NSA Spying on Congress to Manipulate, Intimidate, Blackmail Top Government and Military Officials

The NSA pretty much admitted to spying on Congress this week.

It’s not the first time.  David Sirota notes:

When I asked U.S. Rep. Alan Grayson (D-Fla.) if the NSA was keeping files on his colleagues, he recounted a meeting between NSA officials and lawmakers in the lead-up to a closely contested House vote to better regulate the agency:

“One of my colleagues asked the NSA point blank will you give me a copy of my own record and the NSA said no, we won’t. They didn’t say no we don’t have one. They said no we won’t. So that’s possible.”

Grayson is right: presumably, if the NSA wasn’t tracking lawmakers, it would have flatly denied it. Instead, those officials merely denied lawmakers access to whatever files the agency might have. That suggests one of two realities: 1) the NSA is keeping files on lawmakers 2) the NSA isn’t keeping files on lawmakers, but answered vaguely in order to stoke fear among legislators that it is.

Sirota notes the danger of even the threat of spying on the legislature:

Regardless of which of these realities happens to be the case, the mere existence of legitimate fears of congressional surveillance by an executive-branch agency is a serious legal and separation-of-powers problem. Why? Because whether or not the surveillance is actually happening, the very real possibility that it even could be happening orhas happened can unduly intimidate the legislative branch into abrogating its constitutional oversight responsibilities. In this particular case, it can scare congressional lawmakers away from voting to better regulate the NSA.

And the Atlantic points out:

Access to that telephone metadata would be extremely useful for manipulating the legislature.

***

Should anyone doubt how much mischief could come from spying on even one member of Congress, let’s look back at the story of former Democratic Representative Jane Harman and what happened when the NSA intercepted and transcribed one of her telephone calls. That’s right: There’s a known instance in which a legislator’s private communications were captured by the NSA, though it’s a complicated story….

The story begins with the NSA surveilling two Israeli nationals suspected of being spies. Unbeknownst to them, their phone calls were being recorded by the NSA–and one day, a conversation with Harman got swept up in the ongoing wiretap. No one on the call knew it was being recorded.

“One of the leading House Democrats on intelligence matters was overheard on telephone calls intercepted by the National Security Agency agreeing to seek lenient treatment from the Bush administration for two pro-Israel lobbyists who were under investigation for espionage,” the New York Times reported on April 20, 2009, following up on a story broken by Congressional Quarterly’s Jeff Stein.

***

Congressional Quarterly reported that a criminal case against Harman was dropped because she was a useful ally to the Bush Administration:

Justice Department attorneys in the intelligence and public corruption units who read the transcripts decided that Harman had committed a “completed crime,” a legal term meaning that there was evidence that she had attempted to complete it, three former officials said. And they were prepared to open a case on her, which would include electronic surveillance approved by the so-called FISA Court …

First, however, they needed the certification of top intelligence officials that Harman’s wiretapped conversations justified a national security investigation … But that’s when, according to knowledgeable officials, Attorney General Gonzales intervened. According to two officials privy to the events, Gonzales said he “needed Jane” to help support the administration’s warrantless wiretapping program, which was about to be exposed by the New York Times.

Harman, he told Goss, had helped persuade the newspaper to hold the wiretap story before, on the eve of the 2004 elections. And although it was too late to stop the Times from publishing now, she could be counted on again to help defend the program.

He was right.

On Dec. 21, 2005, in the midst of a firestorm of criticism about the wiretaps, Harman issued a statement defending the operation and slamming the Times, saying, “I believe it essential to U.S. national security, and that its disclosure has damaged critical intelligence capabilities.”

We noted last month that the NSA has previously spied on congress members for improper purposes:

During the Vietnam war, the NSA spied on two prominent politicians – Senators Frank Church and Howard Baker – as well as critics of government policy Muhammad Ali, Martin Luther King, and a Washington Post humorist.

A recently declassified history written by the NSA itself called the effort “disreputable if not outright illegal.”

The main whistleblower who revealed the Vietnam-era spying was Christopher H. Pyle. Pyle told Rob Kall of OpEdNews:

They targeted Sen. Frank Church and Sen. Howard Baker. It could mean they were trying to get information or dirt on senators involved in the Church committee and Watergate committee investigations respectively — either to learn something about their investigations or to discredit them.

***

We still need more information about what happened then. But more critically, we need more information about what’s happening now. These revelations raise the obvious question:If the NSA was targeting people like Sen. Frank Church, who were in a position to oversee the NSA — is that happening now? That is, are people like intelligence committee chairs Sen. Dianne Feinstein (D-Calif.), Rep. Mike Rogers (R-Mich.) and other congressional leaders — who are supposed to be providing oversight themselves — compromised in some way by the NSA? If so, as seems quite certain from the recent Edward Snowden revelations, then how can they conduct genuine oversight of the NSA with their committees?”

***

If I were a member of congress, I would be terrified that NSA would do to them what J. Edgar Hoover did to members back during his time.

Sound paranoid?

Maybe. But remember:

  • The NSA has been tracking people’s porn in order to discredit them. The New York Times reports that this type of behavior has been going on for a long time: “J. Edgar Hoover compiled secret dossiers on the sexual peccadillos and private misbehavior of those he labeled as enemies — really dangerous people like … President John F. Kennedy, for example”.
  • Another very high-level NSA whistleblower – the head of the NSA’s global intelligence gathering operation – says that the NSA targeted CIA chief Petraeus

Indeed, because the NSA’s raw information is shared with Israel, it is possible that the Israeli government is blackmailing our congress members. The Guardian reported in September:

The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.

***

According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. “NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection”, it says.

***

A much stricter rule was set for US government communications found in the raw intelligence. The Israelis were required to “destroy upon recognition” any communication “that is either to or from an official of the US government“. Such communications included those of “officials of the executive branch (including the White House, cabinet departments, and independent agencies), the US House of Representatives and Senate (member and staff) and the US federal court system (including, but not limited to, the supreme court)”.

And it’s not just the NSA.

Last year, Eric Holder refused to say whether the Department of Justice was spying on Congress.

When one branch of government spies on another, “America has no functioning democracy”.


Articles by: Washington's Blog

Disclaimer: The contents of this article are of sole responsibility of the author(s). The Centre for Research on Globalization will not be responsible for any inaccurate or incorrect statement in this article. The Centre of Research on Globalization grants permission to cross-post Global Research articles on community internet sites as long the source and copyright are acknowledged together with a hyperlink to the original Global Research article. For publication of Global Research articles in print or other forms including commercial internet sites, contact: [email protected]

www.globalresearch.ca contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of "fair use" in an effort to advance a better understanding of political, economic and social issues. The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than "fair use" you must request permission from the copyright owner.

For media inquiries: [email protected]