Sunday, March 30, 2008



The New York Times this week attempted to add historical perspective and justification for their infamous exposure of highly classified National Security Agency (NSA) terror surveillance programs.

The Times, of course, considers their illegal and arguably treasonous acts in revealing classified programs and information as valued public service, of a piece with other disclosures of classified information. Significantly, the editors at the Times only consider national secrets worthy of public exposure when they do maximum damage to their political opponents.

A.J. Strata provided excellent and reinforcing rebuttal to the Times self-serving rationalizations: NY Times Reporters Try To Defend Grave Mistake - Of Course Fail.

Strata, knowledgeable enough about telecommunications to make some educated deductions about NSA, presents better background on the issue than anything even attempted by the Times:
Prior to 9-11 the NSA monitored our enemies communications. Always had - that is its purpose to exist and over the years it had become incredibly good at it. If you think the computing power on your desk is impressive, realize most advances in computer capabilities come out of national defense efforts - and they are 10-20 years ahead of what is on the store shelves today. But one thing was very important in the NSA world. When it monitors a Target (and I use that term with purpose) it sweeps up everything coming and going to the Target (and over many mediums like phones, emails, etc). All those communications are between the Target and a Contact (and I use that term with purpose as well to distinguish from the Target). But you have to gather the communications to know who are the Contacts – you collect based on the Target’s ID (for packets it is source or destination ID depending which way the data is going). To know anything about the Contact you have to get to data and look up the Contact’s source or destination ID and see where it is located (US or outside). This is an immutable fact of communications in the digital age. And it is critical to getting the story right or wrong – which we all now know the NY Times got badly wrong.

In nearly all surveillance activities legal authority is provided on the Target, but the Contacts get swept up into it when they are in communications with the Target (all other communications for the Contact are not allowed to be monitored). There was one exception to this rule prior to 9-11 - the NSA could not retain or pass on details on Contacts that were located in the US that were communicating with Targets overseas. To know where the Contact is you have to trace back from the intercepted communications. To know where the other end is you have to find it. This is how it has been for decades prior to 9-11. This did not change after 9-11.

I know this to be the case because during my research on this story I found something in the congressional record from the days when the FISA statutes were being created. And the process was laid out clearly for all to see (from 1976):

4. “Incidental” Intercepts of Americans’ Communications

Although NSA does not now target communications of American citizens, groups, or organizations for interception by placing their names on watch lists, other selection criteria are used which result in NSA’s reviewing many communications to, from, or about an American. The initial interception of a stream of communications is analogous to a vacuum cleaner: NSA picks up all communications carried over a specific link that it is monitoring. The combination of this technology and the use of words to select communications of interest results in NSA analysts reviewing the international messages of American citizens, groups, and organizations for foreign intelligence.

The interception and subsequent processing of communications are conducted in a manner that minimizes the number of unwanted messages. Only after an analyst determines that the content of a message meets a legitimate requirement will it be disseminated to the interested intelligence agencies. In practically all cases, the name of an American citizen, group, or organization is deleted by NSA before a message is disseminated.

Internal NSA guidelines ensure that the decision to disseminate an intercepted communication is now made on the basis of the importance of the foreign intelligence it contains, not because a United States citizen, group, or organization is involved. This procedure is, of course, subject to change by internal NSA directives.

Two things to note here. First, these NSA procedures are open for the NSA to adjust - so Bush had authority in this area. Second, the NSA has to analyze the message to see if it is of any value - i.e., poses a threat to national security. If not it is tossed away. If it is then the next step, prior to 9-11, was to delete all information that could lead authorities to the person in country for further investigation. Prior to 9-11 if Atta was on the phone with Bin Laden and Bin Laden said “execute the attack” then only the part of the intercept dealing with the attack order could be disseminated beyond the gates of NSA. No information on where to find the person given the attack order, the name of the phone or email account used, nothing to stop the attack could be shared. This is the idiocy Bush fixed after 9-11. He allowed the NSA to provide the complete picture of the potential threat to the FBI. Nothing on the NSA side regarding monitoring changed. Nothing.
Precisely. And what the Times mangled beyond recognition in journalistic malpractice was a decision to allow NSA to cull through already data-mined data to retain indicators of terrorist activity.

One can reasonably make all kinds of arguments about whether potential evidence of terrorist activity involving US persons (redacted as USPERS in transcripts) can legitimately be passed to the FBI or other law enforcement. But if the Times wants to foster a debate, it first better make sure their reporters and editors take basic steps in acquiring rudimentary familiarity with the technology, telecommunications, legal issues and all related laws and executive orders, and intelligence operations as a whole. The worst way to facilitate a debate is to make ridiculous assumptions based on a flawed mischaracterization, and then flog endlessly for partisan advantage. (It might also be a step warranted by simple patriotism to find out whether the disclosure of classified information might damage national security, or constitute a felony.)

The Times has ever been adamant that we must have Walls of Separation between intelligence gathering and law enforcement. Better yet, they prefer that Intelligence operations have no walls at all, the better to ensure that the communications of not one hapless innocent will ever show up as an innocent contact with a known terrorist target. Yet, these are the same editors who vilified the Bush Administration in every possible way for the “intelligence gaps” that led to 9/11.

Those same critics who see all manner of evil in our fight against terrorism see nothing wrong in denying and ignoring constitutional protections when the targets are sex offenders. Don’t get me wrong – I think neither terrorists nor pedophiles should be exempted from the data mining of telecommunications, if these efforts can reveal their attempts to do evil.

But what hypocrisy for the Times, progressives, and other professional critics of the Bush Administration, to see excess only when their Adversary goes after terrorists, but never when their friends go after anybody and anything else.

(Via Protein Wisdom, via Memeorandum.)

Labels: ,

Wednesday, March 12, 2008


One Man's Conversion

Mark Steyn, writing at The Corner, notes a frank admission from a very unlikely source. He uses a paragraph as tease, defying readers to identify his source, who it turns out is a very well know, formerly “brain dead liberal,” Playwright David Mamet.

What a confessional Mamet wrote for the Village Voice! Here’s the heart of his testimony:

I'd observed that lust, greed, envy, sloth, and their pals are giving the world a good run for its money, but that nonetheless, people in general seem to get from day to day; and that we in the United States get from day to day under rather wonderful and privileged circumstances—that we are not and never have been the villains that some of the world and some of our citizens make us out to be, but that we are a confection of normal (greedy, lustful, duplicitous, corrupt, inspired—in short, human) individuals living under a spectacularly effective compact called the Constitution, and lucky to get it.

For the Constitution, rather than suggesting that all behave in a godlike manner, recognizes that, to the contrary, people are swine and will take any opportunity to subvert any agreement in order to pursue what they consider to be their proper interests.

To that end, the Constitution separates the power of the state into those three branches which are for most of us (I include myself) the only thing we remember from 12 years of schooling.

The Constitution, written by men with some experience of actual government, assumes that the chief executive will work to be king, the Parliament will scheme to sell off the silverware, and the judiciary will consider itself Olympian and do everything it can to much improve (destroy) the work of the other two branches. So the Constitution pits them against each other, in the attempt not to achieve stasis, but rather to allow for the constant corrections necessary to prevent one branch from getting too much power for too long.

Rather brilliant. For, in the abstract, we may envision an Olympian perfection of perfect beings in Washington doing the business of their employers, the people, but any of us who has ever been at a zoning meeting with our property at stake is aware of the urge to cut through all the pernicious bullshit and go straight to firearms.

David Mamet is one of our finest living playwrights. Reading the entry on him at Wikipedia, it strikes me that I am not at all surprised that he dedicated his Pulitzer Prize winning Glengarry Glen Ross to Harold Pinter, who Mamet identifies as influence for his work.

However abysmal Pinter’s politics, and they are that and more, Pinter shows true genius in capturing dialog, idiom, character and the intensity of the banal. I can’t find better words, but the dialog and characters from Pinter’s The Birthday Party burrowed their way permanently into my brain, since I saw at performed by our Theater Department.

Mamet extends Pinter’s ability to breathe real life into his dialog. But his politics, often nakedly exposed in his scripts, have previously been rock solid Left and defiantly so.

Thus for Conservatives, Mamet’s confessional sounds as pure a Conversion Experience as we’re ever likely to hear.

I will be very interested to see if Mamet’s epiphany reflects itself in his subsequent work. (That’s if any of his publishers or producers have any stomach for what writing might result from the newly brain-alive Mamet.)

Tuesday, March 11, 2008


Times Plays Politics

Eliot Spitzer gets exposed as a frequent purveyor of prostitution, and the Editors of the NY Times strive mightily to use the scandal to somehow blacken NY Republicans. You’d think they played to one side of partisan politics (perish the thought):
A further tragedy here, beyond the personal one of the Spitzer family and the damage he has done to the reform cause, is that Mr. Spitzer’s targets are now relishing their tormentor’s torment. Those on Wall Street who fumed at having to make their world fairer for ordinary shareholders can now chortle with satisfaction in their private enclaves. For New York Republicans, who have blocked some of the most important reforms in Albany, it is hard to imagine the private glee — especially at a moment when they are fighting desperately to hold their majority in the State Senate.
The Times lumps together as Targets State Republicans, who demonstrably have a constituency who vote for and support them, with the former Attorney General’s scapegoats on Wall Street. Corporate tycoons chortle, and NY Republicans flush with private glee. The NY Times should try publishing their Editorials in comic book form.

That’s a stunning rhetorical transition, and nakedly partisan, even for the increasingly yellow-stained Times. However much NY State Government needs reform – as any citizen more conscious than comatose surely knows – how exactly has Spitzer stood or represented any kind of reform in contrast to the State GOP?

By knowingly allowing a corrupt official stand for re-election as State Comptroller? By misusing the State Police to spy on and track the movements of his political opponents? By attempting dirty tricks of the worst kind, trying to press Federal officials to direct tax audits against these same opponents? By attempting to create a Democratic Party vote generator by giving driver’s licenses to illegal aliens, making all of New York a Sanctuary State?

One can only imagine how much more venality this particular Governor could accomplish given nearly three more years in office.

The Times is absolutely correct that the Governor betrayed the public and the public trust, as the highest elected official in the State. He cannot and will not stand above the law. Certainly the many enemies he’s made in and out of public service will be bound and determined to make sure he pays every penny due in recompense, and then some.

(Via Instapundit)

Labels: , ,

This page is powered by Blogger. Isn't yours?

Subscribe to Posts [Atom]