When “incidental” intel collection—isn’t incidental

When “incidental” intel collection—isn’t incidental, Sharylattkisson.com, April 12, 2017

I’ve spoken to a small group of reliable, formerly high-placed intelligence officials who have dropped a few interesting tidbits on me of late. Here’s my understanding, based on the discussions:

  • It’s not true that wiretaps and/or electronic surveillance of U.S. citizens can “only” be done with a FISA (Foreign Intelligence Surveillance Act) court order.
  • Besides the FISA court, “wiretapping” or electronic surveillance can also be done under Title III authority. The government used this authority, for example, in the Justice Department’s secret Fast and Furious “gunwalking” case.
  • Additionally, U.S. Presidents have the power to issue secret presidential directives that can authorize otherwise illegal acts (theoretically in the country’s best interests). These directives may come with pre-planned cover stories to be used in the event the operation is exposed, and they come with indemnity for those involved, giving them permission to lie about the operation or their involvement without fear of prosecution.

  • The public will rarely know about such presidential directives since most who see them must sign agreements that promise nondisclosure and consent to polygraphs.
  • Computer surveillance is a grey area in the intelligence community where many insiders argue the traditional privacy restrictions and surveillance rules don’t necessarily apply.
  • The term “wiretapping” is used in a general sense to refer to electronic eavesdropping, even though the actual “tapping” of “wires” is not routinely necessary with today’s technology.
Telekom Malaysia technician wiretaps a serving area interface. Photo by CEphoto, Uwe Aranas
  • Surveillance of domestic communications can be conducted in international waters where U.S. law doesn’t apply.
A U.S. submarine at sea.
  • There are “back-door” ways to collect and report on a target without Title III or FISA court authority. If it’s for political purposes or blackmail, this may consist of “inventing” an excuse to surveil the target.
  • If the work of targeting an individual cannot be accomplished by government intel officers, it can be contracted out to third parties or to foreign parties who aren’t bound by U.S. law.

  • Incidental collection of a U.S. citizen target may be “orchestrated” for political reasons by those who have tools and tradecraft available to them because of their positions of power. There are ways to do it with no fingerprints.

For example:

1. Locate a foreign target already under CIA surveillance.
2. Have a government agent use the foreign target’s phone and/or computer to make it look like the foreigner contacted the U.S. citizen whose communications are sought. The contacts can be benign, but they establish a record that falsely implies a relationship exists between the U.S. citizen and the foreign target.
3. The government agent can also mimic a communication back from the U.S. citizen to the foreign target, creating an appearance that the U.S. citizen initiated contacts. This could be favorable to justifying a warrant on the U.S. citizen later.
4. The U.S. citizen is now tied to the foreign entity and is now an “incidental” collection target that can be surveilled in a “masked” format. Although “masked,” the surveilling agency knows the U.S. citizen’s identity.
5. If the U.S. citizen does anything that can be construed as illegal or suspicious, it’s possible the intel agency can then receive approval to surveil him directly rather than only “incidentally.”

  • Possibly inappropriate requests to “unmask” names of U.S. citizens captured during surveillance of a foreign target may be preceded by a chain of communications intended to provide a pretense or cover story to justify the unmasking.
Explore posts in the same categories: "Incidental" intelligence collection, Intelligence community, Intelligence leaks, Spying, Unmasking

Tags: , , , ,

You can skip to the end and leave a response. Pinging is currently not allowed.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s