The Faulty Google Search That Set Off A Constitutional Crisis
from the code-is-law dept
We already wrote about Jason Leopold "accidentally" receiving a letter the CIA never actually sent that was an apology for spying on Senate staffers, but there was a lot more that Leopold received in that FOIA dump as well. Beyond the document Leopold wasn't supposed to receive, the 300 pages handed over by the CIA (not by its voluntary desire to respect FOIA stipulations, but rather because a judge told it to) provide additional details about the alleged Senate breach and its "investigative" spying -- and the ensuing fight that set off something of a Constitutional crisis in the separation of powers between the executive branch and the legislative branch.Leopold's article goes into great depth on the subject and is well-worth reading in its entirety. One of the many, many details worth noting is that the CIA's "firewall" between it and Senate staffers wasn't really anything of the sort. A Google-powered custom search function allowed staffers to search CIA documents, but only the documents the CIA wanted them to see. The problem was that the search didn't work correctly. Keyword searches were returning documents the CIA hadn't approved for Senate perusal. This was how the hidden Panetta Report was discovered.
The CIA claimed Senate staffers had abused their privileges by accessing and downloading documents the agency hadn't meant to make available. But the blame was misplaced. The search "appliance" configuration itself was faulty, and had been for years. And, from there, the CIA decided it was okay to spy on the Senate staffers' work, raising questions about the separation of powers.
"In November 2012, the RDI team learned of a vulnerability with the Google appliance, related to configuration settings that had been in place since the initial installation in November 2009," the OIG's report says. "[The Office of Inspector General] reviewed an April 2013 email between members of the RDINet IT staff detailing the existing settings, which indicated an access control deficiency for search results. The RDI IT team updated the Google appliance in April 2013 to reflect this change. Prior to this update, the settings provided to the [Office of Inspector General] showed that the Google appliance was not configured to enforce access rights or search permissions within RDINet and its holdings."A problem the CIA was aware of but had never bothered to fix was now being portrayed as a breach of trust (at best) by the Senate staffers compiling the Torture Report. Brennan knew about the misconfigured search tool but still went after Feinstein and Senate staffers, accusing them of "hacking" the CIA's system and making off with a purloined copy of the Panetta Review.
Weaver explained that the Cyber Blue Team concluded the Google appliance "wasn't enforcing permissions properly, and revealing accessible locations for the [CIA] files."
Considering the Panetta Review was the former CIA director's own investigation into the CIA's torture programs, one would assume these documents would be highly relevant to the task at hand -- the compilation of the torture report. But the findings contained in it were so toxic the CIA immediately began burying the documents using every opaque agency's favorite hiding place: the oft-abused "deliberative documents" exemption.
US officials told VICE News that the Panetta Review was shut down for one reason: the CIA team conducting it discovered damning inconsistencies in reports agency officials made to Congress about the efficacy of the program, and horrific details about the way detainees were treated. These revelations by the CIA's own employees contradicted agency officials who had continued to publicly defend the program's value. The internal reports the Panetta Review team wrote, US officials told VICE News, were so troubling that a decision was made by agency lawyers to mark them as "deliberative" draft documents, thereby protecting them from disclosure via FOIA.Leopold's article is a fascinating study of CIA deception, duplicity and retaliatory abuse. The only way the CIA could have made the aftermath of the Torture Report's release worse was to do all the things it actually did. It made false accusations against a Senate oversight committee. It made blatantly false claims about Senate staff and their "hacking." It stabbed its own Inspector General in the back, publicly impugning him and his findings. It performed an "internal investigation" that managed to "uncover" only the wrongdoing of others. The only act of contrition in this whole debacle went unperformed when CIA head John Brennan chose to toss his apology to the Senate in the nearest file cabinet. The CIA may have had a chance to salvage a small part of its reputation, but instead attempted to bluster its way back to respectability. And, in doing so, lost any respect it had remaining.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: cia, configuration, constitutional crisis, dianne feinstein, google search, jason leopold, john brennan, senate, spying
Reader Comments
Subscribe: RSS
View by: Time | Thread
Hacking
[ link to this | view in chronology ]
Re: Hacking
Or put another way, it's not unauthorized access if you asked nicely and were given authorization.
[ link to this | view in chronology ]
"A Google-powered custom search function allowed staffers to search CIA documents, but only the documents the CIA wanted them to see."
That most interesting fact is slipped in as if incidental!
You KNOW that Google tailors and targets advertisements just for you, well, it also picks news stories according to "algorithm" to keep you in your own happy little ideological bubble with no counter-facts. (Some academic termed it "propaganda bubble"?)
Now, here's the goal of your "friend" Google, which is actually a globalist corporation, as the number one search engine: You'll soon never be able to find anything but The Official Story. It's the Ministry Of Truth's dynamic memory-hole, suppressing all counter-evidence ("BB speech chocolate ration malquoted, rectify"), while at same time those with clearance can see figures that they'll like more! BUT NEITHER necessarily the truth! There is no longer such a thing as "the truth", it'll be exactly as in Orwell's "1984", the most hideous aspect of the novel if you made it that far: you're to say whatever The Party wants you to say.
This is the start of that. There's Google right at center of the CIA, the essential component to shaping views.
[ link to this | view in chronology ]
Re: "A Google-powered custom search function allowed staffers to search CIA documents, but only the documents the CIA wanted them to see."
[ link to this | view in chronology ]
Re: "A Google-powered custom search function allowed staffers to search CIA documents, but only the documents the CIA wanted them to see."
[ link to this | view in chronology ]
Re: "A Google-powered custom search function allowed staffers to search CIA documents, but only the documents the CIA wanted them to see."
I'm not sure what "truth" you think is missing from Google, but I haven't been made aware of it by anyone who says it's missing, and I've researched some pretty obscure topics.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Correcting a Constitutional Crisis
I know, lets call in the Military Industrial Espionage Complex. They seem to have all the power anyway.
[ link to this | view in chronology ]
Do you still believe that Clapper's perjury was accident in the light of these findings?
[ link to this | view in chronology ]
Jobless
[ link to this | view in chronology ]
Re: Jobless
Remember, you're government is "at war" with Druggies and Terrories and so all federal agents and military forces are only answerable to war time laws, which are of course totally secret laws that the public cannot know because Druggies and Terrories might indeed be members of the public.
---
[ link to this | view in chronology ]
"Google Custom Search"
[ link to this | view in chronology ]
Respect
No problem, they will request a law stating that respect is due. It seems to work so well with judges and cops.
[ link to this | view in chronology ]
Computer Fraud and Abuse Act
[ link to this | view in chronology ]
Sounds about right, but I just want to make sure I'm understanding what happened.
[ link to this | view in chronology ]
It had any?
[ link to this | view in chronology ]
Let me get this straight...
I'm astonished!
[ link to this | view in chronology ]
Do as I say, not as I do.
When the Federal Snoop and Scoop Agency does these things, its just business as usual and incurs not even a raised eyebrow from the so-called Justice Department, let alone a symbolic wrist slapping of those employees blatantly interfering with the investigation.
Two Tiered Justice is alive and well in America today.
One massive set of laws for the Public, and a single law for the Elite: The Donot Law; "Do Not Get Caught and if you do, Admit Nothing Ever.".
---
[ link to this | view in chronology ]