View Resource

advertisement
Testimony of
Kate Martin, Director
Center for National Security Studies
For the United States Senate
Committee on the Judiciary
“Securing America's Safety:
Improving the Effectiveness of Anti-Terrorism Tools and
Inter-Agency Communication”
January 20, 2010
Chairman Leahy, Ranking Member Sessions, and Members of the Committee,
thank you for the opportunity to submit this testimony as part of the record for your
hearing on “Securing America's Safety: Improving the Effectiveness of Anti-Terrorism
Tools and Inter-Agency Communication.” We appreciate the Committee’s careful
review and consideration of these issues and the opportunity to offer our views for the
Committee’s consideration.
The Center is the only non-profit organization whose core mission is to prevent
claims of national security from being used to erode civil liberties, human rights, or
constitutional procedures. The Center works to preserve basic due process rights, protect
the right of political dissent, prevent illegal government surveillance, strengthen the
public’s right of access to government information, combat excessive government
secrecy, and assure effective oversight of intelligence agencies. It works to develop a
consensus on policies that fulfill national security responsibilities in ways that do not
interfere with civil liberties or constitutional government.
I would like to first offer a few observations as a twenty-year student of the
intelligence community regarding the terrible events of the past months, including the
shooting at Fort Hood and the attempted destruction of the Detroit–bound plane and
murder of its passengers. It is a truism, but bears keeping in mind, that obtaining good
intelligence, i.e. information that is reliable enough to be acted upon, is very difficult and
can entail great risk. There is no more terrible reminder of this than the killings in Khost
of U.S. intelligence officers by an individual mistakenly believed to be trustworthy.
Accordingly, the recent articulation and understanding by those in the government
that intelligence alone cannot be the mainstay of the effort to defeat al Qaeda is welcome.
Defeating al Qaeda and protecting people from their murderous attacks requires a broader
strategy than one which, relying on intelligence, aims simply to capture or kill all
terrorists without addressing the conditions that allow them to operate. Instead, the
security consensus now recognizes that a much more comprehensive approach is needed,
one which will also work to drain support for terrorist groups and dissuade young men
from becoming suicide bombers. As explained by the President’s advisor for
counterterrorism, John Brennan, the administration has determined to:
integrat[e] every element of American power to ensure that … “upstream” factors
discourage rather than encourage violent extremism. After all, the most effective
long-term strategy for safeguarding the American people is one that promotes a
future where a young man or woman never even considers joining an extremist
group in the first place; where they reject out of hand the idea of picking up that
gun or strapping on that suicide vest; where they have faith in the political process
and confidence in the rule of law; where they realize that they can build, not
simply destroy—and that the United States is a real partner in opportunity,
prosperity, dignity, and peace. That is why President Obama is committed to
using every element of our national power to address the underlying causes and
conditions that fuel so many national security threats, including violent
2
extremism. We will take a multidimensional, multi-departmental, multi-national
approach.1
I want to note that one element of such a comprehensive approach was evident in the
President’s measured response to the Christmas day attack, which was not the fearful
reaction that al Qaeda, like all terrorists, must have been hoping for.
This larger context is essential for looking at the questions being considered by
the Committee today and in the future: whether the shooting at Fort Hood could have
been prevented; what additional measures could have been taken to prevent the Christmas
day attack; and whether it is realistic to expect that such attacks can be successfully
defeated one hundred percent of the time.
In answering these questions, lessons drawn by military commanders in the
counterinsurgency context are useful. Just as U.S. commanders in Afghanistan recognize
that decisions about the use of force there must consider the collateral long-term
consequences for U.S. strategic objectives beyond the immediate military objectives, so
should decisions about the uses of secret intelligence methods consider more than simply
their short-term efficacy in identifying and stopping a terrorist. Disabling individual
terrorists is obviously extremely important. At the same time, recent history has
demonstrated the importance of also considering the longer-term effect of using specific
intelligence methods on the strategic goals of defeating the terrorist narrative and
stopping terrorist attacks; preserving our constitutional government; and building a more
democratic, peaceful and just world.
The recent calls for “racial profiling” of all young Muslim men, for secret
imprisonment and interrogation of the Christmas Day plotter, or for more surveillance
authorities to collect information on Americans all ignore both the specific security gaps
disclosed by these incidents and the larger context of what is necessary to defeat al
Qaeda. For example, the calls to extend the “lone wolf” authorities for secret wiretaps on
non-U.S. persons to citizens and other U.S. persons ignore both constitutional
requirements and the facts. If there had been probable cause to obtain a secret
intelligence warrant to wiretap the Ft. Hood shooter under the “lone wolf” standard, it is
extremely likely that there was probable cause to obtain a criminal warrant to wiretap
him. Indeed, it appears that the intelligence community was in fact not only aware of his
communications with an extremist cleric in Yemen, they may well have been listening to
them. It is not clear, however, that the community was tracking his gun purchases, a
potentially more fruitful kind of surveillance. The calls for racial profiling and
resurrection of the discredited practice of secretly imprisoning and interrogating suspects
– an effort perhaps to defend and justify past practices – overlook the general consensus
among security, military and intelligence experts that such practices overall harmed
rather than strengthened U.S. national security. Those practices strained relationships
1
Brennan, John. Remarks as prepared for delivery "A New Approach to Safeguarding Americans" at the
Center for Strategic and International Studies, August 6, 2009. Available at:
http://www.whitehouse.gov/the_press_office/Remarks-by-John-Brennan-at-the-Center-for-Strategic-andInternational-Studies/.
3
with necessary partners around the world and supplied fodder to the terrorists’ false
narrative about the United States used to recruit an unending stream of fighters and
potential suicide bombers.
Instead the administration and this committee are more usefully focused on the
intelligence community’s failure to “connect the dots” about the Christmas bomber,
despite having adequate raw intelligence about the plot.2 In doing so, it is crucial to
recognize that the volume of information coming into the U.S. government intelligence
agencies either passively through volunteers like the father or through active collection –
for example by the electronic surveillance programs run by the National Security Agency
or the FBI’s use of national security letter and other authorities – makes it extremely
difficult to correlate items of information and produce actionable intelligence analysis.
As John Brennan has stated:
All the information was shared. Except that there are millions upon millions of
bits of data that come in on a regular basis. What we need to do is make sure the
system is robust enough that we can bring that information to the surface that
really is a threat concern.3
Conservative commentator George Will agreed:
When you have millions of dots, you cannot define as systemic failure—
catastrophic failure—anything short of perfection. Our various intelligence
agencies suggest 1,600 names a day to be put on the terrorist watch list. He is a
known extremist, as the president said. There are millions of them out there. We
can’t have perfection here.4
Those of us worried about the lack of civil liberties safeguards in the recent
changes to surveillance laws have long urged Congress to focus on these issues, rather
than simply increasing collection authorities and mandating sharing. Several years ago,
in the context of consideration of reauthorization and amendment of surveillance
provisions, I wrote that while effective counterterrorism requires that agencies share
relevant information, simply mandating sharing fails to address the real difficulties in
such sharing. These include: “How to determine what information is useful for
counterterrorism; how to determine what information would be useful if shared; how to
identify whom it would be useful to share it with; and how to ensure that useful and
relevant information is timely recognized and acted upon.”5 While the legislative
focus and much of the administration’s public commentary in the past eight years may be
2
See Summary of the White House Review of the December 25, 2009 Attempted Terrorist Attack.
Available at: www.whitehouse.gov.
3
Interview with Terry Moran on ABC’s “This Week,” January 3, 2010. Available at:
http://abcnews.go.com/ThisWeek/week-transcript-john-brennan-reps-hoekstra-harmansens/story?id=9467566.
4
Id.
5
See Kate Martin writing in 2005 on sections 203 and 905 on Patriot debates.com, for one instance of this
analysis. Available at: http://www.abanet.org/natsecurity/patriotdebates/section-203.
4
summarized as share everything with everyone, that articulation is likely to have
obscured and thus increased the difficulties in the real challenges of information sharing.
Much of the recent press commentary is still focused on whether particular
individuals had access to or responsibility for the various bits of information relevant in
hind sight to the Christmas day plot and failed to put them together. It appears, however,
that the government is now addressing this more difficult question, by aiming to increase
government capacity to electronically collate and analyze intelligence bits of information
to determine what is in fact significant enough to require attention by a human analyst to
determine if the information should be acted on.6 (e.g., the DNI is to “accelerate
information technology enhancements, to include knowledge discovery, database
inteegration, cross-database searches, and the ability to correlate biographic information
with terrorism-related intelligence.”)
Such an approach may well necessary to identify and prevent future terrorist plots
and could also be useful for other intelligence tasks, such as cybersecurity efforts. At the
same time, such automated analysis, frequently called data mining, raises significant
constitutional and privacy concerns. Building such capacities pose challenges to civil
liberties that go far beyond the risks of individual wrongdoing and misuse of personal
information, such as identity theft or illegal uses of personal information by government
officials. Rather, they pose challenges to the balance of power between the government
and the citizens. As Senator Sam Ervin explained in 1974:
[D]espite our reverence for the constitutional principles of limited Government
and freedom of the individual, Government is in danger of tilting the scales
against those concepts by means of its information gathering tactics and its
technical capacity to store and distribute information. When this quite natural
tendency of Government to acquire and keep and share information about citizens
is enhanced by computer technology and when it is subjected to the unrestrained
motives of countless political administrators, the resulting threat to individual
privacy makes it necessary for Congress to reaffirm the principle of limited,
responsive Government on behalf of freedom.
Each time we give up a bit of information about ourselves to the Government, we
give up some of our freedom: the more the Government or any institution knows
about us, the more power it has over us. When the Government knows all of our
secrets, we stand naked before official power. Stripped of our privacy, we lose our
rights and privileges. The Bill of Rights then becomes just so many words.7
Senator Ervin’s fears become even more relevant as the government develops
automated electronic intelligence capabilities to mine the vast amounts of information
6
See Presidential Memorandum Regarding 12/25/2009 Attempted Terrorist Attack, January 7, 2010.
Available at: http://www.whitehouse.gov/sites/default/files/potus_directive_corrective_actions_1-7-10.pdf.
7
Senator Ervin, June 11, 1974, reprinted in COMMITTEE ON GOVERNMENT OPERATIONS, UNITED STATES
SENATE AND THE COMMITTEE ON GOVERNMENT OPERATIONS, HOUSE OF REPRESENTATIVES, LEGISLATIVE
HISTORY OF THE PRIVACY ACT OF 1974 S.3418, at 157 (Public Law 93-579)(Sept. 1976).
5
electronically collected and stored on individuals. Accordingly, in order to best protect
our constitutional framework and meet national security threats, including terrorism, we
recommend the following guidelines be implemented in adopting or upgrading such
capabilities.



Any consideration of such initiatives should include specific identification and
consideration of alternative solutions to meet the security objectives. Policymakers should direct a preference for the solution which is most protective of
civil liberties and most transparent consistent with appropriate risk-management
objectives;
The Privacy and Civil Liberties Oversight Board should be stood up and provided
the wherewithal to review and contribute to such an approach; and
Any such initiatives should include a comprehensive review of existing legal
protections for Americans’ personally identifiable information, especially private
communications, with the objective of identifying and adopting greater
protections while still meeting security needs.
An in depth discussion of how to do this is beyond the scope of this hearing. But I want
to take this opportunity to outline a general approach that has the potential for increasing
both the analytical capabilities of the government and privacy protections for Americans.
In building automated analysis/data-mining capabilities that could be used on Americans’
personally identifiable information, the government should be directed to consider the
feasibility of requiring such capability to use anonymized data. Such an approach would
require technological anonymization of personally identifiable information accessible to
the government on networks. Doing so would permit the adoption of safeguards,
including judicial oversight, when such analysis generates the identities of Americans as
suspects. Judicial approval could be required before the data could be deanonymized in
order to identify specific Americans as suspects.
For example, when the government has access to streams of network data
containing personally identifiable information on citizens and persons inside the United
States, the network could be required to carry such data in a way that personal identifiers
may be electronically and automatically separated from the rest of the data, in effect
anonymizing the stream of data. While the government would be entitled to access such
anonymized transactional (non-content) data without a warrant and to analyze such data,
it would then be required to make a showing to a court in order to pierce the anonymity
and obtain the personal identifiers of Americans associated with the transactional data.
For example, the government could be authorized to access the personal identifiers for
such data only if it met statutorily mandated standards, e.g., a judicial warrant based on
probable cause.
Finally, the President’s direction to his Intelligence Advisory Board “to look at
broader analytic and intelligence issues associated with this incident, including how to
meet the challenge associated with exploiting the ever-increasing volume of information
available to the Intelligence Community” should be implemented in a manner such that:
6


There is public/congressional knowledge of and input concerning the use of such
technologies to analyze and flag information about Americans; and
There is a commitment to build in more privacy protections in the technical
design of software/hardware capabilities and in the legal authorities for such
systems.
These are obviously difficult, large and complex undertakings, important both to
the efforts to protect Americans from terrorist attacks and to preserve our constitutional
framework. I thank the Committee for providing me the opportunity to participate in this
important work.
7
Download