibility. Appearing at a House Judiciary Committee hearing, Gonzales was asked whether he thought the White House has the legal authority to monitor domestic traffic without a warrant. Gonzales' reply: "I wouldn't rule it out." His comment marked the first time a Bush appointee publicly asserted that the White House might have that authority.

Similarities in programs

The domestic and international call-tracking programs have things in common, according to the sources. Both are being conducted without warrants and without the approval of the FISA court. The Bush administration has argued that FISA's procedures are too slow in some cases. Officials, including Gonzales, also make the case that the USA Patriot Act gives them broad authority to protect the safety of the nation's citizens.

The chairman of the Senate Intelligence Committee, Sen. Pat Roberts, R-Kan., would not confirm the existence of the program. In a statement, he said, "I can say generally, however, that our subcommittee has been fully briefed on all aspects of the Terrorist Surveillance Program. ... I remain convinced that the program authorized by the president is lawful and absolutely necessary to protect this nation from future attacks."

The chairman of the House Intelligence Committee, Rep. Pete Hoekstra, R-Mich., declined to comment.

One company differs

One major telecommunications company declined to participate in the program: Qwest.

According to sources familiar with the events, Qwest's CEO at the time, Joe Nacchio, was deeply troubled by the NSA's assertion that Qwest didn't need a court order — or approval under FISA — to proceed. Adding to the tension, Qwest was unclear about who, exactly, would have access to its customers' information and how that information might be used.

Financial implications were also a concern, the sources said. Carriers that illegally divulge calling information can be subjected to heavy fines. The NSA was asking Qwest to turn over millions of records. The fines, in the aggregate, could have been substantial.

The NSA told Qwest that other government agencies, including the FBI, CIA and DEA, also might have access to the database, the sources said. As a matter of practice, the NSA regularly shares its information — known as "product" in intelligence circles — with other intelligence groups. Even so, Qwest's lawyers were troubled by the expansiveness of the NSA request, the sources said.

The NSA, which needed Qwest's participation to completely cover the country, pushed back hard.

Trying to put pressure on Qwest, NSA representatives pointedly told Qwest that it was the lone holdout among the big telecommunications companies. It also tried appealing to Qwest's patriotic side: In one meeting, an NSA representative suggested that Qwest's refusal to contribute to the database could compromise national security, one person recalled.

In addition, the agency suggested that Qwest's foot-dragging might affect its ability to get future classified work with the government. Like other big telecommunications companies, Qwest already had classified contracts and hoped to get more.

Unable to get comfortable with what NSA was proposing, Qwest's lawyers asked NSA to take its proposal to the FISA court. According to the sources, the agency refused.

The NSA's explanation did little to satisfy Qwest's lawyers. "They told (Qwest) they didn't want to do that because FISA might not agree with them," one person recalled. For similar reasons, this person said, NSA rejected Qwest's suggestion of getting a letter of authorization from the U.S. attorney general's office. A second person confirmed this version of events.

In June 2002, Nacchio resigned amid allegations that he had misled investors about Qwest's financial health. But Qwest's legal questions about the NSA request remained.

Unable to reach agreement, Nacchio's successor, Richard Notebaert, finally pulled the plug on the NSA talks in late 2004, the sources said.

Contributing: John Diamond
----------------------------------------------------------------------------------------------------------

May 14, 2006
Op-Ed Columnist
Will the Real Traitors Please Stand Up?
By FRANK RICH

WHEN America panics, it goes hunting for scapegoats. But from Salem onward, we've more often than not ended up pillorying the innocent. Abe Rosenthal, the legendary Times editor who died last week, and his publisher, Arthur Ochs Sulzberger, were denounced as treasonous in 1971 when they defied the Nixon administration to publish the Pentagon Papers, the secret government history of the Vietnam War. Today we know who the real traitors were: the officials who squandered American blood and treasure on an ill-considered war and then tried to cover up their lies and mistakes. It was precisely those lies and mistakes, of course, that were laid bare by the thousands of pages of classified Pentagon documents leaked to both The Times and The Washington Post.

This history is predictably repeating itself now that the public has turned on the war in Iraq. The administration's die-hard defenders are desperate to deflect blame for the fiasco, and, guess what, the traitors once again are The Times and The Post. This time the newspapers committed the crime of exposing warrantless spying on Americans by the National Security Agency (The Times) and the C.I.A.'s secret "black site" Eastern European prisons (The Post). Aping the Nixon template, the current White House tried to stop both papers from publishing and when that failed impugned their patriotism.

President Bush, himself a sometime leaker of intelligence, called the leaking of the N.S.A. surveillance program a "shameful act" that is "helping the enemy." Porter Goss, who was then still C.I.A. director, piled on in February with a Times Op-Ed piece denouncing leakers for potentially risking American lives and compromising national security. When reporters at both papers were awarded Pulitzer Prizes last month, administration surrogates, led by bloviator in chief William Bennett, called for them to be charged under the 1917 Espionage Act.

We can see this charade for what it is: a Hail Mary pass by the leaders who bungled a war and want to change the subject to the journalists who caught them in the act. What really angers the White House and its defenders about both the Post and Times scoops are not the legal questions the stories raise about unregulated gulags and unconstitutional domestic snooping, but the unmasking of yet more administration failures in a war effort riddled with ineptitude. It's the recklessness at the top of our government, not the press's exposure of it, that has truly aided the enemy, put American lives at risk and potentially sabotaged national security. That's where the buck stops, and if there's to be a witch hunt for traitors, that's where it should begin.

Well before Dana Priest of The Post uncovered the secret prisons last November, the C.I.A. had failed to keep its detention "secrets" secret. Having obtained flight logs, The Sunday Times of London first reported in November 2004 that the United States was flying detainees "to countries that routinely use torture." Six months later, The New York Times added many details, noting that "plane-spotting hobbyists, activists and journalists in a dozen countries have tracked the mysterious planes' movements." These articles, capped by Ms. Priest's, do not impede our ability to detain terrorists. But they do show how the administration, by condoning torture, has surrendered the moral high ground to anti-American jihadists and botched the war of ideas that we can't afford to lose.

The N.S.A. eavesdropping exposed in December by James Risen and Eric Lichtblau of The Times is another American debacle. Hoping to suggest otherwise and cast the paper as treasonous, Dick Cheney immediately claimed that the program had saved "thousands of lives." The White House's journalistic mouthpiece, the Wall Street Journal editorial page, wrote that the Times exposé "may have ruined one of our most effective anti-Al Qaeda surveillance programs."

Surely they jest. If this is one of our "most effective" programs, we're in worse trouble than we thought. Our enemy is smart enough to figure out on its own that its phone calls are monitored 24/7, since even under existing law the government can eavesdrop for 72 hours before seeking a warrant (which is almost always granted). As The Times subsequently reported, the N.S.A. program was worse than ineffective; it was counterproductive. Its gusher of data wasted F.B.I. time and manpower on wild-goose chases and minor leads while uncovering no new active Qaeda plots in the United States. Like the N.S.A. database on 200 million American phone customers that was described last week by USA Today, this program may have more to do with monitoring "traitors" like reporters and leakers than with tracking terrorists.

Journalists and whistle-blowers who relay such government blunders are easily defended against the charge of treason. It's often those who make the accusations we should be most worried about. Mr. Goss, a particularly vivid example, should not escape into retirement unexamined. He was so inept that an overzealous witch hunter might mistake him for a Qaeda double agent.

Even before he went to the C.I.A., he was a drag on national security. In "Breakdown," a book about intelligence failures before the 9/11 attacks, the conservative journalist Bill Gertz delineates how Mr. Goss, then chairman of the House Intelligence Committee, played a major role in abdicating Congressional oversight of the C.I.A., trying to cover up its poor performance while terrorists plotted with impunity. After 9/11, his committee's "investigation" of what went wrong was notoriously toothless.

Once he ascended to the C.I.A. in 2004, Mr. Goss behaved like most other Bush appointees: he put politics ahead of the national interest, and stashed cronies and partisan hacks in crucial positions. On Friday, the F.B.I. searched the home and office of one of them, Dusty Foggo, the No. 3 agency official in the Goss regime. Mr. Foggo is being investigated by four federal agencies pursuing the bribery scandal that has already landed former Congressman Randy (Duke) Cunningham in jail. Though Washington is titillated by gossip about prostitutes and Watergate "poker parties" swirling around this Warren Harding-like tale, at least the grafters of Teapot Dome didn't play games with the nation's defense during wartime.

Besides driving out career employees, underperforming on Iran intelligence and scaling back a daily cross-agency meeting on terrorism, Mr. Goss's only other apparent accomplishment at the C.I.A. was his war on those traitorous leakers. Intriguingly, this was a new cause for him. "There's a leak every day in the paper," he told The Sarasota Herald-Tribune when the identity of the officer Valerie Wilson was exposed in 2003. He argued then that there was no point in tracking leaks down because "that's all we'd do."

What prompted Mr. Goss's about-face was revealed in his early memo instructing C.I.A. employees to "support the administration and its policies in our work." His mission was not to protect our country but to prevent the airing of administration dirty laundry, including leaks detailing how the White House ignored accurate C.I.A. intelligence on Iraq before the war. On his watch, C.I.A. lawyers also tried to halt publication of "Jawbreaker," the former clandestine officer Gary Berntsen's account of how the American command let Osama bin Laden escape when Mr. Berntsen's team had him trapped in Tora Bora in December 2001. The one officer fired for alleged leaking during the Goss purge had no access to classified intelligence about secret prisons but was presumably a witness to her boss's management disasters.

Soon to come are the Senate's hearings on Mr. Goss's successor, Gen. Michael Hayden, the former head of the N.S.A. As Jon Stewart reminded us last week, Mr. Bush endorsed his new C.I.A. choice with the same encomium he had bestowed on Mr. Goss: He's "the right man" to lead the C.I.A. "at this critical moment in our nation's history." That's not exactly reassuring.

This being an election year, Karl Rove hopes the hearings can portray Bush opponents as soft on terrorism when they question any national security move. It was this bullying that led so many Democrats to rubber-stamp the Iraq war resolution in the 2002 election season and Mr. Goss's appointment in the autumn of 2004.

Will they fall into the same trap in 2006? Will they be so busy soliloquizing about civil liberties that they'll fail to investigate the nominee's record? It was under General Hayden, a self-styled electronic surveillance whiz, that the N.S.A. intercepted actual Qaeda messages on Sept. 10, 2001 — "Tomorrow is zero hour" for one — and failed to translate them until Sept. 12. That same fateful summer, General Hayden's N.S.A. also failed to recognize that "some of the terrorists had set up shop literally under its nose," as the national-security authority James Bamford wrote in The Washington Post in 2002. The Qaeda cell that hijacked American Flight 77 and plowed into the Pentagon was based in the same town, Laurel, Md., as the N.S.A., and "for months, the terrorists and the N.S.A. employees exercised in some of the same local health clubs and shopped in the same grocery stores."

If Democrats — and, for that matter, Republicans — let a president with a Nixonesque approval rating install yet another second-rate sycophant at yet another security agency, even one as diminished as the C.I.A., someone should charge those senators with treason, too.

No comments: