Showing posts with label NSA. Show all posts
Showing posts with label NSA. Show all posts

Thursday, July 29, 2010

Secrets, Secrets, Secrets: Who Guards the Secrets

A hidden world, growing beyond control


Monday, July 19, 2010
Washington Post


The top-secret world the government created in response to the terrorist attacks of Sept. 11, 2001, has become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work.


These are some of the findings of a two-year investigation by The Washington Post that discovered what amounts to an alternative geography of the United States, a Top Secret America hidden from public view and lacking in thorough oversight. After nine years of unprecedented spending and growth, the result is that the system put in place to keep the United States safe is so massive that its effectiveness is impossible to determine.

The investigation's other findings include:


* Some 1,271 government organizations and 1,931 private companies work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States.

* An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances.

* In Washington and the surrounding area, 33 building complexes for top-secret intelligence work are under construction or have been built since September 2001. Together they occupy the equivalent of almost three Pentagons or 22 U.S. Capitol buildings - about 17 million square feet of space.

* Many security and intelligence agencies do the same work, creating redundancy and waste. For example, 51 federal organizations and military commands, operating in 15 U.S. cities, track the flow of money to and from terrorist networks.

* Analysts who make sense of documents and conversations obtained by foreign and domestic spying share their judgment by publishing 50,000 intelligence reports each year - a volume so large that many are routinely ignored.

These are not academic issues; lack of focus, not lack of resources, was at the heart of the Fort Hood shooting that left 13 dead, as well as the Christmas Day bomb attempt thwarted not by the thousands of analysts employed to find lone terrorists but by an alert airline passenger who saw smoke coming from his seatmate.

They are also issues that greatly concern some of the people in charge of the nation's security.

"There has been so much growth since 9/11 that getting your arms around that - not just for the DNI [Director of National Intelligence], but for any individual, for the director of the CIA, for the secretary of defense - is a challenge," Defense Secretary Robert M. Gates said in an interview with The Post last week.

In the Department of Defense, where more than two-thirds of the intelligence programs reside, only a handful of senior officials - called Super Users - have the ability to even know about all the department's activities. But as two of the Super Users indicated in interviews, there is simply no way they can keep up with the nation's most sensitive work.

"I'm not going to live long enough to be briefed on everything" was how one Super User put it. The other recounted that for his initial briefing, he was escorted into a tiny, dark room, seated at a small table and told he couldn't take notes. Program after program began flashing on a screen, he said, until he yelled ''Stop!" in frustration.

"I wasn't remembering any of it," he said.

Underscoring the seriousness of these issues are the conclusions of retired Army Lt. Gen. John R. Vines, who was asked last year to review the method for tracking the Defense Department's most sensitive programs. Vines, who once commanded 145,000 troops in Iraq and is familiar with complex problems, was stunned by what he discovered.

"I'm not aware of any agency with the authority, responsibility or a process in place to coordinate all these interagency and commercial activities," he said in an interview. "The complexity of this system defies description."

The result, he added, is that it's impossible to tell whether the country is safer because of all this spending and all these activities. "Because it lacks a synchronizing process, it inevitably results in message dissonance, reduced effectiveness and waste," Vines said. "We consequently can't effectively assess whether it is making us more safe."

The Post's investigation is based on government documents and contracts, job descriptions, property records, corporate and social networking Web sites, additional records, and hundreds of interviews with intelligence, military and corporate officials and former officials. Most requested anonymity either because they are prohibited from speaking publicly or because, they said, they feared retaliation at work for describing their concerns.

The Post's online database of government organizations and private companies was built entirely on public records. The investigation focused on top-secret work because the amount classified at the secret level is too large to accurately track.

Today's article describes the government's role in this expanding enterprise. Tuesday's article describes the government's dependence on private contractors. Wednesday's is a portrait of one Top Secret America community. On the Web, an extensive, searchable database built by The Post about Top Secret America is available at washingtonpost.com/topsecretamerica.

Defense Secretary Gates, in his interview with The Post, said that he does not believe the system has become too big to manage but that getting precise data is sometimes difficult. Singling out the growth of intelligence units in the Defense Department, he said he intends to review those programs for waste. "Nine years after 9/11, it makes a lot of sense to sort of take a look at this and say, 'Okay, we've built tremendous capability, but do we have more than we need?' " he said.

CIA Director Leon Panetta, who was also interviewed by The Post last week, said he's begun mapping out a five-year plan for his agency because the levels of spending since 9/11 are not sustainable. "Particularly with these deficits, we're going to hit the wall. I want to be prepared for that," he said. "Frankly, I think everyone in intelligence ought to be doing that."

In an interview before he resigned as the director of national intelligence in May, retired Adm. Dennis C. Blair said he did not believe there was overlap and redundancy in the intelligence world. "Much of what appears to be redundancy is, in fact, providing tailored intelligence for many different customers," he said.

Blair also expressed confidence that subordinates told him what he needed to know. "I have visibility on all the important intelligence programs across the community, and there are processes in place to ensure the different intelligence capabilities are working together where they need to," he said.

Weeks later, as he sat in the corner of a ballroom at the Willard Hotel waiting to give a speech, he mused about The Post's findings. "After 9/11, when we decided to attack violent extremism, we did as we so often do in this country," he said. "The attitude was, if it's worth doing, it's probably worth overdoing."

Outside a gated subdivision of mansions in McLean, a line of cars idles every weekday morning as a new day in Top Secret America gets underway. The drivers wait patiently to turn left, then crawl up a hill and around a bend to a destination that is not on any public map and not announced by any street sign.

Liberty Crossing tries hard to hide from view. But in the winter, leafless trees can't conceal a mountain of cement and windows the size of five Wal-Mart stores stacked on top of one another rising behind a grassy berm. One step too close without the right badge, and men in black jump out of nowhere, guns at the ready.

Past the armed guards and the hydraulic steel barriers, at least 1,700 federal employees and 1,200 private contractors work at Liberty Crossing, the nickname for the two headquarters of the Office of the Director of National Intelligence and its National Counterterrorism Center. The two share a police force, a canine unit and thousands of parking spaces.

Liberty Crossing is at the center of the collection of U.S. government agencies and corporate contractors that mushroomed after the 2001 attacks. But it is not nearly the biggest, the most costly or even the most secretive part of the 9/11 enterprise.

In an Arlington County office building, the lobby directory doesn't include the Air Force's mysteriously named XOIWS unit, but there's a big "Welcome!" sign in the hallway greeting visitors who know to step off the elevator on the third floor. In Elkridge, Md., a clandestine program hides in a tall concrete structure fitted with false windows to look like a normal office building. In Arnold, Mo., the location is across the street from a Target and a Home Depot. In St. Petersburg, Fla., it's in a modest brick bungalow in a run-down business park.

Each day at the National Counterterrorism Center in McLean, workers review at least 5,000 pieces of terrorist-related data from intelligence agencies and keep an eye on world events.

Every day across the United States, 854,000 civil servants, military personnel and private contractors with top-secret security clearances are scanned into offices protected by electromagnetic locks, retinal cameras and fortified walls that eavesdropping equipment cannot penetrate.



This is not exactly President Dwight D. Eisenhower's "military-industrial complex," which emerged with the Cold War and centered on building nuclear weapons to deter the Soviet Union. This is a national security enterprise with a more amorphous mission: defeating transnational violent extremists.



Much of the information about this mission is classified. That is the reason it is so difficult to gauge the success and identify the problems of Top Secret America, including whether money is being spent wisely. The U.S. intelligence budget is vast, publicly announced last year as $75 billion, 21/2 times the size it was on Sept. 10, 2001. But the figure doesn't include many military activities or domestic counterterrorism programs.



At least 20 percent of the government organizations that exist to fend off terrorist threats were established or refashioned in the wake of 9/11. Many that existed before the attacks grew to historic proportions as the Bush administration and Congress gave agencies more money than they were capable of responsibly spending.



The Pentagon's Defense Intelligence Agency, for example, has gone from 7,500 employees in 2002 to 16,500 today. The budget of the National Security Agency, which conducts electronic eavesdropping, doubled. Thirty-five FBI Joint Terrorism Task Forces became 106. It was phenomenal growth that began almost as soon as the Sept. 11 attacks ended.



Nine days after the attacks, Congress committed $40 billion beyond what was in the federal budget to fortify domestic defenses and to launch a global offensive against al-Qaeda. It followed that up with an additional $36.5 billion in 2002 and $44 billion in 2003. That was only a beginning.



With the quick infusion of money, military and intelligence agencies multiplied. Twenty-four organizations were created by the end of 2001, including the Office of Homeland Security and the Foreign Terrorist Asset Tracking Task Force. In 2002, 37 more were created to track weapons of mass destruction, collect threat tips and coordinate the new focus on counterterrorism. That was followed the next year by 36 new organizations; and 26 after that; and 31 more; and 32 more; and 20 or more each in 2007, 2008 and 2009.

In all, at least 263 organizations have been created or reorganized as a response to 9/11. Each has required more people, and those people have required more administrative and logistic support: phone operators, secretaries, librarians, architects, carpenters, construction workers, air-conditioning mechanics and, because of where they work, even janitors with top-secret clearances.

With so many more employees, units and organizations, the lines of responsibility began to blur. To remedy this, at the recommendation of the bipartisan 9/11 Commission, the George W. Bush administration and Congress decided to create an agency in 2004 with overarching responsibilities called the Office of the Director of National Intelligence (ODNI) to bring the colossal effort under control.

While that was the idea, Washington has its own ways.

The first problem was that the law passed by Congress did not give the director clear legal or budgetary authority over intelligence matters, which meant he wouldn't have power over the individual agencies he was supposed to control.

The second problem: Even before the first director, Ambassador John D. Negroponte, was on the job, the turf battles began. The Defense Department shifted billions of dollars out of one budget and into another so that the ODNI could not touch it, according to two senior officials who watched the process. The CIA reclassified some of its most sensitive information at a higher level so the National Counterterrorism Center staff, part of the ODNI, would not be allowed to see it, said former intelligence officers involved.

And then came a problem that continues to this day, which has to do with the ODNI's rapid expansion.


When it opened in the spring of 2005, Negroponte's office was all of 11 people stuffed into a secure vault with closet-size rooms a block from the White House. A year later, the budding agency moved to two floors of another building. In April 2008, it moved into its huge permanent home, Liberty Crossing.



Today, many officials who work in the intelligence agencies say they remain unclear about what the ODNI is in charge of. To be sure, the ODNI has made some progress, especially in intelligence-sharing, information technology and budget reform. The DNI and his managers hold interagency meetings every day to promote collaboration. The last director, Blair, doggedly pursued such nitty-gritty issues as procurement reform, compatible computer networks, tradecraft standards and collegiality.

But improvements have been overtaken by volume at the ODNI, as the increased flow of intelligence data overwhelms the system's ability to analyze and use it. Every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases. The same problem bedevils every other intelligence agency, none of which have enough analysts and translators for all this work.



The practical effect of this unwieldiness is visible, on a much smaller scale, in the office of Michael Leiter, the director of the National Counterterrorism Center. Leiter spends much of his day flipping among four computer monitors lined up on his desk. Six hard drives sit at his feet. The data flow is enormous, with dozens of databases feeding separate computer networks that cannot interact with one another.



There is a long explanation for why these databases are still not connected, and it amounts to this: It's too hard, and some agency heads don't really want to give up the systems they have. But there's some progress: "All my e-mail on one computer now," Leiter says. "That's a big deal."



To get another view of how sprawling Top Secret America has become, just head west on the toll road toward Dulles International Airport.



As a Michaels craft store and a Books-A-Million give way to the military intelligence giants Northrop Grumman and Lockheed Martin, find the off-ramp and turn left. Those two shimmering-blue five-story ice cubes belong to the National Geospatial-Intelligence Agency, which analyzes images and mapping data of the Earth's geography. A small sign obscured by a boxwood hedge says so.

Across the street, in the chocolate-brown blocks, is Carahsoft, an intelligence agency contractor specializing in mapping, speech analysis and data harvesting. Nearby is the government's Underground Facility Analysis Center. It identifies overseas underground command centers associated with weapons of mass destruction and terrorist groups, and advises the military on how to destroy them.

Clusters of top-secret work exist throughout the country, but the Washington region is the capital of Top Secret America.



About half of the post-9/11 enterprise is anchored in an arc stretching from Leesburg south to Quantico, back north through Washington and curving northeast to Linthicum, just north of the Baltimore-Washington International Marshall Airport. Many buildings sit within off-limits government compounds or military bases.



Others occupy business parks or are intermingled with neighborhoods, schools and shopping centers and go unnoticed by most people who live or play nearby.


Many of the newest buildings are not just utilitarian offices but also edifices "on the order of the pyramids," in the words of one senior military intelligence officer.

Not far from the Dulles Toll Road, the CIA has expanded into two buildings that will increase the agency's office space by one-third. To the south, Springfield is becoming home to the new $1.8 billion National Geospatial-Intelligence Agency headquarters, which will be the fourth-largest federal building in the area and home to 8,500 employees. Economic stimulus money is paying hundreds of millions of dollars for this kind of federal construction across the region.

It's not only the number of buildings that suggests the size and cost of this expansion, it's also what is inside: banks of television monitors. "Escort-required" badges. X-ray machines and lockers to store cellphones and pagers. Keypad door locks that open special rooms encased in metal or permanent dry wall, impenetrable to eavesdropping tools and protected by alarms and a security force capable of responding within 15 minutes. Every one of these buildings has at least one of these rooms, known as a SCIF, for sensitive compartmented information facility. Some are as small as a closet; others are four times the size of a football field.

SCIF size has become a measure of status in Top Secret America, or at least in the Washington region of it. "In D.C., everyone talks SCIF, SCIF, SCIF," said Bruce Paquin, who moved to Florida from the Washington region several years ago to start a SCIF construction business. "They've got the penis envy thing going. You can't be a big boy unless you're a three-letter agency and you have a big SCIF."

SCIFs are not the only must-have items people pay attention to. Command centers, internal television networks, video walls, armored SUVs and personal security guards have also become the bling of national security.



"You can't find a four-star general without a security detail," said one three-star general now posted in Washington after years abroad. "Fear has caused everyone to have stuff. Then comes, 'If he has one, then I have to have one.' It's become a status symbol."



Among the most important people inside the SCIFs are the low-paid employees carrying their lunches to work to save money. They are the analysts, the 20- and 30-year-olds making $41,000 to $65,000 a year, whose job is at the core of everything Top Secret America tries to do.



At its best, analysis melds cultural understanding with snippets of conversations, coded dialogue, anonymous tips, even scraps of trash, turning them into clues that lead to individuals and groups trying to harm the United States.

Their work is greatly enhanced by computers that sort through and categorize data. But in the end, analysis requires human judgment, and half the analysts are relatively inexperienced, having been hired in the past several years, said a senior ODNI official. Contract analysts are often straight out of college and trained at corporate headquarters.

When hired, a typical analyst knows very little about the priority countries - Iraq, Iran, Afghanistan and Pakistan - and is not fluent in their languages. Still, the number of intelligence reports they produce on these key countries is overwhelming, say current and former intelligence officials who try to cull them every day. The ODNI doesn't know exactly how many reports are issued each year, but in the process of trying to find out, the chief of analysis discovered 60 classified analytic Web sites still in operation that were supposed to have been closed down for lack of usefulness. "Like a zombie, it keeps on living" is how one official describes the sites.

The problem with many intelligence reports, say officers who read them, is that they simply re-slice the same facts already in circulation. "It's the soccer ball syndrome. Something happens, and they want to rush to cover it," said Richard H. Immerman, who was the ODNI's assistant deputy director of national intelligence for analytic integrity and standards until early 2009. "I saw tremendous overlap."

Even the analysts at the National Counterterrorism Center (NCTC), which is supposed to be where the most sensitive, most difficult-to-obtain nuggets of information are fused together, get low marks from intelligence officials for not producing reports that are original, or at least better than the reports already written by the CIA, FBI, National Security Agency or Defense Intelligence Agency.



When Maj. Gen. John M. Custer was the director of intelligence at U.S. Central Command, he grew angry at how little helpful information came out of the NCTC. In 2007, he visited its director at the time, retired Vice Adm. John Scott Redd, to tell him so. "I told him that after 41/2 years, this organization had never produced one shred of information that helped me prosecute three wars!" he said loudly, leaning over the table during an interview.

Two years later, Custer, now head of the Army's intelligence school at Fort Huachuca, Ariz., still gets red-faced recalling that day, which reminds him of his frustration with Washington's bureaucracy. "Who has the mission of reducing redundancy and ensuring everybody doesn't gravitate to the lowest-hanging fruit?" he said. "Who orchestrates what is produced so that everybody doesn't produce the same thing?"

He's hardly the only one irritated. In a secure office in Washington, a senior intelligence officer was dealing with his own frustration. Seated at his computer, he began scrolling through some of the classified information he is expected to read every day: CIA World Intelligence Review, WIRe-CIA, Spot Intelligence Report, Daily Intelligence Summary, Weekly Intelligence Forecast, Weekly Warning Forecast, IC Terrorist Threat Assessments, NCTC Terrorism Dispatch, NCTC Spotlight . . .

It's too much, he complained. The inbox on his desk was full, too. He threw up his arms, picked up a thick, glossy intelligence report and waved it around, yelling.

"Jesus! Why does it take so long to produce?"

"Why does it have to be so bulky?"

"Why isn't it online?"

The overload of hourly, daily, weekly, monthly and annual reports is actually counterproductive, say people who receive them. Some policymakers and senior officials don't dare delve into the backup clogging their computers. They rely instead on personal briefers, and those briefers usually rely on their own agency's analysis, re-creating the very problem identified as a main cause of the failure to thwart the attacks: a lack of information-sharing.

A new Defense Department office complex goes up in Alexandria. (Photo by: Michael S. Williamson / The Washington Post)

The ODNI's analysis office knows this is a problem. Yet its solution was another publication, this one a daily online newspaper, Intelligence Today. Every day, a staff of 22 culls more than two dozen agencies' reports and 63 Web sites, selects the best information and packages it by originality, topic and region.

Analysis is not the only area where serious overlap appears to be gumming up the national security machinery and blurring the lines of responsibility.

Within the Defense Department alone, 18 commands and agencies conduct information operations, which aspire to manage foreign audiences’ perceptions of U.S. policy and military activities overseas.

And all the major intelligence agencies and at least two major military commands claim a major role in cyber-warfare, the newest and least-defined frontier.

"Frankly, it hasn't been brought together in a unified approach," CIA Director Panetta said of the many agencies now involved in cyber-warfare.

"Cyber is tremendously difficult" to coordinate, said Benjamin A. Powell, who served as general counsel for three directors of national intelligence until he left the government last year. "Sometimes there was an unfortunate attitude of bring your knives, your guns, your fists and be fully prepared to defend your turf." Why? "Because it's funded, it's hot and it's sexy."

Anti-Deception Technologies

From avatars and lasers to thermal cameras and fidget meters, this multimedia gallery takes a look at some of the latest technologies being developed by the government and private companies to thwart terrorists. Launch Gallery »

Last fall, U.S. Army Maj. Nidal Malik Hasan allegedly opened fire at Fort Hood, Tex., killing 13 people and wounding 30. In the days after the shootings, information emerged about Hasan's increasingly strange behavior at Walter Reed Army Medical Center, where he had trained as a psychiatrist and warned commanders that they should allow Muslims to leave the Army or risk "adverse events." He had also exchanged e-mails with a well-known radical cleric in Yemen being monitored by U.S. intelligence.

But none of this reached the one organization charged with handling counterintelligence investigations within the Army. Just 25 miles up the road from Walter Reed, the Army's 902nd Military Intelligence Group had been doing little to search the ranks for potential threats. Instead, the 902's commander had decided to turn the unit's attention to assessing general terrorist affiliations in the United States, even though the Department of Homeland Security and the FBI's 106 Joint Terrorism Task Forces were already doing this work in great depth.



The 902nd, working on a program the commander named RITA, for Radical Islamic Threat to the Army, had quietly been gathering information on Hezbollah, Iranian Republican Guard and al-Qaeda student organizations in the United States. The assessment "didn't tell us anything we didn't know already," said the Army's senior counterintelligence officer at the Pentagon.

Secrecy and lack of coordination have allowed organizations, such as the 902nd in this case, to work on issues others were already tackling rather than take on the much more challenging job of trying to identify potential jihadist sympathizers within the Army itself.

Beyond redundancy, secrecy within the intelligence world hampers effectiveness in other ways, say defense and intelligence officers. For the Defense Department, the root of this problem goes back to an ultra-secret group of programs for which access is extremely limited and monitored by specially trained security officers.

These are called Special Access Programs - or SAPs - and the Pentagon's list of code names for them runs 300 pages. The intelligence community has hundreds more of its own, and those hundreds have thousands of sub-programs with their own limits on the number of people authorized to know anything about them. All this means that very few people have a complete sense of what's going on.

"There's only one entity in the entire universe that has visibility on all SAPs - that's God," said James R. Clapper, undersecretary of defense for intelligence and the Obama administration's nominee to be the next director of national intelligence.

Such secrecy can undermine the normal chain of command when senior officials use it to cut out rivals or when subordinates are ordered to keep secrets from their commanders.

One military officer involved in one such program said he was ordered to sign a document prohibiting him from disclosing it to his four-star commander, with whom he worked closely every day, because the commander was not authorized to know about it. Another senior defense official recalls the day he tried to find out about a program in his budget, only to be rebuffed by a peer. "What do you mean you can't tell me? I pay for the program," he recalled saying in a heated exchange.

Another senior intelligence official with wide access to many programs said that secrecy is sometimes used to protect ineffective projects. "I think the secretary of defense ought to direct a look at every single thing to see if it still has value," he said. "The DNI ought to do something similar."

The ODNI hasn't done that yet. The best it can do at the moment is maintain a database of the names of the most sensitive programs in the intelligence community. But the database does not include many important and relevant Pentagon projects.

Because so much is classified, illustrations of what goes on every day in Top Secret America can be hard to ferret out. But every so often, examples emerge. A recent one shows the post-9/11 system at its best and its worst.

Last fall, after eight years of growth and hirings, the enterprise was at full throttle when word emerged that something was seriously amiss inside Yemen. In response, President Obama signed an order sending dozens of secret commandos to that country to target and kill the leaders of an al-Qaeda affiliate.

In Yemen, the commandos set up a joint operations center packed with hard drives, forensic kits and communications gear. They exchanged thousands of intercepts, agent reports, photographic evidence and real-time video surveillance with dozens of top-secret organizations in the United States.

That was the system as it was intended. But when the information reached the National Counterterrorism Center in Washington for analysis, it arrived buried within the 5,000 pieces of general terrorist-related data that are reviewed each day. Analysts had to switch from database to database, from hard drive to hard drive, from screen to screen, just to locate what might be interesting to study further.

As military operations in Yemen intensified and the chatter about a possible terrorist strike increased, the intelligence agencies ramped up their effort. The flood of information into the NCTC became a torrent.

Somewhere in that deluge was even more vital data. Partial names of someone in Yemen. A reference to a Nigerian radical who had gone to Yemen. A report of a father in Nigeria worried about a son who had become interested in radical teachings and had disappeared inside Yemen.

These were all clues to what would happen when a Nigerian named Umar Farouk Abdulmutallab left Yemen and eventually boarded a plane in Amsterdam bound for Detroit. But nobody put them together because, as officials would testify later, the system had gotten so big that the lines of responsibility had become hopelessly blurred.

"There are so many people involved here," NCTC Director Leiter told Congress.

"Everyone had the dots to connect," DNI Blair explained to the lawmakers. "But I hadn't made it clear exactly who had primary responsibility."

And so Abdulmutallab was able to step aboard Northwest Airlines Flight 253. As it descended toward Detroit, he allegedly tried to ignite explosives hidden in his underwear. It wasn't the very expensive, very large 9/11 enterprise that prevented disaster. It was a passenger who saw what he was doing and tackled him. "We didn't follow up and prioritize the stream of intelligence," White House counterterrorism adviser John O. Brennan explained afterward. "Because no one intelligence entity, or team or task force was assigned responsibility for doing that follow-up investigation."

Blair acknowledged the problem. His solution: Create yet another team to run down every important lead. But he also told Congress he needed more money and more analysts to prevent another mistake.

More is often the solution proposed by the leaders of the 9/11 enterprise. After the Christmas Day bombing attempt, Leiter also pleaded for more - more analysts to join the 300 or so he already had.

The Department of Homeland Security asked for more air marshals, more body scanners and more analysts, too, even though it can't find nearly enough qualified people to fill its intelligence unit now. Obama has said he will not freeze spending on national security, making it likely that those requests will be funded.

More building, more expansion of offices continues across the country. A $1.7 billion NSA data-processing center will be under construction soon near Salt Lake City. In Tampa, the U.S. Central Command’s new 270,000-square-foot intelligence office will be matched next year by an equally large headquarters building, and then, the year after that, by a 51,000-square-foot office just for its special operations section.

Just north of Charlottesville, the new Joint-Use Intelligence Analysis Facility will consolidate 1,000 defense intelligence analysts on a secure campus.

Meanwhile, five miles southeast of the White House, the DHS has broken ground for its new headquarters, to be shared with the Coast Guard. DHS, in existence for only seven years, already has its own Special Access Programs, its own research arm, its own command center, its own fleet of armored cars and its own 230,000-person workforce, the third-largest after the departments of Defense and Veterans Affairs.

Soon, on the grounds of the former St. Elizabeths mental hospital in Anacostia, a $3.4 billion showcase of security will rise from the crumbling brick wards. The new headquarters will be the largest government complex built since the Pentagon, a major landmark in the alternative geography of Top Secret America and four times as big as Liberty Crossing.
























secret

Friday, April 30, 2010

Obama and Bush: Two Peas in a Pod?

Surprise, surprise.  Isn't it amazing.  A year on the campaign trail, the attacks and viscerally hateful comments made by Obama and his minions in attacking Bush as violating civil liberties and trampling on your rights ... as if he would do better.  Once again, he has failed.  Of course, defenders will say - but Bush did it first.  True, but we have finished with Bush haven't we and Bush never said he would ignore violations to National Security, never said it was a matter of a reporter's civil liberties ... he just marched forward doing what he believed best.  Obama came along and said nothing Bush did was for the best, it was all wrong, all bad, all messed up, and he was going to fix it.  Obama has doubled up on scouring our civil liberties, and maintained the same programs, enhanced others - all the while extolling the virtues of his enlightened policies, and how he is not Bush.  Yet, he seems to be, only worse.  I preferred the guy who actually believed what he was doing and did so with conviction, to benefit the country's long-term welfare, not for short-term political gain. 

Not by a long-shot.  Bush cared about America and our future as a world leader.  Obama cares about our future as an associate power.  BIG difference.



After reporter's subpoena, critics call Obama's leak-plugging efforts Bush-like



By Howard Kurtz
Washington Post Staff Writer
Friday, April 30, 2010; C01



The Justice Department's decision to subpoena a New York Times reporter this week has convinced some press advocates that President Obama's team is pursuing leaks with the same fervor as the Bush administration.

James Risen, who shared a Pulitzer Prize for disclosing President George W. Bush's domestic surveillance program, has refused to testify about the confidential sources he used for his 2006 book "State of War: The Secret History of the C.I.A. and the Bush Administration."

"The message they are sending to everyone is, 'You leak to the media, we will get you,' " said Lucy Dalglish, executive director of the Reporters Committee for Freedom of the Press. In the wake of the Bush administration's aggressive stance toward the press, she said, "as far as I can tell there is absolutely no difference, and the Obama administration seems to be paying more attention to it. This is going to get nasty."

Kurt Wimmer, a Washington lawyer who helped win White House approval for a proposed federal shield law, called the move against Risen "disappointing" after "we had positive discussions with the Obama administration" on the need to give journalists a legal foundation for protecting their sources in most cases.

In the Risen case, Attorney General Eric Holder had to approve the subpoena under Justice Department procedures. The subpoena, disclosed Thursday by the Times, comes two weeks after the administration obtained an indictment of a former top National Security Agency official, Thomas Drake, for allegedly providing classified information to a Baltimore Sun reporter.

Law enforcement officials, who declined to be identified discussing pending investigations, said the close timing of the two cases was coincidental and that the administration is not mounting an intensified effort to crack down on leakers. "As a general matter, we have consistently said that leaks of classified information are something we take extremely seriously,'' said Matthew Miller, chief Justice spokesman, who declined further comment.

Joel Kurtzberg, Risen's lawyer, said the subpoena focuses on his reporting on covert CIA attempts to combat alleged nuclear weapons research by Iran. In one book chapter, Risen wrote that the CIA sent a Russian defector to Vienna in 2000 to provide an Iranian official with plans for a nuclear-bomb-triggering device -- one with a deliberate technical flaw -- along with a solicitation for payment. Risen depicted the operation as giving Iran valuable information.

"We will be fighting to quash the subpoena," Kurtzman said. "Jim is the highest caliber of reporter and adhered to the highest standards of his profession in writing Chapter 9 of his book. And he intends to honor the promise of confidentiality he made to the source or sources."

The Times said in a statement that Risen and his publisher, Simon and Schuster, are handling the matter because the subpoena does not involve material published by the paper. "Our view, however, is that confidential sources are vital in getting information to the public, and a subpoena issued more than four years after the book was published hardly seems to be important enough to outweigh the protection an author needs to have," the newspaper said.

Dalglish described the subpoena as "troublesome" and said defense attorneys have told her that several similar cases against alleged leakers are in the pipeline. The subpoena was first brought under Bush's last attorney general, Michael Mukasey, but the grand jury in the case expired without resolving the matter, prompting Holder's department to empanel a new grand jury. The Bush administration also launched a leak probe involving the Times story but no charges were brought.

If Risen is unable to quash the subpoena, he could face a contempt citation similar to the one that landed then-Times reporter Judith Miller in jail for 85 days during the prosecution of Lewis "Scooter" Libby, a top aide to Vice President Dick Cheney.

The White House last fall reached a compromise with key senators on drafting a shield law, a version of which has passed the House, but the measure would have limited application in national security cases. Even if the bill were law, Dalglish said, the Risen case "is a tough one for a journalist to get quashed."





 
 
 
 
 
 
 
 
 
obama

Saturday, March 6, 2010

Drip drip drip ... goes our rights, drip, drip, dripping away.

Obama and his promises.  I recall he promised to be different than Bush.  To end torture, close Guantanamo, get out of Iraq, end the exodus of workers to foreign lands, rebuild US relations with the world, restore confidence in government, drain the swamp, end the revolving door in the White House for lobbyists, end the constant campaigning that Bush was claimed to have done all during his administration, post bills online several days before he signs them to allow the American people an opportunity for a say, ... he is 0 for whatever.  He attacked Bush, and Democrats went on and on about Bush and he Patriot Act, our civil liberties taken away ... and Obama just extended the Patriot Act, and not only that, but ...

you got to wonder.

1) He has not only not done anything he promised he would do within the first hours, let alone first months.
2) He has made relations worse with most of our allies and made us a laughing stock among the rest
3) He has pushed civil liberties off the page and now every email communication and every internet communication.
4) He has no experience and it shows.
5) Our national debt just went up nearly 1/2 of what Bush's rose in 8 years, and he did it in less than 18 months.

Amazing.





March 2, 2010, 11:00 PM ET.

Details of “Einstein” Cyber Shield Disclosed by White House



By Siobhan Gorman

The Obama administration lifted the veil Tuesday on a highly-secretive set of policies to defend the U.S. from cyber attacks.

It was an open secret that the National Security Agency was bolstering a Homeland Security program to detect and respond to cyber attacks on government systems, but a summary of that program declassified Tuesday provides more details of NSA’s role in a Homeland program known as Einstein.

The current version of the program is widely seen as providing meager protection against attack, but a new version being built will be more robust–largely because it’s rooted in NSA technology. The program is designed to look for indicators of cyber attacks by digging into all Internet communications, including the contents of emails, according to the declassified summary.

Homeland Security will then strip out identifying information and pass along data on new threats to NSA. It will also use threat information from NSA to better identify emerging cyber attacks.

NSA’s role is a careful balance because of the political battles that ensued over the agency’s role in domestic surveillance in the George W. Bush administration. Declassifying details of the NSA’s role, in a program initially developed during the Bush administration and continued in the Obama administration, will likely ignite new debates over privacy.

The White House’s new cyber-security chief, Howard Schmidt, announced the move to declassify the program in a speech at the RSA conference in San Francisco–his first major public address since assuming the post in January. He said addressing potential privacy concerns was one of the ten initial steps he planned to take. “We’re really paying attention, and we get it,” he said.

 
 
 
 
 
civil liberties

Sunday, July 12, 2009

Boogeyman: Bush is still scary to the Left

Report: Bush surveillance program was massive


Pamela Hess, Associated Press Writer

July 10, 2009





WASHINGTON – The Bush administration built an unprecedented surveillance operation to pull in mountains of information far beyond the warrantless wiretapping previously acknowledged, a team of federal inspectors general reported Friday, questioning the legal basis for the effort but shielding almost all details on grounds they're still too secret to reveal.


The report, compiled by five inspectors general, refers to "unprecedented collection activities" by U.S. intelligence agencies under an executive order signed by President George W. Bush after the Sept. 11, 2001, terror attacks.


Just what those activities involved remains classified, but the IGs pointedly say that any continued use of the secret programs must be "carefully monitored."


The report says too few relevant officials knew of the size and depth of the program, let alone signed off on it. They particularly criticize John Yoo, a deputy assistant attorney general who wrote legal memos undergirding the policy. His boss, Attorney General John Ashcroft, was not aware until March 2004 of the exact nature of the intelligence operations beyond wiretapping that he had been approving for the previous two and a half years, the report says.


Most of the intelligence leads generated under what was known as the "President's Surveillance Program" did not have any connection to terrorism, the report said. But FBI agents told the authors that the "mere possibility of the leads producing useful information made investigating the leads worthwhile."


The inspectors general interviewed more than 200 people inside and outside the government, but five former Bush administration officials refused to be questioned. They were Ashcroft, Yoo, former CIA Director George Tenet, former White House Chief of Staff Andrew Card and David Addington, an aide to former Vice President Dick Cheney.


According to the report, Addington could personally decide who in the administration was "read into" — allowed access to — the classified program.


The only piece of the intelligence-gathering operation acknowledged by the Bush White House was the wiretapping-without-warrants effort. The administration admitted in 2005 that it had allowed the National Security Agency to intercept international communications that passed through U.S. cables without seeking court orders.


Dishonest and confusing - Under Bill Clinton, Janet Reno went before Congress on several occasions, one of which had to do with CALEA, to request certain authorities. In the case of wiretapping, the authority granted was no warrant would be required when exigent circumstances existed. That is, immediate need - but if the wiretap was to remain for more than 24 hours, a warrant would be required. To get around this, the Clinton FBI would use roving wiretaps - The FBI wanted B but they would tap A for 24 hours because A talks to B everyday, and then tap A, then C, then A, then B then A and as long as no tap was for more than 23 hours, 59 minutes, 59 seconds, no warrant was required. This questionable practice carried over into the Bush terms, supported by the courts.





Although the report documents Bush administration policies, its fallout could be a problem for the Obama administration if it inherited any or all of the still-classified operations.


Bush started the warrantless wiretapping program under the authority of a secret court in 2006, and Congress authorized most of the intercepts in a 2008 electronic surveillance law. The fate of the remaining and still classified aspects of the wider surveillance program is not clear from the report.


The report's revelations came the same day that House Democrats said that CIA Director Leon Panetta had ordered one eight-year-old classified program shut down after learning lawmakers had never been apprised of its existence.


It is highly unlikely the Congress was not told, albeit not directly. CIA if nothing, follow the law to the letter, but do nothing more. I am sure, somewhere in the 100 pages of briefings, was sentence about the programs. These briefings are then collected after the briefing. Of course the briefing papers are provided in advance, but NO ONE ever reads them - this is a Congress that votes on bills over 1000 pages and have no idea of what it says. CIA provided the details as required, they simply didn't elaborate. Were they purposely trying to evade ... yes, is it their job to be forthcoming - yes and no. Their job is to protect the people of the US - not the feelings of members of Congress.



The IG report said that President Bush signed off on both the warrantless wiretapping and other top-secret operations shortly after Sept. 11 in a single presidential authorization. All the programs were periodically reauthorized, but except for the acknowledged wiretapping, they "remain highly classified."


And so did Bill Clinton - the warrantless wiretaps and so did the Courts.



The report says it's unclear how much valuable intelligence the program has yielded.


The report, mandated by Congress last year, was delivered to lawmakers Friday.


Rep. Jane Harman, D-Ca., told The Associated Press she was shocked to learn of the existence of other classified programs beyond the warrantless wiretapping.


Shocked I tell you, shocked. Jane is shocked. Shocked I tell you! And I am sure she was paying attention the whole time - or rather, was that her aide, now the assistant to DCI Panetta. Maybe he was paying attention!!



Former Bush Attorney General Alberto Gonzales made a terse reference to other classified programs during an August 2007 letter to Congress. But Harman said that when she had asked Gonzales two years earlier if the government was conducting any other undisclosed intelligence activities, he denied it.


"He looked me in the eye and said 'no,'" she said Friday.



No Jane, he didn't. You are lying as liberals do so well. He would not have lied to you if he knew. He a) didn't know and consequently, said statement was not a lie nor a shocking statement to revisit, or b) he knew and he didn't say NO. See the previous statement on how they finagle telling secrets and not revealing anything.


Robert Bork Jr., Gonzales' spokesman, said, "It has clearly been determined that he did not intend to mislead anyone."


In the wake of the new report, Senate Judiciary Committee Chairman Sen. Patrick Leahy, D-Vt, renewed his call Friday for a formal nonpartisan inquiry into the government's information-gathering programs.



Sure Patrick - why not have open hearings - broadcast to the world how we know what we do? Want to reveal everything? Oh, but you would have secret meetings - very convenient when you want to attack a president later - you can say anything and no one can refute you. For example many of the attacks on Bush by your party - when its leadership was aware of whatever the issue.


Former CIA Director Michael Hayden — the primary architect of the program_ told the report's authors that the surveillance was "extremely valuable" in preventing further al-Qaida attacks.


Hayden said the operations amounted to an "early warning system" allowing top officials to make critical judgments and carefully allocate national security resources to counter threats.



Have you stopped beating your wife? Have you stopped using drugs? Do you always cheat on your taxes? Democrats use CIA as their own personal punching bag - it cannot hit back (usually) and they can hit it, kick it, scratch it, hiss at it, abuse it - and it does nothing. THEY know that the intelligence gathered has saved us many times, BUT that isn't why they continue to drag the issue out for public examination. They know they cannot present the entire story, but they can tell lies and no one will rebuke them, no one will rebut their ignorant political ramblings ... so they drag it out to attack Bush or anyone whenever they have nothing better to do.



Information gathered by the secret program played a limited role in the FBI's overall counterterrorism efforts, according to the report. Very few CIA analysts even knew about the program and therefore were unable to fully exploit it in their counterrorism work, the report said.


The report questioned the legal advice used by Bush to set up the program, pinpointing omissions and questionable legal memos written by Yoo, in the Justice Department's Office of Legal Counsel. The Justice Department withdrew the memos years ago.

The report says Yoo's analysis approving the program ignored a law designed to restrict the government's authority to conduct electronic surveillance during wartime, and did so without fully notifying Congress. And it said flaws in Yoo's memos later presented "a serious impediment" to recertifying the program.

Yoo insisted that the president's wiretapping program had only to comply with Fourth Amendment protections against search and seizure — but the report said Yoo ignored the Federal Intelligence Surveillance Act, which had previously overseen federal national security surveillance.

"The notion that basically one person at the Justice Department, John Yoo, and Hayden and the vice president's office were running a program around the laws that Congress passed, including a reinterpretation of the Fourth Amendment, is mind boggling," Harman said.

House Democrats are pressing for legislation that would expand congressional access to secret intelligence briefings, but the White House has threatened to veto it.


Obama threatened to veto it!! Hmmm. Let's think about why. For example, suppose former Rep Cynthia McKinney was still in Congress (God forbid) and say she was off doing her usual stupid things - like sailing in a Greek ship trying to break an Israeli blockade on Gaza and assume she got through and was captured by her friends Hamas who upon seeing her smiling face, kicked her teeth in and shot her in the arm. Hamas then told her they wanted her to reveal every secret she knew - which she would immediately spill - to save her worthless life. Ok, so not all members of Congress are as rock hard stupid as she is - perhaps Kuchinich is a better example - assume he was told anything more than he already knew - he already goes around telling things he should not, saying things he should not - despite warnings to shut up. And Harman wants EVERYONE TOLD! Please. I think 12 people is too many. 1 from each chamber plus the top member of opposite party. 3-4 is a better number. THEN when secrets leak (and THEY ALWAYS LEAK) we can plug the holes up - all 3-4 are spoken to, scooped up ... whatever needs to be done. Congress leaks more than a class of toddlers.


















intelligence

Tuesday, June 16, 2009

NSA - Spying on You

Where is Obama, where are the Democrats? Why are there not calls to end this tyranny, hearings by Waxman. Why isn't Pelosi screaming on television about the civil rights issues.

WHY?





The New York Times

E-Mail Surveillance Renews Concerns in Congress


By JAMES RISEN and ERIC LICHTBLAU
Published: June 16, 2009


WASHINGTON — The National Security Agency is facing renewed scrutiny over the extent of its domestic surveillance program, with critics in Congress saying its recent intercepts of the private telephone calls and e-mail messages of Americans are broader than previously acknowledged, current and former officials said.

The agency’s monitoring of domestic e-mail messages, in particular, has posed longstanding legal and logistical difficulties, the officials said.

Since April, when it was disclosed that the intercepts of some private communications of Americans went beyond legal limits in late 2008 and early 2009, several Congressional committees have been investigating. Those inquiries have led to concerns in Congress about the agency’s ability to collect and read domestic e-mail messages of Americans on a widespread basis, officials said. Supporting that conclusion is the account of a former N.S.A. analyst who, in a series of interviews, described being trained in 2005 for a program in which the agency routinely examined large volumes of Americans’ e-mail messages without court warrants. Two intelligence officials confirmed that the program was still in operation.

Both the former analyst’s account and the rising concern among some members of Congress about the N.S.A.’s recent operation are raising fresh questions about the spy agency.

Representative Rush Holt, Democrat of New Jersey and chairman of the House Select Intelligence Oversight Panel, has been investigating the incidents and said he had become increasingly troubled by the agency’s handling of domestic communications.

In an interview, Mr. Holt disputed assertions by Justice Department and national security officials that the overcollection was inadvertent.

“Some actions are so flagrant that they can’t be accidental,” Mr. Holt said.

Other Congressional officials raised similar concerns but would not agree to be quoted for the record.

Mr. Holt added that few lawmakers could challenge the agency’s statements because so few understood the technical complexities of its surveillance operations. “The people making the policy,” he said, “don’t understand the technicalities.” [What about Nancy Pelosi? Maybe the NSA is lying to her, maybe she needs to march across the street and tell Bush that he ... I mean, tell Obama, I mean, well, we can't raise it because it isn't Bush doing it, and it would embarass Obama and ... well, let's pretend nothing is happening ...]

The inquiries and analyst’s account underscore how e-mail messages, more so than telephone calls, have proved to be a particularly vexing problem for the agency because of technological difficulties in distinguishing between e-mail messages by foreigners and by Americans. A new law enacted by Congress last year gave the N.S.A. greater legal leeway to collect the private communications of Americans so long as it was done only as the incidental byproduct of investigating individuals “reasonably believed” to be overseas.

But after closed-door hearings by three Congressional panels, some lawmakers are asking what the tolerable limits are for such incidental collection and whether the privacy of Americans is being adequately protected.

“For the Hill, the issue is a sense of scale, about how much domestic e-mail collection is acceptable,” a former intelligence official said, speaking on condition of anonymity because N.S.A. operations are classified. “It’s a question of how many mistakes they can allow.”

While the extent of Congressional concerns about the N.S.A. has not been shared publicly, such concerns are among national security issues that the Obama administration has inherited from the Bush administration, including the use of brutal interrogation tactics, the fate of the prison at Guantánamo Bay, Cuba, and whether to block the release of photographs and documents that show abuse of detainees.

In each case, the administration has had to navigate the politics of continuing an aggressive intelligence operation while placating supporters who want an end to what they see as flagrant abuses of the Bush era.

The N.S.A. declined to comment for this article. Wendy Morigi, a spokeswoman for Dennis C. Blair, the national intelligence director, said that because of the complex nature of surveillance and the need to adhere to the rules of the Foreign Intelligence Surveillance Court, the secret panel that oversees surveillance operation, and “other relevant laws and procedures, technical or inadvertent errors can occur.”

“When such errors are identified,” Ms. Morigi said, “they are reported to the appropriate officials, and corrective measures are taken.”

In April, the Obama administration said it had taken comprehensive steps to bring the security agency into compliance with the law after a periodic review turned up problems with “overcollection” of domestic communications. The Justice Department also said it had installed new safeguards.

Under the surveillance program, before the N.S.A. can target and monitor the e-mail messages or telephone calls of Americans suspected of having links to international terrorism, it must get permission from the Foreign Intelligence Surveillance Court. Supporters of the agency say that in using computers to sweep up millions of electronic messages, it is unavoidable that some innocent discussions of Americans will be examined. Intelligence operators are supposed to filter those out, but critics say the agency is not rigorous enough in doing so.

The N.S.A. is believed to have gone beyond legal boundaries designed to protect Americans in about 8 to 10 separate court orders issued by the Foreign Intelligence Surveillance Court, according to three intelligence officials who spoke anonymously because disclosing such information is illegal. Because each court order could single out hundreds or even thousands of phone numbers or e-mail addresses, the number of individual communications that were improperly collected could number in the millions, officials said. (It is not clear what portion of total court orders or communications that would represent.)

“Say you get an order to monitor a block of 1,000 e-mail addresses at a big corporation, and instead of just monitoring those, the N.S.A. also monitors another block of 1,000 e-mail addresses at that corporation,” one senior intelligence official said. “That is the kind of problem they had.”

Overcollection on that scale could lead to a significant number of privacy invasions of American citizens, officials acknowledge, setting off the concerns among lawmakers and on the secret FISA court.

“The court was not happy” when it learned of the overcollection, said an administration official involved in the matter.

Defenders of the agency say it faces daunting obstacles in trying to avoid the improper gathering or reading of Americans’ e-mail as part of counterterrorism efforts aimed at foreigners.
Several former intelligence officials said that e-mail traffic from all over the world often flows through Internet service providers based in the United States. And when the N.S.A. monitors a foreign e-mail address, it has no idea when the person using that address will send messages to someone inside the United States, the officials said.

The difficulty of distinguishing between e-mail messages involving foreigners from those involving Americans was “one of the main things that drove” the Bush administration to push for a more flexible law in 2008, said Kenneth L. Wainstein, the homeland security adviser under President George W. Bush. That measure, which also resolved the long controversy over N.S.A.’s program of wiretapping without warrants by offering immunity to telecommunications companies, tacitly acknowledged that some amount of Americans’ e-mail would inevitably be captured by the N.S.A.

But even before that, the agency appears to have tolerated significant collection and examination of domestic e-mail messages without warrants, according to the former analyst, who spoke only on condition of anonymity.

He said he and other analysts were trained to use a secret database, code-named Pinwale, in 2005 that archived foreign and domestic e-mail messages. He said Pinwale allowed N.S.A. analysts to read large volumes of e-mail messages to and from Americans as long as they fell within certain limits — no more than 30 percent of any database search, he recalled being told — and Americans were not explicitly singled out in the searches.

The former analyst added that his instructors had warned against committing any abuses, telling his class that another analyst had been investigated because he had improperly accessed the personal e-mail of former President Bill Clinton.
[Who wouldn't have wanted to peek at those emails. All his 'friends' emailing him!]

Other intelligence officials confirmed the existence of the Pinwale e-mail database, but declined to provide further details.

The recent concerns about N.S.A.’s domestic e-mail collection follow years of unresolved legal and operational concerns within the government over the issue. Current and former officials now say that the tracing of vast amounts of American e-mail traffic was at the heart of a crisis in 2004 at the hospital bedside of John Ashcroft, then the attorney general, as top Justice Department aides staged a near revolt over what they viewed as possibly illegal aspects of the N.S.A.’s surveillance operations.

James Comey, then the deputy attorney general, and his aides were concerned about the collection of “meta-data” of American e-mail messages, which show broad patterns of e-mail traffic by identifying who is e-mailing whom, current and former officials say. Lawyers at the Justice Department believed that the tracing of e-mail messages appeared to violate federal law.
“The controversy was mostly about that issue,” said a former administration official involved in the dispute.

****************************************************

June 16, 2009. The Atlantic also havs a very good article.
Pinwale And The New NSA Revelations

The New York Times' Pulitzer-Prize-winning duo of Eric Lichtblau and James Risen
have new details about the extent of National Security Agency surveillance of electronic communications in the United States. They reveal that a dispute over e-mail monitoring of Americans was at the heart of a now famous confrontation between then-acting Attorney General James Comey and White House counsel Alberto Gonzales. L and R refer to the program as having the code name of "Pinwale." Pinwale, though, is actually an unclassified proprietary term used to refer to advanced data-mining software that the government uses. Contractors who do SIGINT mining work often include a familiarity with Pinwale as a prerequesite for certain jobs. To keep things straight, the American public now has confirmation of at least four separate NSA domestic surveillance programs. The first is the Terrorist Surveillance Program, which involves the monitoring of telephone calls. The second is "Stellar Wind," a code name for a program that involves meta-data mining. The third is a program that keeps tabs on all the information that flows through telecom hubs under the control of U.S. companies and within the U.S. The fourth is the Pinwale e-mail exploitation. Obviously, these programs overlap. A marvelous new book about the NSA, The Secret Sentry, reports that there are at least ten separate new counterterrorist programs that are segregated from the rest of the NSA's highly classified programs and activities. Four down, six to go.
(For more on the NSA's activities, please read my colleague Shane Harris's collected works.)











NSA

Sunday, May 10, 2009

Obama: Where in the World is Osama ?


Everytime Osama Bin Laden made a statement or distributed a recording, the left went wild. It was all a Bush concoction. Bush did it all. Bush was responsible, Bush would pull out a tape everytime his approval numbers dropped. Bush was purposely trying not to catch Bin Laden, so he could have a boogeyman to use for political gain.

That was then.



Obama aide: Seems no one knows bin Laden's status


May 10, 2009 6:29 AM (3 hrs ago) AP

WASHINGTON -

President Barack Obama's national security adviser says he isn't sure if Osama bin Laden is dead or alive.

Retired Marine Gen. James Jones said Sunday that U.S. intelligence agencies are looking at data and watching for confirmed appearances by the al-Qaida leader.

Jones said, "The truth is, I don't think anybody knows."

White House spokesman Robert Gibbs last week said Obama wants bin Laden brought to justice, but that the U.S. is focused on more than just one person.

Jones spoke on ABC's "This Week."




Isn't it amazing what winning an election can do! Politics. That is all that drives them. Sad.








Obama

Tuesday, April 21, 2009

Jane Harman: Democrat, Change and all that jazz

Republicans are usually the unlucky recipient of a camera or recorder catching them saying something dumb, or opening the door to leave an apartment that is not their ....

Democrats, when they are caufght, are usually commiting more serious offenses.

This is CHANGE? I'd much prefer the bumbling of Republicans to violations of the sort she has 'waddled into'.

MEDIA? Where are you?







April 19, 2009 — 8:49 p.m.

Sources: Wiretap Recorded Rep. Harman Promising to Intervene for AIPAC



Rep. Jane Harman , the California Democrat with a longtime involvement in intelligence issues, was overheard on an NSA wiretap telling a suspected Israeli agent that she would lobby the Justice Department reduce espionage-related charges against two officials of the American Israeli Public Affairs Committee, the most powerful pro-Israel organization in Washington.

Harman was recorded saying she would "waddle into" the AIPAC case "if you think it'll make a difference," according to two former senior national security officials familiar with the NSA transcript.

In exchange for Harman's help, the sources said, the suspected Israeli agent pledged to help lobby Nancy Pelosi , D-Calif., then-House minority leader, to appoint Harman chair of the Intelligence Committee after the 2006 elections, which the Democrats were heavily favored to win.

Seemingly wary of what she had just agreed to, according to an official who read the NSA transcript, Harman hung up after saying, "This conversation doesn't exist."

Harman declined to discuss the wiretap allegations, instead issuing an angry denial through a spokesman.

[To read the rest of the article, click on the title link]








Losercrats

Thursday, April 16, 2009

Obama and the NSA: Spying on You.

I suppose this is Bush's fault also, or is it Obama?


N.S.A.’s Intercepts Exceed Limits Set by Congress


New York Times
By ERIC LICHTBLAU and JAMES RISEN
Published: April 15, 2009

WASHINGTON — The National Security Agency intercepted private e-mail messages and phone calls of Americans in recent months on a scale that went beyond the broad legal limits established by Congress last year, government officials said in recent interviews.



[To read the rest of the article, click on the title link.]

Thursday, October 9, 2008

NSA: Listening in on phone calls

Exclusive: Inside Account of U.S. Eavesdropping on Americans
U.S. Officers' "Phone Sex" Intercepted; Senate Demanding Answers

By BRIAN ROSS, VIC WALTER, and ANNA SCHECTER
Oct. 9, 2008

Intercept operators allege the NSA is listening to citizens' phone calls.
The chairman of the Senate Intelligence Committee, Jay Rockefeller (D-WV), called the allegations "extremely disturbing" and said the committee has begun its own examination.

"We have requested all relevant information from the Bush Administration," Rockefeller said Thursday. "The Committee will take whatever action is necessary."

"These were just really everyday, average, ordinary Americans who happened to be in the Middle East, in our area of intercept and happened to be making these phone calls on satellite phones," said Adrienne Kinne, a 31-year old US Army Reserves Arab linguist assigned to a special military program at the NSA's Back Hall at Fort Gordon from November 2001 to 2003.

Kinne described the contents of the calls as "personal, private things with Americans who are not in any way, shape or form associated with anything to do with terrorism."

She said US military officers, American journalists and American aid workers were routinely intercepted and "collected on" as they called their offices or homes in the United States.
Watch "World News Tonight with Charles Gibson" and "Nightline" for more of Brian Ross' exclusive report.
Another intercept operator, former Navy Arab linguist, David Murfee Faulk, 39, said he and his fellow intercept operators listened into hundreds of Americans picked up using phones in Baghdad's Green Zone from late 2003 to November 2007.

"Calling home to the United States, talking to their spouses, sometimes their girlfriends, sometimes one phone call following another," said Faulk.

The accounts of the two former intercept operators, who have never met and did not know of the other's allegations, provide the first inside look at the day to day operations of the huge and controversial US terrorist surveillance program.

"There is a constant check to make sure that our civil liberties of our citizens are treated with respect," said President Bush at a news conference this past February.

But the accounts of the two whistleblowers, which could not be independently corroborated, raise serious questions about how much respect is accorded those Americans whose conversations are intercepted in the name of fighting terrorism.

US Soldier's 'Phone Sex' Intercepted, Shared

Faulk says he and others in his section of the NSA facility at Fort Gordon routinely shared salacious or tantalizing phone calls that had been intercepted, alerting office mates to certain time codes of "cuts" that were available on each operator's computer.

"Hey, check this out," Faulk says he would be told, "there's good phone sex or there's some pillow talk, pull up this call, it's really funny, go check it out. It would be some colonel making pillow talk and we would say, 'Wow, this was crazy'," Faulk told ABC News.

Faulk said he joined in to listen, and talk about it during breaks in Back Hall's "smoke pit," but ended up feeling badly about his actions.

"I feel that it was something that the people should not have done. Including me," he said.

*************************************

Listen to the video clips as well as read through the commentary by Brian Ross.

And then think about what you have heard.

1. Who is doing the listening and what is the status of the calls listened to?
2. From where are these people calling and to whom?
3. Why is Faulk and the other person coming forward?
4. What is the status of the calls? Live or taped?
5. What happens to these calls after they are listened to, and who has access?
6. What do you imagine is the protocol for listening to these calls?

The answers are as important as the details. And Mr. Faulk, responsibility for listening to phone calls you were not given authority to listen to is not the responsibility of your superiors, it is your responsibility. You listened, inappropriately. In violation of protocol.

HUGE STORY and not because of the details in THIS story!!! HUGE. Or rather, POSSIBLY one of the biggest stories!!!! But we will never know!





CIA





NSA

Make Mine Freedom - 1948


American Form of Government

Who's on First? Certainly isn't the Euro.