Read The Watchers Online

Authors: Shane Harris

The Watchers (64 page)

For an in-depth account of the standoff between Justice and the White House, see Gellman's
Angler.
Also see an adaptation of the book published in the
Washington Post,
September 14, 2008, titled “Conflict Over Spying Led White House to Brink.”
Also see the memoir of Jack Goldsmith, the former head of the Office of Legal Counsel,
The Terror Presidency: Law and Judgment Inside the Bush Administration
(New York: W. W. Norton & Co., 2007).
262
Brenner and Potenza . . . had assured Hayden he could rely on those presidential authorities that Ashcroft was supposed to review. But the White House had forbidden the NSA men to see the underlying analysis, prepared by Yoo:
See Gellman.
262
he'd spent the past few years telling congressional officials, in his limited briefings, that the NSA's lawyers had signed off on the program:
Hayden emphasized this in numerous public statements about the surveillance program. One of his most detailed accounts was presented at the National Press Club, in an address to reporters on January 23, 2006.
CHAPTER 23: THE BREAKTHROUGH
This account of the NSA's foray into in-memory databases comes from the following sources. First, a private-sector individual with direct knowledge of the NSA's surveillance efforts and the technology underpinning them, who requested anonymity when speaking about intelligence programs. This individual spoke with me at length in 2008 about these efforts and pointed me toward a number of publicly available sources that amplified the account. These included press releases from companies that had sold the NSA the computers and servers necessary to build the in-memory system. This individual also supplied me with an internal e-mail from an NSA employee describing some of these efforts.
I was able to independently verify with a number of other sources that the NSA was exploring in-memory databases. These included former intelligence officials and experts on the technology who verified that my characterizations in this chapter—which are meant to make the technology understandable to lay readers—are an accurate reflection of how these systems work. I also conducted a background interview with a researcher who had done work on in-memory databases for the NSA and who requested anonymity.
In this chapter I use the phrase “logic layer” to describe a kind of vocabulary that told a computer what the cacophony of phone records and e-mails, words and numbers running through its brain actually meant, and more important, what they meant in relation to one another. The meaning of logic layer deserves a bit more explanation here. Computer engineers use the word “ontology” for a complete set of terms, definitions, and often explanations of how objects relate to one another. (Ontology is a branch of philosophy that deals with the nature of being.) When engineers speak of a logic layer they mean the application of an ontology to a computer system. So, while the terms “ontology” and “logic layer” are not interchangeable, they are linked to each other. I use the latter term in this chapter, which is all about putting the ontology to use.
 
267
Back in the late 1990s officials had started to worry about whether the power would run out:
See “NSA Risking Electrical Overload,” by Siobhan Gorman,
Baltimore Sun,
August 6, 2006.
267
In 2001 a group of database builders in Washington State decided to test the speed of a disk-based database and one built entirely in memory:
The company in question is called McObject, and research papers detailing these experiments are available on its Web site, mcobject.com.
CHAPTER 24: EXPOSED
271
Not long after Townsend moved into her new West Wing office, an NSA employee came to see her:
Interview with Fran Townsend in 2009. Unless otherwise noted all statements, thoughts, and actions attributed to Townsend in this section come from the interview.
271
Before a meeting in the Oval Office, which was also attended by Mike Hayden, Comey asked Townsend, who was still a deputy, if she had ever heard of the code name Stellar Wind:
Barton Gellman recounts this exchange in
Angler: The Cheney Vice Presidency
(New York: Penguin Press, 2008), but he does not use the code name Stellar Wind. I insert it here because I have confirmed with a former administration official that this was the name.
272
But Alexander also had a contentious relationship with Mike Hayden:
Former officials who have known and worked with both men described this conflict. They described both men as having different views about how the NSA should work with other intelligence officials. Alexander was more open to sharing, they said.
274
Curt Weldon had been hearing things:
In interviews conducted in 2005 and 2006, Weldon described for me the process by which he became aware of the Able Danger program, as well as what he believes was a cover-up by the administration.
274
In October 2003, some staffers flew to Bagram, Afghanistan, where Shaffer was stationed, and they interviewed him:
The Defense Department inspector general's report on Able Danger documents this meeting (“Alleged Misconduct by Senior DoD Officials Concerning the Able Danger Program and Lieutenant Colonel Anthony A. Shaffer, U.S. Army Reserve,” case number H05L97905217, dated September 18, 2006). The 9/11 Commission has also verified that it occurred.
276
Hadley had taken a look at the chart, and he seemed impressed. “I have to show this to the big man,” he said, meaning Bush:
The Defense Department inspector general also cites this exchange, which Weldon writes about in his book,
Countdown to Terror: The Top-Secret Information That Could Prevent the Next Terrorist Attack on America . . . and How the CIA Has Ignored It
(Washington, D.C.: Regnery Publishing, 2005).
277
The story was far more complex, and more disheartening, than the one Weldon was telling. Erik Kleinsmith sure thought so:
Interviews with Kleinsmith in 2005 and 2008. He also felt that plenty of others, not just Weldon, were trying to distort the Able Danger story or hadn't understood it. Kleinsmith felt that the program was not about finding and preventing the next attack so much as finding “actionable intelligence” and using new forms of analysis. The distinction might seem minor to some, but to Kleinsmith it was important.
277
“I myself do not remember seeing either a picture or his name on any charts”:
Kleinsmith testified before the Senate Judiciary Committee on September 21, 2005.
279
Weldon later dismissed Kleinsmith as a know-nothing:
In a phone conversation in December 2005, Weldon told me that Kleinsmith didn't know much about the Able Danger program and insisted that he was a marginal player in the operation.
CHAPTER 25: REASONABLE BELIEFS
282
the former director of the NSA, now the second most senior spy in government, joined President Bush in an Oval Office meeting with Bill Keller, the
Times'
s executive editor:
Keller described the meeting in detail to PBS's
Frontline,
in interviews for its documentary
News War,
which aired February 13, 2007. The producers interviewed Keller on three occasions in 2006.
New York
magazine also recounted the Oval Office meeting, from an interview with Keller, in an article published on September 11, 2006, called “The United States of America vs. Bill Keller.”
283
On January 23, 2006, he addressed a crowd of journalists and a few activists at the National Press Club:
I was present for that address. The accounts of Hayden's demeanor and his facial tic are mine. The latter is something I have observed on the numerous occasions I've been in Hayden's presence while covering him.
288
A
USA Today
poll taken not long after the
Times
story appeared:
The results of the poll were published on May 14, 2006. In response to the question “Based on what you have heard or read about this program to collect phone records, would you say you approve or disapprove of this government program,” 51 percent of respondents said they disapproved, 43 percent said they approved, and 6 percent said they had no opinion. Of those who approved, 69 percent agreed that they felt that way because “investigating terrorism is the more important goal, even if it violates some Americans' civil liberties.” Those who opposed the program were asked, “Do you think there would ever be circumstances in which it would be right for the government to create a database of telephone records, or would it not be right for the government to do this under any circumstances?” Sixty percent answered, No, it wouldn't be right under any circumstances. But 34 percent of those who opposed the program said, Yes, there are circumstances under which it would be right.
 
The
USA Today
poll, cosponsored by Gallup, had a margin of error of plus or minus 4 percentage points. It also differed from a poll released three days earlier by ABC News and the
Washington Post,
which found that 63 percent of respondents said the program was an acceptable means of investigating terrorism. In covering its own poll
USA Today
noted, “The findings may differ because questions in the two polls were worded differently.” The ABC-
Post
poll asked, “It's been reported that the National Security Agency has been collecting the phone call records of tens of millions of Americans. It then analyzes calling patterns in an effort to identify possible terrorism suspects, without listening to or recording the conversations. Would you consider this an acceptable or unacceptable way for the federal government to investigate terrorism?” The
USA Today
-Gallup poll included more respondents and, as the paper noted, “was taken after Americans had a day or two to hear and think about the program.”
In my personal experience, which is hardly scientific, people are genuinely divided over the question. Clearly it depends on how the question is asked, but I think it's a fair characterization to say that reasonable people have different views on whether it's appropriate for the NSA to collect and analyze the communications of Americans for the purposes of detecting terrorism. However, I doubt they would support such covert intelligence gathering if the purpose was to identify political opponents—which would be illegal—or even common criminals.
CHAPTER 26: BETRAYAL
293
“Do you have any contact with journalists?” one interrogator asked a thirty-year intelligence officer working at the agency:
This account comes from a discussion in 2006 with said intelligence officer, who asked not to be quoted.
294
Amid the internal probes Goss imposed new, tighter restrictions on the books, articles, and opinion pieces published by former employees who were still working for the agency under contract:
I wrote about this new policy for
National Journal
in “Silencing the Squeaky Wheels,” published on April 27, 2006.
294
Careerists at the agency thought that Goss had been sent to clean house and to whip them into shape:
I base this view on my own background conversations with career officers at the CIA, including some who worked for Goss and approved of his mission.
294
the
Post
revealed a global network of CIA-run prisons in foreign countries:
See Dana Priest's “CIA Holds Terror Suspects in Secret Prisons,”
Washington Post,
published on November 2, 2005.
294
Senior operations officials . . . were devastated. . . . The
Post
story also put on ice a plan to open a new, more sophisticated prison that the agency had built from the ground up in a friendly country:
Interview with a former senior operations official with direct responsibility for the terrorist detention and interrogation program, who asked not to be identified.
295
What McCarthy learned in the course of her investigation made her a target:
This assessment, with which I concur based on my own reporting, is expressed in R. Jeffrey Smith's
Washington Post
article “Fired Officer Believed CIA Lied to Congress,” published on May 14, 2006. McCarthy's dismissal was covered by most of the major news organizations as well. In our interviews, McCarthy did not speak about her views on what anyone at the CIA had told Congress about its detention and interrogation programs.
296
McCarthy told Poindexter she was not the source of that prisons story:
The account of Poindexter and McCarthy's meeting comes from an interview with McCarthy and an electronic exchange with Poindexter in 2006, shortly after McCarthy was dismissed from the CIA.
297
Some of her friends thought that Goss was looking to scare the spy workforce:
In background conversations, some of McCarthy's friends and former associates told me this. These individuals didn't want to be quoted but shared their opinions after McCarthy was dismissed from the agency. Also see Smith's piece, in which people who are reported to know McCarthy share their views.
298
He once threw a cocktail party for his new friends at the Ritz-Carlton, not far from the Pentagon, and entertained them with a professional “mentalist,” who performed card tricks and sleights of hand:
I attended this party on May 6, 2008.
298
During the lunch break he found himself standing in line for a sandwich next to a guy he'd never met, but who'd also grown up in the Bay Area:
Interview with Jim Harper in 2008.
299
Harper suggested that they write a paper together:
Interviews with Harper and Jeff Jonas in 2008.
299
In December 2005, he spoke before a meeting of the Homeland Security Department's Data Privacy and Integrity Advisory Committee:
A transcript of the proceedings is available at the Homeland Security Department's Web site. The meeting took place on December 6, 2005, in a ballroom at the J. W. Marriott Hotel in Washington, D.C.
www.dhs.gov/xoig/assets/mgmtrpts/privacy_advcom_12-2005_mins_am.pdf
.

Other books

Prima Donna by Drewry, Laura
Tina Mcelroy Ansa by The Hand I Fan With
Courting Lord Dorney by Sally James
Rekindled by Maisey Yates
Ghost Night by Heather Graham
The Fright of the Iguana by Johnston, Linda O.


readsbookonline.com Copyright 2016 - 2024