SECRECY NEWS
from the FAS Project on Government Secrecy
Volume 2013, Issue No. 107
December 20, 2013

Secrecy News Blog: http://blogs.fas.org/secrecy/

INTEL REVIEW GROUP URGES REDUCED SECRECY

The report of a White House advisory group on intelligence surveillance said that reducing undue secrecy was one of its main objectives.

"A central goal of our recommendations is to increase transparency and to decrease unnecessary secrecy, in order to enhance both accountability and public trust," the report of the President's Review Group on Intelligence and Communications Technologies stated (p. 80). "Excessive surveillance and unjustified secrecy can threaten civil liberties, public trust, and the core processes of democratic self-government (p. 12)"

The Review Group specifically recommended that "detailed information" about legal authorities to compel disclosure about communications records be made public and that "general data" concerning orders to disclose telephone records and other business records be routinely disclosed as well (Recommendations 7-10).

In a more tentative, roundabout way, the report implied that the NSA program to collect telephone metadata in bulk should not have been classified.

"We recommend that the decision to keep secret from the American people programs of the magnitude of the section 215 bulk telephony meta-data program should be made only with due consideration of and respect for the strong presumption of transparency that is central to democratic governance. A program of this magnitude should be kept secret from the American people only if (a) the program serves a compelling governmental interest and (b) the efficacy of the program would be *substantially* impaired if our enemies were to know of its existence," the report stated (Recommendation 11).

But the force of this recommendation is diminished by the fact that the proponents of the NSA telephony metadata collection program clearly believed that both of the stated criteria had been met in that case.

More generally, "There is a compelling need today for a serious and comprehensive reexamination of the balance between secrecy and transparency," the Review Group stated (page 125).

But the adjectives -- compelling, serious, comprehensive -- are left to do most of the work here. The proposed reexamination of national security secrecy policy is beyond the Review Group's scope and is not to be found in this report.

"At the very least, we should always be prepared to question claims that secrecy is necessary," the report said. "That conclusion needs to be demonstrated rather than merely assumed."

Not only that, but "Part of the responsibility of our free press is to ferret out and expose information that government officials would prefer to keep secret when such secrecy is unwarranted."

The Review Group's most significant recommendation was that the NSA should no longer be permitted to routinely acquire telephone metadata of US persons in bulk, a step that if adopted would significantly transform existing intelligence surveillance programs.

"As a general rule..., the government should not be permitted to collect and store mass, undigested, non-public personal information about US persons for the purpose of enabling future queries and data-mining for foreign intelligence purposes," the report stated (p. 17)

One way to appreciate the audacity of the Review Group is to compare its report with the original tasking that it received from President Obama in his August 12 memorandum to the Director of National Intelligence.

"The Review Group will assess whether, in light of advancements in communications technologies, the United States employs its technical collection capabilities in a manner that optimally protects our national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust," the President wrote.

This was a weak formulation that barely specified a coherent problem. But the Review Group took it and ran with it, filling in gaps along the way.

Although the President gave prominence in this one-sentence tasking to "unauthorized disclosure," that term is only mentioned twice in the 300 page Review Group report (though a revamping of security clearance procedures is the subject of Recommendations 37-41). The matter of "public trust" seemed to be given greater weight and is referenced 18 times.

Meanwhile, although "civil liberties" was not mentioned in the President's memorandum at all, it appears more than 50 times in the report. And "privacy," which was likewise outside the Review Group's explicit terms of reference, is mentioned well over 100 times.

As if to justify its somewhat expansive interpretation of its assignment, the Review Group argued that privacy is actually a type of security.

"The United State Government must protect, at once, two different forms of security: national security and personal privacy" (p. 43). If this seems contrived, the Review Group offered the Latin etymology of the word "securus," which it claimed encompasses both physical security and personal privacy (p. 45). So....

At any rate, the Review Group exceeded expectations by providing an independent, critical assessment of the issues it was directed to review. Although its non-binding recommendations by themselves do not compel any changes, they already seem to have altered the policy landscape. And together with a December 16 court ruling that NSA bulk collection programs "likely violate the Fourth Amendment," they appear to have substantially shifted the center of the debate.


DNI DIRECTIVE ON SUPPLY CHAIN RISK MANAGEMENT

Because the Intelligence Community utilizes commercial products including those that may be manufactured abroad, it could be vulnerable to threat or compromise through its supply chain. Intelligence Community Directive 731 issued by Director of National Intelligence James Clapper on December 7 establishes IC policy on "Supply Chain Risk Management."

"Many IC mission-critical products, materials, and services come from supply chains that interface with or operate in a global marketplace. A greater understanding of the risks inherent in the IC's participation in the global market place is crucial to safeguarding our nation's intelligence sources, methods, and activities," the Directive said.

"Supply chain risk management is the management of risk to the integrity, trustworthiness, and authenticity of products and services within the supply chain."

"It addresses the activities of foreign intelligence entities ... and any other adversarial attempts aimed at compromising the IC supply chain, which may include the introduction of counterfeit or malicious items into the IC supply chain," the Directive said.


CHINA'S ECONOMIC RISE, AND MORE FROM CRS

Newly updated reports from the Congressional Research Service obtained by Secrecy News include the following.

China's Economic Rise: History, Trends, Challenges, and Implications for the United States, December 17, 2013:

Iraq: Politics, Governance, and Human Rights, December 17, 2013:

Child Support: An Overview of Census Bureau Data on Recipients, December 16, 2013:

Nanotechnology: A Policy Primer, December 16, 2013:

The National Nanotechnology Initiative: Overview, Reauthorization, and Appropriations Issues, December 17, 2013:

War in Afghanistan: Campaign Progress, Political Strategy, and Issues for Congress, December 17, 2013:

******************************

Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists.

The Secrecy News blog is at:
      http://blogs.fas.org/secrecy/

To SUBSCRIBE to Secrecy News, go to:
     http://blogs.fas.org/secrecy/subscribe/

To UNSUBSCRIBE, go to:
      http://blogs.fas.org/secrecy/unsubscribe/

OR email your request to saftergood@fas.org

Secrecy News is archived at:
      http://www.fas.org/sgp/news/secrecy/index.html

SUPPORT the FAS Project on Government Secrecy with a donation here:
      https://members.fas.org/donate/