Playing to the Edge: American Intelligence in the Age of Terror (46 page)

BOOK: Playing to the Edge: American Intelligence in the Age of Terror
9.05Mb size Format: txt, pdf, ePub

And finally, there is the very real possibility that in two hours of testimony discussing things five years distant and separated from me by the administration of two other directors, I may have just gotten some things wrong. It’s possible.

Most important, our purpose for the 2007 session—as well as similar sessions with the HPSCI—had
not
been to narrate a definitive history of the RDI program, but to explain its
current
status as a first step in building a consensus on a way ahead. That never happened, of course.

I got wrapped around another axle in the report concerning the number of detainees. According to the report, I “instructed a CIA officer to devise a way to keep the number of CIA detainees at the same number that the CIA had previously briefed to Congress.” The report says that was ninety-eight; I think it was actually ninety-nine.

The alleged “incident” took place in January 2009 as I was getting ready to step out the door. One CTC officer suggested that the right number of detainees in the program could be as high as 112. There had always been questions as to who should be counted in the program, and early bookkeeping had been sloppy, but I couldn’t resist offering a half smile and saying, “You people have pushed me out there for three years with ninety-seven or ninety-eight [as we added detainees].”

The agency rebuttal reflects the consensus from that meeting that the new CTC numbers were still “somewhat speculative and incomplete.” I
said that if there really were new numbers, they better make sure and then tell the new director to pass them on to Congress.

The Feinstein report settled on “at least 119” (not 112) as the right number of detainees to book under the program.

That said, Attorney General Holder, at the conclusion of the Durham investigation, confidently announced that “Mr. Durham examined any possible CIA involvement with the interrogation and detention of
101 detainees
who were alleged to have been in United States custody.” Looks like it was always a hard number—99, 101, 112, 119—to pin down.

I’ve since reflected on the Feinstein report and what lessons to draw from it. One positive take-away was the clear need to brief Congress fully and contemporaneously on sensitive activity. No fair relying on a director five years later to reconstruct events.

I’m close to drawing a second, darker conclusion too. Be careful what you tell these people. Some are less interested in honest dialogue than listening to rebut and accuse and discredit.

Which, I suppose, again raises the question of motive. Why the report? CIA was out of the interrogation business. It wasn’t going back.
*

Here, too, my darker angels suggest an answer. I picture those who really pushed the release thinking that this earned for them a sense of expiation. They get to say, and say publicly, “See. This wasn’t about us. It was never about us. We’re not like that. Those people, those people over there. The ones who lied. It’s about them. Let me show you.”

Senator Rockefeller was an especially strong advocate for the Feinstein report. He issued his own sharply critical statement at its release in December 2014.

In March 2003, following the capture of Khalid Sheikh Mohammed, the senator’s tone was somewhat different.

CNN’s Wolf Blitzer asked him what would happen to KSM.

ROCKEFELLER:
Well, happily we don’t know where he is. . . . He’ll be grilled by us. I’m sure we’ll be proper with him, but I’m sure we’ll be very, very tough with him.

That raised the question of torture for Blitzer.

ROCKEFELLER:
That’s
always a delicate question. . . . On the other hand, he does have the information. Getting that information will save American lives. We have no business not getting that information.

Blitzer again raised the question of torture.

ROCKEFELLER:
We do not sanction torture, but there are psychological and other means that can accomplish most of what we want.

Blitzer then asked about handing him over to a third country “where the restrictions against torture are not in existence.”

ROCKEFELLER:
I wouldn’t take anything off the table where he is concerned, because this is the man who has killed hundreds and hundreds of Americans over the last ten years.

Hmmm. You could see how the folks at the agency might have been confused.

They, of course, disagreed with the report, its narrative, its method, and its conclusions. And they especially disagreed that this was all just about them. If it was just about them, congressional Democrats (those who had been briefed) would have begun their protest in 2002—when the trauma was recent, the threat seemed imminent, and the future was in doubt—and not in 2014, when it was not.

Americans agreed with the agency. Poll after poll following release of the Feinstein report sided with CIA by a wide margin. Pew put the split at 51–29 that CIA’s actions were justified. The split was even larger, 56–28, that intelligence from the program prevented attacks. For those who said they were closely following the issue, the numbers were even stronger.
They supported the program 59–34. CNN had similar numbers, 66–34 overall.

Brookings, a highly regarded Washington think tank, led its coverage with the headline “Americans Have Taken Ownership of the CIA’s Interrogation Program,” pointing out that CIA tactics were approved both retrospectively and prospectively and concluding that “future presidents who refrain from doing what the Bush-Cheney administration did may well find themselves politically exposed—especially if terrorists once again manage to kill large numbers of Americans.”

Not quite the outcome intended by the Democrats on the intelligence committee.

But not quite the final word, either. The RDI program cries out for an accurate, dispassionate history. The six of us said as much in that
WSJ
op-ed, calling the Feinstein report “a missed opportunity to deliver a serious and balanced study of an important public policy question. . . . The country and the CIA would have benefited from a more balanced study of these programs and a corresponding set of recommendations. The committee’s report is not that study.”

We still await that dispassionate history.

TWENTY-ONE
THE PRIVATE SECTOR
WASHINGTON, DC, 2009–2014

I
n early June 2013, I was settling into a comfortable hotel in La Jolla, California, when I got an e-mail from Mark Hosenball, intelligence beat reporter for Reuters. “Is this real or nuts?” was his subject line. The text was a few words and a hyperlink to an article by Glenn Greenwald that had just been posted on the Web site of the London
Guardian
.

The
Guardian
headline screamed, “NSA Collecting Phone Records of Millions of Verizon Customers Daily,” and a subhead pointed to a court order authorizing the operation.

I liked Hosenball, but I didn’t answer his e-mail. This wasn’t nuts. This was real. But I wasn’t going to talk about it. This was the follow-on program to the telephone metadata we had gathered in Stellarwind
,
now done via a court order, but it wasn’t anything I could confirm or even try to explain. I did wonder, though, How the hell did
that
get out?

The next day Greenwald in the
Guardian
and Bart Gellman in the
Washington Post
claimed that NSA had free access to the US-based servers of Microsoft, Google, Yahoo, Skype, YouTube, Facebook, AOL, and Apple under something called PRISM.

The unfolding press coverage was fast taking on the look of a journalistic version of Tommy Franks’s “shock and awe” campaign in the second Iraq war.

Before long we all learned that the leaks were the product of a boyish-looking twenty-nine-year-old Booz Allen contractor, Edward Snowden, who was then on the lam in Hong Kong trying to arrange transit through Russia en route to South America.

By the summer of 2013 I had been out of government for more than four years. I was enjoying being a principal at the Chertoff Group, a security consulting firm launched by former DHS secretary Mike Chertoff, and teaching at George Mason University’s Graduate School of Policy, Government and International Affairs in northern Virginia. The Chertoff Group kept me around like-minded and like-experienced folks. It was always good to routinely share thoughts with the likes of Charlie Allen, an agency legend. The George Mason position was the product of a casual conversation with a faculty member at former senator Chuck Robb’s 2008 Christmas party. Noting what he called my “scholarship of practice,” the faculty member shepherded my forty-year-old master’s degree through GMU’s administrative wickets to land me a distinguished visiting professorship. I enjoyed teaching the course, “Intelligence and Policy,” which routinely filled up within a minute or two of online registration, although I suspect that had something to do with the hope I was going to spill some secrets.

I was also doing the routine postgovernment thing of signing on to some boards and consultancies. I often wondered what in particular I had to offer, but the invitations were numerous and steady. At one such encounter, Charlie Allen and I spent several hours with some corporate leaders explaining the structure and dynamics of the intelligence community. It wasn’t anything exotic, and we remarked in the elevator after we were done that neither of us could believe that they wrote all that stuff down. Maybe we were underestimating what we had picked up in the near century of IC experience between us.

An active speakers’ bureau rounded out my postgovernment portfolio and managed to fill in most of the empty spaces on my schedule.

I missed government work less than I thought I would. When asked, I would respond that I missed the mission and I missed the people (and would occasionally add that I missed the jet), but that was about it. Most mornings I would roll over, grab my iPad, and read the CIA press clips before getting out of bed. When I later delivered my wife her coffee, she would often ask, “Anything in the clips?” and I would just as often respond, “Yet another great day to be a
former
senior intelligence official.”

That said, I had taken to writing and commenting on intelligence matters since I left government, so I was quickly pulled into the debate that was swirling around Snowden.

An early point I made was that this debate had actually been long in coming. By the late 1990s, NSA was well aware that legitimately targetable foreign communications (like those of the Soviet Union’s strategic forces) were no longer confined to isolated adversary networks. Modern targets (like al-Qaeda’s e-mails on the World Wide Web) were coexisting with innocent and even constitutionally protected messages on a unitary, integrated global communications network.

The dilemma only got more acute after 9/11, since the enemy had demonstrated that he was already inside the gates and—even when he physically might not be inside the United States—his communications often were, as terrorists opted to use e-mail services based in this country.

The sins that Greenwald, Gellman, and others were attempting to portray were efforts by NSA and other intelligence services to deal with these new realities. Some of the efforts did indeed raise important questions about the right balance between security and liberty, and Snowden’s disclosures no doubt accelerated and intensified that discussion. But the disclosures, and especially how they were rolled out, badly misshaped it as complex stories were misreported or, worse still, purposely pushed to the darkest corner of the room.

Take the PRISM program, for example, disclosed on day two of the
campaign. Rushing against deadline, some outlets reported (inaccurately) that NSA had direct and free access to the servers of American communication service providers and it was a short step from there to near-libelous accusations that NSA was routinely rummaging through the e-mails of ordinary Americans. In truth, under court supervision, NSA was requesting specific e-mail accounts of designated foreign intelligence targets from the providers.

Take this hypothetical. NSA is targeting the communications of a known terrorist in Yemen. It discovers that the Yemen-based terrorist is communicating electronically with another individual; he could be in Pakistan, elsewhere in Yemen, or even in the United States. They are using a US-hosted Internet service; they send e-mails back and forth.

Similar contours could apply to e-mail traffic detailing the delivery of dual-use chemicals to a state suspected of developing chemical weapons. Or to other communications that provided information on potential cyber attacks.

In each of these cases, the only thing “American” about the communication is that it is physically in the United States and being hosted by a US-based Internet company. The target of the surveillance is a foreigner outside the United States.

Director of National Intelligence (and former director of NSA) Mike McConnell saw this and convinced Congress to amend FISA (Section 702) in 2008 to make it easier for NSA to grab these kinds of communications. Access is still overseen by the FISA Court (which also compels firms to turn over the data), but the process no longer requires time-consuming, cumbersome, individualized warrants.

NSA treats PRISM as just another collection point, an admittedly new and particularly valuable one, but still one among many designed to acquire
foreign
communications of
foreign
intelligence value.

PRISM didn’t light up domestic protests as much as the metadata gathering, called the 215 program, because that was the section of the Patriot Act that underpinned it. PRISM was focused on foreigners; 215 was all about Americans. NSA kept a repository of American calls—not
content, but facts of calls like from whom, to whom, when, for how long. It was massive, but access was tightly controlled, not just by limiting the number of people who could touch the data, but also by limiting their purpose to only counterterrorism.

When NSA acquired a new terrorism-related phone number overseas, say, by Yemeni forces nabbing that terrorist mentioned above, a key question was always whether or not that heretofore unknown number had ever been in contact with a US phone. It’s a simple matter to query that massive 215 database and, if such a number is identified, NSA gets to ask about the other numbers with which it is in contact. Anything after that is in the hands of the FBI.

As reasonable and constrained as that sounds to me, it sure as hell didn’t go down that way. Lots of Americans were upset, and not all of them were wearing tinfoil hats. Pockets of Congress were livid. Part of the issue was that many refused to believe that the program was constrained. They suspected that the data was being used for other purposes or that massive algorithms were being launched against it to divine personal patterns of behavior.

Others made claims that, if true, had NSA not only violating the laws of the United States but the laws of physics as well. I even heard one commentator posit that NSA could, if it suspected something of interest, click on a number in order to go back and hear what was said during a call. Huh? Click on what in reality is a phone bill to hear what was said in the past?

I pushed back strongly against a similar notion in a discussion on
Fox News Sunday
with Tea Party freshman congressman Justin Amash. I advised him that he needed to be telling his constituents the truth rather than whipping them up with scaremongering.

AMASH:
And it’s important to understand that it then goes beyond metadata. So, we start with metadata but the government is not suggesting that it can’t collect your actual communications. Under this doctrine, they certainly can collect your content just as they can collect your metadata. . . .

HAYDEN:
 . . . I’ve got to add, Chris [Wallace], it doesn’t make Americans more comfortable about the program to misrepresent it. This does not authorize the collection of content, period.

An early NSA defense of the 215 metadata program was that the executive, the Congress, and the courts were all witting and supportive. In a post–Church Committee intelligence-reform era, that should have been sufficient. It wasn’t.

The controversy created strange alignments. Fox News abandoned its usual national security credentials for a chance to beat up the president and strengthen its populist Tea Party brand. The network couldn’t address the issue without the lede “NSA scandal,” a lede that brought with it its own conclusions.

In midsummer, the 215 program came within a whisker of being shut down. By a bare twelve-vote margin, a bipartisan coalition of more or less centrist Republicans and centrist Democrats defeated an equally bipartisan coalition of their more ideological brethren, the latter an incredibly improbable alliance of far left and far right. In a rare show of bipartisanship, nearly 60 percent of Democrats and over 40 percent of Republicans voted to defund the program. One Hill participant described the hours before the vote as hand-to-hand combat.
*

To be fair, there was always a small number (especially in the Senate) who were thoroughly knowledgeable of and thoroughly opposed to 215. Take Ron Wyden of Oregon, a member of the Senate intelligence panel. Well before Snowden, Wyden tried to entrap DNI Jim Clapper into publicly revealing the 215 program by asking him in open session if NSA collects “any type of data at all on millions or hundreds of millions of Americans.” Of course, Wyden and his fellow committee members knew
the answer to the question, as did all of their staff. Suddenly on the spot, Clapper clumsily answered, “No, sir. Not wittingly.”

Really bad answer. But really bad question too. Rather underhanded. If Wyden wanted to reveal state secrets in an open hearing, he should have just manned up and dumped them himself. After the Snowden revelations, Wyden took a victory lap for asking his question and many were genuinely angered by Clapper’s response. Good to keep in mind, though, that Wyden was pressing the issue in open session because he was getting nowhere in closed sessions, where he consistently lost committee votes on the 215 program by wide margins. In fact, the strongest supporters of 215 after it was revealed were the leadership and most members of the two intelligence committees.

That most members who were most knowledgeable of what NSA was doing were supportive was heartening. But there were members of the executive branch who were (or should have been) equally knowledgeable, and their silence was puzzling.

If the vice president made any public defense of NSA, I must have missed it. So, too, with the secretary of defense, for whom the director of NSA works.

The same applies to officials like the national security advisor and the secretary of state, who actually help set intelligence requirements and receive reports based on that tasking. Where did they think this stuff came from?

Curiously, after the Snowden revelations, there were more Bush than Obama administration officials on the networks defending the current administration’s programs.

President Obama defended NSA . . . to a point. Shortly after the Snowden deluge began, he took a single (and obviously planted) question right before meeting Chinese president Xi Xinping in California. His extemporaneous response was carefully crafted, technically accurate (not an easy matter), and calmly, but forcefully, given.

The president continued his “response to query” defense in interviews
with CNN and with Charlie Rose, defending NSA programs along similar lines, although he was now admitting that “the capabilities of the NSA are scary to people.”

By September, when he was asked a question before a foreign audience in Sweden, the president’s response had become even more apologetic and defensive. He was willing to walk some things back and took pains to point out that “what I’ve said domestically and what I say to international audiences is . . . just because we can do something doesn’t mean we should do it.”

When President Bush launched the current metadata program in 2006 and the PRISM effort in 2008, he told Keith Alexander, the NSA director, to take these authorities and defend America. If they ever became politically contentious, he said, it would be his job to defend the agency (which is exactly how he dealt with the programs for which I was responsible).

When President Obama embraced these efforts in 2009, he should have embraced that social contract as well, even though it might be more difficult for him to fulfill. More difficult because it would cut against his base more than it would have for President Bush. Even more difficult later because such seemingly intrusive surveillance cut against his narrative of “al-Qaeda is on the run” and “the tide of war is receding.”

Other books

The Appetites of Girls by Pamela Moses
The Journeying Boy by Michael Innes
Deadeye Dick by Kurt Vonnegut
Paradise Alley by Kevin Baker
Sandra Hill by Down, Dirty
His Yankee Bride by Rose Gordon
Seven Year Switch (2010) by Cook, Claire
The Red Eagles by David Downing