State sanctioned secrecy: NSA's criminality shield

coderman coderman at protonmail.com
Sat Sep 12 13:20:37 PDT 2020


https://thehill.com/blogs/congress-blog/politics/516064-state-sanctioned-secrecy-nsas-criminality-shield?amp

State sanctioned secrecy: NSA's criminality shield

Last week, the U.S. Court of Appeals for the 9th Circuit [ruled that the National Security Agency (NSA)](https://cdn.arstechnica.net/wp-content/uploads/2020/09/nsa-ruling.pdf) telephone metadata program first [exposed](https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order) in June 2013 by whistleblower Edward Snowden "...may have violated the Fourth Amendment and did violate the Foreign Intelligence Surveillance Act ("FISA") when it collected the telephony metadata of millions of Americans..." The program was repeatedly reauthorized by Congress before finally (allegedly) being shelved in 2019, despite a Trump administration effort to [revive legal authority for it](https://www.techdirt.com/articles/20190816/16083742800/as-nsa-declares-phone-record-program-dead-trump-administration-asks-permanent-reauthorization.shtml). Snowden recognized the program's inherent criminality and unconstitutional character, which is precisely why he exposed it - and why all pending federal charges against him should be dismissed with prejudice.

Unfortunately, NSA still has a critical legal tool to hide other criminal or unconstitutional acts: the six-decade old National Security Agency (NSA) Act of 1959 ([P. L. 86-36](https://www.intelligence.senate.gov/laws/national-security-agency-act-1959-amended-through-october-24-1992)).

Enacted at the height of the Cold War, the NSA Act gives the agency radically sweeping powers to withhold any information from public disclosure. Specifically, Section 6 of the Act states "...nothing in this Act or any other law...shall be construed to require the disclosure of the organization or any function of the National Security Agency, or any information with respect to the activities thereof, or of the names, titles, salaries, or number of the persons employed by such agency."

NSA has used that blanket authority to try to keep secret details about its lethal 9/11 intelligence failure. A Freedom of Information Act (FOIA) lawsuit I brought on behalf of the Cato Institute against the Defense Department (NSA's parent organization) in January 2017 has, after over three-and-a-half years in federal court, partially punctured NSA's veil of secrecy over the cancelled TRAILBLAZER and THINTHREAD digital network exploitation (DNE) programs.

In brief, during the five-year period leading up to the 9/11 attacks, a bureaucratic war raged inside of NSA over the best way to handle the exploding volume of digital communications the agency was trying to keep up with. On one side was a group of veteran NSA cryptographers, mathematicians and computer scientists who developed a cheap, extremely effective, and Constitutionally compliant in-house DNE system codenamed THINTHREAD. On the other side was then-NSA Director Michael Hayden, who favored an unproven, external, contractor developed DNE system called TRAILBLAZER. When then-GOP House Intelligence Committee staffer [Diane Roark](https://www.pbs.org/wgbh/pages/frontline/government-elections-politics/united-states-of-secrets/the-frontline-interview-diane-roark/) got the THINTHREAD team development money and language in the FY 2002 Intelligence Authorization bill directing wider deployment of the cheaper, off-the-shelf THINTHREAD system, Hayden refused to deploy it as directed - even though THINTHREAD, still in prototype development, was already producing intelligence NSA couldn't get from any of its other existing systems.

Three weeks before the 9/11 attacks, Hayden killed further THINTHREAD development, despite the fact that TRAILBLAZER was still little more than an idea on PowerPoint slides. The former THINTHREAD team members believe to this day that had their system been deployed even a few weeks before the 9/11 attacks, bin Laden's hijackers would never have made it onto a single plane. I agree.

Ultimately, Hayden would squander at least $696 million on TRAILBLAZER between October 2001 and September 2005; the money produced exactly one failed prototype DNE system. The total is likely far higher, as the full amount of money wasted on TRAILBLAZER remains classified.

The only reason we know these facts is because of the Cato Institute FOIA lawsuit (managed by [Josh Burday](https://loevy.com/attorneys/josh-burday/) of [Loevy & Loevy](https://loevy.com/)), which focused on NSA's attempts to prevent multiple Department of Defense Inspector General (DoD IG) reports on the TRAILBLAZER and THINTHREAD systems from ever seeing the light of day (you can read the still heavily redacted but revealing 2004 DoD IG report [here](https://www.scribd.com/document/354295394/2004-DoD-IG-TT-TB-Report-071817-FOIA-Version) and the 2006 report [here](https://www.scribd.com/document/474828823/DoD-IG-Sep-2006-TRAILBLAZER-Program-Execution-Report-budget-Figure-Unredacted)).

Those reports only came about because the original THINTHREAD team members filed a DoD IG hotline complaint about TRAILBLAZER in September 2002. I learned about and actually read the classified versions of those reports while working for then-Rep. [Rush Holt](https://thehill.com/people/rush-holt) (D-N.J.) in 2013. After Holt's retirement from Congress in 2014, I continued to pursue my investigation into the scandal after joining the Cato Institute, filing the FOIA lawsuit in January 2017.

Throughout the lawsuit, NSA and DoD lawyers repeatedly invoked Section 6 of the NSA Act to try to keep as much of the TRAILBLAZER/THINTHREAD scandal secret as possible. However, the threat of an actual public FOIA trial - ordered by DC Circuit Judge Trevor McFadden - finally forced NSA to disclose the amount cited above. Unfortunately, the [2016 FOIA Improvements Act](https://www.congress.gov/bill/114th-congress/senate-bill/337) passed by Congress does not provide FOIA requestors the necessary legal tools to overcome the government accountability and transparency barrier represented by the NSA Act. NSA dug in its heels and refused to release any further information.

No legal mechanism exists to allow myself and the former THINTHREAD team members to have our security clearances restored so we could fight out the classification and disclosure battle in camera before the judge. And despite our request, Judge McFadden declined to use an existing [precedent](https://law.justia.com/cases/federal/district-courts/FSupp/766/1/1647523/) to appoint a cleared Special Master (court appointed legal or technical experts who advise judges in cases) to review 800 pages of still-classified material in the case to determine whether, in fact, NSA was improperly invoking the NSA Act to conceal still other illegal acts - like Hayden's refusal to follow the law and more widely deploy THINTHREAD as ordered by Congress, which we had finally pressured NSA into revealing. The existing [executive order](https://www.archives.gov/isoo/policy-documents/cnsi-eo.html) on classification and declassification expressly forbids such acts, but there is nothing in statute requiring such a review in FOIA cases, and at present there is no legal penalty for the kind of misuse of the NSA Act that NSA employed in this episode. Faced with these barriers, we were forced to settle the case this month.

The problem is that the NSA Act is what is known as a "(b)(3)" FOIA exemption statute - meaning that it is an existing law that can be used to withhold information from the public in spite of FOIA. The 2016 FOIA Improvements Act failed to address that problem, which also applies to laws allowing the CIA, Office of the Director of National Intelligence, and other federal department and agencies to withhold - often in blanket form - information that might reveal waste, fraud, abuse, mismanagement or even criminal conduct.

If NSA or any other department or agency that currently enjoys the use of a "(b)(3)" exemption statute is allowed to keep it, you can take it to the bank they will use it to conceal bad management, wasteful spending, and even criminal conduct. If Congress were to strike Section 6 of the NSA Act, it would go a long way towards improving public oversight and government transparency as it pertains to NSA, but much more is needed.

In the TRAILBLAZER/THINTHREAD episode, the agency that was the subject of investigation - NSA - used Section 6 of the NSA Act to try to prevent highly critical audit and investigation reports by another DoD element - the DoD IG - from ever being revealed. When the entity being audited can prevent the auditor from reporting findings of wrongdoing to taxpayers, the system is by definition corrupt. Congress should statutorily bar any agency or department subjected to an IG or Government Accountability Office (GAO) audit from blocking release of that report to the public.

Additionally, Congress should mandate judicial in camera reviews in FOIA cases involving classified information or in which a "(b)(3)" exemption statute (if still on the books) is invoked to determine whether it is being misused by an executive branch department or agency to conceal waste, fraud, abuse, mismanagement or criminal conduct. An outright statutory bar on using any law to conceal the aforementioned misconduct should likewise be enacted.

Americans should not have to rely on whistleblowers like Snowden to reveal our government is targeting us for unconstitutional surveillance behind a shield of secrecy. Nor should executive branch bureaucrats be able to conceal their misconduct behind false claims that exposing their ineptitude or criminality would involve "compromising sources and methods."

The author, a former CIA analyst and ex-Senior Policy Advisor to Rep. Rush Holt (D-N.J.), is a Research Fellow at the Cato Institute. You can follow him on Twitter via @PGEddington.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 10833 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20200912/116b5acd/attachment.txt>


More information about the cypherpunks mailing list