Article by Peter Maass

Obama’s Pardon of Gen. James Cartwright Is a New Twist in the War on Leaks

The Intercept  |  Jan. 18, 2017

The celebrations over President Barack Obama’s commutation of Chelsea Manning’s 35-year prison sentence have overshadowed what might be a more consequential development in the government’s long-running war against leakers and whistleblowers: Obama’s pardon of Marine General James Cartwright.

Late last year, Cartwright pled guilty to lying to the FBI about disclosing classified information on the Stuxnet computer virus to reporters from The New York Times and Newsweek. The former general, a vice chairman of the Joint Chiefs of Staff who was known as Obama’s “favorite general,” was due to be sentenced this month on felony charges. Prosecutors were seeking a two-year prison term.

Obama pardoned him yesterday, which means Cartwright will not go to prison.

“It seems to me that the far bigger news from the perspective of policy and precedent-setting is the pardon of General James Cartwright,” wrote Steve Vladeck, a University of Texas law professor who specializes on national security law. Vladeck described the Cartwright pardon as “an interesting denouement” to the controversy over the Obama administration’s war on leakers. While Vladeck stated that he doubted it was the beginning of a trend, he asked, “Is it possible, then, that the Cartwright pardon is a tacit admission on the government’s part that it has been a bit too hard on leakers and those, like General Cartwright, who have interfered with leak investigations?”

The Cartwright pardon constitutes a new precedent in which a well-connected leaker of classified information who lied to the FBI has been spared jail time. In 2015, former general David Petraeus admitted to sharing top secret information with his biographer and girlfriend, Paula Broadwell, and lying to the FBI about it. Petraeus, who resigned from his job as CIA director when the scandal broke, negotiated a deal to plead guilty to a single misdemeanor count, accepted 18 months of probation, and avoided a prison sentence. [In another era, during the George W. Bush presidency, Scooter Libby, who was chief of staff to Vice President Dick Cheney, received a presidential commutation for a 30-month sentence for leaking the name of CIA agent Valerie Plame.]

The Manning case is different from Cartwright’s in significant ways, including the amount of material leaked. Manning leaked a large cache of secret military and diplomatic documents, while Cartwright talked about a single top-secret program to undermine Iran’s nuclear industry (and his conversations with reporters from the New York Times and Newsweek were in the context of making the Obama administration look good, whereas Manning’s leak to Wikileaks exposed government wrongdoing). While Cartwright received a full pardon, Manning only had her sentence commuted, to seven years from the staggering 35 years she received at trial.

At the time of the Petraeus plea deal, lawyers for several convicted leakers expressed outrage that Petraeus was permitted to avoid incarceration for crimes that were arguably far worse than their clients were incarcerated for. Abbe Lowell, the lawyer for Stephen Kim, a State Department official who received a 13-month sentence for talking to a journalist about a single classified report on North Korea, said at the time, “The issue is not whether General Petraeus was dealt with too leniently … The issue is whether others are dealt with far too severely for conduct that is no different. This underscores the random, disparate and often unfair application of the national security laws where higher-ups are treated better than lower-downs.”

The Petraeus deal was cited in pleadings that Lowell and lawyers for another convicted leaker, Jeffrey Sterling, made to their respective judges, arguing that justice had to be meted out equally, and that their clients had received far harsher treatment (the appeals were unsuccessful, though). The Cartwright case adds another data point for future leak cases. There is not just the Petraeus plea deal that can be cited, but the Cartwright pardon, too.

“The clemency and pardons today underscore the uneven enforcement and completely unequal treatment of people accused of leaking classified information,” Lowell told The Intercept after the Cartwright and Manning decisions were announced.

One of the Obama-era leakers who did not receive the generous treatment showered on Cartwright and Petraeus is John Kiriakou, a former CIA officer who pled guilty to sharing the name of a covert operative with a reporter. Even though the operative’s name was never published, Kiriakou was sentenced to 30 months in prison.

“Now we’ve seen it twice,” said Kiriakou, who was released from prison in 2015. “It’s not just the pardon, it’s the sweetheart deal Petraeus got as well. How can a prosecutor prosecute a leak case and with a straight face ask a judge to sentence somebody to 24 years [this is what Sterling faced] when Petraeus got 18 months of unsupervised probation and Cartwright just sat at home and waited for his pardon to come through?”

The contrast was noted by national security reporter Michael Isikoff in a dispatch for Yahoo News yesterday.

Still, the pardon is likely to prove controversial in light of the prison terms — in one case as long as three and a half years — given to other, much lower level government officials prosecuted by the Justice Department in leak-related cases. If nothing else, the move appears to undercut a significant argument made by the office of U.S. attorney for Maryland Rod Rosenstein in a court filing last week, that “when an individual is found to have made unauthorized disclosures, particularly one serving in a senior position, it is critically important” to hold that person accountable.

Of course the Department of Justice under Donald Trump will pursue whatever cases it wants to pursue, and if the latest twists with Cartwright and Manning are politically inconvenient, lawyers for the new administration will try to downplay them. Pardons and commutations do not have the same legal standing as court rulings, and can be portrayed as discretionary and inherently political moves by an outgoing president.

“It’s hard to know the precedental value this will have,” said Jesselyn Raddack, who has represented several prominent leakers and whistleblowers. “Both of these cases were very politicized, for better or worse. We are also moving into a presidency that promises greater secrecy and doesn’t necessarily think secrecy is a bad thing and is reflexively anti-leak when it’s against [Trump], and pro-leak when it serves to smear his enemies.” Referring to the commutation of Manning’s sentence, Raddack added, “I hope it would be encouraging for whistleblowers, but encouraging for what? They could only be put in jail for seven years, and then someone will have mercy on them? It’s hard to read a lot of encouragement in that, because we’re still in such a chilling environment.”

Why Obama Should Pardon All Whistleblowers and Leakers—Not Just Edward Snowden

The Intercept  |  Sept. 19, 2016

Of course President Obama should pardon Edward Snowden — and Chelsea Manning, too.

But this story is not about the excellent reasons for thanking rather than locking up the two most famous whistleblowers of the post-9/11 era. Plenty of people are already calling for that in powerful ways. A new petition on Snowden’s behalf has been signed by Twitter’s Jack Dorsey as well as Steve Wozniak, Maggie Gyllenhaal and Aragorn (also known as Viggo Mortensen). Organizations coming out in support of a pardon for Snowden, who is currently a political refugee in Moscow, include the ACLU, Human Rights Watch and Amnesty International. And Oliver Stone has just released “Snowden,” a movie that emphasizes his good and patriotic intentions.

But the unfortunate truth of our times is that Obama is not going to pardon Snowden and Manning. His administration has invested too much capital in demonizing them to turn back now. However, there are other leakers and whistleblowers for whom the arguments in favor of pardons are not only compelling but politically palatable, too. Their names are Stephen Kim, Jeffrey Sterling, John Kiriakou and Thomas Drake. All of them were government officials who talked with journalists and were charged under the Espionage Act for disclosures of information that were far less consequential than the classified emails that Hillary Clinton stored on her server at home or the top secret war diaries that David Petraeus shared with his biographer and girlfriend. Petraeus, a former general and CIA director, got a fine for his transgressions. Clinton got a presidential nomination.

Consider this: Kiriakou, a CIA agent who criticized the agency’s use of torture, was thrown into prison because he provided a journalist with the name of one covert officer, although the name was never published. Kim, a State Department official, pleaded guilty to talking to Fox News reporter James Rosen about a single classified report on North Korea that an official later described as a “nothing burger.” Sterling, a CIA officer, talked to New York Times reporter James Risen about a botched operation against Iran that went wrong because of bungling by the agency. Drake, who worked at the NSA, faced multiple felony charges after he talked to a Baltimore Sun reporter about fraud and abuse in a bloated surveillance program. All of them went to prison except Drake, who was able, in the end, to plead guilty to a misdemeanor, though he lost his job and security clearance and now works at an Apple store.

There is an imperative to apologize to Kim, Sterling, Kiriakou and Drake that has nothing to do with justice (though justice should be sufficient incentive). It is possible that a crackpot grifter will be elected president of the United States in seven weeks time. Obama needs to start dramatically disavowing the excesses of his presidency, so that Donald Trump, if he wins in November, will not be able to use the continuity card to do even worse things with the excessive powers that Obama was able to arrogate for the Oval Office. (Trump would still do terrible things, of course, but he would at least have a harder time citing Obama as precedent.) One of the most insidious domestic legacies of Obama’s presidency is his unprecedented crackdown on officials who talked to journalists about embarrassing issues or policies the government wanted to keep secret — and this needs to be forsaken, now.

It wouldn’t be that out of character. The Obama administration has been admirable in the use of its powers to reverse or stop wrongful actions by state and municipal authorities. Earlier this month, the administration suspended construction on the North Dakota Access Pipeline because it violated the rights of Native Americans. In recent years, the Department of Justice has conducted scathing investigations into civil rights abuses by a number of police departments, and has extracted meaningful changes from many of them. Fairness for all has been a hallmark of these laudable moves, and the same standard should be applied to leakers and whistleblowers. If Petraeus and Clinton are allowed to get away with unauthorized sharing of classified information, it should be okay for lesser officials too, especially when their actions involved the exposure of government wrongdoing.

Instead of just correcting the errors of other branches of government, Obama should admit that his own administration made a terrible mistake by prosecuting good people who helped, rather than harmed, the cause of democracy. If pardoning Snowden and Manning requires more courage than the president possesses, he can at least show clemency for Kim, Kiriakou, Drake and Sterling, who have suffered catastrophically. Pardons would clear their names and release Sterling from prison (he remains behind bars to this day). The fact that Trump has the instincts of a dictator makes it all the more crucial that Obama not hand him the powers and policies of one.

He Was a Hacker for the NSA and He Was Willing to Talk. I Was Willing to Listen.

The Intercept  |  June 28, 2016

The message arrived at night and consisted of three words: “Good evening sir!”

The sender was a hacker who had written a series of provocative memos at the National Security Agency. His secret memos had explained — with an earthy use of slang and emojis that was unusual for an operative of the largest eavesdropping organization in the world — how the NSA breaks into the digital accounts of people who manage computer networks, and how it tries to unmask people who use Tor to browse the web anonymously. Outlining some of the NSA’s most sensitive activities, the memos were leaked by Edward Snowden, and I had written about a few of them for The Intercept.

There is no Miss Manners for exchanging pleasantries with a man the government has trained to be the digital equivalent of a Navy SEAL. Though I had initiated the contact, I was wary of how he might respond. The hacker had publicly expressed a visceral dislike for Snowden and had accused The Intercept of jeopardizing lives by publishing classified information. One of his memos outlined the ways the NSA reroutes (or “shapes”) the internet traffic of entire countries, and another memo was titled “I Hunt Sysadmins.” I felt sure he could hack anyone’s computer, including mine.

Good evening sir!

The only NSA workers the agency has permitted me to talk with are the ones in its public affairs office who tell me I cannot talk with anyone else. Thanks to the documents leaked by Snowden, however, I have been able to write about a few characters at the NSA.

There was, for instance, a novelist-turned-linguist who penned an ethics column for the NSA’s in-house newsletter, and there was a mid-level manager who wrote an often zany advice column called “Ask Zelda!” But their classified writings, while revealing, could not tell me everything I wanted to know about the mindset of the men and women who spy on the world for the U.S. government.

I got lucky with the hacker, because he recently left the agency for the cybersecurity industry; it would be his choice to talk, not the NSA’s. Fortunately, speaking out is his second nature. While working for the NSA, he had publicly written about his religious beliefs, and he was active on social media. So I replied to his greeting and we began an exchange of cordial messages. He agreed to a video chat that turned into a three-hour discussion sprawling from the ethics of surveillance to the downsides of home improvements and the difficulty of securing your laptop. “I suppose why I talk is partially a personal compulsion to not necessarily reconcile two sides or different viewpoints but to just try to be honest about the way things are,” he told me. “Does that make sense?”

The hacker was at his home, wearing a dark hoodie that bore the name of one of his favorite heavy metal bands, Lamb of God. I agreed not to use his name in my story, so I’ll just refer to him as the Lamb. I could see a dime-store bubble-gum machine behind him, a cat-scratching tree, and attractive wood beams in the ceiling. But his home was not a tranquil place. Workmen were doing renovations, so the noise of a buzz saw and hammering intruded, his wife called him on the phone, and I could hear the sound of barking. “Sorry, my cats are taunting my dog,” he said, and later the animal in question, a black-and-white pit bull, jumped onto his lap and licked his face.

The Lamb wore a T-shirt under his hoodie and florid tattoos on his arms and smiled when I said, mostly in jest, that his unruly black beard made him look like a member of the Taliban, though without a turban. He looked very hacker, not very government.

When most of us think of hackers, we probably don’t think of government hackers. It might even seem odd that hackers would want to work for the NSA — and that the NSA would want to employ them. But the NSA employs legions of hackers, as do other agencies, including the FBI, CIA, DEA, DHS, and Department of Defense. Additionally, there are large numbers of hackers in the corporate world, working for military contractors like Booz Allen, SAIC, and Palantir. The reason is elegantly simple: You cannot hack the world without hackers.

In popular shows and movies such as “Mr. Robot” and “The Matrix,” hackers tend to be presented as unshaven geeks loosely connected to collectives like Anonymous, or to Romanian crime syndicates that steal credit cards by the millions, or they are teenagers who don’t realize their online mischief will get them into a boatload of trouble when Mom finds out.

The stereotypes differ in many ways but share a trait: They are transgressive anti-authoritarians with low regard for social norms and laws. You would not expect these people to work for The Man, but they do, in droves. If you could poll every hacker in the U.S. and ask whe­­­ther they practice their trade in dark basements or on official payrolls, a large number would likely admit to having pension plans. Who knows, it could be the majority.

This may qualify as one of the quietest triumphs for the U.S. government since 9/11: It has co-opted the skills and ideals of a group of outsiders whose anti-establishment tilt was expressed two decades ago by Matt Damon during a famous scene in Good Will Hunting. Damon, playing a math genius being recruited by the NSA, launches into a scathing riff about the agency serving the interests of government and corporate evil rather than ordinary people. Sure, he could break a code for the NSA and reveal the location of a rebel group in North Africa or the Middle East, but the result would be a U.S. bombing attack in which “1,500 people that I never met, never had a problem with, get killed.” He turns down the offer.

In recent years, two developments have helped make hacking for the government a lot more attractive than hacking for yourself. First, the Department of Justice has cracked down on freelance hacking, whether it be altruistic or malignant. If the DOJ doesn’t like the way you hack, you are going to jail. Meanwhile, hackers have been warmly invited to deploy their transgressive impulses in service to the homeland, because the NSA and other federal agencies have turned themselves into licensed hives of breaking into other people’s computers. For many, it’s a techno sandbox of irresistible delights, according to Gabriella Coleman, a professor at McGill University who studies hackers. “The NSA is a very exciting place for hackers because you have unlimited resources, you have some of the best talent in the world, whether it’s cryptographers or mathematicians or hackers,” she said. “It is just too intellectually exciting not to go there.”

Revealingly, one of the documents leaked by Snowden and published by The Intercept last year was a classified interview with a top NSA hacker (not the Lamb) who exulted that his job was awesome because “we do things that you can’t do anywhere else in the country … at least not legally. We are gainfully employed to hack computers owned by al-Qa’ida!” Asked about the kind of people he works with at the NSA, he replied, “Hackers, geeks, nerds … There’s an annual event for hackers in Las Vegas called DEF CON, and many of us attend. When there, we feel as though we are among our bretheren! [sic] We all have a similar mindset of wanting to tear things apart, to dig in, to see how things work.”

In 2012, Gen. Keith Alexander, the NSA director at the time, even attended DEF CON wearing blue jeans and a black T-shirt that bore the logo of the Electronic Frontier Foundation, an anti-surveillance organization that is beloved by hackers and other good citizens of the world. To coincide with Alexander’s visit, the NSA had created a special webpage to recruit the hackers at DEF CON. “If you have a few, shall we say, indiscretions in your past, don’t be alarmed,” the webpage stated. “You shouldn’t automatically assume you won’t be hired.” Alexander’s personal pitch was even more direct: “In this room right here is the talent we need.”

If you are willing to become a patriot hacker, Uncle Sam wants you.

As a teenager, the Lamb was a devout Christian who attended church two or three times a week, yet he also participated in online forums for Satanists and atheists. He wanted to learn what others believed and why they believed it, and he wanted to hear their responses to questions he raised. If his beliefs could not withstand challenges from opposing ones, they might not be worth keeping.

“As a Christian, I believe the Bible, and one of the things it says is if you seek the truth, you should find it,” he told me. “If I started to come across facts that contradicted what I believed and contradicted the way that I thought about things, I had to be open to confronting them and determining how I would integrate them into my life and my thought system.”

Before he became a hacker, the Lamb had the restless spirit of one. After high school, he attended a Christian university for a year but dropped out and joined the military as a linguist. He was assigned to the NSA, and although he told me his computer skills were modest at the time, he was intrigued by the mysteries inside the machines. “I started doing some basic computer training, like ‘Oh, here’s how computers talk to each other and network’ and that sort of stuff,” he said. “I enjoyed that far more than trying to maintain a language that I rarely used.”

He devoured books on computers and experimented on his own time, using an application called Wireshark to see how network data was moving to and from his own computer. He picked up a bit of programming knowledge, and he asked agency veterans for tips. As he wrote in one of his memos, “If you want to learn crazy new things … why not walk around NSA, find people in offices that do things you find interesting, and talk to them about how they do what they do.”

Like Snowden, he did not need a formal education to succeed. Snowden, after all, dropped out of high school and mastered computers through self-education. As an NSA contractor, he rose to a position that gave him access to broad swaths of the agency’s networks. While Snowden was a systems administrator, the Lamb became an expert in network analysis and was well-versed in the crucial trick of shaping traffic from one place to another — for instance, sending it from an ISP in a foreign country to an NSA server.

The Lamb’s work was important, but his memos are remarkably irreverent, even cocky. I’ve read a fair number of NSA documents, and not one contains as much hacker and internet lingo as his; he used words like “skillz” and “internetz” and “ZOMG!” and phrases like “pwn the network” and “Dude! Map all the networks!!!” Some of what he wrote is just cheerily impudent, like the opening line of one memo: “Happy Friday my esteemed and valued intelligence Community colleagues!” Another memo began, “Welcome back, comrade!”

While poking gentle fun at the government hackers he worked with, the Lamb dismissed the amateur hackers on the outside. He identified himself and his highly trained colleagues at the NSA as a breed apart — a superior breed, much in the way that soldiers look down on weekend paintballers. Perhaps this shouldn’t be altogether surprising, because arrogance is one of the unfortunate hallmarks of the male-dominated hacker culture. At the NSA, this hubris can perhaps serve as an ethical lubricant that eases the task of hacking other people: They are not as special as you are, they do not have the magical powers you possess, they are targets first and humans second.

As the Lamb wrote in one of his memos, “When I first went to Blackhat/Defcon, it was with the wide-eyed anticipation of ‘I’m going to go listen to all of the talks that I can, soak up all of the information possible, and become a supar-1337-haxxor.’ What a let-down of an experience that was. You find the most interesting topics and briefings, wait in lines to get a seat, and find yourself straining your ears to listen to someone that has basically nothing new to say. Most of the talks get hyped up exponentially past any amount of substance they actually provide.”

When I asked the Lamb where he was in the hierarchy of hackers at the NSA, he just smiled and said, “I got to the point where more people would ask me questions than I asked other people questions.” He would not delve into the classified specifics of his job — he despises Snowden for leaking classified information — but I knew a lot through his memos.

Although network analysis, the Lamb’s area of expertise, is interesting from a technical perspective, he was one step removed from the most challenging and menacing type of government hacking — executing finely tuned attacks that infiltrate individual computers. Nonetheless, he offered this characterization of his NSA work: “They were just ridiculously cool projects that I’ll never forget.” One of the quandaries of technology is that “cool” does not necessarily mean “ethical.” Surveillance tools that are regarded as breakthroughs can be used to spy on innocent people as well as terrorists. This is a key part of the debate on the NSA, the concern that its formidable powers are being used, or can be used, to undermine privacy, freedom, and democracy.

The Lamb’s memos on cool ways to hunt sysadmins triggered a strong reaction when I wrote about them in 2014 with my colleague Ryan Gallagher. The memos explained how the NSA tracks down the email and Facebook accounts of systems administrators who oversee computer networks. After plundering their accounts, the NSA can impersonate the admins to get into their computer networks and pilfer the data flowing through them. As the Lamb wrote, “sys admins generally are not my end target. My end target is the extremist/terrorist or government official that happens to be using the network … who better to target than the person that already has the ‘keys to the kingdom’?”

Another of his NSA memos, “Network Shaping 101,” used Yemen as a theoretical case study for secretly redirecting the entirety of a country’s internet traffic to NSA servers. The presentation, consisting of a PowerPoint slideshow, was offbeat at times, with a reference to throwing confetti in the air when a hack worked and jokey lines like, “The following section could also be renamed the ‘I’m pulling my hair out in the fetal position while screaming “Why didn’t it work?!”’ section.” The Lamb also scribbled a hand-drawn diagram about network shaping that included a smiley face in the middle next to the phrase, “YEAH!!! MAKE DATA HAPPEN!” The diagram and slideshow were both classified as top secret.

His memos are boastful, even cackling. At the end of one of the sysadmin memos, the Lamb wrote, “Current mood: scheming,” and at the end of another, “Current mood: devious.” He also listed “juche-licious” as one of his moods, ironically referring to the official ideology of North Korea. Another memo he wrote, “Tracking Targets Through Proxies & Anonymizers,” impishly noted that the use of identity-obscuring tools like Tor “generally makes for sad analysts” in the intelligence community; this was followed by a sad face emoji. The tone of his classified writing was consistent with some of his social media posts — the Lamb’s attitude, in public as well as in private, was often outspoken and brash.

What if the shoe was on the other foot, however? When I wrote about the sysadmin memos in 2014, I wondered how their author would feel if someone used the same devious rationale to hack his computer and his life. Nearly two years later, I had the chance to find out.

“If I turn the tables on you,” I asked the Lamb, “and say, OK, you’re a target for all kinds of people for all kinds of reasons. How do you feel about being a target and that kind of justification being used to justify getting all of your credentials and the keys to your kingdom?”

The Lamb smiled. “There is no real safe, sacred ground on the internet,” he replied. “Whatever you do on the internet is an attack surface of some sort and is just something that you live with. Any time that I do something on the internet, yeah, that is on the back of my mind. Anyone from a script kiddie to some random hacker to some other foreign intelligence service, each with their different capabilities — what could they be doing to me?”

He seemed to be putting the blame for NSA attacks on the victims — if they were too dimwitted to protect themselves from hunters like him, it was their fault. “People don’t want to think about being targets on the internet, in spite of the fact that at this point in the game, everybody is,” he added. “Every country spies.”

He was dead serious, no smiles any longer. “As much as we’d like to say we will all beat our swords into plowshares and become a peaceful people, it’s not going to happen,” he continued. “Intelligence agencies around the world are being asked questions by their governments, and government officials don’t want to hear, ‘That’s hard to solve.’ They just say, ‘Can you solve this and can you get me the intel I’m asking for?’ Which is nation agnostic, whether that’s the NSA, the FSB, the PLA or whoever.”

The Lamb’s political ideology evoked the cold-blooded realpolitik of Henry Kissinger. There is the idyllic digital world we would like to live in, there is the dog-eat-dog digital world we actually live in — and the Lamb, as I understood it, was intensely focused on winning in the latter.

“You know, the situation is what it is,” he said. “There are protocols that were designed years ago before anybody had any care about security, because when they were developed, nobody was foreseeing that they would be taken advantage of. … A lot of people on the internet seem to approach the problem [with the attitude of] ‘I’m just going to walk naked outside of my house and hope that nobody looks at me.’ From a security perspective, is that a good way to go about thinking? No, horrible … There are good ways to be more secure on the internet. But do most people use Tor? No. Do most people use Signal? No. Do most people use insecure things that most people can hack? Yes. Is that a bash against the intelligence community that people use stuff that’s easily exploitable? That’s a hard argument for me to make.”

But it wasn’t a hard argument for me to make, so I tried. Back in the 1990s, in the early days of the web, the uses and hopes for the internet were thought to be joyous and non-commercial. The web would let us talk to one another and would decentralize power and revolutionize the world in good ways. Those were the years when the Lamb spent hours and hours in chatrooms with Satanists and atheists — just the sort of connect-us-to-each-other activity that made everyone so excited about the future. At the time, few people thought the internet would become, as Bruce Schneier describes it, a surveillance platform. So I asked whether the Lamb felt conflicted, as Snowden did, working for an organization that turned the web further and further away from its original potential as a global platform for speaking and thinking freely.

He responded by noting that he is, by nature, a defiant type and attracted to hard problems. That’s how, without a lot of formal instruction, he became an NSA hacker — he was curious about how computers worked and he wanted to figure them out. “Technically challenging things are just inherently interesting to me,” he said. “If you tell me, ‘This can’t be done,’ I’m going to try and find a way to do it.”

I mentioned that lots of people, including Snowden, are now working on the problem of how to make the internet more secure, yet he seemed to do the opposite at the NSA by trying to find ways to track and identify people who use Tor and other anonymizers. Would he consider working on the other side of things? He wouldn’t rule it out, he said, but dismally suggested the game was over as far as having a liberating and safe internet, because our laptops and smartphones will betray us no matter what we do with them.

“There’s the old adage that the only secure computer is one that is turned off, buried in a box ten feet underground, and never turned on,” he said. “From a user perspective, someone trying to find holes by day and then just live on the internet by night, there’s the expectation [that] if somebody wants to have access to your computer bad enough, they’re going to get it. Whether that’s an intelligence agency or a cybercrimes syndicate, whoever that is, it’s probably going to happen.”

The Lamb was comfortable with the side he joined in the surveillance wars, and this sets him apart from the most common stereotypes of the men and women who devote their lives to spying on others.

Spies who do nothing but eavesdrop, slipping into computers and conversations without a trace, have a reputation in popular culture of being troubled in ways that conventional spies are not. Think of Gene Hackman in The Conversation, or Ulrich Mühe in The Lives of Others — these surveillers are haunted, as it seems they should be. Conventional spies are seen as journeying into hostile lands and committing heroic or devious acts; they are men and women of action, not thought. But the people who watch, listen, or hack are not as distracted by danger or adrenaline. They mostly labor in tranquility, in temperature-controlled offices without windows, risking bodily harm no worse than carpal tunnel syndrome, and they have an abundance of time to think about the lurking that is their occupation and the people on whom they practice it.

I have a bias against the watchers, I suppose. I have been concerned about the bureaucracies of surveillance since the 1980s, when I was a student in the Soviet Union and felt like hunted prey. The telephone in the dreary lobby of my dormitory on the banks of the Neva River in Leningrad (now St. Petersburg) was assumed to be bugged, and if the KGB’s devices weren’t working, the dezhurnaya who sat nearby was sure to be listening. This was my anti-surveillance Rosebud, I guess. When I visited Russian friends, I stayed silent as I walked in their ill-lit stairwells, so that the accent of my Russian would not give away the fact a foreigner was visiting them. The walls had ears. This was one of the great contrasts between the Soviet Union and America, where I could speak to my friends without worrying about the government listening.

The Soviet Union is long gone, but in 2016 we live under the specter of far more surveillance than anything the KGB could have dreamed of with its rudimentary bugs and fearful informers. Not just government surveillance — law enforcement can easily obtain our phone and internet records with a warrant from the nearly always compliant courts — but corporate surveillance, too. It’s not just Google and Facebook that might know more details about our lives and friends than the KGB could have imagined in its most feverish dreams of information dominance, but even Zipcar and Amazon.

There are precautions one can take, and I did that with the Lamb. When we had our video chat, I used a computer that had been wiped clean of everything except its operating system and essential applications. Afterward, it was wiped clean again. My concern was that the Lamb might use the session to obtain data from or about the computer I was using; there are a lot of things he might have tried, if he was in a scheming mood. At the end of our three hours together, I mentioned to him that I had taken these precautions—and he approved.

“That’s fair,” he said. “I’m glad you have that appreciation. … From a perspective of a journalist who has access to classified information, it would be remiss to think you’re not a target of foreign intelligence services.”

He was telling me the U.S. government should be the least of my worries. He was trying to help me.

Documents published with this article:

  Tracking Targets Through Proxies & Anonymizers
  Network Shaping 101
  Shaping Diagram
  I Hunt Sys Admins (first published in 2014)


What It’s Like to Read the NSA’s Newspaper for Spies

The Intercept  |  May 9, 2016

The men and women who work at the National Security Agency were greeted, on March 31, 2003, with a cheery notice on their office computers. “Welcome to SIDtoday,” a new internal website announced, explaining that the communications team in the Signals Intelligence Directorate, the heart of the NSA, was launching the publication to keep employees abreast of what was happening inside the spy agency.

The website, SIDtoday, started modestly. Its inaugural article blandly described what it called “the analyst cockpit,” a portal for intelligence experts to access their data. The following day, which was April Fools’, SIDtoday posted an offbeat story about practical jokes, recounting how the Germans in World War II built a decoy air base, complete with planes, out of wood; the kicker, according to SIDtoday, was that the British realized the base was a decoy and dropped a wooden bomb on it. (Online fact-checkers have since declared the story a “well-traveled anecdote” of dubious accuracy.)

The April Fools’ article was at the frivolous end of the SIDtoday spectrum. Because it trafficked in “top-secret” information, SIDtoday lived in a classified environment that, over the years, allowed the agency’s spies to explain to each other, in a non-technical way, a surprising amount about what they were doing, how they were doing it, and why. In the first nine years of SIDtoday’s life, more than 4,500 stories were posted on the website, a gold mine of often mundane, occasionally revealing articles that made the agency human and comprehensible in a way that technical documents could not.

Functioning like a small-town newspaper, the staff of SIDtoday published question-and-answer articles with senior and mid-level officials who described their jobs and their motivations for doing them. Some articles were firsthand descriptions of important missions, as in the case of an NSA employee who went to Baghdad right after the Iraqi capital came under American control. “I rode the whole way in a five-ton truck, with easy access to thermite grenades that could be used to destroy our classified cargo in the event of an ambush,” he wrote at the end of 2003. Another story, by SID’s chief of staff, described how the agency helped with the rescue of Pfc. Jessica Lynch during the invasion (his article is included in the first batch of SIDtoday articles).

SIDtoday even assembled a stable of columnists over the course of its first nine years, contributors who wrote as a sideline to their day jobs at the agency. One column, called “Ask Zelda!,” was akin to “Dear Abby” for the intelligence community, written by a mid-level supervisor at the NSA who answered questions from readers, including one about what should be worn to the office on hot summer days. “Shorts and flip-flops don’t exactly convey the image of a fierce SIGINT warrior,” Zelda noted. Another column, “SIGINT Philosopher,” delved into the ethics of surveillance (reliably coming out on the favorable side) and was written by a language analyst who described a personal epiphany that came during a polygraph exam. “Signal v. Noise” explored the difficulties involved in collecting large amounts of data, while “SIGINT Curmudgeon” was written by a longtimer who waxed nostalgic about the good old days of eavesdropping. (None of these columns were up and running in the initial batch of SIDtoday just released by The Intercept, but I have written previously about “Ask Zelda!” and the “SIGINT Philosopher.” In both cases, The Intercept simultaneously published copies of the original columns.)

One of the cultural revelations in the archives of SIDtoday is the corporate language that was routinely used. Intelligence reports delivered to other government agencies were described as “products,” and there was a category called the “Counterterrorism Product Line.” Government agencies that received these reports were known as “customers,” and the NSA has an entire division called the “Customer Relationship Directorate.” One of the SIDtoday articles published today was titled “Dynamic Methods of Interaction With New and Existing Customers,” and it referred to “product line leaders” at the agency who created “customer support plans” that included details on what “each customer needs.” The customers mentioned in the article included the Department of Homeland Security, Secret Service, Missile Defense Agency, and Federal Reserve. The article was written by an official whose title was “acting chief, customer gateway.”

The SIDtoday articles also convey what officials at the agency were reading in their off-hours. Some articles included references to popular authors like the travel writer Bill Bryson, the New Yorker writer Malcolm Gladwell, and mid-century economist Herbert Simon. One of the articles released today was an enthusiastic review of the Neal Stephenson sci-fi novel Cryptonomicon, which was described in the article (written by a member of the communications team in the Signals Intelligence Directorate) as “an enthralling work that proves to be as much of a history lesson as an eye-opening thriller.”

The articles, almost uniformly glowing about the NSA, serve as reminders that the men and women who surveil the world are not machines; they have good days and bad days, jokes and tears, and strange tales about their lives. A two-part article from 2005, “‘Odd Jobs’ Before NSA,” listed unconventional occupations that some employees had before joining the world’s largest electronic spying organization. The prior jobs included being a craps dealer in Las Vegas, a developer of crossword puzzles for the New York Times, a professional baseball player in the Atlanta Braves farm system, a nanny for the daughter of Sunny von Bülow’s first husband, and a “mosquito bite test count subject” who was paid to visit forests and swamps to take off his shirt for a minute to assess the local mosquito population.

SIDtoday even offers a window into the hopes and wide-eyed wonder of the agency’s youngest workers, its summer interns. The title of one intern’s article for SIDtoday in 2004 was “How I Spent My Summer Vacation,” while another article in 2011 recounted that on their first day of work, a boisterous group of interns stepped into an elevator and got a quick and stern lecture from “an older gentleman” who warned that “the only thing you need to know is that we don’t talk in the elevators, and the extroverts look at other people’s shoes.” The interns silently shared the same reaction — “What have we gotten ourselves into?”

Obama’s Gift to Trump: A Policy of Cracking Down on Journalists and Their Sources

The Intercept  |  April 6, 2016

ONE OF THE intellectual gargoyles that has crawled out of Donald Trump’s brain is the idea that we should “open up” libel laws to make it easier to punish the media for negative or unfair stories. Trump also wants top officials to sign nondisclosure agreements, so they never write memoirs that upset the boss. Trump is so disdainful of free speech that he has even vowed to use the Espionage Act to imprison anyone who says or leaks anything to the media that displeases him.

Actually, that last bit is made up; Trump hasn’t talked about the Espionage Act. Instead, the Obama administration has used the draconian 1917 law to prosecute more leakers and whistleblowers than all previous administrations combined. Under the cover of the Espionage Act and other laws, the administration has secretly obtained the emails and phone records of various reporters, and declared one of them — James Rosen of Fox News — a potential “co-conspirator” with his government source. Another reporter, James Risen of the New York Times, faced a jail sentence unless he revealed a government source (which he refused to do).

Obama has warned of the imminent perils of a Trump presidency, but on the key issue of freedom of the press, which is intimately tied to the ability of officials to talk to journalists, his own administration has established a dangerous precedent for Trump — or any future occupant of the Oval Office — to use one of the most punitive laws of the land against some of the most courageous and necessary people we have. One section of the Espionage Act even allows for the death penalty.

Obama’s gift to Trump was unintentionally highlighted in a speech the president delivered last week at a ceremony to honor the winner of the Toner Prize for Excellence in Journalism. Obama lamented the financial challenges facing the journalism industry and lauded the assembled reporters and editors for the hard and vital work they do. He made no mention of the ways in which his administration is making that job even harder, however, and that omission prompted the winner of the prize, ProPublica’s Alec MacGillis, to gently note, “That does not get him off the hook for his administration taking so long to respond to our FOIAs.”

Two years ago, Eben Moglen, a law professor at Columbia University, gave a series of lectures in which he discussed the idea of “fastening the procedures of totalitarianism on the substance of democratic society.” Moglen’s lectures were mostly concerned with surveillance by the National Security Agency — the title of his talks was “Snowden and the Future” — but his idea applies to other procedures the U.S. government has recently become fond of. Few are more important than targeting whistleblowers and journalists, and Obama has begun the fastening process.

It’s a maddening situation that becomes all the more maddening when you think of the lives of the leakers and whistleblowers the Department of Justice has ruined. I have previously written at length about two of them, Jeffrey Sterling of the CIA and Stephen Kim of the State Department. A new documentary about Kim, directed by Steve Maing and released this week by Field of Vision, the film division of The Intercept, powerfully shows the personal hell of living under Obama’s crackdown. After serving a prison sentence for discussing a classified report on North Korea with Fox’s James Rosen, Kim now finds it impossible to return to his old life. Although he has advanced degrees from Harvard and Yale, he cannot get a foreign policy job because of the taint of being a convicted leaker. Kim now describes himself as “homeless, penniless, family-less,” and adds, “I cannot go back to what I was. That person is gone.”

Leakers and whistleblowers are not just categories of people — they are actual people with names and careers and children and lives that have been unjustly crushed. David Petraeus, the former four-star general and CIA director, leaked far more classified data to his biographer-girlfriend than Sterling or Kim or John Kiriakou, and lied to the FBI about it. Petraeus, however, was let off with a misdemeanor plea bargain, because if you are powerful you can do as you like. That deal is another gift to Trump or any menace-in-waiting. The president has set a precedent that says it’s okay to literally give a get-out-of-jail card to your friends.

Now that we live in the shadow of a political era that goes by two words — President Trump — it’s time for Obama to disavow the precedent he has set. The next time he gives a speech on the importance of journalism and free speech, he should admit he has made a terrible mistake and pardon the people who were wrongly prosecuted, including Manning, Kim, Sterling, Kiriakou, and Thomas Drake. He should ask their forgiveness. Obama does not have the power to stop us from electing a terrible president, but he can limit the damage that one can do.

What the Guilty Verdict of Radovan Karadzic Tells Us About War Crimes After 9/11

The Intercept  |  March 24, 2016

WHEN I FIRST MET RADOVAN KARADZIC, he seemed more of a well-dressed buffoon than a major war criminal. Tall and blustery, with wavy hair and double-breasted suits, he made outlandish statements that few people took at face value. His prior achievements, such as they were, did not suggest a history-making future — he had been a writer of bad poetry, a psychiatrist to losing soccer teams, a small-time embezzler of public funds.

Karadzic became the leader of Bosnian Serbs in the 1990s and made history in dark ways, but the latest twist, which occurred today, is unexpectedly bright — he has been convicted, after a long and open trial in the Hague, of genocide, war crimes, and crimes against humanity, and sentenced to 40 years in prison. This outcome is bright for reasons beyond the satisfaction of justice in the Balkans. At the moment, it might seem far-fetched to imagine that U.S. political and military officials will be held to account for torture and other war crimes they approved, condoned, or bore command responsibility for in the post-9/11 era. But it was even more unlikely in the 1990s to think that the hand of justice — the justice of a fair trial, not a mob’s noose or a precision-guided missile — would get close to Karadzic and his prime collaborators.

Guess what? Slobodan Milosevic, the Yugoslav leader who masterminded the carnage in the Balkans, was ousted from power in 2000 and extradited to an international tribunal at the Hague. His trial was under way in 2006 when he died of a heart attack. Ratko Mladic, the military leader of Bosnian Serb forces, was extradited to the Hague in 2011 and a verdict in his case is expected soon. The unthinkable happened to the untouchable. And it has happened to others who were brought to the Hague for trial, including, just a few days ago, the leader of a Congolese rebel group that carried out a campaign of murder and pillage in the Central African Republic.

Many valid criticisms can be made of the war-crimes trials that have been conducted in the Netherlands and elsewhere. They provide victor’s justice with an international fig leaf; they are often weighted against malefactors whose skin colors are not white; they have passed over guilty parties from countries of geopolitical import. These are all true. Yet these trials and others have shown that in some cases — and it bears repeating, in cases that meet the particular requirements of the imperial age in which we live — the impossible can be accomplished.

FROM 1992 UNTIL 1995, Karadzic led the Bosnian Serbs who introduced the phrase “ethnic cleansing” into the lexicon of modern Europe, murderously pushing non-Serbs out of large swathes of Bosnia and besieging Sarajevo and other cities. At the time of his crimes and even afterward, he seemed immune to punishment — because he possessed bodyguards and protectors in Belgrade, and because the fabled international community didn’t care that much about bringing him to justice. Yet years later, justice caught up with him.

In 2014, President Obama made the headline-grabbing admission, “We tortured some folks.” Yet his long-overdue statement was not followed by the kind of legal consequences that have been required of other states and individuals that violated the laws of war. After all, it would not have been enough for the successors of Karadzic or Milosevic to simply admit that war crimes were committed and move on without trials. While a handful of low-level violators have been punished in the United States— some soldiers involved in abuses at Abu Ghraib have gone to prison, for instance — their commanders, whether with stars on their shoulders or tassles on their loafers, have lived unmolested by U.S. courts. And, for the most part, they have been honored for their service. (Here’s a video of President George W. Bush awarding a Medal of Freedom to, among others, CIA director George Tenet, who oversaw the agency’s black sites and “enhanced interrogation techniques.”)

Many of the people who survived Karadzic’s crimes are long dead, as are many of the people who wrote about them. With this timeline in mind, it could well be a quarter century or more before a legal reckoning occurs for everything the U.S. government has done since Al Qaeda terrorists hijacked four civilian jetliners on September 11, 2001.  Today, for instance, Henry Kissinger enjoys the company and adulation of mainstream politicians and journalists, even as we continue to learn more about the graveyards filled a half century ago by his words and winks over Cambodia, Argentina, and Bangladesh. Kissinger is in his nineties and too hallowed in America to be affronted by a trial, so the best we can hope for might be the lacerating words of Bernie Sanders, who said in a debate with Hillary Clinton last month, “Henry Kissinger was one of the most destructive secretaries of state in the modern history of this country. I am proud to say that Henry Kissinger is not my friend.”

Of course those were just the words of a presidential candidate, not the verdict of a court or of history, but it was something. The people who believed that Karadzic would never face justice now have something to celebrate, too. We should keep that in mind when we are told that we tortured some folks but nobody should be held responsible for it.

‘13 Hours’ Splashes Blood Across the Screen and Misses the Real Story of Benghazi

The Intercept  |  January 14, 2016

Would you give the story of Benghazi to the producer of Teenage Mutant Ninja Turtles? Someone did. The result is the new film directed by Michael Bay, 13 Hours, which makes Rambo look like War and Peace.

In 13 Hours, Bay displays a fetish for fake blood and heads that explode like watermelons when waves of bad guys are given the tap-tap of eternal sleep from the hot barrels of American assault rifles. Are the repetitive scenes of mowed-down attackers a job-creation program for the hundreds of dark-haired extras dressed as ready-for-paradise militiamen? Was Bay suffering from the delusion that every attacker killed on screen would translate into a vote for an Oscar? The true story of 13 Hours, in Bay-worthy broad strokes, is this: Six private military contractors who work for the CIA try to stave off attacks by Libyan militants on two U.S. compounds in Benghazi in 2012. Yet Bay’s movie feels like a hybrid war/zombie film, The Green Berets meets Night of the Living Dead.

I went into the screening with the distinct premonition that I would emerge in anger after seeing another maddeningly effective piece of Hollywood war propaganda. That’s how I felt last year after seeing American Sniper, a surprise blockbuster directed by Clint Eastwood and starring Bradley Cooper in the role of Navy sniper Chris Kyle. In American Sniper, no one asked why Iraqis were shooting at Kyle and the rest of the U.S. military in the first place (hint: we invaded and occupied their country and tortured some of them at prisons like Abu Ghraib). Despite such errors of context, American Sniper was a formidable movie. It was really human and stuck with the audience. Much credit goes to Eastwood, a skilled director, and Cooper, a charismatic actor. His thespian counterpart in 13 Hours is John Krasinski, the nice guy from The Office. As it turns out, Krasinski wields a stapler and a pun far more convincingly than an M-4.

As far as propaganda goes, 13 Hours is mercifully thin. If we are lucky, it will fade away as quickly as the fake smoke from one of its many explosions. But the film is getting a big publicity push and might accidentally be taken seriously. Bay’s team is trying to work the behind-the-scenes alchemy that makes reviews by recovering war correspondents like me utterly irrelevant, not to mention film critics who don’t know an IED from LAX. 13 Hours is lining up endorsements from the taste-makers who really count, celebrities like Carmelo Anthony and Tiger Woods, who are among the sports figures who have attended advance screenings and tweeted about it. (Take that, Pauline Kael.)

13 Hours has a number of political problems that go beyond the one most people are likely to notice — the question of whether Hillary Clinton, secretary of state at the time, should be blamed for what happened in Benghazi. The film doesn’t actually mention Clinton by name. The short answer to the Clinton question is that everyone in the government should be blamed for what happened, including the Republicans who for years have bled the State Department of the funds it needs to provide proper security for its overseas facilities.

13 Hours, like American Sniper, is allergic to context. American Sniper presented Iraqis as sub-human, and that’s pretty much the same treatment Libyans get in 13 Hours, which includes the now-obligatory shot of Muslim fighters praying next to their AK-47s. Yet Bay’s film makes an additional error — it depicts private military contractors as heroes. In the very particular case of what happened in Benghazi in 2012 on September 11 and 12, that’s correct — the men who fought to save Ambassador Christopher Stevens, who died in the attacks along with a mid-level State Department employee, were brave. Two of the military contractors died in combat that night.

The deeper truth — which doesn’t diminish the real-life efforts of the men portrayed in the film — is that private military contractors have been a pox on America’s post-9/11 warfare. Particularly in Iraq, mercenaries hired by the U.S. government operated with near impunity, shooting and killing civilians, and engendered hatred on all sides. Even U.S. troops were fed up with them. A number of times, when I was embedded in Iraq, U.S. soldiers criticized the highly paid mercenaries as irresponsible troublemakers whose excesses further diminished the reputation of all U.S. forces. The most notorious example was the killings at Nisour Square in 2007, when gunmen working for Blackwater killed 17 civilians and injured 24.

Outsourcing warfare to mercenaries leads to all kinds of perverse outcomes. This was true in Benghazi too, though that story is not told in 13 Hours or the book it’s based on. For instance, one of the contractors killed in Libya, Glen Doherty, was working for the CIA on a short-term contract as a “direct independent contractor.” He had formed his own company for this purpose, called Icarus, Inc., and had been required by the CIA to buy an insurance policy. But according to a lawsuit filed by his mother and other relatives (settled last year in a confidential agreement), the policy, bought from an insurer recommended by the CIA, was nearly worthless and the insurer refused to pay death benefits because Doherty had no children or spouse. Even the contractors are cheated in the new American way of war.

13 Hours also fails to mention one of the strange reasons why the CIA contractors in Benghazi were called into combat. The defense of a State Department diplomatic compound in the city had been outsourced to a little-known military contractor, Blue Mountain Group, which had hired a small number of underpaid and ill-trained Libyans. When the attack began, the Libyan contractors mostly disappeared, along with the local militia that was supposed to provide another layer of protection. The bizarre upshot: A group of contractors hired by the CIA was called in to save the day partly because a group of contractors hired by the State Department had run away. It’s a strange twist. Maybe someone will make a movie about it one day.

Homeland Goes Rogue Against the Espionage Act

The Intercept  |  November 10, 2015

On Sunday evening, at around 9:30, a senior CIA official committed an egregious violation of the Espionage Act, leaking a cache of secret cables to someone who did not have clearance to receive them. The official now stands in breach of a draconian law the Obama administration has used to win lengthy prison sentences against leakers and whistleblowers.

Of course the breach occurred in the latest episode of Homeland, so nobody is going to jail, unless manufacturing an implausible plotline is a federal crime. But the scenario that played out between Saul Berenson and Carrie Mathison on Sunday constitutes a welcome repudiation in popular culture of an abusive law, because Saul and Carrie are the heroes in this show, and heroes don’t do things that merit a 35-year prison sentence. While Homeland tends to be as reactionary as it is enjoyable, the latest twist puts Saul and perhaps Carrie into the same Espionage Act box as Edward Snowden, Chelsea Manning, Thomas Drake, Stephen Kim and John Kiriakou, all of whom have been charged under the law.

Yes, that means Saul Berenson is our new Edward Snowden, with the caveat that a compliant Saul was taken into custody in Berlin at the end of the episode, while the usually long arm of American law enforcement has not been able to touch Snowden, who lives in Russia. I wouldn’t be surprised if the show’s producers and writers, whose prior work is not infused with enthusiasm for left or libertarian causes, make the argument in a future episode that leaking classified documents for noble reasons is laudable only if you face the music like Saul. But let’s put that aside, because according to the Department of Justice, whether or not you surrender doesn’t lessen the impact of the dastardly things you have done to shred national security.

Although Sunday’s episode did not mention the Espionage Act, here’s how it comes into play. As the episode neared its end, Saul became convinced by Carrie, who herself is something of a fugitive, that the Russians had infiltrated the CIA. Carrie told Saul that she needs to see a cache of secret files that will give her the clues to expose the Kremlin’s perfidy. Carrie is of course no longer at the CIA, but once Saul came under suspicion as a turncoat for the Israelis and was abruptly deprived of his clearance, he surreptitiously accessed the agency’s computer system, downloaded the files, and then gave them to Carrie via the dashing billionaire she works for.

(Don’t blame me if you’re having a hard time following the plot, and please be thankful I haven’t mentioned the story line that involves a bullet-riddled Quinn trying to kill himself to save Carrie and being rescued at the last second by a Good Samaritan who takes him home and gives him a transfusion of his own blood but unfortunately does so at the Berlin apartment building where a just-released-from-prison Islamic radical is planning a series of bomb plots that Quinn overhears, leading Quinn to kill the radical while groaning and staggering from the septic bullet wound in his side. This is Homeland at its terrible best.)

It’s going to be instructive to see how the rest of the season deals with what Saul and Carrie have just done. I think it’s safe to assume they will be exonerated for exposing, through the leaked files, the Russian mole (or moles) — one of whom, as we already know, is the head of station in Berlin. But the fact is that Saul and Carrie have potentially violated a couple of sections of the Espionage Act, which does not allow for good intentions as an excuse for leaking classified documents. Carrie might be on the hook, in addition to Saul, because the U.S. government has intimated that it might be illegal to ask someone to leak classified documents.

Of course the law is one thing and its application by the Obama administration is another. David Petraeus, the former general and CIA director, shared with his biographer (and then-girlfriend) several diaries filled with secret information, but he got just a slap on the wrist, pleading guilty to a misdemeanor charge of mishandling classified material. Will Saul and Carrie receive the Petraeus treatment from the Homeland equivalent of the Department of Justice — that is, the writers’ room? I hope so, if only to demonstrate that leaking secret documents in the public interest is an act that deserves the gratitude of society. Or an Emmy

Firing Blind: Flawed Intelligence and the Limits of Drone Technology

The Intercept  |  Oct. 15, 2015

This article was co-authored with Cora Currier and is part of a series of stories, The Drone Papers, that The Intercept published based on secret military documents. For a version of this story with links to the source documents, please click here.

The Obama administration has portrayed drones as an effective and efficient weapon in the ongoing war with al Qaeda and other radical groups. Yet classified Pentagon documents obtained by The Intercept reveal that the U.S. military has faced “critical shortfalls” in the technology and intelligence it uses to find and kill suspected terrorists in Yemen and Somalia.
Those shortfalls stem from the remote geography of Yemen and Somalia and the limited American presence there. As a result, the U.S. military has been overly reliant on signals intelligence from computers and cellphones, and the quality of those intercepts has been limited by constraints on surveillance flights in the region.
The documents are part of a study by a Pentagon Task Force on Intelligence, Surveillance, and Reconnaissance. They provide details about how targets were tracked for lethal missions carried out by the Joint Special Operations Command, or JSOC, in Yemen and Somalia between January 2011 and summer 2012. When the study was circulated in 2013, the Obama administration was publicly floating the idea of moving the bulk of its drone program to the Pentagon from the CIA, and the military was eager to make the case for more bases, more drones, higher video quality, and better eavesdropping equipment.
Yet by identifying the challenges and limitations facing the military’s “find, fix, finish” operations in Somalia and Yemen — the cycle of gathering intelligence, locating, and attacking a target — the conclusions of the ISR study would seem to undermine the Obama administration’s claims of a precise and effective campaign, and lend support to critics who have questioned the quality of intelligence used in drone strikes.
The study made specific recommendations for improving operations in the Horn of Africa, but a Pentagon spokesperson, Cmdr. Linda Rojas, declined to explain what, if any, measures had been taken in response to the study’s findings, saying only that “as a matter of policy we don’t comment on the details of classified reports.”

Tyranny of Distance
One of the most glaring problems identified in the ISR study was the U.S. military’s inability to carry out full-time surveillance of its targets in the Horn of Africa and Yemen. Behind this problem lies the “tyranny of distance” — a reference to the great lengths that aircraft must fly to their targets from the main U.S. air base in Djibouti, the small East African nation that borders Somalia and sits just across the Gulf of Aden from Yemen.
Surveillance flights are limited by fuel — and, in the case of manned aircraft, the endurance of pilots. In contrast with Iraq, where more than 80 percent of “finishing operations” were conducted within 150 kilometers of an air base, the study notes that “most objectives in Yemen are ~ 500 km away” from Djibouti and “Somalia can be over 1,000 km.” The result is that drones and planes can spend half their air time in transit, and not enough time conducting actual surveillance.
Compounding the tyranny of distance, the ISR study complained, was the fact that JSOC had too few drones in the region to meet the requirements mandated for carrying out a finishing operation. The military measures surveillance flights in orbits — meaning continuous, unbroken coverage of a target — and JSOC chronically failed to meet “minimum requirements” for orbits over Yemen, and in the case of Somalia had never met the minimum standards. On average, 15 flights a day, by multiple aircraft relieving or complementing one another, were needed to complete three orbits over Yemen.
The “sparse” available resources meant that aircraft had to “cover more potential leads — stretching coverage and leading to [surveillance] ‘blinks.’” Because multiple aircraft needed to be “massed” over one target before a strike, surveillance of other targets temporarily ceased, thus breaking the military’s ideal of a “persistent stare” or the “unblinking eye” of around-the-clock tracking.
JSOC relied on manned spy planes to fill the orbit gap over Yemen. In June 2012 there were six U-28 spy planes in operation in East Africa and the Arabian Peninsula, as well as several other types of manned aircraft. The U-28s in Djibouti were “referred to as the ‘Chiclet line,’” according to the ISR study, and “compounded Djiboutian air control issues” because of their frequent flights.
Only in the summer of 2012, with the addition of contractor-operated drones based in Ethiopia and Fire Scout unmanned helicopters, did Somalia have the minimum number of drones commanders wanted. The number of Predator drones stationed in Djibouti doubled over the course of the study, and in 2013, the fleet was moved from the main U.S. air base, Camp Lemonnier, to another Djibouti airstrip because of overcrowding and a string of crashes.
“Blinking” remained a concern, however, and the study recommended adding even more aircraft to the area of operations. Noting that political and developmental issues hampered the military’s ability to build new bases, it suggested expanding the use of aircraft launched from ships. JSOC already made use of Fire Scout helicopter drones and small Scan Eagle drones off the coast of Somalia, as well as “Armada Sweep,” which a 2011 document from the National Security Agency, provided by former contractor Edward Snowden, describes as a “ship-based collection system” for electronic communications data. (The NSA declined to comment on Armada Sweep.)
Lt. Gen. Michael Flynn, who was head of the Defense Intelligence Agency from July 2012 to August 2014, told The Intercept that the surveillance requirements he outlined for tracking al Qaeda while in office had never been met. “We end up spending money on other stupid things instead of actually the capabilities that we need,” he said. “This is not just about buying more drones, it’s a whole system that’s required.”
According to Micah Zenko, a senior fellow at the Council on Foreign Relations who has closely studied the drone war, resource constraints in Africa “mean less time for the persistent stare that counterterrorism analysts and commanders want, and got used to in the Afghanistan-Pakistan theater.”

Find, Fix, Finish
The find, fix, finish cycle is known in the military as FFF, or F3. But just as critical are two other letters: E and A, for “exploit and analyze,” referring to the use of materials collected on the ground and in detainee interrogations.
F3EA became doctrine in counterinsurgency campaigns in Iraq and Afghanistan in the mid-2000s. Gen. Stanley McChrystal wrote in his memoir that the simplicity of those “five words in a line … belied how profoundly it would drive our mission.” In 2008, Flynn, who worked closely with McChrystal before becoming head of the Defense Intelligence Agency, wrote that “Exploit-Analyze starts the cycle over again by providing leads, or start points, into the network that could be observed and tracked using airborne ISR.”
Deadly strikes thus truncate the find, fix, finish cycle without exploitation and analysis — precisely the components that were lacking in the drone campaign waged in East Africa and Yemen. That shortfall points to one of the contradictions at the heart of the drone program in general: Assassinations are intelligence dead ends.
The ISR study shows that after a “kill operation” there is typically nobody on the ground to collect written material or laptops in the target’s house, or the phone on his body, or capture suspects and ask questions. Yet collection of on-the-ground intelligence of that sort — referred to as DOMEX, for “document and media exploitation,” and TIR, for “tactical interrogation report” — is invaluable for identifying future targets.
Stating that 75 percent of operations in the region were strikes, and noting that “kill operations significantly reduce the intelligence available from detainees and captured material,” the study recommended an expansion of “capture finishes via host-nation partners for more ‘finish-derived’ intelligence.” One of the problems with that scenario, however, is that security forces in host nations like Yemen and Somalia are profoundly unreliable and have been linked to a wide variety of abuses, including the torture of prisoners.
A report last year by retired Gen. John Abizaid and former Defense Department official Rosa Brooks noted that the “enormous uncertainties” of drone warfare are “multiplied further when the United States relies on intelligence and other targeting information provided by a host nation government: How can we be sure we are not being drawn into a civil war or being used to target the domestic political enemies of the host state leadership?”
In 2011, for example, U.S. officials told the Wall Street Journal that they had killed a local governor because Yemeni officials didn’t tell them he was present at a gathering of al Qaeda figures. “We think we got played,” one official said. (The Yemeni government disputed the report.)
Despite such warnings, the drone program has relied heavily on intelligence from other countries. One slide describes signals intelligence, or SIGINT, as coming “often from foreign partners,” and another, titled “Alternatives to Exploit/Analyze,” states that “in the reduced access environment, national intelligence partners often have the best information and access.”
One way to increase the reliability of host-nation intelligence is to be directly involved in its collection — but this can be risky for soldiers on the ground. The study called for “advance force operations,” including “small teams of special force advisors,” to work with foreign forces to capture combatants, interrogate them, and seize any written material or electronic devices they possess. According to public Special Operations guidelines, advance force operations “prepare for near-term” actions by planting tracking devices, conducting reconnaissance missions, and staging for attacks. The documents obtained by The Intercept did not specify an optimum number of advisors or where they should be based or how exactly they should be involved in capture or interrogation operations.
Although the study dates from 2013, current Special Operations Commander Joseph Votel echoed its findings in July 2015. Votel noted that his troops were working closely with African Union forces and the Somali government to battle al Shabaab. He added, “We get a lot more … when we actually capture somebody or we capture material than we do when we kill someone.”

The Poverty of Signals Intelligence
With limited ability to conduct raids or seize materials from targeted individuals in Yemen and Somalia, JSOC relied overwhelmingly on monitoring electronic communications to discover and ultimately locate targets.
The documents state bluntly that SIGINT is an inferior form of intelligence. Yet signals accounted for more than half the intelligence collected on targets, with much of it coming from foreign partners. The rest originated with human intelligence, primarily obtained by the CIA. “These sources,” the study notes, “are neither as timely nor as focused as tactical intelligence” from interrogations or seized materials.
Making matters worse, the documents refer to “poor” and “limited” capabilities for collecting SIGINT, implying a double bind in which kill operations were reliant on sparse amounts of inferior intelligence.
The disparity with other areas of operation was stark, as a chart contrasting cell data makes clear: In Afghanistan there were 8,900 cell data reports each month, versus 50 for Yemen and 160 for Somalia. Despite that, another chart shows SIGINT comprised more than half the data sources that went into developing targets in Somalia and Yemen in 2012.
Flynn told The Intercept there was “way too much reliance on technical aspects [of intelligence], like signals intelligence, or even just looking at somebody with unmanned aerial vehicles.”
“I could get on the telephone from somewhere in Somalia, and I know I’m a high-value target, and say in some coded language, ‘The wedding is about to occur in the next 24 hours,’” Flynn said. “That could put all of Europe and the United States on a high-level alert, and it may be just total bullshit. SIGINT is an easy system to fool and that’s why it has to be validated by other INTs — like HUMINT. You have to ensure that the person is actually there at that location because what you really intercepted was the phone.”
In addition to using SIGINT to identify and find new targets, the documents detail how military analysts also relied on such intelligence to make sure that they had the correct person in their sights and to estimate the harm to civilians before a strike. After locating a target, usually by his cellphone or other electronics, analysts would study video feeds from surveillance aircraft “to build near-certainty via identification of distinguishing physical characteristics.”
A British intelligence document on targeted killing in Afghanistan, which was among the Snowden files, describes a similar process of “monitoring a fixed location, and tracking any persons moving away from that location, and identifying if a similar pattern is experienced through SIGINT collect.” The document explains that “other visual indicators may be used to aid the establishment of [positive identification]” including “description of clothing” or “gait.” After a shot, according to the British document and case studies in the Pentagon’s ISR report, drones would hover to determine if their target had been hit, collecting video and evidence of whether the cellphone had been eliminated. (The British intelligence agency, GCHQ, declined to comment on the document.)
Yet according to the ISR study, the military faced “critical shortfalls of capabilities” in the technologies enabling that kind of precise surveillance and post-strike assessment. At the time of the study, only some of the Reaper drones had high-definition video, and most of the aircraft over the region lacked the ability to collect “dial number recognition” data.
The study cites these shortcomings as an explanation for the low rate of successful strikes against the targets on the military’s kill list in Yemen and Somalia, especially in comparison with Iraq and Afghanistan. It presents the failings primarily as an issue of efficiency, with little mention of the possible consequence of bad intelligence leading to killing the wrong people.

How the Makers of ‘Zero Dark Thirty’ Seduced the CIA with Fake Earrings

The Intercept  |  September 9, 2015

The plot behind the plot of Zero Dark Thirty just gets better and better.

From the moment it premiered in 2012, the film by Kathryn Bigelow and Mark Boal about the hunt for Osama bin Laden has been criticized as pro-torture propaganda. According to its many detractors, the film embraced the discredited notion that torture by CIA interrogators made Al Qaeda members talk about the whereabouts of their leader. It subsequently was revealed that Bigelow and Boal had received an unusual amount of access to CIA officials who had a keen interest in peddling the virtues of waterboarding, and this spawned a cottage industry of investigations and articles.

Vice News has added to the spicy pile with a 5,000-word article by Jason Leopold and Ky Henderson that draws on more than 100 pages of internal CIA documents released through the Freedom of Information Act. According to the documents, at least 10 CIA officers met Bigelow and Boal at the agency’s headquarters in Langley, Virginia, as well as at hotels and restaurants in Washington D.C. and Los Angeles. In addition, the CIA director at the time, Leon Panetta, met Bigelow at a dinner in Washington and, soon after that, shared a table with her and Boal at the White House Correspondents’ Association Dinner. It also turns out that Boal read his script over the phone to CIA public affairs officials on four separate days in the fall of 2011.

But the biggest takeaway from these documents is that even as the CIA turned Bigelow and Boal into its willing propagandists, the filmmakers were turning the CIA into star-gazing dupes; the seduction went both ways. Bigelow and Boal emerge in these documents as excellent co-opters of the nation’s toughest spies — and it didn’t take much for them to do that.

Bigelow and Boal visited CIA headquarters (an officer recalled having to cover up classified material on one occasion), but the meetings soon moved off campus to “avoid jealousy” about who was getting “face time” with the famous duo, according to the CIA documents obtained by Vice. For instance, one CIA officer met Boal at his suite in the luxury Jefferson Hotel in Washington D.C. and dined with him at the hotel as well as at a nearby restaurant, Citronelle, where a slab of ribeye cost $39. Not long afterwards, Bigelow met that same officer in her accommodations at the Ritz-Carlton in Georgetown.

The seduction was bi-coastal. A CIA officer met Boal in Hollywood for a meal and then drove to a beach house in Malibu to talk with Bigelow. Boal gave the officer a bottle of Tequila and boasted it was worth “several hundred dollars” (although when someone at the CIA checked, the highest listed price was $169.99). The officer who had met Boal at the Jefferson Hotel also had dinner with him and Bigelow at the members-only Soho House in L.A. and later told investigators she had “developed a friendship” with the filmmakers. It had not been terribly expensive for Bigelow and Boal to develop these friendships, however — Bigelow had given the officer a set of what the director described as “black Tahitian pearl earrings” that, it turned out, were painted black and were so cheap they weren’t worth the cost of an appraisal.

The documents show that auditors at the CIA referred the matter to the Department of Justice for possible criminal action against Boal and Bigelow for bribing public officials. Prosecutors took no action. To date, Zero Dark Thirty has earned more than $130 million in worldwide ticket sales.

The Philosopher of Surveillance

The Intercept  |  August 11, 2015
What Happens When a Failed Writer Becomes a Loyal Spy?

ARE YOU THE SOCRATES of the National Security Agency?

That was the question the NSA asked its workforce in a memo soliciting applications for an in-house ethicist who would write a philosophically minded column about signals intelligence. The column, which would be posted on a classified network at the NSA, should be absorbing and original, the memo said, asking applicants to submit a sample to show they had what it takes to be the “Socrates of SIGINT.”

In 2012, the column was given to an analyst in the Signals Intelligence Directorate who wrote that initially he opposed the government watching everyone but came around to total surveillance after a polygraph exam did not go well. In a turn of events that was half-Sartre and half-Blade Runner, he explained that he was sure he failed the polygraph because the examiner did not know enough about his life to understand why at times the needle jumped.

“One of the many thoughts that continually went through my mind was that if I had to reveal part of my personal life to my employer, I’d really rather reveal all of it,” he wrote. “Partial revelation, such as the fact that answering question X made my pulse quicken, led to misunderstandings.”

He was fully aware of his statement’s implications.

“I found myself wishing that my life would be constantly and completely monitored,” he continued. “It might seem odd that a self-professed libertarian would wish an Orwellian dystopia on himself, but here was my rationale: If people knew a few things about me, I might seem suspicious. But if people knew everything about me, they’d see they had nothing to fear. This is the attitude I have brought to SIGINT work since then.”

When intelligence officials justify surveillance, they tend to use the stilted language of national security, and we typically hear only from senior officials who stick to their platitudes. It is rare for mid-level experts — the ones conducting the actual surveillance — to frankly explain what they do and why. And in this case, the candid confessions come from the NSA’s own surveillance philosopher. The columns answer a sociological curiosity: How does working at an intelligence agency turn a privacy hawk into a prophet of eavesdropping?

Not long after joining the NSA, Socrates was assigned a diplomatic target. He knew the saying by Henry Stimson that “gentlemen do not read each other’s mail,” and he felt uncomfortable doing the digital equivalent of it. As he wrote, “If there were any place in the world that idealism should rule and we should show voluntary restraint in our intelligence work, diplomacy was that place. Terrorists who meant harm to children and puppies were one thing, but civil servants talking about work while schlepping their kids to soccer practice seemed a little too close to home.”

His polygraph was an epiphany, however.

“We tend to mistrust what we do not understand well,” he noted. “A target that has no ill will to the U.S., but which is being monitored, needs better and more monitoring, not less. So if we’re in for a penny, we need to be in for a pound.”

I wanted to know more about Socrates, but one of the asymmetric oddities of the NSA is that the agency permits itself to know whatever it wants to know about any of us, yet does everything it can to prevent us from knowing anything about the men and women who surveil us, aside from a handful of senior officials who function as the agency’s public face. An NSA spokesperson refused to confirm that Socrates even worked there. “I don’t have anything to provide for your research,” the spokesperson wrote in an email.

The “SIGINT Philosopher” columns, provided to The Intercept by NSA whistleblower Edward Snowden, gave me the opportunity to learn more without the agency’s assistance, because they included his name. Heading down the path of collecting information about Socrates (whose name we are not publishing — more on that later), I was in the odd position of conducting surveillance on a proponent of surveillance, so I had a get-out-of-guilt-free card.

Unlike the paranoid eavesdropper played by Gene Hackman in The Conversation, or the quiet Stasi agent at the center of The Lives of Others, Socrates lives in the age of Google and data-mining. Like the rest of us, he cannot remain invisible. Socrates was an evangelical Christian for seven years, got married at 19, divorced at 27 and remarried not long after. He is now a registered Democrat and lives in a Maryland suburb with his son and wife, a public school teacher. I’ve seen the inside of their house, thanks to a real estate listing; the home, on a cul de sac, has four bedrooms, is more than 2,000 square feet, and has a nice wooden deck. I’ve also seen pictures of their son, because Socrates and his wife posted family snapshots on their Facebook accounts. His wife was on Twitter.

Conducting surveillance can be a creepily invasive procedure, as Socrates discovered while peering into the digital life of his first diplomatic target, and as I discovered while collecting information about him. In the abstract, surveillance might seem an antiseptic activity — just a matter of figuring out whether a valid security reason exists to surveil a target and then executing a computer command and letting the algorithms do the rest. But it’s not always that clinical. Sheelagh McNeill, the research editor with whom I worked on this story, was able to find Socrates’ phone number, and although he did not respond to voicemails, he eventually got on the line when I called at night.

His young son answered and fetched his father. Socrates was not pleased. He asked that I not disclose his identity, which was ironic because his columns praised the virtues of total transparency as a way to build trust. Why shouldn’t the public know about him? What’s wrong with a bit of well-intentioned surveillance among fellow Americans? I was not able to ask these questions, however.

“I can’t say anything,” he said, not long before he hung up. “You can’t use my name.”

He didn’t need to say anything, because his NSA columns explained a lot, as did the online databases McNeill and I consulted, though all of it paled in comparison to the motherlode of his blog.


The name on Socrates’ columns was not, it turned out, his full legal name; he used an abbreviated form of his first name. His last name is an ordinary one that yields a large number of search results. McNeill and I had a bit of luck, though — his columns included a user ID with his middle initial. McNeill needed a day to comb the web and examine public as well as proprietary databases before finding a person she believed was Socrates. He resided in the Washington area, was married to a woman who had worked in Korea (Socrates is a Korean language analyst), and he had lived in a variety of places that correlated with biographical hints in the columns.

But there wasn’t a lot of flesh on the digital bones we had found; Socrates was correct when he said it’s easy to misunderstand someone if you know only a bit. McNeill and I, though fairly certain that we had located the right person, still didn’t know much about his life or who, in an existential sense, he was. That changed when McNeill typed his name into Google and the name of a world event that one of his columns had mentioned.

She walked to my desk with her laptop open and pointed to a blog on her screen.

“This is him,” she said.

The blog consists of more than 20,000 words Socrates wrote about his failed effort, before joining the NSA, to earn a living as a writer. As he explained in often bitter and personal detail, he reluctantly went from starving writer to salaried spy. Instead of creating fictional characters, he spied on real ones. It dawned on me: coming from the world of books and words rather than technology and code, Socrates represented a post-modern version of the literary eavesdropper.

In his twenties, according to his blog, he wrote a personal mission statement, in the style of Jerry Maguire, in which he described the creation of literature as a higher calling than raising a child, proclaiming it nobler to live as a penniless writer than a parent. He took subsistence jobs to pay the bills and relied on financial support from family members as he tried to become the next Jonathan Franzen. He loved the great authors he read and studied — Melville, Cervantes, Borges, Vonnegut, and others. He wanted to produce great works that would persuade people to love and care about the world as much as he did.

It didn’t work out, and ironically the turning point was a graduate writing program he enrolled in at a Midwestern university in 2002. The program used the workshop method of putting students into a group and having them read and critique one another’s work. His experience amounted to a year and a half of getting bad advice from bad writers working part-time jobs to put themselves through a middling school. Nearly every professor was a dick, he wrote, and he mused that writing had turned them into dicks.

The worst part of the experience was the financial side, because he went into debt (annual tuition and living costs at his university can exceed $25,000). Tired of asking for handouts and getting rejection letters, he wrote in his blog that the nobility of writing was a lie. He was so angry with himself and his writing that he deleted everything he had written, even throwing away hard copies of his stories, and stopped reading literature altogether. He decided to look for real work.

Socrates was able to land a job at the NSA. He had a background in Korean, which is of great interest in the intelligence world. He worked hard, had a son, owned a house, did volunteer work with refugees. He was living the American dream. In 2012, he began the “SIGINT Philosopher” columns, and this seems to have reminded him of the joys and rewards of writing for an audience. The next year, according to his blog, he thought he might lose his day job and this crisis made him ask what he most wanted to do in life. The answer surprised him: He wanted to write.

He was having, as he frankly admitted, a mid-life crisis that turned into a writing experiment. After 10 years of ignoring literature, he set a goal — he would write a collection of stories for an annual competition organized by the University of Iowa Press. He had a bit less than a year to write the stories, while keeping his position at the NSA. In the summer of 2014, a month before the Iowa deadline and just before one of his stories was published in a small literary review, he started blogging, without mentioning that he was a spy.

The surveillance archetypes that dominate popular culture are different from Socrates because they eventually see evil in the systems of surveillance that employ them. There is Winston Smith in 1984, who works at the Ministry of Truth and despises everything it does. Gerd Wiesler in The Lives of Others turns insubordinate after he receives an assignment to surveil a well-known writer and his girlfriend. And Harry Caul in The Conversation comes to fear that he is being played by the business executive who hired him.

Socrates, on the other hand, is loyal to a fault. One of his columns made a point of saying that even if an NSA employee disagrees with a policy, and even if the policy is wrong, she should stay the course. “We probably all have something we know a lot about that is being handled at a higher level in a manner we’re not entirely happy about,” he wrote. “This can cause great cognitive dissonance for us, because we may feel our work is being used to help the government follow a policy we feel is bad.” Socrates advised modesty. Maybe the policy is actually correct — or perhaps it is wrong but will work out in the end. “I try,” he explained, “to be a good lieutenant and good civil servant of even the policies I think are misguided.”

Socrates does not have a quiet psyche, however. While his blog and columns do not question the NSA, he struggled to live meaningfully. He returned to creative writing to make a lasting and worthwhile mark, so that his time on earth would not be wasted. Unfortunately, his second effort to become a successful writer did not turn out any better than the first. He reached out to two writing groups but never heard back. He paid for an editor to review one of his stories, disagreed with the editor’s comments, and accused the editor of trying to drum up additional fees for more work — and blogged about all of this in excruciating detail. The story, about a man whose ex-girlfriend gives him herpes, was called “Infection.”

Socrates sent his stories to literary reviews and got rejection after rejection. Late last year, he wrote that he felt empty and low. His blogging platform allows for tags for each post, and the tags he used included “rejection,” “rejection notes,” “giving up” and “why write?” Even worse was the silence that greeted the one story he had gotten published after he started blogging. He heard nothing from readers, and he wondered whether anyone other than family members and friends were aware of it.

THE INTERCEPT HAS A POLICY of not publishing the names of non-public intelligence officials unless there is a compelling reason, as with our naming of Alfreda Bikowsky, who oversaw key aspects of the CIA’s torture program. Withholding Socrates’ identity presents certain problems in the age of Google, however. If I quote from his blog, or give its name, or provide other search-enhancing morsels, like the name or location of his graduate writing program or where he was born, I might provide the sort of data that could instantly reveal his name with a few keystrokes.

So I am more or less trying to do what the NSA and a large number of agencies and corporations do with the personal data they possess — stripping away names and other identifying information to “anonymize” the data before sharing it. The beauty of anonymizing data, according to the (very many) entities that do it, is that nobody can be identified — citizens and consumers do not have to worry that their privacy is violated when petabytes of data are collected about what they do, where they go, what they read, where they eat and what they buy, because their names are not attached to it. The conceit is that our data does not betray us.

Anonymization is problematic, however, because it doesn’t always work. It is entirely possible that a reader of this story could make a few lucky or smart guesses and data-mine their way to Socrates’ name. There is a whole area of data research that’s known as re-identification, which consists of matching anonymized data with actual names. Even if anonymization did work, there’s a creepiness to knowing everything about a person even if you don’t know their name. Look at this story — it’s invasive without disclosing Socrates’ name, isn’t it? I could dial up the invasiveness, too. Would you like to know the asking price of the house he lives in? Would you like to know the names of the schools where his wife has worked? Would you like to see the pictures of their son or their house? Know the name of their dog? Their dates of birth? The branch of the military Socrates served in and his dates of service? There is so much I can tell you about Socrates without telling you his name. You don’t need to code if you want to hack into someone’s life. We are all hackers now.

If the original Socrates of ancient Greece were still around, he would probably suggest that it is morally compromising to conduct surveillance on people who have done no harm — no matter whether the surveillance is carried out by a philosopher in a robe, a journalist with a laptop, or an intelligence agency with a $10 billion budget. Surveillance, as a word, is a cleaned-up version of voyeurism, and whether state-sponsored or editor-approved, it’s creepy to carry out, and probably futile in most cases. Socrates (the columnist) insisted that total surveillance would allow the NSA to understand us and not mistake our intentions. His inaugural column even suggested that the NSA’s slogan could be “building informed decision makers — so that targets do not suffer our nation’s wrath unless they really deserve it — by exercising deity-like monitoring of the target.” Yet Socrates probably knows, as most writers do, that what we say does not necessarily reflect what is in our minds.

Here’s an example. I told Socrates, in our phone call, that I had read his blog. I assumed that once our conversation was finished he would go online and take down the blog, scrupulously doing what a smart surveiller would do once he realized he was the target rather than targeter — try to scrub the public domain of his existence to inhibit surveillance of him.

Yet the blog stayed up. In fact, he continued posting — once about a blockbuster movie series he disliked, another time about a short story he generally liked. I asked McNeill, the research editor, what she made of this, and she was surprised, too. Although I could not spy on Socrates in the way the NSA spies on its targets, I had done a lot and thought I understood him. In addition to the biographical and financial data I had mined, Socrates and I have an intellectual kinship as writers. After all, editors have killed stories I have written. I have friends who have gone through graduate writing programs. I have taught in one. I have the same hope (probably futile) that my writing will do some good in this world and somebody in Hollywood will make a movie.

Yet I had misunderstood him. I’m not sure I can ever understand him, even if he were strapped into a polygraph and had all the time in the world to answer my questions. If it is true that we are mysteries even to ourselves — as the original Socrates suggested — the eavesdroppers at the NSA invade our privacy without learning who we really are.

Benghazi Film by Michael Bay Could Be Next ‘American Sniper’ but Let’s Hope Not

The Intercept  |  July 30, 2015

Hollywood surprised itself earlier this year by producing an Iraq war movie that was a blockbuster—American Sniper has earned more than half a billion dollars so far, starring Bradley Cooper in the role of Navy SEAL Chris Kyle. The film also produced intense cultural criticism about the way it narrowly represented the war, portraying Iraqis as little more than turbaned bullseyes for American valor.

Now comes the trailer for 13 Hours: The Secret Soldiers of Benghazi, an action film about the attempt by military contractors working for the CIA to rescue two diplomats from an extremist attack on the American consulate in Benghazi, Libya. The film, directed by Michael Bay, is being touted as a cross between Black Hawk Down and American Sniper. The early reviews—I mean the early tweets—are highly favorable. If the trailer is an accurate indicator, or the director’s filmography (Bay also brought us Pearl Harbor and Transformers), the star-spangled hype is probably on the money, and we will be the poorer for it.

I haven’t seen the film yet—it comes out in January, so press screenings are months away. I contacted Mitchell Zuckoff, who wrote the nonfiction book on which the film is based, as well as a publicist for the studio that is producing the film, but they declined to say what’s in the movie. The main hints are the attention-getting trailer (please take a look) and the cast of characters on the IMDB site. There is apparently no Libyan character who merits a last name—there is just a “Fareed” and “Fareed’s wife.” The other apparently Libyan characters have no names at all; one of them is described as “Bandolier Militiaman” and another is “Camo Headwrap.” Who knows, perhaps 13 Hours will be loaded with rich historical context, but Bay, whose films have grossed $6.4 billion, according to his Twitter bio, is known for other things.

One of the problems with Hollywood war movies is that they rarely tell us what we need to know about the wars we engage in. It’s certainly true that American soldiers often perform heroically in the wars they fight—I have reported from Iraq as well as Afghanistan and have seen it first-hand. It is also true that American soldiers don’t always behave honorably (I have seen this too), but Hollywood doesn’t often shine a light on it. Studio executives prefer to back movies we are willing to buy tickets for, and crowd-pleasers tend to have heroic narratives in the John Wayne mold, which is why for every Apocalypse Now or Three Kings there seem to be a dozen American Snipers or Lone Survivors.

Yet the real problem with conventional war movies is their historically negligent portrayal of the people Americans fight against. The Iraqis or Afghans or Somalis or Vietnamese in our most popular war movies tend to be stick figures at best, snarling animals at worst. This is not only epically unfair to the people upon whose lands we have chosen to fight our wars, it hurts us as well, because we just consume more of the intellectual junk that leads us to believe we are always the good guys and they are always the bad guys and the people we kill always deserve it.

And there’s a genre twist in the trailer for 13 Hours, which portrays military contractors as heroes. It’s true that some contractors have acted bravely in the warzones where they were lucratively employed to fight, and some have been killed (including two in Benghazi), but their overall record is terrible. Military contractors—traditionally referred to as mercenaries—are one of the poxes of the new American way of warfare. When I was in Baghdad in the early years of the occupation, military contractors were among the greatest perils to human life, because they were all but unaccountable and acted like it. Driving around Baghdad in an unmarked civilian vehicle, I worried more about being shot by one of the Blackwater cowboys than being blown up by a car bomb. Yet now they are being packaged as a new type of American war hero, a sort of mercenary chic.

Yes, it’s only a movie, and one we’re not able to see until January. But movies seem to do more to shape our understanding of warfare, valor and foreigners than any other form of popular culture, and it seems we are heading toward another feel-good brainwash.

How Jeffrey Sterling Took On the CIA—and Lost Everything

The Intercept  |  June 18, 2015

THIS IS HOW it ended for Jeffrey Sterling.

A former covert officer for the Central Intelligence Agency, Sterling sat down in a federal courtroom with a lawyer on either side, looking up at a judge who would announce in a few moments whether he would go to prison for the next 20 years. A few feet away, three prosecutors waited expectantly, hoping that more than a decade of investigation by the FBI would conclude with a severe sentence for a man who committed an “unconscionable” crime, as one of them told the judge.

In Sterling’s blind spot, behind his left shoulder, his wife tried not to sob so loudly that the judge would hear. A social worker, she had been interrogated by FBI agents, her modest home was searched, she had been made to testify before a grand jury, and she had given up her hopes for an ordinary life — a child or two rather than the miscarriages she had, a husband who could hold a job, a life that was not under surveillance, and friends who were free of harassment from government agents asking for information about her and her husband.

One of Sterling’s lawyers stood up to ask for leniency. Sterling was a good person, the lawyer said, not a traitor. He was the first in his family to graduate from college. After leaving the CIA, he worked as a healthcare investigator and won awards for uncovering millions of dollars in fraud. He loved his wife. He did not cause any harm and did not deserve to be locked up until he was an old man for talking to a New York Times reporter about a classified program that he believed had gone awry. Please let the sentence be fair, the lawyer said.

It was time for Sterling to say a few words. His lawyers followed him to the lectern, standing a half step behind, as though to steady him if he wavered. A tall man with a low voice, Sterling thanked the court for its efforts to conduct the trial and thanked the judge for delaying its start so he could attend the funeral of one of his brothers. He did not say whether, as the jury had decided, he was guilty of what they had convicted him for — violating the Espionage Act and other laws related to disclosing classified information.

Sterling’s battle against the government had begun more than 15 years earlier, when he was still at the CIA. After he lodged a racial discrimination complaint, he was fired by the agency and filed two federal lawsuits against it, one for retaliation and discrimination, another for obstructing the publication of his autobiography. He also spoke as a whistleblower to Congress. Soon, his savings ran out and he became all but homeless, driving around the country, lost in despair. He eventually returned to his hometown near St. Louis and rebuilt his life, finding the woman who became his wife and landing a job he thrived at.

His new life was torn apart when FBI agents came to his workplace in 2011, placing him in handcuffs and parading him past his colleagues. A few days later, still in jail, he was fired because he had not shown up for work. The drama ended in a wood-paneled courtroom in Alexandria, Virginia on a warm afternoon in May, after Sterling finished his brief statement to the judge.

Sterling’s case has drawn attention primarily for two reasons: it was part of the Obama Administration’s controversial crackdown on leakers and whistleblowers, and prosecutors had tried to force the Times reporter, James Risen, to divulge the name of his source, whom the government believed was Sterling. The case, known as United States of America v. Jeffrey Alexander Sterling, was treated mainly as a freedom-of-the-press issue, with Risen as the heroic centerpiece. Lost in the judicial briefs about the First Amendment was the black man in the middle.

This is Sterling’s story.

DURING HIS LAST year of law school in St. Louis, Sterling was reading a newspaper between classes. He noticed an advertisement that showed a man standing at the edge of a body of water and looking at the horizon in an inspirational way. See the world, the ad said. Serve your country. Join the CIA.

It got him.

As a teenager, Sterling had become fascinated with the rest of the world. When he arrived home from high school, he would watch the MacNeil/Lehrer report on PBS. Attending a racially mixed high school, he didn’t fit in. He remembers being called an Oreo, black on the outside and white on the inside, because his interests didn’t coincide with some people’s concept of what a black kid should do or think or say. Within hours of reading the CIA ad he began working on his application.

His first day at Langley — what people at the agency call their “EOD,” or Entrance On Duty — was May 13, 1993. He was told to park behind the main building and enter through the back doors used by most employees. But Sterling made a detour around the long sides of the building to walk through the grand entrance — the one with the shiny CIA emblem on the marble floor, where you walk by a wall that has stars for each CIA officer killed in the line of duty.

“That was a thrill,” he told me. “I actually did that for the first few days. It meant that much to me, to be able to walk in that front door knowing that I was part of something special. I was so proud of it.”

I met Sterling in April, at his home in O’Fallon, on the outskirts of St. Louis. It had been three months since the jury convicted him, and he was waiting for the hearing at which he would find out whether he would receive the term recommended under federal sentencing guidelines — between 19 to 24 years in prison. He was surprisingly tranquil, occasionally stroking his gray-flecked goatee as he talked about his long fight with the government. Other than discussing his case in a short documentary directed by Judith Ehrlich and produced by Norman Solomon, Sterling has not talked publicly about it. The Justice Department, asked to respond to his account, refused to provide any comment.

IT DID NOT take long, apparently, for the color of Sterling’s skin to set him apart at the CIA.

Once he had completed the agency’s version of basic spy training, Sterling was assigned to the Iran Task Force and dispatched to language school to learn Farsi. In 1997, just before he was to leave for his first overseas post in Germany, he was told that somebody else was going instead.

“We’re concerned that you would stick out as a big black guy speaking Farsi,” Sterling recalls his supervisor saying.

Shocked, he responded, “Well, when did you figure out I was black?”

The agency did not have a good record on diversity. At the time, all of its directors, deputy directors and chiefs of espionage operations had been white men. In 1995, the agency had agreed to pay $990,000 to settle a class-action lawsuit filed by female case officers who accused the agency of sex discrimination. The agency promised to do better on both racial and gender diversity — but it wasn’t, as far as Sterling could tell.

“I seriously considered leaving the agency,” he told me. “But I believed in what I would be able to do. I believed in the career I could have there.”

A few months later, he accepted a different overseas assignment. Shortly before he was to leave, a supervisor said he would instead go to the position in Germany that he had previously been turned down for, because the officer they were planning to send had pulled out. Sterling, a proud man, said he didn’t want to take a position for which he had been deemed second-best.

“You either go where we want or you’re going nowhere,” Sterling says he was told.

He went.

“I was like, OK, I can deal with this, I at least have an assignment,” Sterling told me. “I’ll prove to them how I’m a great case officer.”

Sterling recalls being the only black officer at the agency’s station in Bonn. His cover was as an Army logistics officer rather than a State Department officer, and he says this made it more difficult to gain entry to the social and political circles where foreign spies are recruited; doors that open for diplomats are closed to logistics officers. He believes his bosses thought the color of his skin meant he wouldn’t do as well as other officers, so they didn’t bother giving him a good cover.

“I couldn’t get into a janitor’s convention,” he said.

Sterling returned to the U.S. and was assigned to the counter-proliferation division at the agency’s headquarters before being dispatched to the New York station, where he says that once again he was the only black officer. Things did not go smoothly. He was given an unusual ultimatum — start recruiting three new spies, hold three meetings with each of them, or leave New York. He felt singled out, asked to do more than other officers while lacking the cover they had.

“That was the last I could take of it,” Sterling recalled. “I just said ‘No, I don’t accept this and I’m going to file a complaint.’”

He was transferred back to Langley, where he was given a closet-sized office that he and the co-worker he shared it with jokingly called “the penalty box.” He filed an internal racial discrimination complaint that didn’t succeed, and soon he was fired. John Brennan, who at the time was the agency’s deputy executive director and is currently its director, told the New York Times that “it was an unfortunate situation because Jeffrey was a talented officer and had a lot of skills we are looking for, and we wanted him to succeed. We were quite pleased with Jeffrey’s performance in a number of areas. Unfortunately, there were some areas of his work and development that needed some improvement.”

In O’Fallon, Sterling and I met at the single-story home he shares with his wife and two cats in a community of nearly identical red-and-white houses. “We’re really outside the beltway here,” he joked at one point. He has a voice that’s made for radio — deep and fluid, a bass that usually stays in the same comfortable register. He was dressed in jeans and a short-sleeved shirt, with sandals on his feet. On the wall, there was a print by Salvador Dali of two butterflies dancing in the air. His tone varied only once or twice, when his steady voice sharpened into a knife.

“I had dedicated myself to that agency,” he said, when I asked why he chose to confront the CIA rather than, as many people might have done, carry on quietly or resign without filing a lawsuit. “I couldn’t just walk away from something that was so vital to me and that I knew I was good at, proved I was good at. That was it for me … No, you are not going to treat me that way.”

IN 1972, JIM CROCE came out with a hit song, “You Don’t Mess Around with Jim,” that had several lines about the things a sensible person never does, such as spitting into the wind, pulling off the mask of the Lone Ranger, and tugging on Superman’s cape. Sterling pointed to that last bit of advice — not tugging on Superman’s cape — to describe the path he took. He challenged the CIA, and it probably wasn’t a sensible choice.

In 2001, as he was leaving the agency, he filed a federal lawsuit that said the CIA retaliated against him for making an internal discrimination complaint, and that he had indeed faced a pattern of discrimination there. The suit was dismissed by a judge after the CIA successfully argued in pre-trial motions that a trial would expose state secrets by disclosing sources and methods of intelligence-gathering. An appeals court upheld that ruling, though it noted that the dismissal “places, on behalf of the entire country, a burden on Sterling that he alone must bear” by being deprived of his right to a trial. The dismissal spared Sterling’s supervisors from testifying about their interactions with him. The government has not provided specific responses, in court or to the media, about his accusations of racial discrimination, other than to generally state that he faced none.

He tugged on the CIA’s cape in other ways. He wrote a memoir, tentatively titled Spook: An American Journey Through Black and White, and submitted chapters for pre-publication review. According to a lawsuit Sterling filed in 2003, the CIA determined that his manuscript contained classified information that should not be published, and demanded that he add information that, his suit said, was “blatantly false.” Facing a tough legal battle with a presiding judge who seemed sympathetic to the CIA, Sterling eventually agreed to drop the suit. His manuscript has not been published.

Also in 2003, Sterling met staffers from the Senate Select Committee on Intelligence to let them know his concerns about the mismanagement of a classified program he worked on at the agency. Merlin, as the program was called, involved the CIA giving Iran faulty nuclear blueprints. If the blueprints were used, Iran’s nuclear program would be delayed. The blueprints were given to the Iranians by a Russian scientist who lived in the United States, and Sterling was his CIA handler. The CIA has said the program worked well, but Sterling told the committee staffers it was botched and that the Iranians learned the blueprints were flawed; the Iranians might have gained nuclear insights from the accurate parts.

By the time he talked to the Senate staffers, Sterling had become radioactive by Washington standards. This is the usual whistleblower’s fate. He applied for jobs with the private-sector contractors that tend to eagerly recruit experts like him, and they initially seemed quite interested, Sterling recalls, but their attention vanished suddenly, presumably when they learned about his disputes with the CIA. His descent began in full. Running out of money, he sold his belongings on Craigslist, gave his cats to a woman who had a farm, and packed a few things into his car and took off.

The idea was to drive to his mother’s house in Missouri, but he wandered, parking at truck stops at night and sleeping in his car. “I had nowhere to go,” he recalled. “I had worked hard and it all fell apart.” He eventually visited friends in St. Louis who had a newborn and they made a deal — Sterling cared for their baby and lived rent-free in their house. “It was very humbling to go from being a case officer with the Central Intelligence Agency to now I’m a manny,” Sterling noted.

Then, as things do, his life turned around. In 2004 he landed a job as a healthcare investigator at WellPoint, and he also met a woman, Holly Brooke, and after a few months moved into her house. He now had a job, a life partner, a home. Everything was great until, on the morning of New Year’s Eve in 2005, the CIA’s top lawyer, John Rizzo, was woken up at home by a phone call on his secure line.

RIZZO GROGGILY ANSWERED the phone and was told by an official at the National Security Council that a book was about to be published that disclosed one of the CIA’s most sensitive intelligence programs. The book, by James Risen, was called State of War, and it described the Merlin program as perhaps “one of the most reckless operations in the modern history of the CIA.” Risen’s book did not identify who his source, or sources, were.

Rizzo, who described the day’s events in his memoir, threw on his clothes and drove into town to get the book from the NSC official, then drove to Langley to share it with senior officials who had been dragged from their homes to figure out what to do. The White House wanted to take the extraordinary step of stopping the book from being published. President Bush’s top lawyer, Harriet Miers, asked Rizzo to call Sumner Redstone, the chairman of Viacom, which owned Simon & Schuster, the book’s publisher. In the end, Rizzo didn’t call Redstone, but he made a mental note to file a crimes report with the Department of Justice; the leaker had to be found.

Within a month, two FBI agents were at Sterling’s house outside St. Louis. They claimed they were concerned that an Iranian was on the loose who might do harm to him. Sterling sensed it was a ruse; he told the FBI agents he’d be able to spot someone following him, particularly an Iranian because there were no Iranians where he lived. The agents then asked if they could come inside and Sterling refused. They had a copy of Risen’s book and asked if he knew about it.

“I was like, ‘I don’t know anything about that book. That was the first I had ever seen of that,’” Sterling told me.

This wasn’t the first time Sterling was questioned by the FBI. Risen had interviewed Sterling in 2002 and published a story about his discrimination lawsuit. The next year, Risen reported a story about the Merlin program, but it wasn’t published. Risen asked the CIA for pre-publication comment on the story and was soon summoned to the White House, along with his editor. They were told by then-National Security Adviser Condoleeza Rice that the story, if published, would reveal a valuable covert program and could cost lives. The Times decided to kill it.

The Justice Department launched a criminal investigation in 2003 and FBI agents questioned Sterling that year. However, until the agents showed up at his doorstep in 2006 with Risen’s book, Sterling thought his struggles with the government were behind him.

After that visit, Holly was subpoenaed to testify before a grand jury. She was questioned for seven hours at FBI headquarters in Washington and, she told me, the next day she spent three hours before the grand jury in Alexandria, Virginia. When she returned to St. Louis, she got a call from her lawyer, who said the FBI was coming to search her home. More than a dozen agents soon showed up to confiscate some of the couple’s belongings.

“They left and I had a meltdown,” Holly said during lunch at a pub near her home, as easy-listening rock music played in the background. “I was sobbing and crying and couldn’t understand this. I attempted to go to work the next day and I just lost it. My boss came to me and she said, ‘You need to leave. I think you are suffering from post-traumatic stress disorder.’”

Then, as mysteriously as it had intruded into their lives, the FBI’s investigation seemed to dissipate. In the fall of 2010, Sterling’s lawyer called him to say the case appeared to be winding down.

ON JANUARY 6, 2011, Sterling was asked to attend a meeting at his office. He was on medical leave after a knee-replacement operation, so he hobbled into work with a cane, and after checking on the mail that had piled up on his desk, a colleague told him the security staff needed to see him because there was a problem with his badge. It was urgent, Sterling was told. When he visited the security staff he was confronted, he says, by several FBI agents and police officers who placed him under arrest. His cane was taken away, his arms were handcuffed behind his back, and he was marched out of the building, limping, as his co-workers gaped. The indictment accused him of leaking to Risen out of “anger and resentment” at the CIA.

The timing of his arrest was unusual. The exchanges between Sterling and Risen began in 2001 and finished in 2005, according to records of their phone calls and emails that were listed in the indictment. Why was Sterling arrested six years after he last communicated with Risen and five years after his home was searched by the FBI? If, as the government claimed, he had caused so much harm, why did prosecutors wait so long to press charges?

The answers appear to be political. Until Barack Obama was elected president, the Department of Justice rarely prosecuted leakers. Obama promised, as a candidate, to create the most transparent administration ever, but he has presided over more leak prosecutions under the Espionage Act than all previous administrations combined. Dennis Blair, the director of national intelligence during Obama’s first term, told the Times that a decision was made in 2009 to “hang an admiral once in a while,” as Blair put it, to show would-be leakers they should not talk to the press. The Justice Department did not charge high-level officials, however; mid-level officials were the principal targets, and it appears that Sterling’s all-but-shut case was brought back to life as part of the crackdown.

Sterling, detained for weeks, became despondent.

“All of it came crashing down on me, sitting in that jail cell,” he said. “So many years, so many struggles, and I had gotten to a point where I had picked myself up and was just moving on. But this behemoth of anger, of retaliation, was having its way. It was an extremely low feeling that I was going through, disbelief, shock.”

He stopped eating until Holly was allowed to visit.

“Just seeing her face shocked me back into knowing that here’s this woman who loves me and she’s been with me through thick and thin,” he said. “I made a promise to her that I would stay alive, I won’t try to hurt myself.”

RELEASED FROM JAIL, Sterling no longer had a job and could not find a new one, due to the taint of an Espionage Act indictment, and he had to wait four years for his trial to begin. A large part of the delay was due to a legal battle between the prosecution and Risen — the prosecution wanted Risen to name his source, whom the government believed was Sterling, but Risen refused to cooperate, raising the prospect of a journalist going to jail for defying the government. The Obama administration, criticized for violating First Amendment protections, backed off just before the trial began.

On January 13, the trial opened with the lead prosecutor, James Trump, telling the jury that Sterling was a traitor.

“The defendant betrayed his country,” Trump said. “He betrayed his colleagues. He betrayed the CIA and compromised its mission. And most importantly, he betrayed the Russian asset, a man who literally placed his trust and his life into the defendant’s hands.”

Trump addressed the question of motive.

“And why?” he asked. “Anger, bitterness, selfishness. The defendant struck back at the CIA because he thought he had been treated unfairly. He had sued the agency for discrimination and demanded that they pay him $200,000 to settle his claim. When the agency refused, he struck back with the only weapon he had: secrets, the agency’s secrets.”

The government’s case consisted mostly of records of emails and phone calls between Sterling and Risen that began in 2001 and continued into 2005. The emails were very short, just a line or so, and did not reference any CIA programs. The phone calls were mostly short too, some just a few seconds, and the government did not introduce recordings or transcripts of any of them.

Sterling was represented by two lawyers, Edward MacMahon Jr. and Barry Pollack. In his opening statement, MacMahon pointed to the lack of hard evidence against his client.

“Mr. Trump is a fine lawyer,” MacMahon said. “If he had an email with details of these programs or a phone call, you would have heard it, and you’re not going to hear it in this case .… Mr. Trump told you that [Sterling] spoke to Risen. Did you hear where, when, or anything about what happened? No. That’s because there isn’t any such evidence of it whatsoever .… You don’t see a written communication to Mr. Risen from Mr. Sterling about the program at all, no evidence they even met in person.”

After a two-week trial that included some CIA witnesses testifying from behind a screen, so that their identities would not be revealed, the jury convicted Sterling, based on what the judge, Leonie Brinkema, described at the sentencing as “very powerful circumstantial evidence.” She added, “In a perfect world, you’d only have direct evidence, but many times that’s not the case in a criminal case.”

Sterling sat motionless as she explained the reasoning behind the sentence that she was about to announce. I had asked Sterling, when we met in St. Louis, what he expected would happen.

“This process has destroyed a lot of me,” he began, his voice shifting in the halting way that means anguish has broken loose. “The thought that I’m going to be sent to prison, I can’t and haven’t been able to deal with that. I don’t know where to put it or how to deal with it because it doesn’t make any sense. I’m dreading going to jail. Maybe some miracle will happen and I won’t. But I still have to be realistic and prepare for the worst.”

A few minutes before three in the afternoon, Judge Brinkema said that Sterling would go to prison for three and a half years. This was far below the sentencing guidelines — and was seen as a rebuke of the prosecution’s portrayal of Sterling as a traitor who had to be locked away for a long time. But that wasn’t much comfort for Sterling or his wife, because he would nonetheless be locked away. After the hearing ended, Sterling walked to the front row of seats to console his sobbing wife. You could hear her wails in the courtroom.

His lawyers requested that he be allowed to serve his sentence in his home state of Missouri, so that his wife and other family members could easily visit him. Earlier this week, Sterling reported to the prison that was selected for him. It is in Colorado.

Inside NSA, Officials Privately Criticize ‘Collect It All’ Surveillance

The Intercept  |  May 28, 2015

AS MEMBERS OF CONGRESS struggle to agree on which surveillance programs to re-authorize before the Patriot Act expires, they might consider the unusual advice of an intelligence analyst at the National Security Agency who warned about the danger of collecting too much data. Imagine, the analyst wrote in a leaked document, that you are standing in a shopping aisle trying to decide between jam, jelly or fruit spread, which size, sugar-free or not, generic or Smucker’s. It can be paralyzing.
“We in the agency are at risk of a similar, collective paralysis in the face of a dizzying array of choices every single day,” the analyst wrote in 2011. “’Analysis paralysis’ isn’t only a cute rhyme. It’s the term for what happens when you spend so much time analyzing a situation that you ultimately stymie any outcome …. It’s what happens in SIGINT [signals intelligence] when we have access to endless possibilities, but we struggle to prioritize, narrow, and exploit the best ones.”
The document is one of about a dozen in which NSA intelligence experts express concerns usually heard from the agency’s critics: that the U.S. government’s “collect it all” strategy can undermine the effort to fight terrorism. The documents, provided to The Intercept by NSA whistleblower Edward Snowden, appear to contradict years of statements from senior officials who have claimed that pervasive surveillance of global communications helps the government identify terrorists before they strike or quickly find them after an attack.
The Patriot Act, portions of which expire on Sunday, has been used since 2001 to conduct a number of dragnet surveillance programs, including the bulk collection of phone metadata from American companies. But the documents suggest that analysts at the NSA have drowned in data since 9/11, making it more difficult for them to find the real threats. The titles of the documents capture their overall message: “Data Is Not Intelligence,” “The Fallacies Behind the Scenes,” “Cognitive Overflow?” “Summit Fever” and “In Praise of Not Knowing.” Other titles include “Dealing With a ‘Tsunami’ of Intercept” and “Overcome by Overload?”
The documents are not uniform in their positions. Some acknowledge the overload problem but say the agency is adjusting well. They do not specifically mention the Patriot Act, just the larger dilemma of cutting through a flood of incoming data. But in an apparent sign of the scale of the problem, the documents confirm that the NSA even has a special category of programs that is called “Coping With Information Overload.”
The jam vs. jelly document, titled “Too Many Choices,” started off in a colorful way but ended with a fairly stark warning: “The SIGINT mission is far too vital to unnecessarily expand the haystacks while we search for the needles. Prioritization is key.”
These doubts are infrequently heard from officials inside the NSA. These documents are a window into the private thinking of mid-level officials who are almost never permitted to discuss their concerns in public.

AN AMUSING PARABLE circulated at the NSA a few years ago. Two people go to a farm and purchase a truckload of melons for a dollar each. They then sell the melons along a busy road for the same price, a dollar. As they drive back to the farm for another load, they realize they aren’t making a profit, so one of them suggests, “Do you think we need a bigger truck?”
The parable was written by an intelligence analyst in a document dated Jan. 23, 2012 that was titled, “Do We Need a Bigger SIGINT Truck?” It expresses, in a lively fashion, a critique of the agency’s effort to collect what former NSA Director Keith Alexander referred to as “the whole haystack.” The critique goes to the heart of the agency’s drive to gather as much of the world’s communications as possible: because it may not find what it needs in a partial haystack of data, the haystack is expanded as much as possible, on the assumption that more data will eventually yield useful information.
The Snowden files show that in practice, it doesn’t turn out that way: more is not necessarily better, and in fact, extreme volume creates its own challenges.
“Recently I tried to answer what seemed like a relatively straightforward question about which telephony metadata collection capabilities are the most important in case we need to shut something off when the metadata coffers get full,” wrote the intelligence analyst. “By the end of the day, I felt like capitulating with the white flag of, ‘We need COLOSSAL data storage so we don’t have to worry about it,’ (aka we need a bigger SIGINT truck).” The analyst added, “Without metrics, how do we know that we have improved something or made it worse? There’s a running joke … that we’ll only know if collection is important by shutting it off and seeing if someone screams.”
Another document, while not mentioning the dangers of collecting too much data, expressed concerns about pursuing entrenched but unproductive programs.
“How many times have you been watching a terrible movie, only to convince yourself to stick it out to the end and find out what happens, since you’ve already invested too much time or money to simply walk away?” the document asked. “This ‘gone too far to stop now’ mentality is our built-in mechanism to help us allocate and ration resources. However, it can work to our detriment in prioritizing and deciding which projects or efforts are worth further expenditure of resources, regardless of how much has already been ‘sunk.’ As has been said before, insanity is doing the same thing over and over and expecting different results.”
Many of these documents were written by intelligence analysts who had regular columns distributed on NSANet, the agency’s intranet. One of the columns was called “Signal v. Noise,” another was called “The SIGINT Philosopher.” Two of the documents cite the academic work of Herbert Simon, who won a Nobel Prize for his pioneering research on what’s become known as the attention economy. Simon wrote that consumers and managers have trouble making smart choices because their exposure to more information decreases their ability to understand the information. Both documents mention the same passage from Simon’s essay, Designing Organizations for an Information-Rich World:
“In an information-rich world, the wealth of information means a dearth of something else: a scarcity of whatever it is that information consumes. What information consumes is rather obvious: it consumes the attention of its recipients. Hence a wealth of information creates a poverty of attention and a need to allocate that attention efficiently among the overabundance of information sources that might consume it.”
In addition to consulting Nobel-prize winning work, NSA analysts have turned to easier literature, such as Malcolm Gladwell’s best-selling Blink: The Power of Thinking Without Thinking. The author of a 2011 document referenced Blink and stated, “The key to good decision making is not knowledge. It is understanding. We are swimming in the former. We are desperately lacking in the latter.” The author added, “Gladwell has captured one of the biggest challenges facing SID today. Our costs associated with this information overload are not only financial, such as the need to build data warehouses large enough to store the mountain of data that arrives at our doorstep each day, but also include the more intangible costs of too much data to review, process, translate and report.”
Alexander, the NSA director from 2005 to 2014 and chief proponent of the agency’s “collect it all” strategy, vigorously defended the bulk collection programs. “What we have, from my perspective, is a reasonable approach on how we can defend our nation and protect our civil liberties and privacy,” he said at a security conference in Aspen in 2013. He added, “You need the haystack to find the needle.” The same point has been made by other officials, including James Cole, the former deputy attorney general who told a congressional committee in 2013, “If you’re looking for the needle in the haystack, you have to have the entire haystack to look through.”
THE OPPOSING VIEWPOINT was voiced earlier this month by Snowden, who noted in an interview with the Guardian that the men who committed recent terrorist attacks in France, Canada and Australia were under surveillance—their data was in the haystack yet they weren’t singled out. “It wasn’t the fact that we weren’t watching people or not,” Snowden said. “It was the fact that we were watching people so much that we did not understand what we had. The problem is that when you collect it all, when you monitor everyone, you understand nothing.”
In a 2011 interview with SIDtoday, a deputy director in the Signals Intelligence Directorate was asked about “analytic modernization” at the agency. His response, while positive on the NSA’s ability to surmount obstacles, noted that it faced difficulties, including the fact that some targets use encryption and switch phone numbers to avoid detection. He pointed to volume as a particular problem.
“We live in an Information Age when we have massive reserves of information and don’t have the capability to exploit it,” he stated. “I was told that there are 2 petabytes of data in the SIGINT System at any given time. How much is that? That’s equal to 20 million 4-drawer filing cabinets. How many cabinets per analyst is that? By the end of this year, we’ll have 1 terabyte of data per second coming in. You can’t crank that through the existing processes and be effective.”
The documents noted the difficulty of sifting through the ever-growing haystack of data. For instance, a 2011 document titled “ELINT Analysts – Overcome by Overload? Help is Here with IM&S” outlined a half dozen computer tools that “are designed to invert the paradigm where an analyst spends more time searching for data than analyzing it.” Another document, written by an intelligence analyst in 2010, bluntly stated that “we are drowning in information. And yet we know nothing. For sure.” The analyst went on to ask, “Anyone know just how many tools are available at the Agency, alone? Would you know where to go to find out? Anyone ever start a new target…without the first clue where to begin? Did you ever start a project wondering if you were the sole person in the Intelligence Community to work this project? How would you find out?” The analyst, trying to encourage more sharing of tips about the best ways to find data in the haystack, concluded by writing, in boldface, “Don’t let those coming behind you suffer the way you have.”
The agency appears to be spending significant sums of money to solve the haystack problem. The document headlined “Dealing With a ‘Tsunami’ of Intercept,” written in 2006 by three NSA officials and previously published by The Intercept, outlined a series of programs to prepare for a near future in which the speed and volume of signals intelligence would explode “almost beyond imagination.” The document referred to a mysterious NSA entity–the “Coping With Information Overload Office.” This appears to be related to an item in the Intelligence Community’s 2013 Budget Justification to Congress, known as the “black budget”—$48.6 million for projects related to “Coping with Information Overload.”
The data glut is felt in the NSA’s partner agency in Britain, too. A slideshow entitled “A Short Introduction to SIGINT,” from GCHQ, the British intelligence agency, posed the following question: “How are people supposed to keep on top of all their targets and the new ones when they have far more than [they] could do in a day? How are they supposed to find the needle in the haystack and prioritise what is most important to look at?” The slideshow continued, “Give an analyst three leads, one of which is interesting: they may have time to follow that up. Give them three hundred leads, ten of which are interesting: that’s probably not much use.”
These documents tend to shy away from confrontation—they express concern with the status quo but do not blame senior officials or demand an abrupt change of course. They were written by agency staffers who appear to believe in the general mission of the NSA. For instance, the author of a “SIGINT Philosopher” column wrote that if the NSA was a corporation, it could have the following mission statement: “building informed decision makers — so that targets do not suffer our nation’s wrath unless they really deserve it — by exercising deity-like monitoring of the target.”
On occasion, however, the veil of bureaucratic deference is lowered. In another “SIGINT Philosopher” column, “Cognitive Overflow?,” the author offered a forthright assessment of the haystack problem and the weakness of proposed solutions:
“If an individual brain has finite ‘channel capacity,’ does the vast collective of SID, comprised of thousands of brilliant, yet limited, brains also have a definite ‘channel capacity’? If so, what is it? How do we know when we’ve reached it? What if we’ve already exceeded it? In essence, could SID’s reach exceed its grasp? Can the combined cognitive power of SID connect all the necessary dots to avoid, predict, or advise when the improbable, complex, or unthinkable happens?”
The column did not offer an optimistic view.
“Take for example the number of tools, clearances, systems, compliances, and administrative requirements we encounter before we even begin to engage in the work of the mission itself,” the column continued. “The mission then involves an ever-expanding set of complex issues, targets, accesses, and capabilities. The ‘cognitive burden,’ so to speak, must at times feel overwhelming to some of us.”
The analyst who wrote the column dismissed, politely but firmly, the typical response of senior officials when they are asked in public about their ability to find needles in their expanding haystack.
“Surely someone will point out that the burgeoning amalgam of technological advances will aid us in shouldering the burden,” he noted. “However, historically, this scenario doesn’t seem to completely bear out. The onslaught of more computer power—often intended to automate some processes—has in many respects demanded an expansion of our combined ‘channel capacity’ rather than curbing the flow of the information.”

Documents published with this article:

Too Many Choices
Cognitive Overflow?
Summit Fever
Do We Need a Bigger SIGINT Truck?
Overcome With Overload? Help is Here with IM&S
In Praise of Not Knowing
The Fallacies Behind the Scenes
Leave Bright Pebbles, Not Breadcrumbs, for Those Coming After You
‘Data Is Not Intelligence’
Is There a Sustainable Ops Tempo in S2? How Can Analysts Deal with the Flood of Collection?
Dealing With a ‘Tsunami’ of Intercept
SIGINT Mission Thread 3

The CIA and the Myths of the Bin Laden Raid

The Intercept  |  May 19, 2015

If you read the sketchy New York Times article on the Delta Force raid into Syria a few days ago — how an ISIS leader was killed when he “tried to engage” American commandos while his fighters used women and children as shields, and an 18-year-old slave was freed with no civilian casualties thanks to “very precise fire”—you can be forgiven for thinking, “Haven’t I seen this movie before?”

You probably have, and it was called Zero Dark Thirty, the film directed by Kathryn Bigelow, written by Mark Boal and backed with gusto by the Central Intelligence Agency. The CIA provided Bigelow and Boal with privileged access to officials and operators behind the hunt for Osama bin Laden—and not coincidently, their movie portrayed the CIA’s torture program as essential to the effort to find and kill the leader of al Qaeda. It grossed more than $132 million worldwide.

Zero Dark Thirty was criticized by a number of writers (including me) when it came out in 2012, and now it is being treated as a political farce in a new Frontline documentary scheduled to be broadcast by PBS on Tuesday, May 19. Titled “Secrets, Politics and Torture,” the show explores the CIA’s effort to persuade Congress, the White House and the American public that its “enhanced interrogation methods” were responsible for extracting from unwilling prisoners the clues that led to bin Laden and other enemy targets.

Jane Mayer, the New Yorker writer whose work on CIA torture has been exemplary, explains that the team behind Zero Dark Thirty was conned by the CIA.

“The CIA’s business is seduction, basically,” she says in the documentary. “And to seduce Hollywood producers, I mean they are easy marks compared to some of the people that the CIA has to go after.”

Another journalist, Michael Isikoff, connects the final dots by pointing out the harm caused by political lies that find their way into blockbuster films.

“Movies like Zero Dark Thirty have a huge impact,” he says. “More people see them, and more people get their impressions about what happened from a movie like that than they do from countless news stories or TV spots.”

The Frontline documentary could not come at a better moment. Just last week, investigative journalist Seymour Hersh published a 10,000-word story in the London Review of Books that challenged much of the official narrative about the hunt for bin Laden. You don’t have to believe everything Hersh wrote — and I don’t, including the reference to SEAL team members throwing some of bin Laden’s corpse over the Hindu Kush — to appreciate the debate he has re-opened over the considerable holes in the government’s story.

There is a saying in the military that first reports are always wrong. We need to remember this lesson when we get first reports of the latest military or intelligence successes — and the second reports and the movies, too. Much that the Pentagon said about the rescue of Private Jessica Lynch during the invasion of Iraq turned out to be fictitious. The media’s portrayal of the toppling of a statue of Saddam Hussein in Firdos Square was pretty much the opposite of what really happened as Marines stormed into Baghdad on April 9, 2003. Similar problems of fact probably exist in this week’s accounts of a flawless killing of an ISIS leader (or at least a man whom the military tells us is an ISIS leader).

The Frontline documentary includes a clip from Zero Dark Thirty in which a CIA torturer yells at an al Qaeda prisoner, “When you lie to me, I hurt you!” A repurposing of that line would hold true for the government and the American public—when it lies to us, it hurts us.

Obama’s War on Leaks Faces Backlash in Court

The Intercept  |  May 13, 2015

Nearly a decade ago, at a federal courthouse in northern Virginia, Judge Leonie Brinkema set a new standard for taking a tough stance against people who inflict harm on America.

Brinkema presided over the lengthy trial of Zacarias Moussaoui, who was convicted as a co-conspirator in the 9/11 attacks against America. The jury decided he would spend the rest of his life in prison, and when the sentence was formally issued, Brinkema told Moussaoui, “You will die with a whimper.” He tried to interrupt, but she would have none of it. “You will never get the chance to speak again, and that’s an appropriate ending,” she said sternly.

In the same courthouse this week, Brinkema listened intently as a government lawyer argued that Jeffrey Sterling, a former CIA agent convicted of leaking classified information to a New York Times reporter, had caused grave damage to national security and should be sentenced to a long term in prison, saying his actions were “unconscionable” and constituted a “substantial and costly blow to our intelligence efforts.” In its legal briefs, the prosecution had asked for a “severe” sentence that many observers regarded as being in line with federal guidelines for at least 19 years behind bars.

In a surprising turn, Brinkema sentenced Sterling to just three and a half years in prison, which is a long time to be deprived of liberty but nothing like two decades. She told the courtroom that Sterling had done what no intelligence officer should do, disclosing the identity of a covert asset. But she made no mention of the prosecution’s claim that he caused significant harm to national security. That omission, combined with a sentence far below the prosecution’s request, strongly indicate she didn’t believe the government’s dire warnings.

“The Sterling sentence certainly contained an implicit rebuke to the prosecution,” said Steven Aftergood, who directs the Project on Government Secrecy at the Federation of American Scientists. “By ordering the sentences for each of the nine felony counts against Sterling to run concurrently, Judge Brinkema was declaring in effect that Sterling had been overcharged.”

One of Sterling’s lawyers, Barry Pollack, agreed.

“I do think that the court largely rejected the government’s view of the harm that was caused by the leak in this case,” he told The Intercept. “By claiming that this was one of the greatest leaks and threats to national security, the government simply overplayed its hand and I think the judge did not agree with that assessment.”

The sentence appears to be a blow to Obama’s broader crackdown on leakers and whistleblowers, solidifying a trend in which the government has failed, with the notable exception of Chelsea Manning, to get lengthy prison terms against people who are portrayed in prosecution filings as severely damaging national security. The sentences handed out recently — 13 months to Stephen Kim, a former State Department official, and 30 months to John Kiriakou, a former CIA officer — have been widely criticized as unjust and have been disastrous for the men involved, but they are not the sort of lengthy sentences handed out to major criminals.

One of the much-criticized characteristics of the crackdown — its selectivity — is showing signs of coming back to haunt the government, too. Primarily mid-level officials whose leaks embarrass the government have been targeted with prison terms while senior officials who are friendly to the administration are untouched or slapped on the wrist. The plea deal with former general and former CIA director David Petraeus is a recent example — Petraeus admitted to sharing classified information with his biographer and then-girlfriend, Paula Broadwell, but was allowed to plead guilty to just a misdemeanor and avoided any time in jail.

Judge Brinkema did not mention Petraeus by name on Monday, but she hinted at his case in a remark that the justice system has to be fair. Aftergood, in an email to The Intercept, noted that “every case and every ruling perturbs the environment in which later cases are brought,” adding that “the Petraeus outcome may have worked subterraneously to Sterling’s benefit.”

Sterling’s sentence has begun to draw attention. In an editorial today, The New York Times described Brinkema’s decision as a “significant rebuke to the Obama administration’s dogged-yet-selective crusade against leaks.” That view was echoed by national security journalist Marcy Wheeler, who wrote of Sterling’s sentence, “The government’s insistence that whistleblowing and accountability equate to spying is coming under increasing scrutiny, even mockery.”

The criticism is coming from all sides. Jack Goldsmith, a Harvard Law School professor and former assistant attorney general and special counsel to the Department of Defense, last week chided the government for hyping the damage caused by leaks. In a speech that focused on how the intelligence community should react to the disclosure of secrets, he noted that officials had been “jeopardizing vital credibility through exaggerated claims about the national security harms of disclosure.” He also called for the intelligence community to “rethink, really rethink, the pervasive resistance to public disclosure of any aspect of any intelligence operation.”

When the Obama administration began its war on leakers and whistleblowers in 2009, there was little precedent for trying to put leakers into prison. The series of leak cases brought by the administration under the draconian Espionage Act — more than all previous administrations combined — gave the impression of a crackdown to end all crackdowns. Instead, if Brinkema’s rebuke is an indication, it risks becoming the crackdown without clothes — an effort to imprison officials who have done no harm, and perhaps some good, because leaks often put into the public domain information that the public should know.

Of course the government has gotten a lengthy sentence for one leaker — Manning, formerly known as Bradley Manning, was sentenced to 35 years for sharing a trove of military and diplomatic cables with Wikileaks. And Espionage Act charges have been filed against Edward Snowden, who leaked thousands of NSA documents. But Brinkema’s decision could give the government cause to reconsider the scope of its crackdown.

“I hope it makes them more reluctant to file these cases,” Pollack said. “An inordinate amount of resources went into this case. At the end of the day, what the government had was a circumstantial case that it ultimately was able to sell to the jury, but they did not get the type of sentence that they thought that they might get. As a taxpayer, I would certainly question whether the needs of national security really required the government throwing these kinds of resources at Jeffrey Sterling over a leak that occurred years ago, on a program that I think was of questionable value.”

The Department of Justice, contacted by The Intercept, did not provide any comment.

Why Should Bowe Bergdahl Suffer More Than Generals Who Did Far Worse?

The Intercept  |  March 27, 2015

What punishment should Sgt. Bowe Bergdahl receive for allegedly deserting his post in Afghanistan? The answer comes by asking another question: What punishment has been handed out to American generals and politicians whose incompetence caused far more bloodshed and grief than anything Bergdahl did?

A key thing about justice is that it should be fair — people should be punished no matter their rank or title. The problem with the bloodlust for more action against Bergdahl — beyond his five years of horrific suffering as a Taliban prisoner — is that inept generals, rather than being court-martialed or demoted or reprimanded, have been rewarded and celebrated despite their dereliction in Iraq and Afghanistan.

This duality is crystallized in a now-famous article written by Lt. Col. Paul Yingling in 2007 for Armed Forces Journal. After describing the failures of general officers after 9/11 as well as in the Vietnam war, Yingling, who served three tours in Iraq and is now a teacher in Colorado, wrote a stinging sentence about justice and responsibility in the military: “A private who loses a rifle suffers far greater consequences than a general who loses a war.”

Let’s be clear about what it means to lose a war in the context of Iraq. It does not only mean that America failed to achieve its political or military goals. It means that more Americans and Iraqis lost their lives than needed to, and it means that war crimes were committed for which general officers bear command responsibility. Due to failures that Yingling and many others have noted — not anticipating the aftermath of the 2003 invasion, not recognizing the emergence of an insurgency, not figuring out the right strategy to respond to it — the war in Iraq ground on and the bloodshed has been enormous on all sides. Afghanistan is yet another graveyard of failures by general officers.

Two generals, in particular, have been criticized but not punished for serious mistakes that they and their subordinates made — Tommy Franks, who commanded U.S. forces in both Afghanistan and Iraq, and Ricardo Sanchez, who led U.S. forces in Iraq after the 2003 invasion. The military writer Tom Ricks has done the best job so far of exposing their battlefield failures and the failure of our political and military leaders to do anything about it. Sanchez oversaw, among other disasters, the Abu Ghraib torture scandal, for which low-ranking soldiers were sternly punished, such as Specialist Lynndie England, who served a year and a half in prison for her role in abusing Iraqi detainees. Ricks has noted, in a startling case of military chutzpah, that Sanchez was indignant he didn’t receive an extra star for his Iraq service.

“As far as I can tell, no general has been fired for incompetence in combat since Maj. Gen. James Baldwin was fired as commander of the Americal Division in 1971,” Ricks has said. “Since then, others have been relieved for moral and ethical lapses that are embarrassing to the Army, but not, to my knowledge, for combat ineffectiveness.”

If firing generals for incompetence is too much to ask for, how about retiring them at a lower rank? As Yingling noted, “A general who presides over a massive human rights scandal or a substantial deterioration in security ought to be retired at a lower rank than one who serves with distinction. A general who fails to provide Congress with an accurate and candid assessment of strategic probabilities ought to suffer the same penalty.” Yet even that modest level of reprimand has almost never occurred. Holding generals to account for war crimes committed on their watch is like waiting for Halley’s Comet — it happens with excruciating rarity.

Instead, dereliction is rewarded. In Oklahoma, for instance, there is the General Tommy Franks Leadership Institute and Museum. Franks is a frequent public speaker (here’s his bio at the speakers bureau that represents him) and was tapped as an adviser to presidential candidate Mitt Romney. In Texas, Sanchez was sufficiently celebrated and popular to mount a primary run for an open Senate seat (he pulled out before the election), he has a school named after him, and like so many other retired generals, he gives a lot of speeches to admiring audiences.

So we circle back to Bowe Bergdahl, who could spend the rest of his life in prison for desertion and misbehaving before the enemy, unless there is a plea deal. If he is guilty, he should be convicted. But punishment beyond his torment at the hands of the Taliban would be unfair, even if it is true, as some allege, that G.I.s were killed while searching for him. Whatever blood he might have on his hands — and it’s far from clear there’s any — is minor compared to the generals and politicians who made far graver errors. It would be particularly unfortunate if Bergdahl became another sort of pawn, this time in the partisan polemics over President Obama’s decision to exchange five Taliban prisoners for him.

I reported on the wars in Iraq and Afghanistan, as well as the conflicts in Bosnia, Somalia and Sudan, so I understand the sense of betrayal among soldiers who served with Bergdahl, even if my understanding is that of a civilian who watched rather than fought. Their anger and desire for justice are not unreasonable. I share it, but my anger is directed upwards at the unpunished and unapologetic, rather than downwards at men and women who have suffered enough.

Atrocities Committed by U.S.-Trained Iraqi Forces—Again

The Intercept  |  March 13, 2015

Investigative reporter James Gordon Meek broke an important story this week: he revealed that U.S.-backed forces in Iraq are committing the same type of horrific war crimes — wanton killings of prisoners, beheadings, torture — as the Islamic State fighters on the other side of the frontline.

Meek’s report, broadcast by ABC News and based on photos and cellphone videos that Iraqi fighters had proudly shared on social media, shows the Humvees and M4A1 assault rifles that the U.S. government has supplied in abundance to Iraq’s armed forces. In its effort to push the Islamic State out of Iraq, the U.S. is providing Baghdad with nearly $1 billion a year in weapons, in addition to training by several thousand American advisers.

U.S. and Iraqi officials professed surprise at what is happening, and told ABC that investigations would be launched to get to the bottom of it. If this sounds familiar in a “Casablanca” way — gambling in the casino, stop the presses — it should. Back in 2005, when Facebook was a curiousity used by just a few thousand students and Instagram was years away from being invented, the sorts of abuses that Meek recently found on social media sites were well underway.

Back then, I visited Samarra, a contested town in the heart of what was known as the Sunni Triangle, and wrote about the abuses I saw while accompanying Iraqi and U.S. forces on joint raids. I saw beatings, witnessed a mock execution, and heard, inside an Iraqi detention center, the terrible screams of a man being tortured. I received the same sorts of reactions that greeted Meek’s story: U.S. and Iraqi officials expressed surprise and promised to punish any wrongdoers.

Nothing changed.

That’s because torture, rather than being an aberration, was embedded in a strategy that was described, at the time, as the Salvadorization of Iraq—the use of dirty-war tactics to defeat an insurgency. It is more than a footnote of history that the origins of this policy appear to date to 2004, when the effort to train and equip Iraqi forces got underway in earnest under the leadership of Gen. David Petraeus, who went on to command all U.S. forces in Iraq, then in Afghanistan, then became director of the CIA, then resigned and pleaded guilty to disclosing a trove of highly-classified information to his lover and biographer, Paula Broadwell, and lying to the FBI about it.

I was hardly the first to witness the abuses and hypocrisy that were the hammer and anvil of the American program to build up Iraqi forces. In 2004, Oregon National Guard troops in Baghdad observed officers inside a Ministry of Interior compound beating and torturing prisoners; they entered the compound and found dozens of abused detainees, including one who had just been shot. The Oregon soldiers reported what they had found and received an incredible order from their commanders—leave the compound now.

In 2010, the deluge of military and diplomatic files that were released by Wikileaks included a document that explained why the Oregon soldiers had been told to forget about what they had seen—FRAGO 242, as the order was called, required U.S. troops to not investigate any abuses committed by Iraqi forces unless U.S. troops were involved. In other words, so long as Iraqis were doing the torturing rather than Americans, it was none of our business. Move along, nothing to see here.

Then, as now, the reason these abuses were tolerated was a battlefield version of expediency—this is the way insurgencies are confronted, they all tend to be dirty, there’s nothing we can do about it because angels don’t win wars. The problem with this thinking is not just moral—we shouldn’t support forces that we fully know are committing war crimes—it is also practical. What has turning a blind eye gotten us since the effort to equip Iraqi forces got underway in the aftermath of the toppling of the statue of Saddam Hussein in Firdos Square in 2003?

Expediency is not our friend. It is our enemy.

Petraeus Plea Deal Reveals Two-Tier Justice System for Leaks

The Intercept  |  March 3, 2015

David Petraeus, the former Army general and CIA director, admitted today that he gave highly-classified journals to his onetime lover and that he lied to the FBI about it. But he only has to plead guilty to a single misdemeanor that will not involve a jail sentence, thanks to a deal with federal prosecutors. The deal is yet another example of a senior official treated leniently for the sorts of violations that lower-level officials are punished severely for.

According to the plea deal, Petraeus, while leading American forces in Afghanistan, maintained eight notebooks that he filled with highly-sensitive information about the identities of covert officers, military strategy, intelligence capabilities and his discussions with senior government officials, including President Obama. Rather than handing over these “Black Books,” as the plea agreement calls them, to the Department of Defense when he retired from the military in 2011 to head the CIA, Petraeus retained them at his home and lent them, for several days, to Paula Broadwell, his authorized biographer and girlfriend.

In October 2012, FBI agents interviewed Petraeus as part of an investigation into his affair with Broadwell — Petraeus would resign from the CIA the next month — and Petraeus told them he had not shared classified material with Broadwell. The plea deal notes that “these statements were false” and that Petraeus “then and there knew that he previously shared the Black Books with his biographer.” Lying to FBI agents is a federal crime for which people have received sentences of months or more than a year in jail.

Under his deal with prosecutors, Petraeus pleaded guilty to just one count of unauthorized removal and retention of classified information, a misdemeanor that can be punishable by a year in jail, though the deal calls only for probation and a $40,000 fine. As The New York Times noted today, the deal “allows Mr. Petraeus to focus on his lucrative post-government career as a partner in a private equity firm and a worldwide speaker on national security issues.”

The deal has another effect: it all but confirms a two-tier justice system in which senior officials are slapped on the wrist for serious violations while lesser officials are harshly prosecuted for relatively minor infractions.

For instance, last year, after a five-year standoff with federal prosecutors, Stephen Kim, a former State Department official, pleaded guilty to one count of violating the Espionage Act when he discussed a classified report about North Korea with Fox News reporter James Rosen in 2009. Kim did not hand over a copy of the report — he just discussed it, and nothing else — and the report was subsequently described in court documents as a “nothing burger” in terms of its sensitivity. Kim is currently in prison on a 13-month sentence.

“The issue is not whether General Petraeus was dealt with too leniently, because the pleadings indicate good reason for that result,” said Abbe Lowell, who is Kim’s lawyer. “The issue is whether others are dealt with far too severely for conduct that is no different. This underscores the random, disparate and often unfair application of the national security laws where higher-ups are treated better than lower-downs.”

In 2013, former CIA agent John Kiriakou pleaded guilty to violating the Intelligence Identities Protection Act by disclosing the name of a covert CIA officer to a freelance reporter; he was sentenced to 30 months in jail. Kiriakou’s felony conviction and considerable jail sentence — for leaking one name that was not published — stands in contrast to Petraeus pleading guilty to a misdemeanor without jail time for leaking multiple names as well as a range of other highly-sensitive information.

Kiriakou, released from prison earlier this year, told The Intercept in an emailed statement, “I don’t think General Petraeus should have been prosecuted under the Espionage Act, just as I don’t think I should have been prosecuted under the Espionage Act. Yet only one of us was. Both Petraeus and I disclosed undercover identities (or confirmed one, in my case) that were never published. I spent two years in prison; he gets two years probation.”

The prosecution of Kiriakou, Kim and other leakers and whistleblowers has been particularly intense under the Obama Administration, which has filed more than twice as many leak cases under the Espionage Act as all previous administrations combined. In 2013, Army Private Chelsea Manning, formerly known as Bradley Manning, pleaded guilty to violating the Espionage Act by leaking thousands of documents to Wikileaks, and she was sentenced to 35 years in prison. Manning received a harsh sentence even though then-Defense Secretary Robert Gates said in 2010 that the leaks had only “modest” consequences.

“I’ve heard the impact of these releases on our foreign policy described as a meltdown, as a game-changer, and so on. I think those descriptions are fairly significantly overwrought,” Gates said. “Is this embarrassing? Yes. Is it awkward? Yes. Consequences for U.S. foreign policy? I think fairly modest.”

Senior officials tend to get far kinder treatment. As The Times noted today, former Attorney General Alberto Gonzales was “admonished but not charged” for keeping classified information at his house; John Deutch, the former CIA director, resigned and lost his security clearance but was not charged for storing classified documents on a home computer; and former National Security Adviser Sandy Berger was allowed to plead guilty to a misdemeanor after he surreptitiously removed classified documents from the National Archives.

Destroyed By The Espionage Act

The Intercept  |  February 18, 2015
Stephen Kim Spoke To A Reporter. Now He’s In Jail. This Is His Story

ON THE MORNING of June 11, 2009, James Rosen stepped inside the State Department, scanned his building badge and made his way to the Fox News office in the busy press room on the second floor. It was going to be a hectic day. Like other reporters working the phones that morning, Rosen was looking for fresh news about the latest crisis with North Korea.
Two weeks earlier, North Korea had conducted a nuclear detonation that showed the rest of the world it possessed a functioning bomb. The United Nations was on the verge of a formal condemnation, but no one at the U.N. or inside the U.S. government knew how North Korea’s unpredictable regime would respond and whether things might escalate toward war.
Rosen called Stephen Kim, a State Department expert on rogue nations and weapons of mass destruction. Kim, a U.S. citizen who was born in South Korea, spoke fluent Korean and had worked at one of America’s nuclear-weapons labs. He probably knew more about what was going on in Pyongyang than almost anyone else in the building.
The call, according to metadata collected by the FBI, lasted just half a minute, but soon afterward Kim called Rosen and they talked for nearly a dozen minutes. After that conversation, they left the building at roughly the same time, then spoke once more on the phone after they both returned.
A classified report on North Korea had just begun circulating, and Kim was among the restricted number of officials with clearance to read it. He logged onto a secure computer, called up the report at 11:27 a.m., and phoned Rosen 10 minutes later. A few minutes past noon, he left the building again, and a minute later Rosen followed. The destruction of Kim’s life would center on the question of what the two men discussed during that brief encounter outside the State Department.
Kim returned to the building at 12:26 p.m., but Rosen lingered outside to make calls to colleagues at Fox News — to lines for the network’s Washington bureau chief, as well as a vice president and assignment editor. Back inside, Rosen called the bureau chief’s line again, and then an official at the National Security Council. Around 3:00 in the afternoon, with typos that suggest it was written in haste, Rosen posted a story on the Fox News website under the headline, “North Korea Intends to Match U.N. Resolution With New Nuclear Test.” It said the U.S. government, in its latest intelligence assessment, believed U.N. sanctions would trigger retaliatory actions from North Korea, including another detonation.
As news goes, Rosen’s story wasn’t, in fact, much of a scoop. It merely confirmed the conventional wisdom of the day. According to court documents, one State Department official described the intelligence assessment as “a nothing burger,” while another official said Rosen’s story had disclosed “nothing extraordinary.” But the article had a seismic impact in another way. It occurred just as the Obama administration was intensifying its effort to crack down on leakers and whistleblowers; the FBI soon launched an investigation. Because Rosen used phones that were easy to trace and twice left the building at the same time as Kim, it was simple for the FBI to zero in on whom he talked with that day. Before long, Kim, who had worked as a civil servant since 2000, was being threatened with decades in prison for betraying his country.
Five years later, on April 2, 2014, I sat in a half-empty courtroom in Washington, D.C., and watched as Kim pleaded guilty to one count of violating the Espionage Act. He was the latest victim in an unprecedented crackdown on leaks; so far, the Obama administration has prosecuted more than twice as many leak cases under the Espionage Act as all previous administrations combined. Kim was dressed in a dark suit, white shirt and blue tie. His manner that day revealed nothing, at least on the surface, of how his life had unravelled in the past five years — the broken marriage, the young son who lived far away, the life savings that were now depleted, and the profound struggles with depression and thoughts of suicide.
I first spoke with Kim at the end of 2013. Until the summer of 2014, when we said goodbye at the entrance to a federal prison in Cumberland, Maryland, we met from time to time, mostly at the small apartment where he lived in northern Virginia, until his lease expired and he moved into a spare room in an apartment that belonged to a friend of a friend. He told me as much of his story as he was able to tell, with a caveat set by his lawyer: he could not discuss the details of his decision to accept the plea deal or the specifics of his conversations with Rosen on that June day in 2009.
UNTIL THE FBI knocked on his door in the fall of 2009, a little more than three months after Rosen’s story was published, Kim was a rising star in the intelligence community and a remarkable immigrant success story. After earning a Ph.D. in history from Yale University, he started his career at the Center for Naval Analyses, followed by four years at Lawrence Livermore National Laboratory, which designs and analyzes nuclear weapons. It didn’t take long for him to attract attention. The intelligence community has a lot of experts on nuclear programs and a lot of experts on North Korea, but few who had Kim’s expertise in both. Kim was even summoned to Washington to give a classified briefing to Vice President Dick Cheney and National Security Adviser Stephen Hadley.
He then landed a job at the Pentagon’s Office of Net Assessment, a legendary internal think tank for incubating new ideas about military policy, and in 2008, he was tapped as the senior intelligence adviser in the State Department’s Bureau of Verification, Compliance and Implementation (VCI). His work there was complex: essentially, he needed to know as much as it was possible to know about programs to develop weapons of mass destruction that threatened the United States. His first performance evaluation described him as “an invaluable asset” and praised him for possessing a “unique nexus of expertise.” It concluded by saying he was making “outstanding contributions to the development of U.S. national security policy.” He was slated for promotion to the Policy Planning Staff, which provides advice directly to the secretary of state.
Yet as he rose through the government’s ranks, Kim was troubled by U.S. policy toward North Korea. Though born in Seoul in 1967, long after the Korean War, he had lost a grandfather in the conflict and was acutely aware of the pain North Korea inflicted on his family and on South Korea as a whole. He felt that the moderate policies pursued by both the Bush and Obama administrations — the endless negotiations and sanctions — only served to embolden the North Koreans. In one of his few public talks, in 2006, Kim laid out his hard-line view, saying, “I know I am going to be accused of being a warmonger … but diplomacy, if not backed by the possibility of force, is very, very empty.”
In February 2009, Kim sent a blunt email to a government colleague about his concerns: “I am SERIOUSLY considering resigning from this entire USG business,” he wrote. “I cannot seemingly affect change from within … and so perhaps it is best to do it from the outside. Call me idealistic or radical but I refuse to play this game that deeply undermines our national security. I am confident enough to call these people out as idiots who know nothing about Korea or Asia. If there is an opportunity, I will leave …”
Two months later, he wrote another colleague about his assessments of Stephen Bosworth and Sung Kim, the top State Department officials dealing with North Korea. Both were well known in policy circles and had worked on North Korea for years; Sung Kim was born in Seoul and moved to the U.S. as a teenager. Stephen Kim’s opinion of them was scathing, however. “Wasn’t too impressed,” he wrote. “Knew it already but confirmed beyond certainty after the meeting. They just don’t know North Korea or the North Koreans.”
There is a time-honored way in government for mid-level experts to convey their worries that high-level officials are misguided — they talk to reporters to raise an alarm outside the walls of whichever department they work for. This is why confidential conversations in Washington seem to take place in parks and restaurants and store aisles as much as they do in actual offices. These conversations can serve as a check on the official statements that portray prevailing policies as wise and successful, even when they are not.
Unlike many government officials, Kim had very little experience interacting with journalists. He didn’t know whom to talk to until John Herzberg, who was in charge of public affairs at the VCI, arranged for him to meet Rosen.
Like the Obama administration in general, the State Department is not especially friendly with Fox News. But the VCI was, at the time, something of a miniature fortress of hard-liners within State, and Rosen was popular there. He had been on particularly good terms with Paula DeSutter, a conservative Republican who headed the bureau during the Bush administration. DeSutter talked with Rosen from time to time and even went as his guest to the White House Correspondents’ Dinner.
Rosen also had a good relationship with Herzberg. Public affairs officials tend to keep their views to themselves, but Herzberg had donated to the Bush-Cheney campaign, and had signed a letter of support for John Bolton, the neoconservative who became ambassador to the U.N. during the Bush administration. Over just a few months in 2009, Herzberg and Rosen exchanged more than 100 emails.
Herzberg was one of the State Department’s designated traffic cops for organizing (or quashing) meetings between officials and journalists, so his involvement gave an official blessing to Kim’s relationship with Rosen. This would later make the FBI’s pursuit of Kim seem a bit odd — one arm of the government was prosecuting an official for speaking with a reporter whom another arm had arranged for him to meet. Herzberg had also decided that the introductory meeting with Rosen would take place outside the State Department — the type of encounter that the FBI later portrayed as suspicious.
HERZBERG KNEW THAT Rosen couldn’t casually drop by to say hello to Kim at his office; it was located in a secure area to which outsiders were a noticeable imposition, because secret material had to be stored safely and classified discussions had to cease. And so on a March day, Herzberg and Kim left the State Department and headed toward an adjacent park, where Rosen was waiting for them. They made small talk for the next 10 minutes or so. Rosen has a “wicked sense of humor,” Kim told me, and the tenor of their initial encounter was friendly and non-political. “It’s not like I started describing my ideas on the future of Asia,” he recalled. “We didn’t talk about fissile material.”
After that introduction, Kim and Rosen talked on their own. They discussed a variety of topics, Kim said, including Pakistan and its nuclear program. “He wanted to know about the basics of nuclear weapons design. I said, ‘Don’t ask me, I’m not a physicist.’ But he just wanted the basics, so I told him.”
Rosen, a Watergate aficionado who worked for 17 years on a book about John Mitchell, Nixon’s attorney general (his first draft was 500,000 words long), seemed to enjoy playing the role of stealthy reporter. In an email he sent on May 20, Rosen instructed Kim to use a special code to manage their meetings. The code was simple: one asterisk in a blank email meant they should meet or talk on the phone, two meant they should cancel a scheduled encounter. The problem, of course, was that by explaining the code in an email, Rosen disclosed it to anyone who might obtain the email, as the FBI did.
Rosen’s behavior was often careless. As a Reuters columnist would later write, teenagers practice better tradecraft when deceiving their parents. His antics made the FBI all the more suspicious of his relationship with Kim. In its filings with the court, the prosecution used the asterisk email as evidence that Kim engaged in a secretive relationship with Rosen, though the prosecution did not offer any evidence Kim ever used the code.
When contacting Kim, Rosen mostly used a Gmail address apparently named after Alexander Butterfield, an obscure White House official who was the first to tell Congress about the Nixon-era taping system. He sent emails to a Yahoo account Kim had established under the name Leo Grace. This, too, was a detail prosecutors portrayed as sinister, though it’s not unusual for government officials to use private email accounts, and Kim’s had been created long before, when he was corresponding with a woman whose Zodiac sign was Leo and who had described him as graceful — hence, Leo Grace.
Rosen made no secret of his desire for sensitive information. He ended the May 20 email by saying, “With all this established, and presuming you have read/seen enough about me to know that I am trustworthy … let’s get about our work! What do you want to accomplish together? As I told you when we met, I can always go on television and say: ‘Sources tell Fox News.’ But I am in a much better position to advance the interests of all concerned if I can say: ‘Fox News has obtained …’”
Here, Kim revealed his lack of sophistication in dealing with the media.
“I am new to this,” he replied. “Do you have any good suggestions on things you might be interested in doing?”
Two days later, on May 22, Rosen asked for an array of sensitive information that would likely be classified. His wish list was no different from what many journalists would want from a source, but most would know better than to ask in writing, since soliciting classified information can be illegal and can get sources in trouble even if no information is provided. In the government’s view, Rosen’s email on May 22 constituted “instructions” for Kim to “gather intelligence” and supply it to Fox.
“Thanks Leo,” Rosen began on May 22, using his codename for Kim. “What I am interested in, as you might expect, is breaking news ahead of my competitors. I want to report authoritatively, and ahead of my competitors, on new initiatives or shifts in U.S. policy, events on the ground in North Korea, what intelligence is picking up, etc. As possible examples: I’d love to report that the IC [Intelligence Community] sees activity inside DPRK [Democratic People’s Republic of Korea] suggesting preparations for another nuclear test. I’d love to report on what the hell Bosworth is doing, maybe on the basis of internal memos detailing how the U.S. plans to revive the six-party talks (if that is really our goal) [the six parties he refers to were North Korea, South Korea, the U.S., China, Russia and Japan]. I’d love to see some internal State Department analyses about the state of the DPRK HEU [Highly Enriched Uranium] program, and Kim’s health or his palace intrigues … In short: Let’s break some news, and expose muddle-headed policy when we see it — or force the administration’s hand to go in the right direction, if possible. The only way to do this is to EXPOSE the policy, or what the North is up to, and the only way to do that authoritatively is with EVIDENCE.
Yours faithfully, Alex.”
Rosen’s email helps explain the part of the case that has received the most media attention: in 2013, the court unsealed a prosecution document that described Rosen as a potential “co-conspirator.” The document, an affidavit in support of a search warrant to Google demanding access to Rosen’s Gmail account, revealed that the government had tracked Rosen’s movements on June 11 and had obtained records of his phone calls and some emails. There was widespread condemnation from the media about what seemed to be a profound violation of First Amendment protections for a free press. This came as the Department of Justice was continuing to threaten the New York Times reporter James Risen with a jail sentence if he refused to identify one of his sources (last month, the Justice Department announced it would not prosecute Risen), and it came just a few days after news broke that the government secretly had obtained the records of more than 20 Associated Press phone lines as part of an investigation into the source of an AP terrorism story. The government responded to the outcry by promising that Rosen would not be prosecuted, and that the seizure of reporters’ emails and phone records would be done with greater care in the future.
“I could have been a little more careful looking at the language that was contained in the filing that we made with the court — that he was labeled as a co-conspirator,” Attorney General Eric Holder said.
The government made no suggestion in its key filings that Kim responded to Rosen’s May 22 email — and the Department of Justice refused to answer any queries from The Intercept about the case. These were particularly busy days for Kim — the global crisis was intensifying every day, culminating on May 25 with North Korea conducting an underground nuclear test, just the second in its history. The White House was gravely weighing what could or should be done to punish North Korea and stop its weapons program. The next day, May 26, Rosen frantically tried to contact Kim, placing seven calls in a few hours. Getting no reply, he sent a plaintive email.
“Is the honeymoon over already?” he asked. “Thought we would have much to discuss today.”
As the crisis intensified, Kim’s frustration also heated up. He emailed a State Department colleague to complain about the reaction to a note he had written promoting the value of intelligence gleaned from North Korean defectors. None of the officials who received his note had responded to it. Forwarding it to his colleague, Kim wrote, “I am giving this to you … to underscore my point that 99% of the people don’t care and don’t know … That is why I say it’s not worth it. They [the officials] really don’t know anything.”
Others in the State Department might have been wary of venting to Rosen, whose eagerness and carelessness were a perilous combination. But Kim didn’t sense this. According to phone records, the two men had a 20-minute conversation an hour after Rosen’s pleading email. And when Rosen called on June 11, Kim called back.
AS A PRESIDENTIAL candidate, Barack Obama promised that his administration, in contrast to that of George W. Bush, would be the most transparent in U.S. history. Once in office, however, he veered in the opposite direction. Rosen’s story had the misfortune of being published just as the administration was nearing its breaking point on leaks.
Jeffrey Bader, who was the senior director for East Asian affairs at the National Security Council, recalled that the day Rosen’s story was published, he and other senior officials at the White House discussed it. “I was annoyed, and I remember others were annoyed,” Bader told me. There were two problems: first, that Rosen’s story contained information that was also contained in a classified intelligence report; and second, that the story was published within hours of the report being circulated. “It was regarded as a serious breach,” Bader said.
Around that time, Dennis Blair, the president’s director of national intelligence, reassessed the government’s approach toward leaks. Blair asked the Justice Department for a list of officials who had been prosecuted for leaking. He was surprised by the result — of 153 referrals to the Justice Department in the previous four years, not a single person had been indicted. That scorecard, Blair later told The New York Times, “was pretty shocking to all of us.” A decision was made to start going after indictments. “My background is in the Navy, and it is good to hang an admiral once in a while as an example to the others,” Blair told The Times. “We were hoping to get somebody and make people realize that there are consequences to this and it needed to stop.”
On September 24, two FBI agents were escorted into Kim’s office, three-and-a-half months after his fateful conversations with Rosen. He apparently hadn’t thought those June 11 conversations were problematic — next to the phone on his desk he had put a handwritten note with the numbers for Rosen’s BlackBerry and office phone.
The men sat closely together in Kim’s office. It had no windows and no couch, and was crowded with three computers (for unclassified, secret and top secret material), as well as a refrigerator-sized safe for storage of computer drives and documents.
The agents were friendly, Kim recalled. They asked him to sign a document stating he was aware they were conducting an investigation — though Kim told me that neither the form nor the agents mentioned that he was the target. They asked about his background, about his family, about his colleagues. They asked about the Rosen story, and whether he had met Rosen, but their questions were polite and sprinkled in a conversation about a number of things, none of them adversarial.
“It wasn’t like suddenly they came in and, boom, laid it on me,” Kim said. “They did not say, ‘We are investigating a leak.’ They did not say, ‘We are investigating you.’ … I didn’t know why they were there.”
Kim had fallen into a trap the FBI uses to squeeze information out of unwitting suspects. It is called “non-custodial questioning,” which can involve law enforcement agents visiting suspects at their home or workplace and disguising, through friendly questions, the fact that they are under investigation. The suspects are not read their Miranda rights, warning that anything they say can be used against them in a court of law.
Kim, in particular, was predisposed to trust the agents. He was a conservative, straight-laced government employee, raised in an immigrant family. “To automatically give trust to the police or to government authority is not a conscious thing, it’s almost ingrained in me,” he told me in March, at his lawyer’s office in downtown Washington. It was raining outside, and the grim weather matched his mood. “Maybe you’d call that naïve, but that’s the environment in which I grew up … If a policeman stops me on the street for no reason, my natural instinct is to give them what they want.”
In addition to yielding more testimony than might be offered after a suspect has been read his or her rights, non-custodial interrogations can serve another purpose — they encourage lies. When FBI agents don’t let on that you are a suspect, you may be more inclined to tell a fib. After all, why admit to an indiscretion that the agents don’t seem aware of? The problem is that lying to an FBI agent is a crime — another charge added to an indictment you are not aware is being prepared against you.
According to notes written by one of the FBI agents, Kim said he met Rosen in March, but that he hadn’t met him again and wasn’t a source for the June 11 story. According to the agent’s account, Kim also said, “I wouldn’t pick up a phone and call Rosen or Fox News.”
Of course, the FBI knew Kim had talked with Rosen on June 11 — that’s why they were interviewing him. It is one of the ironies of the case that an expert on one of the most devious regimes in the world was a naïf when it came to recognizing the trap his government was setting for him. Kim had no idea that in the month leading up to the cordial FBI visit, his office had already been searched.
By the time the FBI agents left his office, Kim apparently realized something was afoot. According to a document the FBI submitted to the court, after the meeting Kim logged onto his Yahoo account and called up emails he had exchanged with Rosen. The next day, he told the FBI that his Yahoo account was full and that they should email him at a Gmail account.
If Kim’s intent was to make it less likely that the FBI would learn about his contact with Rosen, it was too late. What took place during the FBI’s announced visit is a source of exasperation for the lawyer Kim eventually hired, Abbe Lowell.
“He was asked questions that were, for all intents and purposes, a setup,” Lowell told me. “The government already knew that Stephen had had a conversation with the media. They already knew that he had had access to the information that they believed to have been classified. They were basically setting him up, to see if they couldn’t get him on another charge.”
Lowell mentioned an old adage about criminal defense lawyers.
“Many of them have a fish that they mount on the wall,” he said. “These lawyers put a plaque under the fish, and in words or effect that plaque will say, ‘If I hadn’t opened my mouth, I wouldn’t be hanging here today.’”
IN THAT SAME month of September 2009, Kim was called into the office of his new boss, Rose Gottemoeller, who had replaced DeSutter after Obama’s election. Kim had spent the morning chasing after some intelligence for her, and he assumed she wanted an update. But the moment he walked into her office and saw that her chief of staff was also there, he knew something was off. As Kim recalled, Gottemoeller didn’t look him in the eye as she told him he was being let go due to a budget shortfall.
Kim recalled that he asked her if he had done something wrong, and she told him no. After a few awkward minutes, Kim left the office. His promotion to the Policy Planning Staff was gone, too. He was still an employee of Livermore — his job at the State Department was technically a second appointment — so he moved to the lab’s satellite office at L’Enfant Plaza while he looked for a new position in Washington.
He didn’t know it, but he was becoming more of a marked man with each passing day. In December 2009, the Justice Department came under new pressure to crack down after a closed-door hearing in which leaks were criticized by members of the Senate Select Committee on Intelligence, chaired by Sen. Dianne Feinstein. As Dennis Blair told The Times, “We had to do 50 push-ups and promise to do better.”
Despite the sustained crisis around North Korea and Kim’s unique expertise, he was turned down everywhere he applied. After a few months, he finally landed a position at the Defense Threat Reduction Agency, a little-known Pentagon think tank. It was not the center of the action, but it was something.
He was living a booby-trapped life, however. Relieved to have found a job, he went to South Korea on vacation with his new wife (at the time, his ex-wife lived in California with their son). When he returned home, he was pulled over by a customs agent at the airport and grilled about his trip.
“I’ve never been called aside for inspection in all my travels,” Kim told me. “The customs officer who pulls me over doesn’t check my bag or my wife’s bag. He asks me all these questions. When did you leave? Why were you there? Did you speak to South Korean officials? What did you talk about? At a certain point, I started getting a little bit upset.”
Two days later, on March 29, 2010, Kim got a call from an FBI agent, who asked to talk again. Kim agreed, but said his new office in L’Enfant Plaza did not have a secure room. The agent told him to meet at the Department of Energy building around the corner.
“They were all friendly,” Kim recalled. “They were like, ‘We just want to ask you some questions, follow up on this and that.’”
They went to the basement of the building, to what’s known as a Sensitive Compartmented Information Facility (SCIF), where classified information can be discussed without fear of eavesdropping. The windowless room where he was questioned had a table and a few chairs.
Shortly after they sat down, Kim said, the smiles disappeared. The agents accused him of leaking classified information to Rosen. It wasn’t just one leak, though; according to Kim, they said he had leaked “a body of work” and had intentionally divulged classified information on multiple occasions.
Kim became visibly agitated as he described the scene of this interrogation. He got restless in his chair. He leaned forward, his voice became louder, and he thumped the table in front of him as he skipped from one part of the interrogation to another.
The agents demanded to search his condo in McLean, Virginia. Kim said they told him that if he refused, they would get a search warrant.
“It was surreal,” Kim told me. “What are you supposed to feel? You don’t feel anything. You’re dumbfounded.”
We had been talking for more than three hours at his lawyer’s office. Outside, the sky was turning dark. Kim paused for a while, struggling to find the right words to describe his shock over the FBI’s accusations.
“Have you ever been hit really hard, like playing sports, or you ran into a pole, or somebody hit you?” he finally asked. “At first you don’t know what hit you. You’re kind of stunned. It doesn’t even hurt in the beginning … When somebody gets shot, unless you have had the experience of being shot, you don’t know that you’ve been shot. It’s not like in the movies. That’s the closest analogy I can come up with. I didn’t know what was happening.”
When the interrogation inside the SCIF was over, Kim left and got into his car. He didn’t want his wife to be around for the search, so he called and asked if she would run some errands. When he arrived home, he noticed a man loitering in the hallway, apparently a federal agent; his home was already staked out. The agents who had interrogated him soon arrived, along with four more men in casual clothes. They scoured his home for several hours, confiscating computers, opening books to see if anything was hidden inside, going through drawers and kitchen cupboards. According to Kim, the agents repeatedly challenged him with the same question: “Where is the document? You stole a document. It’s in your possession.” One of the agents, apparently frustrated that they weren’t discovering anything, used a phrase that Kim interpreted as a racial slur, referring to him and other Asian-Americans as “you people.” (The government denied this exchange took place.)
Kim’s wife showed up in the middle of the search.
“She doesn’t know what’s going on and she’s offering them drinks,” Kim recalled, shaking his head. “This is how stupid we were.”
Even at this stage, with the FBI turning over his house, Kim didn’t comprehend the full scope of what he was facing. He asked the FBI agents whether he needed a lawyer, and when they said they could not provide advice on that, he let them continue. It wasn’t until a few days later, in another secure room, that he finally understood the calamity that was upon him. Along with a lawyer he belatedly contacted, he met a team of prosecutors from the U.S. Attorney’s Office who told him that the government planned to charge him with multiple counts of violating the Espionage Act. He faced decades in prison.
IN THE 1970s, when Kim was bullied at grammar school for being a skinny Asian kid named Jin-Woo who knew only a few words of English, the same person always came to his rescue — his older sister, Yuri. She would run down the hallways of their Bronx school, shouting at the boys ganging up on her brother and beating them off if necessary. Unschooled in the language or culture of their newly adopted country, Stephen and Yuri were inseparable. They read the same books that Yuri brought home from the library, they skipped together to McDonald’s when they had spending money, they passed summer days at the pool in their apartment complex.
Both children excelled academically. Stephen earned a spot at Fordham Prep, an elite private school, and Yuri attended Bronx Science, one of the most competitive public schools in the city. Yuri went on to earn a law degree from Georgetown University and became a corporate lawyer. Stephen got his undergraduate degree from Georgetown and a master’s degree from Harvard before heading to Yale for his Ph.D.
Yuri is more openly emotional than her brother. When we spoke last April at Stephen’s apartment about the early days of the case, she clasped her hands on her chest and occasionally closed her eyes, as though reliving the ordeal. She spoke quietly and intensely. She was at her job in Zurich, where she lived with her husband and two children, when she heard her brother was in trouble.
“My brother tried to explain, saying, ‘The government came to me and said I did something. I’m meeting with Ruth, the only lawyer I know in town … But I don’t know what’s going on. They want to send me to jail for 30 years. They said I did something back in 2009. And the FBI guys were here last weekend.’ ”
“Are you a spy?” she asked her brother. “What did you do? What’s happening?”
She immediately booked a flight to Washington, then she went on a Googling binge, searching “Espionage Act,” “Valerie Plame,” “Judith Miller” — anything that might be related to Stephen’s predicament. Before she got on the plane, she had read every case study she could find on espionage.
Kim had noticed that men in unmarked cars had been trailing him to work and parking outside his building at night. (He didn’t know at the time that the government had a code name for him — Lemon Shark.) He warned Yuri that she would likely be followed once she landed at Dulles.
“That was my first taste of, ‘Oh, my God, whatever is happening, it’s involving the U.S. government,’ the most powerful, most tenacious, most resourceful government,” Yuri said. “And if they’re after my brother, then this is really, really bad news.”
Kim, who’d been sitting silently next to Yuri as she recounted those early days, finally spoke up. “I didn’t have the wherewithal to Google anything,” he said. “Everything was just a blur … I compare it to losing all five senses at the same time. You don’t see anything, you don’t smell anything, you don’t hear anything. Nothing. That’s the only way I can describe it.”
Yuri said Stephen was a shell of a man in those early days after he’d been accused. Before dinner one night, she found him sobbing, crying out that his life was destroyed. She worried that her brother might harm himself. At one point, she tried to make light of it as they stood on the terrace of his 19th-floor condo.
“It’s going to be a really painful fall,” she told him. “Call me before you do it. I’ll talk you out of it.”
“It’s got to hurt when you land,” he replied.
After devoting more than a decade of his life to preventing North Korea from building a nuclear arsenal, he was now accused of helping Pyongyang. How could he live with the stain of what his government accused him of doing? Espionage. What could he say to his young son? To his elderly parents?
“Every single day, I thought about killing myself,” Kim said.
He went online to find out how many sleeping pills or Tylenol he would need to swallow to end his life. He considered jumping in front of a train, because that would be quick. He made plans for letting people know he had committed suicide, deciding that he would send a note to a friend and explain that it should be opened on a certain day; inside he would place his house and car keys.
“It’s a ruthless calculus — you don’t think like a normal person,” Kim told me. “I’m not proud of it, but I’m not ashamed of it, either. Why should I be? Have you gone through what I have? If not, then don’t judge, don’t cast a stone.”
Looking back, Kim felt a kind of dark kinship with Aaron Swartz, the brilliant computer programmer who committed suicide after prosecutors threatened a lengthy prison term for his unauthorized downloads of papers from an academic database. The Justice Department doesn’t just react harshly to unauthorized releases of government data. These priorities are controversial, of course, because young computer hackers and dissenting government officials have received much harsher treatment than corrupt bankers or tax-evading corporations.
Kim talked for a while about Swartz, and about the particular psychic strain that has to be endured when you feel the government’s fist brought down on you. “I know exactly what happened to him,” Kim said. “They threw the kitchen sink at the boy.” He talked about his own struggle: “The only thing I had to think about was how to survive day to day. What do I have to do every single day to be sane.”
We were sitting in the living room of his rented apartment in northern Virginia. “I do believe that nothing meaningful is really ever learned in the absence of suffering,” he said. “But, boy, to gain that meaning — ”
Kim is well-versed in theology, and he mentioned the intellectual history of suffering and the idea that a person can become purified through struggle and pain. “But for the person going through the suffering, it doesn’t seem that pure,” he added.
AFTER THE SEARCH of his McLean home, prosecutors offered Kim a quick deal in which he would accept a sentence of about seven years. If he refused, he could face a 30-year sentence at trial. For a defendant facing indictment, the decision to fight is not just moral or legal. It is also largely financial. Private attorneys are expensive, especially if a case is complicated and long, and as with this one, the government is prepared to invest a lot of resources in it. When Kim was indicted, the opposing bench included three prosecutors from the Department of Justice’s National Security Division.
Kim turned to Abbe Lowell, who had recently defended a lobbyist against an Espionage Act charge and who had a string of other high-profile cases. Lowell had argued on behalf of President Clinton during his impeachment hearing in the House of Representatives, and had defended John Edwards in his corruption trial, Gary Condit in the Chandra Levy case, and even Sean Combs in a voting rights case.
Even when sitting in the quiet of his office, Lowell gives the impression of a taut spring that may uncoil at any moment. He understood that Kim’s case could go on for years and that Kim would not be able to pay for it, but he took it on because he believed it involved a decent American fighting an indecent crackdown. It was, he said, a case of “a person who needed a lawyer and an issue that needed a defense.”
But the legal bills would be substantial. Kim depleted his bank accounts. His parents sold their retirement house in South Korea. Yuri drained her savings. Every time the government refused to provide classified material that might exonerate Kim, the matter had to be argued before the judge. Brief after brief had to be filed. The case would cost millions before it concluded.
Stephen and Yuri set up a defense fund and solicited contributions from friends and supporters. They sold personal belongings — furniture, watches, jewelry. Not even a year into it, they were running out of money. Lowell agreed that once the funds were gone, further costs would be covered by his firm, Chadbourne & Parke. In the end, the firm absorbed more than $1 million in unpaid legal fees.
“I told Abbe, ‘This is everything we’ve got,’” Yuri said. “So I want your moral promise that you will defend my brother to the fullest of your abilities … You’re part of our lives. My brother holds onto your legs for his life, and so do I.”
When Kim’s parents visited Washington and met Lowell, Kim’s mother broke into tears, clasping the lawyer’s hands in supplication.
“Please save my son,” she pleaded.
ON APRIL 5, 2010, WikiLeaks released a cockpit video taken from an American helicopter gunship in Iraq that showed the killing of at least 12 people. The video had been provided to the whistleblowing group by an Army private, Bradley Manning (who later switched gender and became Chelsea Manning), and was part of a trove of Pentagon and State Department files that WikiLeaks would publish about the Iraq and Afghan wars.
The Obama administration, facing what it feared might become a hemorrhage of secrets by anyone with access to a government database — not an unfounded fear, as the 2013 purloining of National Security Agency documents by Edward Snowden would later demonstrate — moved swiftly against leakers in its path. Manning was charged under the Espionage Act; a grand jury was convened to consider charges against WikiLeaks founder Julian Assange; and Snowden, too, of course, would later be charged under the law. The administration instituted an aggressive “Insider Threat Program” to find leakers before they leaked. And it decreed last March that members of the intelligence community needed authorization to talk with reporters even if their conversations were not about sensitive matters. If an intelligence official bumps into a reporter at the gym, it apparently must be reported to her superiors.
“For many years, we had achieved what seemed like a state of equilibrium, in which a certain type of leaking was understood and tolerated,” said Steven Aftergood, who directs the Project on Government Secrecy at the Federation of American Scientists. “I date the collapse of that equilibrium to WikiLeaks, because it was such a departure in magnitude and consequence from the norm. It triggered a response of unusual severity.”
Kim was among the first victims, and his prosecution revealed that the technologies that enable large-scale leaks are also the government’s most formidable weapon for striking back. With a few clicks by a systems administrator, or a subpoena to a phone company or web firm, the government can figure out who talks to whom and when, who emails whom and what they write, or who enters and leaves a building and when they do it. When there is metadata, there is no need for informers or tape recordings or confessions.
The FBI was able to acquire Kim’s phone records, Rosen’s phone records, their emails, security badge records for the State Department building, even records of the precise moments Kim accessed the North Korea intelligence report on his office computer. The assemblage of electronic data showed when and where and for how long Kim and Rosen talked, though not what they talked about. This attests to the power of metadata — to indict a suspect under the Espionage Act, the government doesn’t need to prove what he said in a particular conversation on a particular day, just that he talked or met or left the building at a particular time. Kim’s lawyer highlighted this in a brief to the court: “The government has not produced any email, text message, or recorded conversation documenting the contents of any communication [on June 11] between Mr. Kim and Mr. Rosen.”
It didn’t matter.
In the summer of 2010, after the FBI searched his home in McLean — finding no classified documents or incriminating evidence on his computers — Kim was in California working on unclassified projects at Livermore (the job he had lined up at the Pentagon think tank was gone). As the WikiLeaks disclosures played out on the front pages of The New York Times and the Guardian, the government moved swiftly ahead with its prosecution. Lowell called Kim near the end of August to say the government was going to charge him unless he agreed to plead guilty.
Kim made hasty farewells to his son, who was 10 years old at the time and living nearby with Kim’s ex-wife. They didn’t tell him why Kim was leaving so suddenly. Though a press blitz was inevitable once the indictment was announced, Kim hoped his son could be shielded from it.
The next days in Washington were a flurry of meetings and phone calls with prosecutors. To avoid a trial that could be unpredictable for both sides, they tried to hammer out a plea deal, haggling over the length of Kim’s sentence and what he would plead guilty to. Two counts or one count? Disclosing sources and methods? Less than a year or more than a year?
“I felt like chattel,” Kim told me. “Like in The Merchant of Venice, how much for the pound of flesh?”
The calculus on taking a plea often has little to do with guilt or innocence. One consideration is the judge. Kim was not lucky on this — the judge he had drawn, Colleen Kollar-Kotelly, had served for seven years as the head of the secretive Foreign Intelligence Surveillance Court, which in her tenure had rarely denied or limited government requests for surveillance by the NSA.
The prosecution was not going to back down, but neither would Kim. On Aug. 27, while eating lunch at the Tysons Corner mall, his phone rang. The negotiations had deadlocked, Lowell told him. Lowell’s instructions were blunt: “Shower, shave, put on your best suit and come down to the court by four, because they’ve decided to indict you.”
The next hours were a montage of humiliation. Walking up the courtroom steps as photographers jostled to take his picture, going before the judge to be charged with one count of violating the Espionage Act and one count of lying to the FBI, being led out of the building in handcuffs, put into the back of an FBI vehicle, fingerprinted at a nearby station, having his shoelaces removed, and being locked up until bail was posted. In his solitary holding cell, Kim was less than 2 miles from the office where he had briefed Vice President Cheney.
Kim’s wife had gone to South Korea to stay with her family. His marriage had fallen apart, too.
LOWELL’S LEGAL STRATEGY had many prongs, the most important of which was simple: Was it possible that other officials had talked to Rosen about the classified information in the story? He made a series of discovery requests to find out how many officials had access to the report (the number turned out to be at least 168) and whether any of them spoke with Rosen. Just as the FBI had used email and phone records to connect Kim to Rosen, Lowell asked for the phone and email records of the 167 other officials.
As it turned out, on the day Rosen’s story was published, a Fox correspondent, Major Garrett, emailed then-Deputy National Security Adviser for Strategic Communications Denis McDonough to say he would receive “a call or an e-mail from a trustworthy colleague, James Rosen,” who had “some very good stuff on North Korea and would like some NSC guidance.” Two minutes later, McDonough replied via email, “Got it.” About 10 minutes after that, Rosen called an NSC number used by McDonough and several other senior officials, including John Brennan, a counterterrorism adviser at the time (and now director of the CIA). Phone records show that someone called back from the NSC and talked to Rosen for several minutes. Mysteriously, the prosecution said that neither McDonough, nor any of the NSC officials interviewed by the FBI, recalled talking to Rosen.
The defense learned that in the time leading up to the story, Rosen exchanged dozens of emails with Herzberg, the public affairs officer who had introduced Rosen to Kim. Some of the emails covered “sensitive but unclassified” information, according to a court filing. Herzberg denied in his first interviews with the FBI that he had discussed sensitive information with Rosen. The prosecution also disclosed that Herzberg had sometimes used a private email account to communicate with Rosen.
Though not conclusive, this was tantalizing evidence to support Lowell’s argument that Kim was not the only official to talk with Rosen about the North Korea report, nor the only one to tell the FBI less than the entire truth at the outset of an interrogation, nor the only one to use a private email account to correspond with the Fox reporter. But Kim was the only one being prosecuted.
“There were a number of other people in the government that were talking that day about this subject matter,” Lowell told me. “The reason (Kim) got picked out of what I call the lineup is because once the leak occurred and the intelligence community decided to say this was a terrible, outrageous thing, and they demanded that somebody be found, it was possible to find Stephen and it wasn’t as easy to find others. The government could have found others, but having already vested their target to be Stephen, they never bothered.”
Kim had the particular misfortune of being a mid-level official. Senior officials tend to have powerful allies who can push back against the Department of Justice. This doesn’t always protect them — Scooter Libby, who was Vice President Cheney’s chief of staff, was convicted in 2007 of obstructing an investigation into the leak of a CIA agent’s name (though his sentence was later commuted by President Bush). But usually it helps. Top officials who have not been prosecuted for leaking include Leon Panetta, the former CIA director who, according to a report by the Defense Department’s inspector general, leaked the name of the SEAL commando who led the raid that killed Osama bin Laden. Another example is Gen. James Cartwright, who reportedly has been investigated as the source for a Times story on Stuxnet, but has not been charged.
And of course there is David Petraeus, the former CIA director and four-star general who is being investigated for leaking classified information to Paula Broadwell, his former lover and authorized biographer. According to recent press reports, lawyers in the Department of Justice have recommended that Petraeus be indicted, but there’s significant resistance because he is a popular figure with influential friends who have taken his side, including Sens. Dianne Feinstein and John McCain. While Kim sits in prison for talking to a reporter about a single classified document, Petraeus has not been charged for allegedly handing over multiple classified documents.
The problem was that Kim was an off-the-rack analyst on loan from one government entity to another, and the VCI, where he worked, was filled with hard-liners who were unloved by the rest of the State Department.
“He’s an easy target,” said Jim McNally, a verification expert who worked with Kim at the State Department. “A guy who doesn’t have a strong constituency behind him, and that can lead to problems.”
Still worse, Kim could no longer count on the support of the VCI, because DeSutter, who had hired him when she headed it, had left by the time the leak investigation began. Kim barely knew his new boss, the one who abruptly laid him off.
“If I had still been there, I would have protected him,” DeSutter told me. “I feel bad as an American, because I believe this is an injustice … I was interviewed by the FBI two separate times. I told them, ‘You have the wrong guy.’”
KIM’S EX-WIFE AND SON eventually moved overseas, and though it wasn’t because of Kim’s troubles, the move insulated them from the American news cycle. For a while, their son was kept unaware of exactly what was going on (even though the FBI had called him in 2011), but his mother later told him about it.
Kim’s son, whose name and location we are withholding because he is a minor, seems to have handled the fact of the accusations against his father as well as could be expected. He was visiting Kim during one of my trips to northern Virginia, and spent most of the time while I was there happily playing video games on a computer. The two of them talked easily and playfully.
A sense of their rapport emerges in the text messages they exchanged when Kim’s guilty plea was announced last year. Before the trial was scheduled to start, the prosecution offered a relatively lenient deal — just 13 months in prison for an Espionage Act violation, with the dropping of the charge that Kim had lied to the FBI. Rather than risk more than a decade in prison if he lost at trial, Kim accepted the deal.
“As you know I faced charges that I did something wrong,” he texted his son. “I fought for 4 years. At this juncture I faced a harsh choice to continue to fight and go to trial or to compromise. If I won at trial would be best. But if I lost I would have faced 15 years in jail.”
His son replied that his father was making the best choice, and in other exchanges told him that he was proud of him and that he wasn’t ashamed. Their exchanges have been reassuring, Kim told me, but he realizes kids can hide their true feelings from their parents.
“I don’t know how well he took it,” Kim said. “All I know is what I see in his text messages. I can’t see the emotions behind the words … I don’t know whether he’s masking his pain.”
It was not as simple to break the news to his father, who is 79 and lives in Seoul. So you are saying you are spy! he replied when Kim told him about the plea. If you pleaded guilty, that means you did it! Kim tried to explain the risk of losing at trial, but his father, who had sold his house to help pay the legal costs, was incensed. In response, Kim told his father that they were no longer father and son, and only after Yuri intervened to make peace between them did the two men talk again.
SO WHAT DID Kim tell Rosen? Was he guilty as charged?
He couldn’t give me any answers. Anything he said about his conversations with Rosen could get him into more trouble — a claim of innocence, for instance, would conflict with his plea agreement. Rosen refused to talk to me; he has only made a few comments about the case. “As a reporter, I will always honor the confidentiality of my dealings with all of my sources,” he said on “The O’Reilly Factor” in 2013.
I interviewed four people who worked with Kim in the VCI, and they all described him as a stickler when it came to handling classified data. Livermore, the lab where he worked earlier in his career, holds the most closely guarded secrets about the making of nuclear weapons. He did not have a reputation for indiscretion.
“That’s not how he ever was,” one of his co-workers told me, requesting anonymity because of ongoing work for the government. “He was very careful and thoughtful and followed procedures.”
One possible scenario is that Kim discussed information that was both in the intelligence report and in the public domain. The government puts a surplus of information behind its secrecy firewall; in 2012, the executive branch made 95 million “classification decisions,” according to the agency that tracks these things, and even President Obama has said that over-classification is a problem. The upshot is that it can be difficult for government officials to have useful discussions about policy without talking about something that is both banal and classified.
Kim suggested to the FBI that Rosen might have heard about the report from other sources, and that he, Kim, might have confirmed it or talked about it without intending to step over any lines. This scenario was sketched out in the prosecution’s own filings, one of which, recounting Kim’s second interrogation by the FBI, notes, “To be clear, the defendant denied that he was a source for Mr. Rosen or had knowingly provided Mr. Rosen with classified documents or information. Nevertheless, the defendant also told the FBI agents that he may have ‘inadvertently’ confirmed information that he believed Mr. Rosen had already received from other individuals.”
The article that Rosen ended up writing suggests why Kim might have discussed those intelligence issues with him. By predicting that North Korea would lash out against new sanctions, the report confirmed his hawkish view that modest punishments are insufficient to make North Korea more pliant.
Rosen may have worsened Kim’s plight by framing the assessment in a sensational way. His story described “prized data” that the CIA had just learned and was urgently providing to the White House. The story neglected to mention that nearly everything in the assessment had already been discussed in the media. In an April dispatch from its official news agency, North Korea itself had said that it would take the actions that, two months later, the CIA breathlessly warned it would take. Rosen’s story also said the intelligence was based on “sources inside” North Korea — this could have angered the intelligence community, because sources and methods are particularly sensitive issues — but there was no detail.
Indeed, the banality of Rosen’s story prompted dumbfounded articles with such headlines as, “How the World’s Dullest Story Became the Target of a Massive Leak Investigation.” Jon Stewart, host of “The Daily Show,” mocked the government’s case. “That’s it?” he said. “That’s the leak they needed to quash? North Korea to answer sanctions with more nuclear tests? North Korea answers everything with more nuclear! They have a nuclear-test-based economy!”
AFTER HE WAS SENTENCED in April, Kim had to wait three months for the Bureau of Prisons to tell him where to report. It was an odd purgatory — a government that had threatened to put him in prison for decades didn’t seem to care about him serving time once it had reaped the publicity of a guilty plea on an Espionage Act charge. And Kim, after years of fighting to stay out of jail, wanted to go to prison as soon as possible, so that he could get on with his life.
When I visited him in April and May, there were surprisingly few things in the small apartment he was renting in Reston, Virginia. Clothes, dishes, sheets, books — everything was being sold, given away or put into storage as his incarceration neared. He mentioned that he had a picture from the day he briefed Cheney. I asked if I could see it, and he brought it up from the basement. I looked at it for a while, Kim and the vice president going over documents about North Korea. When I asked whether I could make a copy, he waved at the picture abruptly.
“Take it,” he said. “Take whatever you want.”
Kim’s pain emerged in flashes like this. Most of the time he was adept at hiding behind a self-protective dry humor. At lunch with a few of his supporters after he was sentenced , he joked that he could write a memoir entitled, “From Yale to Jail.” When someone asked what he would do after getting out, he wisecracked, “Welcome to McDonald’s. Would you like to supersize your order?” This wasn’t too far from the truth. To improve his odds for early release, he lined up two job commitments once he got out of prison — one was working in a Catholic church, the other was a job in a women’s beauty shop.
From the moment he arrived in New York City as Jin-Woo Kim, he had set to work on constructing a new self, becoming Stephen J. Kim, a successful immigrant with Ivy League degrees who advised the White House and was privy to some of the nation’s most sensitive secrets. Now, he told me, he had to deconstruct that identity.
“My reputation is gone,” he said over dinner at a Japanese restaurant in Reston. “I don’t have any power. I am not a human being. I am the property of the state.”
He picked up a plate and held it aloft. “I am like this,” he said. “I don’t have rights. There’s no Stephen Kim. It’s erased. I am prisoner number whatever.”
When the lease on his Reston apartment came to an end, he moved into a spare room in a friend-of-a-friend’s apartment. Then he had to move again, into another apartment — this one with a mattress on the floor and a lamp — belonging to another friend of a friend. Finally he received a call from an official in the corrections system. “We have your designation,” the official said. “You got the Cumberland camp.”
Cumberland, in western Maryland, had its share of famous inmates, including Bernard Kerik, the former New York Police Department commissioner, and the lobbyist Jack Abramoff. Kim’s lawyer had represented Abramoff, so they talked on the phone before he went in; among other things, Abramoff gave him advice on how to stay out of trouble.
A handful of Kim’s friends quickly arranged a farewell party at one of their homes. As Kim dined on what would be his last big Korean meal for a while — marinated beef, known as bulgogi, and kimchi, a spicy side dish — the dozen or so guests drank generous quantities of beer and whisky and watched fireworks explode overhead. Kim’s going-to-prison party coincided with the Fourth of July.
His last hours of freedom were restless, much of the time spent exchanging text messages with his son.
“Today is Sunday here,” he wrote. “It will be my last day and then I sleep and wake up real early around 4:30 and get ready to leave here at 6 am so that I can report to Cumberland by 10 am.”
His son responded with emoticons that showed tears streaming from an emoji’s face.
Kim texted a list of things to keep in mind.
“First, don’t ever get down,” he began.
Write lots of letters. Study hard and joyfully. Make good friends. Don’t lose hope.
He continued to text through the night.
“Don’t be sad.”
“Be a good man.”
His friends arrived at 5:30 in the morning. Kim dressed in a white shirt and beige trousers. One of his friends jokingly offered to swap shoes, because Kim’s loafers were nicer and he couldn’t wear them in prison.
The drive took about three hours, a journey through rolling farmland along stretches of two-lane roads. Kim barely talked. In Cumberland, they stopped at a café for breakfast. One of the friends, a Catholic priest, recited Psalm 31 before the omelets and pancakes arrived. A few more jokes were told — someone said they would all be glad to frequently visit the prison because there was a good public golf course nearby.
The prison camp, a few miles outside the town, has no barbed wire. It resembles, from the outside, a well-kept recreation center. Getting his first glimpse of his new home, Kim saw an inmate mowing a lawn on a small tractor. “I wish they’d give me that job,” he smiled.
The intake for new inmates was located in an adjacent medium security facility ringed with concertina wire. Pulling into its parking lot, the car stereo was playing classical music. Nobody spoke. Kim’s friends walked him to the entrance and said goodbye. There were no tears, no drama, just as he’d requested. Inside, a guard told Kim to take a seat. He waited to begin his new life as prisoner 33315-016.

Oscars Make History, So Hollywood’s War Stories Need To Be True

The Intercept  |  February 13, 2015

When the Academy Awards are handed out, history will be made.

I’m not referring to the Oscars that particular films might win, but our embrace of their narratives of history. If “American Sniper” gathers a fistful of statues, even more people will see a film that presents a skewed view of the Iraq war. If the “Imitation Game” gets lucky, a lot more people will watch a movie that erroneously portrays Alan Turing as a social idiot. If “Selma” catches some of the limelight, more people may believe that Lyndon Johnson wasn’t entirely supportive of Martin Luther King.

This year’s controversy over films and history has led to a dismissive shrug from cultural critics who wearily tell us that movies are just movies, you shouldn’t take their versions of truth to heart, just enjoy the show. “Going to a Hollywood movie for a history lesson is like going to a brothel for a lecture in philosophy,” wrote Esquire’s Stephen Marche. “You’re in the wrong place.” A.O. Scott, the New York Times film critic, tweeted for the hard of understanding, “FEATURE FILMS ARE NOT HISTORY. THEY ARE HISTORICAL FICTION.”

They are right — Hollywood is not a classroom. The problem, however, is that movies, despite the bonfires of distortion in many of them, can shape our understanding of political events just as much as think tank reports or Pulitzer-winning books. For instance, a lot of major movies are taught in schools. It is disingenuous for the screening room cognoscenti to pretend that films are of no political consequence and shouldn’t be critiqued for historical accuracy — and that’s particularly true for war films.

As Don Gomez, a soldier and blogger, wrote about “Zero Dark Thirty,” which portrayed torture as playing a crucial role in finding Osama bin Laden, “Filmmakers can always deflect criticism by saying ‘It’s a movie, not a documentary,’ which is true. But that ignores the reality of how it will be consumed — how they know it will be marketed and consumed.” And guess what — opinion polls show a majority of Americans think torture worked, just as ZDT said it did, even though an exhaustive Senate report concluded it did not.

A recent study conducted by Notre Dame researchers Todd Adkins and Jeremiah J. Castle indicated that movies are more effective in shaping political opinion than cable news or political ads. In the study, different audiences were exposed to different films and the evolution of their political beliefs was tested before and afterwards; there were statistically significant shifts. “Viewers come expecting to be entertained and are not prepared to encounter and evaluate political messages as they would during campaign advertisements or network news programs,” the authors wrote — meaning that viewers are not aware they are being targeted with political messages, so they are more likely to be persuaded by what they see on the screen.

I’m not really concerned about “The Imitation Game” or “Selma” or for that matter, “Argo” or “The King’s Speech,” because nobody is going to die from the wrong lessons they might impart (and it’s not clear that “Selma” was wrong). It’s probably true, as The Guardian said of “Braveheart,” that it’s a “great big steaming haggis of lies” — but the present-day costs of its liberties with the truth are negligible. However, when it comes to blockbuster tales about our ongoing wars in the Middle East and Central Asia, the wrong lessons are deadly. If, as “American Sniper” suggests, people believe that Iraq was filled with crazed savages who had no reason to attack the foreign army in their midst, we risk engaging in more warfare in the region, because fighting sub-human Muslim fanatics is far easier to justify than killing and maiming innocent civilians, which is a lot of what actually happened.

There is another problem with the “calm down it’s just a movie” attitude — it is chiefly used to protect narratives that confirm our prejudices. When Oliver Stone’s “J.F.K.” came out in 1991, it received coast-to-coast jeers for suggesting a conspiracy behind President John F. Kennedy’s assassination. “What is fact and what isn’t is not always easy to tell,” Vincent Canby wrote in the Times, calling out the movie’s “unsubstantiated data.” Director Oliver Stone, deeply at odds with conventional wisdom, was eviscerated for his “paranoid fantasy,” as Charles Krauthammer wrote at the time. Yet Clint Eastwood, whose “American Sniper” conforms with traditional notions of patriotism and heroism, gets a pass from historical scrutiny because, as his defenders say, it’s only a film.

Rutgers historian Richard Heffner noted that the furor over “J.F.K.” showed that filmmakers like Stone had hit a sensitive nerve — they were becoming “our nation’s leading storytellers,” and the Academy Awards rather than the Pulitzer Prizes were becoming the go-to accolades for our new historians (Heffner wasn’t entirely happy about this). By all means, let movies engage history — this is a wonderful thing — but their narratives of violence should not be spared a confrontation with the truth.

How Clint Eastwood Ignores History in ‘American Sniper’

The Intercept  |  January 8, 2015

Just a few pages into “American Sniper,” Chris Kyle used an epithet to describe the Arabs on the wrong side of his gun scope. “A lot of people, myself included, called the enemy ‘savages,’” he wrote. “I only wish I had killed more. Not for bragging rights, but because I believe the world is a better place without savages out there taking American lives.” A decorated Navy SEAL, Kyle killed more than 150 “savages” in Iraq, becoming the deadliest sniper in the annals of American warfare.

Kyle’s memoir has been turned into a film starring Bradley Cooper and it’s an Oscar contender even before its national release on January 16. The Los Angeles Times hails its action scenes as “impeccably crafted,” while The New Yorker salutes Clint Eastwood for making other directors “look like beginners.” Unfortunately, Hollywood’s producing class, taking a break from exchanging catty emails about A-list stars, has created another war film that ignores history, and reviewers who spend too much time in screening rooms are falling over themselves in praise of it.

They should know better. In 2012, “Zero Dark Thirty,” about the hunt for Osama bin Laden, was lavishly praised by most reviewers, and it wasn’t until criticism emerged from political reporters like Jane Mayer and others (I wrote about it too) that the tide turned against the pro-torture fantasy at its core. The backlash, coming after the film made “best of the year” lists, was probably responsible for it (fortunately) being all but shut out of the Academy Awards. Hopefully the praise-and-reconsider scenario will recur with “American Sniper.”

Just as ZDT director Kathryn Bigelow insisted her movie took no position on the use of torture, the makers of “American Sniper” tell us the film takes no position on the war in Iraq. Cooper, who in addition to having the lead role was one of the producers, has said “it’s not a movie about the Iraq war; it’s about the horror of what a soldier like Chris has to go through. It’s not a political movie at all. It’s a movie about a man—a character study.” I talked to the movie’s screenwriter, Jason Hall, and he said, “For me, this is not a war movie.”

The film faithfully recycles Kyle’s crude language, and while shocking to some viewers, his slurs are the least surprising or objectionable part. Dehumanizing the enemy is common in almost any conflict, particularly for snipers, who see their foes up close. If you regard your target as a savage or an infidel, it’s easier to squeeze the trigger. Kyle’s blinkered attitude was not unusual among the fighters I spent time with in Iraq. It’s the truest part of the movie and belongs in it.

The problem is that the film makes no attempt to tell us anything beyond Kyle’s limited comprehension of what was happening. More than a decade after America invaded and occupied Iraq, and long after we realized the war’s false pretense and its horrific toll, we deserve better. There’s a dilemma at work: a war movie that is true of one American’s experience can be utterly false to the experience of millions of Iraqis and to the historical record. Further, it’s no act of patriotism to celebrate, without context or discussion, a grunt’s view that the people killed in Iraq were animals deserving their six-feet-under fate. When the movie’s villain, an enemy sniper named Mustafa, was killed by Kyle, the crowd at the theater where I was watching broke into applause.

If Cooper, the film’s star, means what he said about its lack of politics, he fails to understand how war movies operate in popular culture. When a film venerates an American sniper but portrays as sub-human the Iraqis whose country we were occupying—the film has one Iraqi who seems sympathetic but turns out to be hiding a cache of insurgent weapons—it conveys a political message that is flat wrong. Among other things, it ignores and dishonors the scores of thousands of Iraqis who fought alongside American forces and the hundreds of thousands of innocent civilians who were killed or injured in the crossfire.

While it is about a certain type of bravery, the film itself is not brave. One of the things it does well is highlight Kyle’s post-traumatic stress disorder. But there is no mention of the problems returning soldiers often encounter when they try to get treatment at military hospitals–even though the disturbed veteran who killed Kyle in real life, at a Texas shooting range in 2013, had been denied the care he desperately needed. Why ignore an issue of national importance that is also the reason Kyle is no longer with us? I asked Hall, the screenwriter, and he said that while the government’s inadequate care of veterans is worthy of criticism, this was a movie about Kyle’s experience, and he didn’t have problems with the Department of Veterans Affairs. “I think that without the time to adequately explore that, and just take a swing at the VA—that’s ill-mannered and ineffective,” Hall said.

I’m not so surprised about Hollywood—the making of great and true movies is not a feature built into its strange operating system amid the palm trees—but I am dismayed with the reviewers who should know better. As Alissa Quart wrote for Reuters during the backlash to ZDT (full disclosure: Quart is my wife), today’s critics tend to avoid cinematic politics, in contrast to their predecessors, like Mary McCarthy and Pauline Kael. If a movie is well acted and nicely shot and carries the viewer along, that is enough to earn five stars in their reviews, because history does not matter to them. They are ideology-agnostic formalists, and this hurts us.

We got Iraq wrong in the real world. It would be nice to get it right at the multiplex.

The Sound of Torture

The Intercept  |  Dec. 16, 2014

Have you heard the screams of a prisoner who is being tortured in America’s war on terror? I can’t forget them.

They pierced the walls of a detention center I visited in Samarra during an offensive by American and Iraqi forces in 2005. In a small room, I was interviewing a frightened detainee whose head was bandaged from an injury he unconvincingly attributed to a car accident during his capture. Bloodstains dripped down the side of a desk, and there was an American military adviser with us, as well as a portly officer of Iraq’s special police commandos.

Suddenly there was a chilling scream.

“Allah,” someone wailed. “Allah! Allah!”

As I wrote at the time, this wasn’t a cry of religious ecstasy. It was the sound of deep pain, coming from elsewhere in the town library, which had been turned into a detention center by Iraqi security forces who were advised by American soldiers and contractors. I was embedded with the Americans for a week, and I had already heard two of them, from the Wisconsin National Guard, talk about seeing their Iraqi partners trussing up prisoners like animals at a slaughter. During raids, I had seen these Iraqis beat their detainees — muggings as a form of questioning — while their American advisers watched.

The CIA’s violations of its detainees are the tip of the torture iceberg. We run the risk, in the necessary debate sparked by the Senate’s release of 500 pages on CIA interrogation abuses, of focusing too narrowly on what happened to 119 detainees held at the agency’s black sites from 2002-2006. The problem of American torture — how much occurred, what impact it had, who bears responsibility — is much larger. Across Iraq and Afghanistan, American soldiers and the indigenous forces they fought alongside committed a large number of abuses against a considerable number of people. It didn’t begin at Abu Ghraib and it didn’t end there. The evidence, which has emerged in a drip-drip way over the years, is abundant though less dramatic than the aforementioned 500-page executive summary of the Senate’s still-classified report on the CIA.

Matt Aikins, whose reporting on human-rights abuses in Afghanistan has been path-breaking, made this point the other day in a series of concise tweets:

Just as the CIA opposed release of the Senate torture report, the Pentagon and White House continue to do their best to suppress the evidence. The Daily Beast noted the other day that the Obama Administration, responding to pressure from the Pentagon, continues to fight in court to prevent the publication of thousands of photos of detainee abuse. The argument against release is nearly identical to the argument used by the CIA to repress the Senate’s report—it could put American lives in danger. To her credit, Sen. Dianne Feinstein pushed back and published an executive summary of her committee’s 6,000-page report (which has caused practically no protest or violence overseas).

Repression is the gut instinct of institutions that have something to hide, and I came across that in Samarra, too. Shortly after I witnessed the threatened execution of a detainee (an Iraqi soldier pointed his AK-47 at a prisoner who was against a wall with his hands up), an order came down from the American command to get me out of Samarra. I was told to pack my backpack for the next convoy out of town. After I made a flurry of calls on my satellite phone, the order was rescinded. Someone wanted the truth to come out.

Art in a Time of Surveillance

The Intercept  |  Nov. 13, 2014

This just happened — while trying to figure out a colorful way to begin the story you’re reading, I toggled to Twitter and saw a link to a short film by two Brooklyn directors who used a drone to film actors having sex. Their project, somewhere between art and porn, hovers on the R-rated margins of a thriving cultural movement in which artists of all stripes are exploring what it means to live in a state of surveillance.

You can’t throw a rock these days without hitting a surveillance art project, and the remarkable thing is that so much of it is so good. Some of the Snowden era’s sharpest interrogations of collect-it-all tracking by corporations and the government are to be found in galleries and other art spaces. They are the opposite of the acronym-laden news stories we read: NSA, FISA, PGP, PRISM, ACLU, EFF, SIGINT, GCHQ, TOR, FOIA, HTTPS, are you still awake? They are playful, invasive and eerie, and best of all they are graphically visual. With a transgressive edge that journalism struggles to match, they creatively challenge what it means to be human in a time of data.

The latest example is an exhibit called Watching You, Watching Me, organized by the Open Society Foundations in New York City and featuring ten artists and photographers. Rather than tell us about program X or problem Y in the word-based vernacular we’re numbed by, they offer new ways of seeing and understanding surveillance. The stunner in this show is an object created by Hasan Elahi that from a distance looks like a lovely tapestry draped on a wall.

As Elahi has explained, in 2002 he was stopped at the Detroit airport because his name appeared on a terrorism watchlist, and he was subsequently interrogated by FBI agents. Born in Bangladesh and raised in the United States, Elahi, an art professor at the University of Maryland, chose an unusual response to clear his name and make a statement—he began a self-surveillance project in which he took pictures of nearly everything he did and sent them to the FBI. He also posted them to a website he created. He’s taken about 70,000 pictures of the buildings he’s visited, the beds he’s slept in, the food he’s eaten, the toilets he’s used, the roads he’s travelled on, and he’s also published receipts for the things he’s bought; he even tracks his location using GPS.

“By disclosing mundane details about my daily life, I am simultaneously telling everything and nothing about my life,” he writes in the exhibit brochure. “I am flooding the market with banal information, and questioning its inherent meaning and value for intelligence purposes.”

For the exhibit, Elahi created a giant tapestry made of tiny reproductions of 32,000 of those photos. It works on several levels. Aesthetically and from afar, it is a gorgeous, softly-colored flag, something Jasper Johns might have created with fabric. Up close, you see each photo and comprehend the audacity of Elahi’s monitoring project as well as the invasive banality of surveillance (though the photos were shot by Elahi, they are the sorts of things spy agencies might collect on their targets). You can also read the photos as a visual story of a man’s life in America, or more broadly as life in America, with its fast-food restaurants, its parking lots and planes and strip malls. His artwork is the analog turned digital turned material.

Surveillance art — or as one academic has called it, artveillance — fits into a creative continuum that stretches back to at least the 1930s, when the introduction of “miniature” cameras, such as the Leica, made it relatively easy for photographers to secretly take pictures. Walker Evans led the way with undercover pictures taken on the New York City subway with a Leica hidden behind his coat. State surveillance wasn’t the subtext of Evans’ work—he was the surveiller, after all—but as the art professor Stephanie Schwartz pointed out to me, the issue was being evoked in the creative realm at the time. One of the scenes in Modern Times shows Charlie Chaplin’s character, the tramp, going into a bathroom to get away from the factory floor, only to find a monitor from which the factory manager sees him and orders him back to work.

The latest wave of surveillance art has been evident for a number of years, especially since 9/11, which increased the powers and budgets of intelligence agencies in the United States and elsewhere. The wave seems to have grown larger in the wake of the leaks from NSA whistleblower Edward Snowden, and this is fortunate. Pervasive surveillance is oddly paralyzing—it is the digital equivalent of the aphorism about genocide, “The death of one man is a tragedy and the death of a million is a statistic.” The more we learn of its vast scope, the more we seem dulled to it. We need to see it anew.

Josh Begley, a data editor at The Intercept, tries to bring that kind of utility to the New York Police Department’s invasive surveillance of Muslims. After 9/11, the NYPD established a secret “Demographics Unit” that mapped Muslim neighborhoods, dispatching plainclothes officers to collect photographs and information about Muslim businesses and gathering places. The program was revealed in a 2011 news story by the Associated Press that also published the NYPD’s surveillance photos and notes.

Begley’s project in the Watching You exhibit reassembles the original documents, arranging the NYPD photos of hundreds of Muslim-owned establishments in a jaggedly circular collage, surrounded by notes from the undercover cops involved in the surveillance (“Medium sized store that sells stationary, lotto, newspapers and American party supplies…Location sells live poultry…A male Pakistani was working behind the counter”). The project engages you far more deeply than a stack of original documents or news stories about them ever could.

The exhibit offers much more—photojournalist Tomas van Houtryve displays his beautiful and disturbing pictures taken with a small drone that he flew over American settings to replicate the locations of drone strikes in Pakistan and Afghanistan—weddings, playgrounds, people praying or exercising. There is also the turn-the-tables work of Simon Menner, a German who combed through the Stasi archives for pictures the East German spy agency took of its own agents (mainly in training situations, but also at parties).

It’s just a microcosm of today’s vibrant surveillance art scene. Travel a few dozen blocks from the Open Society and you’ll reach the latest work by Trevor Paglen, who has collected more than 4,000 code names from the archive of NSA documents leaked by Snowden. Paglen’s video installation, in a darkened room at the Metro Pictures gallery, projects the code names into slowly-rising columns of white type that crawl up the walls around you. The effect is literally destabilizing—with the code names rising as you stand still, you feel as though you are falling in a shaft of infinite surveillance. Paglen materializes our political vertigo.

As a writer, it’s hard to say this but there’s more variety and excitement in surveillance art than in surveillance writing. For instance, artist Heather Dewey-Hagborg has collected DNA samples from cigarette butts, chewing gum and stray hair, and has used these to create portraits of whomever the DNA belongs to. It’s an aggressive act — appropriating someone’s genetic property to show the ease with which our identities can be constructed and exposed. Two artists, Brian House and Kyle McDonald, even created an eavesdropping device that looks like a light bulb or lamp, and after infiltrating them into public places like a restaurant, bank lobby and library, they tweeted snippets of overheard conversations; the project is called “Conversnitch.”

Fair game? I don’t know, but these projects engage us with the problems of surveillance in ways that news stories and congressional hearings do not. There’s a freshness to each one, and the list lengthens every day. As I was finishing this story, I received an email from a group of 14 artists who have released a CD called “NSA Listening Party” — songs against surveillance. The first track is called “Dossier.”

A Story About Ben Bradlee

The Intercept  |  October 22, 2014

“So what have you been doing?”

The question was barked out by Ben Bradlee, and the young reporter who had to come up with a quick answer was me. I had been freelancing for The Washington Post from South Korea for three years, I had scored a half dozen or so front-page stories, and I was meeting the legendary editor at the end of a day of interviews for a staff job as a metro reporter. Within the first minute or two, he sensed that I was not only a liar but a bad liar.

I mentioned that I had arrived from Seoul via an improbable route. As a vacation, I had flown to Beijing, gotten on the trans-Mongolia train to Moscow, and from there I had taken another train to Berlin, arriving in time to chisel a few stones from the wall that had been breached by East Germans a few days earlier. It was November 1989, communism was collapsing in Eastern Europe, and I had sipped a thrilling bit of it.

All of that was true. The rest was not — that what I really wanted at this point in my life was to work in one of the paper’s local bureaus. I had been coached by the foreign editor and my friends at the paper to tell this fib, so that I would get a staff job and, after a few of what would be the dullest years of my life, earn my way back overseas as a full-fledged foreign correspondent, rather than a $150-per-story freelancer. I tried my best to sound enthusiastic about Montgomery County.

“Why would you want to work here?” Bradlee replied in the growly register he was famous for. “What’s happening in Eastern Europe is the best fucking story since World War II.”

Smart editors have a knack for calling bullshit on bullshit, and Bradlee was a pro at that. He had called bullshit on Richard Nixon several times, and he had even called bullshit on himself after the paper published a series of prize-winning stories that had been fabricated by its reporter, Janet Cooke; the Post’s apology was complete, and its internal investigation, which criticized Bradlee, was blunt. On this late November afternoon, Bradlee was calling bullshit on me.

I folded, telling the truth. I had studied Russian in college and I would love to cover the aftermath of the fall of the Berlin Wall but the foreign desk didn’t have a position for me in the region. The next best thing would be a metro job followed, hopefully as soon as possible, by an overseas post. Bradlee laughed. He started telling stories about the great times he had living in Paris after World War II, and then he dismissed me with a friendly wave.

Bradlee died yesterday at the age of 93, and you’ve probably read about it already. He was the Watergate editor, the editor in “All the President’s Men,” a great editor of the 20th century. All of that is true. What’s also true is that he had a compulsion to do whatever he felt like doing, and he made the right choice more often than editors who were more cautious. He didn’t have a political edge — the man lived in Georgetown — but he did have an attitude.

When I left his office I had no idea what would happen. The foreign editor, Michael Getler, the kindest person in the newsroom, would hear of my treason and shake his head in despair; I had failed him. The metro editor, Milton Coleman, would hear of it and say, You can never trust those overseas hotshots, I’m not going to hire another of them. The end was near for me.

A few minutes later, I saw Bradlee heading to Getler’s office. I don’t know what was said, but not long afterwards I was told that Getler wanted to talk to me immediately. This wasn’t part of the plan. I walked into his office and he didn’t look up to say hello. He was angry, and I was the reason.

“Okay,” he said. “I’ll send you to Budapest.”

I don’t recall him saying anything else. No smile, no handshake. This hadn’t been his call. Bradlee had apparently ordered him to send the kid to Eastern Europe, and now he had to scrounge around his freelance budget to pay me for stories he didn’t want or need. Kind as he was, at that moment I think he wanted to fire me for insubordination.

Instead of a local school board I got Eastern Europe and the dreadful thing that reporters of a young age wish for, a war to cover; mine would be in the Balkans. I have no idea what I would have become, or who I would have been, if Bradlee had done as most editors would have done, listening to my polite lies and shuffling me along toward a by-the-numbers career that would kill my soul.

I am sure my cause was helped by the fact that I was young and white and male, the kind of object that older editors who are white and male tend to have a biased soft spot for. This is why it’s good we don’t have as many Ben Bradlees these days; the mirroring and replication of a dominant culture is weaker now. Which doesn’t mean we’re in a universally better place; we have a lot of editors who are more cautious than they should be (patriarchy replaced by management culture), and a large number of top slots are still filled with guys (yes, including at The Intercept). It’s hard to believe that gender played no role in the firing of Jill Abramson at The New York Times.

This little story has reached the point where I am supposed to say something charming and sweet. That’s the way appreciations tend to go in the literary equivalent of the bottom of the ninth. In honor of Bradlee, whose language was famously not a model of restraint, I’d like to say, fuck that. The point of this little story, the point that Bradlee conveyed when he let me loose in Eastern Europe, is don’t hold back, find a great story or a great cause and don’t fucking let go.

Core Secrets

The Intercept  |  October 10, 2014
NSA’s Saboteurs in China and South Korea

This article was co-authored with Laura Poitras.

The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by The Intercept.

The documents, leaked by NSA whistleblower Edward Snowden, also indicate that the agency has used “under cover” operatives to gain access to sensitive data and systems in the global communications industry, and that these secret agents may have even dealt with American firms. The documents describe a range of clandestine field activities that are among the agency’s “core secrets” when it comes to computer network attacks, details of which are apparently shared with only a small number of officials outside the NSA.

“It’s something that many people have been wondering about for a long time,” said Chris Soghoian, principal technologist for the American Civil Liberties Union, after reviewing the documents. “I’ve had conversations with executives at tech companies about this precise thing. How do you know the NSA is not sending people into your data centers?”

Previous disclosures about the NSA’s corporate partnerships have focused largely on U.S. companies providing the agency with vast amounts of customer data, including phone records and email traffic. But documents published today by The Intercept suggest that even as the agency uses secret operatives to penetrate them, companies have also cooperated more broadly to undermine the physical infrastructure of the internet than has been previously confirmed.

In addition to so-called “close access” operations, the NSA’s “core secrets” include the fact that the agency works with U.S. and foreign companies to weaken their encryption systems; the fact that the NSA spends “hundreds of millions of dollars” on technology to defeat commercial encryption; and the fact that the agency works with U.S. and foreign companies to penetrate computer networks, possibly without the knowledge of the host countries. Many of the NSA’s core secrets concern its relationships to domestic and foreign corporations.

Some of the documents in this article appear in a new documentary, CITIZENFOUR, which tells the story of the Snowden disclosures and is directed by Intercept co-founder Laura Poitras. The documents describe a panoply of programs classified with the rare designation of “Exceptionally Compartmented Information,” or ECI, which are only disclosed to a “very select” number of government officials.

Sentry Eagle
The agency’s core secrets are outlined in a 13-page “brief sheet” about Sentry Eagle, an umbrella term that the NSA used to encompass its most sensitive programs “to protect America’s cyberspace.”

“You are being indoctrinated on Sentry Eagle,” the 2004 document begins, before going on to list the most highly classified aspects of its various programs. It warns that the details of the Sentry Eagle programs are to be shared with only a “limited number” of people, and even then only with the approval of one of a handful of senior intelligence officials, including the NSA director.

“The facts contained in this program constitute a combination of the greatest number of highly sensitive facts related to NSA/CSS’s overall cryptologic mission,” the briefing document states. “Unauthorized disclosure…will cause exceptionally grave damage to U.S. national security. The loss of this information could critically compromise highly sensitive cryptologic U.S. and foreign relationships, multi-year past and future NSA investments, and the ability to exploit foreign adversary cyberspace while protecting U.S. cyberspace.”

The document does not provide any details on the identity or number of government officials who were supposed to know about these highly classified programs. Nor is it clear what sort of congressional or judicial oversight, if any, was applied to them. The NSA refused to comment beyond a statement saying, “It should come as no surprise that NSA conducts targeted operations to counter increasingly agile adversaries.” The agency cited Presidential Policy Directive 28, which it claimed “requires signals intelligence policies and practices to take into account the globalization of trade, investment and information flows, and the commitment to an open, interoperable, and secure global Internet.” The NSA, the statement concluded, “values these principles and honors them in the performance of its mission.”

Sentry Eagle includes six programs: Sentry Hawk (for activities involving computer network exploitation, or spying), Sentry Falcon (computer network defense), Sentry Osprey (cooperation with the CIA and other intelligence agencies), Sentry Raven (breaking encryption systems), Sentry Condor (computer network operations and attacks), and Sentry Owl (collaborations with private companies). Though marked as a draft from 2004, it refers to the various programs in language indicating that they were ongoing at the time, and later documents in the Snowden archive confirm that some of the activities were going on as recently as 2012.

One of the most interesting components of the “core secrets” involves an array of clandestine activities in the real world by NSA agents working with their colleagues at the CIA, FBI, and Pentagon. The NSA is generally thought of as a spying agency that conducts its espionage from afar—via remote commands, cable taps, and malware implants that are overseen by analysts working at computer terminals. But the agency also participates in a variety of “human intelligence” programs that are grouped under the codename Sentry Osprey. According to the briefing document’s description of Sentry Osprey, the NSA “employs its own HUMINT assets (Target Exploitation—TAREX) to support SIGINT operations.”

According to a 2012 classification guide describing the program, TAREX “conducts worldwide clandestine Signals Intelligence (SIGINT) close-access operations and overt and clandestine Human Intelligence (HUMINT) operations.” The NSA directs and funds the operations and shares authority over them with the Army’s Intelligence and Security Command. The guide states that TAREX personnel are “integrated” into operations conducted by the CIA, FBI, and Defense Intelligence Agency. It adds that TAREX operations include “off net-enabling,” “supply chain-enabling,” and “hardware implant-enabling.”

According to another NSA document, off-net operations are “covert or clandestine field activities,” while supply-chain operations are “interdiction activities that focus on modifying equipment in a target’s supply chain.”

The NSA’s involvement in supply-chain interdiction was previously revealed in No Place to Hide, written by Intercept co-founder Glenn Greenwald. The book included a photograph of intercepted packages being opened by NSA agents, and an accompanying NSA document explained the packages were “redirected to a secret location” where the agents implanted surveillance beacons that secretly communicated with NSA computers. The document did not say how the packages were intercepted and did not suggest, as the new documents do, that interception and implants might be done by clandestine agents in the field.

The TAREX guide lists South Korea, Germany, and Beijing, China as sites where the NSA has deployed a “forward-based TAREX presence;” TAREX personnel also operate at domestic NSA centers in Hawaii, Texas, and Georgia. It also states that TAREX personnel are assigned to U.S. embassies and other “overseas locations,” but does not specify where. The document does not say what the “forward-based” personnel are doing, or how extensive TAREX operations are. But China, South Korea, and Germany are all home to large telecommunications equipment manufacturers, and China is known to be a key target of U.S. intelligence activities.

Although TAREX has existed for decades, until now there has been little information in the public domain about its current scope. A 2010 book by a former Defense Intelligence Agency officer, Lt. Col. Anthony Shaffer, described TAREX operations in Afghanistan as consisting of “small-unit, up-close, intelligence-gathering operatives. Usually two-to-three man units.”

“Under Cover” Agents
The most controversial revelation in Sentry Eagle might be a fleeting reference to the NSA infiltrating clandestine agents into “commercial entities.” The briefing document states that among Sentry Eagle’s most closely guarded components are “facts related to NSA personnel (under cover), operational meetings, specific operations, specific technology, specific locations and covert communications related to SIGINT enabling with specific commercial entities (A/B/C).”

It is not clear whether these “commercial entities” are American or foreign or both. Generally the placeholder “(A/B/C)” is used in the briefing document to refer to American companies, though on one occasion it refers to both American and foreign companies. Foreign companies are referred to with the placeholder “(M/N/O).” The NSA refused to provide any clarification to The Intercept.

The document makes no other reference to NSA agents working under cover. It is not clear whether they might be working as full-time employees at the “commercial entities,” or whether they are visiting commercial facilities under false pretenses. The CIA is known to use agents masquerading as businessmen, and it has used shell companies in the U.S. to disguise its activities.

There is a long history of overt NSA involvement with American companies, especially telecommunications and technology firms. Such firms often have employees with security clearances who openly communicate with intelligence agencies as part of their duties, so that the government receives information from the companies that it is legally entitled to receive, and so that the companies can be alerted to classified cyber threats. Often, such employees have previously worked at the NSA, FBI, or the military.

But the briefing document suggests another category of employees—ones who are secretly working for the NSA without anyone else being aware. This kind of double game, in which the NSA works with and against its corporate partners, already characterizes some of the agency’s work, in which information or concessions that it desires are surreptitiously acquired if corporations will not voluntarily comply. The reference to “under cover” agents jumped out at two security experts who reviewed the NSA documents for The Intercept.

“That one bullet point, it’s really strange,” said Matthew Green, a cryptographer at Johns Hopkins University. “I don’t know how to interpret it.” He added that the cryptography community in America would be surprised and upset if it were the case that “people are inside [an American] company covertly communicating with NSA and they are not known to the company or to their fellow employees.”

The ACLU’s Soghoian said technology executives are already deeply concerned about the prospect of clandestine agents on the payroll to gain access to highly sensitive data, including encryption keys, that could make the NSA’s work “a lot easier.”

“As more and more communications become encrypted, the attraction for intelligence agencies of stealing an encryption key becomes irresistible,” he said. “It’s such a juicy target.”

Of course the NSA is just one intelligence agency that would stand to benefit from these operations. China’s intelligence establishment is believed to be just as interested in penetrating American companies as the NSA is believed to be interested in penetrating Chinese firms.

“The NSA is a risk [but] I worry a lot more about the Chinese,” said Matthew Prince, chief executive of CloudFlare, a server company. “The insider threat is a huge challenge.” Prince thinks it is unlikely the NSA would place secret agents inside his or other American firms, due to political and legal issues. “I would be surprised if that were the case within any U.S. organization without at least a senior executive like the CEO knowing it was happening,” he said. But he assumes the NSA or CIA are doing precisely that in foreign companies. “I would be more surprised if they didn’t,” he said.

Corporate Partners
The briefing sheet’s description of Sentry Owl indicates the NSA has previously unknown relationships with foreign companies. According to the document, the agency “works with specific foreign partners (X/Y/Z) and foreign commercial industry entities” to make devices and products “exploitable for SIGINT”—a reference to signals intelligence, which is the heart of the NSA’s effort to collect digital communications, such as emails, texts, photos, chats, and phone records. This language clarifies a vague reference to foreign companies that appears in the secret 2013 budget for the intelligence community, key parts of which were published last year from the Snowden archive.

The document does not name any foreign companies or products, and gives no indication of the number or scale of the agency’s ties to them. Previous disclosures from the Snowden archive have exposed the agency’s close relationships with foreign intelligence agencies, but there has been relatively little revealed about the agency gaining the help of foreign companies.

The description of Sentry Hawk, which involves attacks on computer networks, also indicates close ties with foreign as well as American companies. The document states that the NSA “works with U.S. and foreign commercial entities…in the conduct of CNE [Computer Network Exploitation].” Although previous stories from the Snowden archive revealed a wide range of NSA attacks on computer networks, it has been unclear whether those attacks were conducted with the help of “commercial entities”—especially foreign ones. The document does not provide the names of any of these entities or the types of operations.

Green, the cryptography professor, said “it’s a big deal” if the NSA is working with foreign companies on a greater scale than currently understood. Until now, he noted, disclosures about the agency’s corporate relationships have focused on American companies. Those revelations have harmed their credibility, nudging customers to foreign alternatives that were thought to be untouched by the NSA. If foreign companies are also cooperating with the NSA and modifying their products, the options for purchasing truly secure telecommunications hardware are more limited than previously thought.

The briefing sheet does not say whether foreign governments are aware that the NSA may be working with their own companies. If they are not aware, says William Binney, a former NSA crypto-mathematician turned whistleblower, it would mean the NSA is cutting deals behind the backs of friendly and perhaps not-so-friendly governments.

“The idea of having foreign corporations involved without any hint of any foreign government involved is significant,” he said. “It will be an alert to all governments to go check with their companies. Bring them into parliament and put them under oath.”

The description of Sentry Raven, which focuses on encryption, provides additional confirmation that American companies have helped the NSA by secretly weakening encryption products to make them vulnerable to the agency. The briefing sheet states the NSA “works with specific U.S. commercial entities…to modify U.S manufactured encryption systems to make them exploitable for SIGINT.” It doesn’t name the commercial entities or the encryption tools they modified, but it appears to encompass a type of activity that Reuters revealed last year—that the NSA paid $10 million to the security firm RSA to use a weak random number generator in one of its encryption programs.

The avalanche of NSA disclosures since the Snowden leaks began in 2013 has shattered whatever confidence technologists once had about their networks. When asked for comment on the latest documents, Prince, the CEO of CloudFlare, began his response by saying, “We’re hyper-paranoid about everything.”

Documents mentioned in this story:

  Sentry Eagle Brief Sheet (13 pages)
  TAREX Classification Guide (7 pages)
  Exceptionally Controlled Information Listing (6 pages)
  ECI WHIPGENIE Classification Guide (7 pages)
  ECI Pawleys Classification Guide (4 pages)
  ECI Compartments (4 pages)
  CNO Core Secrets Slide Slices (10 pages)
  CNO Core Secrets Security Structure (3 pages)
  Computer Network Exploitation Classification Guide (8 pages)
  CNO Core Secrets (7 pages)

Killing Americans on the White House Lawn Is Wrong

The Intercept  |  October 3, 2014

America’s forever war has come to this — the front lawn of the White House may become a kill zone. That’s crazier than whatever prompted Iraq war veteran Omar J. Gonzalez to jump the fence on Pennsylvania Avenue two weeks ago, running for the Oval Office.

The Secret Service has not announced what will happen to the next homeless person with PTSD who rushes the White House, but the Outrage Machine is demanding blood. Rep. Jason Chaffetz, the Republican who sits on a committee that is investigating the September breach, warned at a hearing this week, “You make a run and a dash at the White House, we’re going to take you down. I want overwhelming force.” In the same vein, Ronald Kessler wrote in Politico Magazine that the Secret Service should have tried to “take out” Gonzalez.

We shouldn’t be surprised by the over-reaction. There have been armored police vehicles and camo-clad officers with ballistic helmets and assault rifles on the streets of Ferguson and other places, so by the same logic, shouldn’t the guardians of the White House be visibly legion and have their fingers on the trigger, fully automatic? Welcome to the nation’s capital, hope you have a nice day, don’t make any quick movements, deadly force may be used, mental illness is no excuse. Invade, torture, drone, shoot — these are the four horsemen of the post-9/11 apocalypse.

Call me crazy, but I’m glad the Gonzalez saga ended with him being wrestled to the ground in the East Room rather than shot dead on the lawn outside it. Yes, there’s a happy medium we should strive toward — stopping intruders without deadly force before they get to the front door — and hopefully the Secret Service will find a way to make that happen, once it finds a new director. But there’s bloodlust in the air, it’s ugly, and the people who will suffer because of it include the weakest members of society—the mentally ill who do not get the medical attention they need from the government that should be their safety net, and who do stupid things like charging the White House, which gets them violent attention they don’t need.

When I reported in authoritarian states, including communist ones, I often saw the sort of hyper-vigilance over Dear Leader’s abode that our professional hotheads are asking for. If you lingered in front of one of Teodoro Obiang’s many mansions in Equatorial Guinea, you could be questioned or arrested; same goes for Vladimir Putin’s crib in Moscow. In other countries, just asking where a leader lives can get you in trouble (hello North Korea). And you can forget about strolling by 10 Downing Street — even it’s closed to the public. America has been different; our presidents did not live in fear, did not choose to surround themselves with hair-trigger force.

It shouldn’t be too much to ask for — let’s have a reasoned response to the Secret Service’s lapses. Nobody got killed. Remember, that’s a good thing.

Hellish Images for Hellish Wars

The Intercept  |  September 10, 2014
Beheading Videos and the Censorship of War Imagery

Beheading is barbaric. The men of the Islamic State who executed James Foley and Steve Sotloff are monsters. Yet their monstrosity does not fully explain our fury over their beheading videos, or the exhortations we have heard to not share or distribute the harrowing images.

We are right to be repulsed. But I think part of our horror stems from the fact we rarely see images of American victims of war. It is the last taboo in our era of endlessly transgressive media — publishing photos or videos of injured, dying, or dead Americans in a war zone. How has this taboo been maintained? To a great degree, the reason is censorship on the part of the American government.

It is an oddity of all of the violence since 9/11: Despite constant warfare and the death of more than 5,000 American soldiers (a figure that does not include American contractors, aid workers, and journalists) — not to mention the more than 50,000 wounded — we have rarely seen photos or videos of Americans in their ultimate agony. Photographers embedded with American troops have been all but forbidden from taking pictures of dead or wounded soldiers; Michael Kamber’s Photojournalists on War is filled with tales of war photographers prevented from doing their necessary work. Until 2009, it was even forbidden to take photographs of flag-draped coffins as they returned home. I once had a minor encounter with the machinery of censorship: On a military flight out of Baghdad in 2005, a military police officer confiscated my camera after I took a few shots of the coffins on board. He returned the device after deleting the pictures.

It’s no secret why the government has repressed these sorts of images. Support for the wars since 9/11 could be undermined if Americans were to see the ghastly things that happen to their brothers and sisters in combat. This is generally attributed to a lesson supposedly learned by the generals in Vietnam: If you let photographers take pictures of American dead and injured, you will lose public support for the messy undertaking of mass violence. It’s fine to disseminate pictures and video of foreign dead and wounded, which can actually help the war effort.

It is a different thing when the victims are ours. When it comes to our own citizens, the consequences of war are preferably represented in elliptical ways that do not show torn flesh or faces of the newly dead. Instead, we see townspeople lining up and saluting as a hearse drives by, we hear the sound of taps at a funeral, we remember the flag as it was placed in a brave widow’s hands, or we see a wounded veteran with a handful of pills for PTSD. It demands a mournful response rather than an informed decision.

This censorship has spawned an odd blowback. By shielding us from disturbing imagery, our government (and editors who shy away from gore) may have made us all the more vulnerable when we finally see dead Americans. This is not an abstract theory. The two disastrous invasions of Falluja during the Iraq War were sparked by pictures of the bodies of four American contractors hanging from one of the town’s bridges in 2004. It wasn’t the event itself so much as the pictures that launched such destructive fury. Confronted with these stark but complicated images, we tend to respond with a primal scream, as The New York Post did with its identical headlines for both the Falluja desecrations in 2004 and the Islamic State beheadings a decade later: “Savages.”

In the case of the Islamic State, some of the outrage is explained by the perverse pride the killers take in distributing the evidence of their crimes. But we are on a slippery slope with this indignation, because we have our own macabre mechanism for broadcasting the deaths of our supposed enemies — Central Command recently began tweeting out links to videos of air strikes in Iraq. As human rights groups have amply documented, a large number of civilians have been killed by American drones. Many Americans look at those videos and think, Got the bad guys, job well done. How many Iraqis, Afghans, Pakistanis or Yemenis look at those same videos, remind themselves of the women and children killed, and say, What savages?

In the end, it is a strange twist: Instead of pushing us away from war, as the Vietnam generals feared, images of American casualties are now driving us into the vortex. Would seeing more of it really help? Instead of reasoned discussion, might there be more howls for revenge? Or might there be shrugs of seen-it-before indifference, as Susan Sontag warned in her 2002 New Yorker essay, “Looking at War?” I wish we didn’t have to ask these questions — that there were no loathsome images to flash on our screens — and I wish we didn’t have a responsibility to look and think deeply. But we do, if the depravity of war is to be understood and, hopefully, dealt with.

Original headline: Why More Americans Should See the Beheading Videos

A Jungle Eco-Battle

Outside  |  August 25, 2014
There are two sides to the story of the biggest environmental lawsuit ever, but a new book tells only one of them.

In the 1970s and 1980s, Texaco extracted more than a billion barrels of oil from the Ecuadorean rainforest but spilled an estimated 400,000. In 1993, locals filed a class action against the company. That case is ongoing—it’s a legal version of the Amazon, serpentine and vast, with the company still fighting an Ecuadoran judge’s record-setting $19 billion verdict—and is the subject of Paul M. Barrett’s serious but uneven book Law of the Jungle: The $19 Billion Legal Battle Over Oil in the Rain Forest and the Lawyer Who’d Stop at Nothing to Win It.

Barrett, a senior writer at Bloomberg Businessweek and author of the bestselling book Glock, focuses on the activist lawyer, Steven Donziger, who turned the case into a no-holds-barred crusade against Chevron, which acquired Texaco in 2001. Donziger is an abrasive attorney (I wrote about him for Outside in 2007), and Barrett exhaustively describes his errors: coaching experts and cajoling judges and carrying on like a guerrilla with a law degree. Last March, a federal judge ruled that Donziger had used coercion and bribery in Ecuador, which would keep him from profiting from the Ecuadorean case if and when it’s resolved. (Donziger is appealing the decision.)

As a protagonist, Donziger is Shakespearean in his tragic dimensions and a natural magnet for a writer’s pen. But the odd thing about Barrett’s book is that Donziger is its nearly exclusive target. Barrett describes him as behaving like a “mob boss” with an ego on “an Olympian scale.” That may be true, but some of Barrett’s critiques are petty. Donziger is chided for being married to a woman who works for a glossy-magazine publisher and for living in a two-bedroom Manhattan apartment with “high-end appliances” while his clients in Ecuador live in shacks. But if that’s hypocrisy, every public-interest lawyer with an espresso machine or a successful spouse is a scoundrel.

Barrett does dip into Chevron’s chicanery—the firm paid private investigators to follow Donziger and tried to persuade a freelance journalist to collect information about his Ecuadoran clients on a phony reporting trip—but the oil company gets far less scrutiny than its adversary. This seems lopsided, because the worst culprit in this case isn’t a quixotic lawyer who misplayed the bad hand dealt to him but the company that almost everyone agrees acted in a reprehensible way for decades. Barrett traveled to Ecuador, as I did, saw the pits of years-old oil that still dot the landscape, and heard the stories of people dying from cancers that their survivors blame on oil. Even he concluded that the region is “no place I’d want to live.” But Barrett moves on too quickly from the environmental crime scene. Much can be said about Donziger, but despite his many flaws, he did not spill a drop of oil in the Amazon.

Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators

The Intercept  |  March 20, 2014

This article was co-written with Ryan Gallagher.

Across the world, people who work as system administrators keep computer networks in order – and this has turned them into unwitting targets of the National Security Agency for simply doing their jobs. According to a secret document provided by NSA whistleblower Edward Snowden, the agency tracks down the private email and Facebook accounts of system administrators (or sys admins, as they are often called), before hacking their computers to gain access to the networks they control.

The document consists of several posts – one of them is titled “I hunt sys admins” – that were published in 2012 on an internal discussion board hosted on the agency’s classified servers. They were written by an NSA official involved in the agency’s effort to break into foreign network routers, the devices that connect computer networks and transport data across the Internet. By infiltrating the computers of system administrators who work for foreign phone and Internet companies, the NSA can gain access to the calls and emails that flow over their networks.

The classified posts reveal how the NSA official aspired to create a database that would function as an international hit list of sys admins to potentially target. Yet the document makes clear that the admins are not suspected of any criminal activity – they are targeted only because they control access to networks the agency wants to infiltrate. “Who better to target than the person that already has the ‘keys to the kingdom’?” one of the posts says.

The NSA wants more than just passwords. The document includes a list of other data that can be harvested from computers belonging to sys admins, including network maps, customer lists, business correspondence and, the author jokes, “pictures of cats in funny poses with amusing captions.” The posts, boastful and casual in tone, contain hacker jargon (pwn, skillz, zomg, internetz) and are punctuated with expressions of mischief. “Current mood: devious,” reads one, while another signs off, “Current mood: scheming.”

The author of the posts, whose name is being withheld by The Intercept, is a network specialist in the agency’s Signals Intelligence Directorate, according to other NSA documents. The same author wrote secret presentations related to the NSA’s controversial program to identify users of the Tor browser – a privacy-enhancing tool that allows people to browse the Internet anonymously. The network specialist, who served as a private contractor prior to joining the NSA, shows little respect for hackers who do not work for the government. One post expresses disdain for the quality of presentations at Blackhat and Defcon, the computer world’s premier security and hacker conferences:

When I first went to Blackhat/Defcon, it was with the wide-eyed anticipation of, ‘I’m going to go listen to all of the talks that I can, soak up all of the information possible, and become a supar-1337-haxxor.’ What a let-down of an experience that was. You find the most interesting topics and briefings, wait in lines to get a seat, and find yourself straining your ears to listen to someone that has basically nothing new to say. Most of the talks get hyped up exponentially past any amount of substance they actually provide, most of the ‘interactive sessions’ end up in a ‘oh! woe is the state of the security industry!’ chant, and leave the audience no better off than before.

It is unclear how precise the NSA’s hacking attacks are or how the agency ensures that it excludes Americans from the intrusions. The author explains in one post that the NSA scours the Internet to find people it deems “probable” administrators, suggesting a lack of certainty in the process and implying that the wrong person could be targeted. It is illegal for the NSA to deliberately target Americans for surveillance without explicit prior authorization. But the employee’s posts make no mention of any measures that might be taken to prevent hacking the computers of Americans who work as sys admins for foreign networks. Without such measures, Americans who work on such networks could potentially fall victim to an NSA infiltration attempt.

The NSA declined to answer questions about its efforts to hack system administrators or explain how it ensures Americans are not mistakenly targeted. Agency spokeswoman Vanee’ Vines said in an email statement: “A key part of the protections that apply to both U.S. persons and citizens of other countries is the mandate that information be in support of a valid foreign intelligence requirement, and comply with U.S. Attorney General-approved procedures to protect privacy rights.”

As The Intercept revealed last week, clandestine hacking has become central to the NSA’s mission in the past decade. The agency is working to aggressively scale its ability to break into computers to perform what it calls “computer network exploitation,” or CNE: the collection of intelligence from covertly infiltrated computer systems. Hacking into the computers of sys admins is particularly controversial because unlike conventional targets – people who are regarded as threats – sys admins are not suspected of any wrongdoing.

In a post calling sys admins “a means to an end,” the NSA employee writes, “Up front, sys admins generally are not my end target. My end target is the extremist/terrorist or government official that happens to be using the network some admin takes care of.”

The first step, according to the posts, is to collect IP addresses that are believed to be linked to a network’s sys admin. An IP address is a series of numbers allocated to every computer that connects to the Internet. Using this identifier, the NSA can then run an IP address through the vast amount of signals intelligence data, or SIGINT, that it collects every day, trying to match the IP address to personal accounts.

“What we’d really like is a personal webmail or Facebook account to target,” one of the posts explains, presumably because, whereas IP addresses can be shared by multiple people, “alternative selectors” like a webmail or Facebook account can be linked to a particular target. You can “dumpster-dive for alternate selectors in the big SIGINT trash can” the author suggests. Or “pull out your wicked Google-fu” (slang for efficient Googling) to search for any “official and non-official e-mails” that the targets may have posted online.

Once the agency believes it has identified a sys admin’s personal accounts, according to the posts, it can target them with its so-called QUANTUM hacking techniques. The Snowden files reveal that the QUANTUM methods have been used to secretly inject surveillance malware into a Facebook page by sending malicious NSA data packets that appear to originate from a genuine Facebook server. This method tricks a target’s computer into accepting the malicious packets, allowing the NSA to infect the targeted computer with a malware “implant” and gain unfettered access to the data stored on its hard drive.

“Just pull those selectors, queue them up for QUANTUM, and proceed with the pwnage,” the author of the posts writes. (“Pwnage,” short for “pure ownage,” is gamer-speak for defeating opponents.) The author adds, triumphantly, “Yay! /throws confetti in the air.”

In one case, these tactics were used by the NSA’s British counterpart, Government Communications Headquarters, or GCHQ, to infiltrate the Belgian telecommunications company Belgacom. As Der Speigel revealed last year, Belgacom’s network engineers were targeted by GCHQ in a QUANTUM mission named “Operation Socialist” – with the British agency hacking into the company’s systems in an effort to monitor smartphones.

While targeting innocent sys admins may be surprising on its own, the “hunt sys admins” document reveals how the NSA network specialist secretly discussed building a “master list” of sys admins across the world, which would enable an attack to be initiated on one of them the moment their network was thought to be used by a person of interest. One post outlines how this process would make it easier for the NSA’s specialist hacking unit, Tailored Access Operations (TAO), to infiltrate networks and begin collecting, or “tasking,” data:

So, by combining all of that information, you end up with a list of public IP addresses that probably belong to sys admins as well as personal accounts that probably belong to those admins. All you have to do is put all this info in a database somewhere, and what you end up with is a list of networks as well as personal accounts of probable admins for those networks! Then, as soon as one of those networks becomes a target, all TAO has to do is query the database, see if we have any admins pre-identified for that network, and if we do, automatically queue up tasking and go-go- CNE!

Aside from offering up thoughts on covert hacking tactics, the author of these posts also provides a glimpse into internal employee complaints at the NSA. The posts describe how the agency’s spies gripe about having “dismal infrastructure” and a “Big Data Problem” because of the massive volume of information being collected by NSA surveillance systems. For the author, however, the vast data troves are actually something to be enthusiastic about.

“Our ability to pull bits out of random places of the Internet, bring them back to the mother-base to evaluate and build intelligence off of is just plain awesome!” the author writes. “One of the coolest things about it is how much data we have at our fingertips.”

Micah Lee contributed to this report.

Page 1 of 6 pages  1 2 3 >  Last »