Private Jihad: How Rita Katz got into the spying business.
By Benjamin Wallace-Wells | Annals of Terrorism | May 29, 2006 Issue
Rita Katz is tiny and dark, with volatile brown eyes, and when she is nervous or excited she can’t sit still. She speaks in torrents, ten minutes at a stretch. Everybody who works in intelligence calls her Rita, even people who don’t know her well. She sometimes telephones people she hasn’t met—important people in the government—to tell them things that she thinks they ought to know. She keeps copies of letters from officials whose investigations into terrorism she has assisted. “You and your staff . . . were invaluable additions to the investigative team,” the special agent in charge of the F.B.I.’s Salt Lake City Division wrote; the Assistant U.S. Attorney in Boise said, “You are a rare and extraordinary gem that has appeared too infrequently throughout the course of history.” The letters come in handy, she told me, when she meets with skepticism or lack of interest; they are her establishment bona fides.
Katz, who was born in Iraq and speaks fluent Arabic, spends hours each day monitoring the password-protected online chat rooms in which Islamic terrorists discuss politics and trade tips: how to disperse botulinum toxin or transfer funds, which suicide vests work best. Occasionally, a chat-room member will announce that he is turning in his user name and password and going to Iraq to become a martyr, a shaheed. Several weeks later, his friends will post a report of the young man blowing himself up. Katz usually logs on at six in the morning. When she has guests for dinner, she leaves a laptop open on the kitchen counter, so she can check for updates. “It is completely addicting,” she says. “You wake up thinking, I’ve been offline for seven hours, but the terrorists have been making plans.”
Traditionally, intelligence has been filtered through government agencies, such as the C.I.A. and the N.S.A., which gather raw data and analyze it, and the government decides who sees the product of their work and when. Katz, who is the head of an organization called the Search for International Terrorist Entities, or SITE Institute, has made it her business to upset that monopoly. She and her researchers mine online sources for intelligence, which her staff translates and sends out by e-mail to a list of about a hundred subscribers.
Katz’s client list includes people in the government who are presumably frustrated by how long it takes to get information through official channels; it also includes people in corporate security and in the media, who rarely get much useful material from the C.I.A. She has worked with prosecutors on more than a dozen terrorism investigations, and many American officers in Iraq rely on Katz’s e-mails to, for example, brief their troops on the designs for explosives that are passed around terrorist Web sites. “You’re thrown into Baghdad, and there are a million different groups out there you’ve never heard of claiming responsibility for attacks,” Robert Worth, a Times reporter who used Katz’s service during the eighteen months he spent in Iraq, told me. “Rita really knows what she’s talking about—who’s responsible for attacks, what’s a legitimate terrorist organization and what’s not.” Because many reporters rebroadcast her information, it can reach the public before people in the government have had a chance to evaluate it; her organization’s work is cited in the Times and the Washington Post about twice a month.
Katz has many critics, who believe that she is giving terrorists a bigger platform than they would otherwise have, and that the certainty and obsession that make her a dedicated archivist also make her too eager to find plots where they don’t exist; she publicized a manual for using botulinum in terror attacks, for example, which experts later concluded was not linked to any serious threat. It’s possible that her immersion in the world of terrorism has removed whatever skepticism or doubts she may have had. “Much as Al Jazeera underplays terrorist threats, the SITE Institute at times overhypes them,” Michael Scheuer, the former head of the C.I.A.’s bin Laden unit, said.
More fundamentally, some people involved in counterterrorism do not think that a private group with limited resources can do as good or as prudent a job as government agencies can. “Intelligence analysis is a set of skills that you learn, not just something that anyone can walk in off the street and pick up,” Steven Aftergood, who monitors the intelligence community for the Federation of American Scientists, told me. Katz, however, pointed out that, for example, the professionals consistently missed signals about Al Qaeda before September 11, 2001, and said that she was simply filling a gap. (A 2004 audit showed that the F.B.I. alone had thousands of hours of untranslated intercepts.) Indeed, Katz has received outsourcing contracts from the government.
Before the September 11, 2001, attacks, the official counterterrorism agencies paid relatively little attention to the jihadis’ online presence. But in the past few years that has changed, in large measure because of changes in the way terror networks operate. “Nearly everything about Al Qaeda that matters is happening online right now,” Peter Bergen, a journalist and terrorism expert, said. Some analysts believe that Al Qaeda today is a model of what is called “leaderless resistance”: self-appointed cells operating with help and inspiration from materials that they find online. Traffic rose dramatically after Abu Musab al-Zarqawi, the head of Al Qaeda in Iraq, posted a video of the beheading of the American contractor Nicholas Berg.
“It’s not as if Al Qaeda were inventing this,” Jessica Stern, a terrorism specialist who served on the National Security Council under President Clinton, said. What’s unique about Islamic terror and the Internet is that there is up-to-the-minute access to what terrorists are thinking. Rita Katz is, in a sense, the natural complement, the engineer of a leaderless counter-resistance to the terrorist groups. “Some people think that she’s a zealot,” Stern said when I asked her about Katz, “but only a zealot would provide this kind of service.”
In March, I visited Katz at her office, on the seventh floor of an old building in a Northeastern city that she refuses to allow reporters to identify in print. She told me to take a train to the city’s main terminal, and then call the office for further directions. By the time I got to SITE’s locked door, which has a black security camera and a plaque bearing the name of a nonexistent business, I half expected to walk into a center full of high-tech equipment, with flashing maps and screens.
The SITE Institute’s office looked like a college newspaper’s. There were three rooms: Katz’s office, dominated by a large conference table; a small room for two translators (more work part time, from home); and what’s called the pit, where several researchers and interns, all in their twenties, sat under a long, eye-level row of mug shots of wanted terrorists—mostly bearded Arab men, with grim, unsmiling glares. There was an air of intense isolation, with everyone focussed on his own projects. It was hard to ignore the office’s youth; Katz told me of a new service she had added that scanned French-language terrorist sites, and that depended on an undergraduate intern who spoke fluent French (Katz has since hired another French-speaker for the service).
Each day, Katz finds about a half-dozen items on the Arabic message boards that are worth distributing. Her researchers, who monitor English-language jihadist Web sites, often find a few more. Some are propaganda: videos taking responsibility for attacks, statements of intent to attack, announcements of allegiances or splits. Others involve tactics and weapons. “You don’t need to go to Afghanistan for training anymore,” Katz said as we paged through a list of credit-card information that seemed to have been stolen from Houston suburbanites. “You just get it on the Internet.” SITE tries to have the items translated and sent to subscribers within an hour and a half of their first appearance online; when the material could be a big news story—for instance, a new audiotape released by Ayman al-Zawahiri, Osama bin Laden’s closest associate—SITE’s translation may go on television a few minutes later. The full transcript of the video of the American reporter Jill Carroll, made by her kidnappers, was posted within twenty-five minutes.
Katz has a testy relationship with the government, sometimes acting as a consultant and sometimes as an antagonist. About a year ago, a SITE staffer, under an alias, managed to join an exclusive jihadist message board that, among other things, served as a debarkation point for many would-be suicide bombers. For months, the staffer pretended to be one of the jihadis, joining in chats and watching as other members posted the chilling messages known as “wills,” the final sign-offs before martyrdom. The staffer also passed along technical advice on how to keep the message board going. Eventually, he won the confidence of the site’s Webmasters, who were impressed with his computer skills, and he gained access to the true e-mail addresses of the members and other information about them. After monitoring the site for several more days, the staffer told Katz that one of the site’s members, a young Muslim man in a European country, had just posted a will. “It was obvious that he was planning to become a martyr very soon,” Katz said.
Katz called officials in Washington, and was met with institutional resistance: “They said, ‘Oh, Rita, I’m not sure you should even be communicating with them—you might be providing material support!’ And they wanted to get approval from the Department of Justice to look at the e-mails. I said, ‘Look, we have to do something.’ ” Katz then called an American counterterrorism official stationed in the young man’s country, and he, in turn, sent the jihadi’s e-mails to local investigators. Within twenty-four hours, they had him under surveillance, and a week later they arrested him. “In my opinion, they probably wouldn’t have had a clue if it hadn’t been for Rita,” the official told me. This, Katz said, is what she always hopes to achieve: “It’s one case where everything just worked so well.”
At the SITE office, Katz showed me some suicide-bombing videos from Iraq. They are often five or ten minutes long, overlaid with religious chanting. In one video, a middle-aged Iraqi doctor straps on a suicide vest. “In Israel, they always told you that the profile of a suicide bomber was someone young, without family, from the lowest economic level, but what we see here over and over is just the opposite,” Katz said.
We watched the last day in the life of Abu Mouwayia al-Shimali, a chubby, bespectacled Saudi. Shimali discusses a letter purportedly written by a female prisoner at Abu Ghraib named Fatima, describing nightly public rapes of female prisoners by American guards. The letter is apocryphal, but it has circulated widely online, and has become a rallying point for the Iraqi insurgency. Shimali does not sound unhinged or bloodthirsty; he sounds humble.
Shimali is shown waving as he walks to a car. Then he is in the driver’s seat, with a rifle in his lap, patting a clunky metal apparatus next to him. His smile is warm, and he is speaking in a measured tone. “He is saying, ‘This is my bomb,’ ” Katz translated. The car pulls up to a dusty checkpoint manned by American and Iraqi soldiers, and then explodes. SITE distributed the video two days after it was posted. As you watch, it feels not like an advertisement for homicide but like an advertisement for belief. Katz told me that even she, watching such videos, could imagine wanting to become a suicide bomber.
Katz believes that America has so far understood the terrorist threat only in bastardized and insufficient terms. She believes that it is wrong to assert, as President Bush does, that terrorists are motivated by hatred for our freedoms rather than by our policies in the Middle East or those of their own governments. Though she herself is circumspect about the issue of Iraq, some members of her staff believe that the war is a distraction from the fight with radical Islamic terrorism. But Katz also believes that terrorists are more sophisticated and resilient than most Americans realize, that the war against radical Islam is likely to last for decades, and that the outcome is far from clear. Her project is, in large measure, to convince Americans of the seriousness of the threat by building a direct conduit to the terrorist mind.
“What makes Rita unique is her background,” Peter Probst, a terrorism consultant and retired C.I.A. officer who works with Katz, told me. “Because of what she’d been through, she understood the threat earlier and better than most of us.”
Katz was born in Basra, Iraq, in 1963, one of four children of a wealthy Jewish businessman. In 1968, in the wake of the Six-Day War, the Baath government, with Saddam Hussein as its head of security, encouraged attacks against Iraqi Jews. Some Jews from prominent families were arrested and charged with spying for Israel, among them Katz’s father. After he was imprisoned, his wife and children were transported to Baghdad and kept under house arrest in a stone hut. Katz’s father was convicted in a military tribunal and executed, in 1969, with eight other Jews and five non-Jews, in a public hanging in Baghdad’s central square. Hundreds of thousands of cheering Iraqis attended; the government offered free transportation to people from the provinces, and belly dancers performed for the crowd. Katz was six years old.
After the family had been living in the hut for months, Katz’s mother drugged the guards and escaped with the children. By pretending to be the wife of a well-known Iraqi general, a woman she faintly resembled, she got the family first to the Iranian border and then to Israel. They settled in a small seaside town called Bat-Yam. Katz did her military service in the Israel Defense Forces after high school, and studied politics and history at Tel Aviv University. She married a medical student, and went into business with her mother, manufacturing clothes; Katz handled sales. In 1997, Katz’s husband won a fellowship to do research in endocrinology at the National Institutes of Health, and they moved to Washington with their three children. (They later had a fourth.)
The particulars of her biography—her father’s execution, her escape from Iraq, and her education in Israel—give Katz, in the eyes of some in the counterterrorism community, a kind of bionic character, as if she had been designed to hunt down terrorists. Her friends and allies are awed by her background; her critics find in it reason to be suspicious of her motives. Katz claims to attach no special meaning to it. “I would have to think about that,” she said, when I asked her if her early life had made her particularly sensitive to the terrorist threat. Later, she told me, “I know that the people who killed my father aren’t the same as the jihadis, but obviously I would never have got interested in the politics of this part of the world if it weren’t for his execution.” (She also said, “When you grow up in a place like Iraq, you understand maybe a little bit about how Arabs think, and also what they are capable of.”)
Katz’s first nine months in the United States were lonely—“I cried on the phone to my mama every day”—and she abruptly quit the one job she held, as an assistant in a suburban gift shop. (She didn’t get along with her boss.) She saw an ad for an Arabic-speaking research assistant, applied for the job, and got it. Her employer was the Investigative Project, run by Steven Emerson, a former reporter with an interest in terror networks. Emerson became widely known in the aftermath of the 1995 Oklahoma City bombing, when, appearing as an expert on CBS News, he theorized that the attack was the work of Islamic extremists. It turned out that Timothy McVeigh was responsible.
The Investigative Project was an exciting place to be. By the mid-nineties, the Internet had begun to change intelligence gathering profoundly, allowing groups like Emerson’s to emerge—self-styled spies who relied on the floods of “open source” information available online—tax records, credit reports, Internet newsletters written by people in Belgrade or Indonesia. Senior counterterrorism officials had been slow to take open-source information seriously. “It was seen as irrelevant, and they much preferred working with spies and satellites,” Timothy Naftali, of the University of Virginia, who wrote a history of American counterterrorism for the 9/11 Commission, said. Katz would start with the name of an organization, or an individual, and pore over records to find out who was associated with whom, whether they were sending money overseas, what they were writing. She was amazed at what she could discover. She began joining message boards related to a particular group or mosque and chatting with her subjects online, pretending to be a Muslim man.
The Investigative Project also did undercover work at Islamic fund-raisers and rallies. “Our families all thought we were nuts,” Evan Kohlmann, who worked with Katz and Emerson, said. (Kohlmann now runs his own Web-based consultancy, globalterroralert.com.) The I.P. sometimes sent Katz to events where non-Muslims would stand out; she pretended to be the wife of a radical Iraqi-American businessman. She taped crowds outside the Israeli Embassy screaming in Arabic, “Jew, Jew, Muhammad is coming to get you.” At particularly radical fund-raisers and conferences, she wore a burka, spoke a deferential Iraqi-accented Arabic, and sat apart from the men, averting her eyes. By volunteering to send cash to the families of suicide bombers, she said, she figured out which organizations were funnelling money to them. She openly videotaped events, as true believers do, and, she said, “sometimes when I had trouble holding the video camera, they would be very polite and hold it for me.” She became so consumed by this work—telephoning her house from other cities at odd hours and telling her family that she’d be back in a day or two but couldn’t say why—that her husband suspected her of having an affair.
On December 14, 1999, an Algerian named Ahmed Ressam was arrested as he tried to cross the border from Canada with a trunk full of materials for an explosive device that he intended to detonate at Los Angeles International Airport. Richard A. Clarke, who was then President Clinton’s counterterrorism adviser, called Emerson from the White House and asked the Investigative Project for a report on militant Islamic cells in North America. The worry was that Ressam was part of a larger plot planned for the millennium. Each day for the next two weeks, Kohlmann, Katz, Emerson, and two other analysts stayed at the office until well past midnight, looking through public records and other sources. Katz became convinced that she was looking at a single global network of terror. “We began to realize how big it was, and how little anyone knew about it,” she said, “and it just began to swallow me up.”
On September 11, 2001, Kohlmann, then in law school, raced out of class and called Katz. “She said, ‘Time to get to work.’ ” But by the following June Katz and Emerson, both combative personalities, had parted ways. Taking two staff members from the Investigative Project, Katz set up her own office. She got by on small government contracts. Some of that work, done for the Treasury Department, involved identifying Islamic groups that might be sending money to terrorist organizations. She also had a contract with the Swiss government and with a group of relatives of 9/11 victims who were suing Saudi Arabian officials, businesses, and charities. Still, during the first two years, Katz said, she couldn’t always pay salaries.
But Katz’s organization had embedded itself in the Internet, and when a part-time P.R. consultant whom Katz brought in suggested that she start a subscription service, Katz sent out an e-mail to people and groups she had worked with. In a few weeks, SITE had a few dozen subscribers, each paying twenty-five hundred dollars annually. (SITE is a nonprofit organization, and also raises money from private donors.)
The world of private, open-source counterterrorism operations is tiny—a few dozen people, if you’re counting liberally—and it tends to have the same characteristics as other self-appointed, at-the-barricades élites, like the neoconservatives, or the old American left, or, for that matter, an underground terrorist organization. There are the same personal allegiances and petty feuds, the same mixture of importance and self-importance. Kohlmann and Josh Devon, who left the Investigative Project with Katz and helped set up SITE, have been friends since middle school. They finished college in 2001. Kohlmann has long hair and a beard and is aided in his work, he said, “by looking like the kind of grad-school, hippie American that Islamic terrorists think they can recruit”; Devon has curly hair and always looks slightly surprised. When I asked Devon whether they had given much thought to the implications of selling intelligence by subscription, he said, “We were just trying to survive.”
In May, 2003, Katz published, anonymously, a memoir about her work, called “Terrorist Hunter.” (She was exposed as its author soon afterward.) The book is as psychologically blunt as she is, and the tone, at times, verges on smugness; the F.B.I., she writes, didn’t “possess one-thousandth of my knowledge on the relevant issues.” It is also an account, in almost religious terms, of her revelation about the threat and reach of global Islamic terrorism. Not that Katz goes through any real conversion in the course of the book; the only change is the slow, mechanical development of naïveté into experience, of suspicion into conviction, like water into steam.
That month, Katz went on “60 Minutes” to promote “Terrorist Hunter,” and to talk about her investigation into terrorist financing. Wearing a wig, five hours’ worth of makeup, and a large fake nose to conceal her identity, Katz also suggested that Mar-Jac Poultry, a Georgia chicken farm, was sending money to terrorists. She speculated that the company had hidden the transfers by selling chickens that it had recorded in its books as dead. Mar-Jac sued Katz and CBS. (The suit is still pending.) “This woman knows nothing about money laundering, and she sure as hell knows nothing about poultry,” Mar-Jac’s lawyer, Wilmer Parker, told me.
Katz said that her information was sound, but the publicity from the suit was not good. And there were other setbacks. In 2004, after she spent months helping the Department of Justice prepare a case against a young University of Idaho computer scientist named Sami Omar al-Hussayen for giving material support to terrorists, a jury acquitted him.
The invasion of Iraq opened up new opportunities for small, private groups like SITE, and as the war went on, and the insurgency continued to grow, SITE provided instantaneous bits of information to keep up with the news cycle. “It’s like when CNN came on the scene in the Gulf War, with twenty-four-hour news—it forever changed the field,” Bruce Hoffman, a counterterrorism expert at RAND told me. “SITE sends out six, seven e-mails a day, and the stuff is good, and it forces everyone else to play catch-up.”
SITE’s detractors have also questioned the quality, or, rather, the possible slant, of SITE’s translations—an especially troubling issue given the shortage of alternatives. “An Arabic word can have four or five different meanings in translation,” Michael Scheuer, the former C.I.A. analyst, said. SITE, in his view, always picks the “most warlike translation.”
“Our translations are as close as we can get to the original language,” Katz told me. “We have native speakers who do them, and I definitely don’t tell the native speakers what word to use—I am too busy to do that.”
Last December, Katz was reading a jihadist message board called Al Safanat when she discovered a manual describing how to attack the Alaska pipeline. She was struck by the level of detail: the manual recommended that an élite cell of four or five men equipped with armor-piercing bullets or explosives sneak across the border into Alaska from Canada. “They spilled our brothers’ blood and they stole our oil resources,” it said. “This is our time to teach them a lesson.” SITE sent the manual to its subscribers that day.
Soon afterward, the Anchorage Daily News published an article on the threat, crediting SITE for the information. “That’s when everything went crazy,” Katz said. Other reports followed, and soon Katz’s phone was ringing so frequently that she was overwhelmed. Things were even more overwhelming for workers on the pipeline. “We were already in communication with local, state, and federal officials,” Mike Heatwole, a spokesman for the company that manages the pipeline, said. When the media reports of the manual came out, Heatwole’s company sent internal memos reassuring its employees and their spouses that there was no credible threat. “The situation we don’t want to be in is to have CNN on in our facilities and someone on TV saying, ‘This just in—terrorist threat to the pipeline,’ and all our workers and their families saying, ‘Oh, no!’ ”
Katz conceded that her group doesn’t check the scientific accuracy of each manual, or the legitimacy of every threat—although she tries to make sure that the Web site that a particular item appears on has produced credible threats in the past, and that the threat seems serious. And, she said, vetting isn’t her role. “I’m telling people what terrorists are thinking,” Katz says. “Wouldn’t you rather know that they’re thinking about the Alaska pipeline, even if this manual wouldn’t work?”
There are hundreds of extremist Web sites, but there is also a hierarchy: sites on which terrorist groups release statements and videos have the most devoted audiences. As soon as something appears, users post it on dozens of message boards, chat rooms, and blogs. For much of the past two years, activity centered on a board called Ansar; once it was shut down, with its British-based Webmaster imprisoned for his part in a bomb plot, users shifted to a board called Al Hesbah. “There was absolutely no disruption,” Katz said.
Al Hesbah has several thousand regular users, and most log on from Europe and the Middle East. The tone of the conversation is respectful—“brother” is the universal term of greeting—and dissent is not tolerated. Once in a while, someone will ask whether it is justifiable to kill Muslims or women in the course of jihad in Iraq, but in the past year, according to Rebecca Givner-Forbes, an analyst with the Terrorism Research Center, “that has pretty much stopped.”
One afternoon early last fall, Katz came across a new thread. It was about her. A jihadi had posted a link to the SITE Institute’s Web site. “The SITE is lurking,” he wrote. Its people were on the boards, using false names and acting as spies. He urged his brothers to ferret them out and expel them.
But another poster responded that SITE might be providing a valuable service. He wrote, “They translate the statements into English on our behalf, and they do not analyze them. Why do we not grab the opportunity?” Eventually, a moderator on the site weighed in: “All right, men, do not argue. We will carry out an election, and then we will see if we should keep them or expel them—what do you think? I am a democratic operative, don’t you think?” He ended with a smiley-face emoticon. By the time attention shifted to a new thread, opinion was running fifty-fifty as to whether SITE was, on balance, good for jihad.
Terrorism is, in part, theatre and psychological warfare, and many of the statements that Katz translates are propaganda intended to raise the profile of obscure groups. Katz sees her audience mainly as professionals—people whose job it is to stop terrorism or uncover it. But, by creating a shortcut around government agencies, she may also be contributing to the tendency that the media (and at times the government) has displayed since 9/11 to dramatize even the flimsiest threat. In recent months, Katz has noticed Algerian radicals and Afghan terrorists releasing videos that mirror Zarqawi’s in substance and tone and that are also designed to impress young militants in the West. Katz believes that the terrorists have been underestimated, and that more people should have direct access to what they are thinking and saying. The terrorists, of course, think so, too.
Katz has a very specific vision of the counterterrorism problem, which she shares with most of the other contractors and consultants who do what she does. They believe that the government has failed to appreciate the threat of Islamic extremism, and that its feel for counterterrorism is all wrong. As they see it, the best way to fight terrorists is to go at it not like G-men, with two-year assignments and query letters to the staff attorneys, but the way the terrorists do, with fury and the conviction that history will turn on the decisions you make—as an obsession and as a life style. Worrying about overestimating the threat is beside the point, because underestimating the threat is so much worse.
“The problem isn’t Rita Katz—the problem is our political conversation about terrorism,” Timothy Naftali says. “Now, after September 11th, there’s no incentive for anyone in politics or the media to say the Alaska pipeline’s fine, and nobody’s cows are going to be poisoned by the terrorists. And so you have these little eruptions of anxiety. But, for me, look, the world is wired now: either you take the risks that come with giving people—not just the government—this kind of access to information or you leave them. I take them.”
The New Yorker : Listening In
Monday, May 22, 2006
LISTENING IN
Issue of 2006-05-29
Posted 2006-05-22
Seymour M. Hersh | Talk of the Town | May 22, 2006
A few days before the start of the confirmation hearing for General Michael Hayden, who has been nominated by President Bush to be the head of the C.I.A., I spoke to an official of the National Security Agency who recently retired. The official joined the N.S.A. in the mid-nineteen-seventies, soon after contentious congressional hearings that redefined the relationship between national security and the public’s right to privacy. The hearings, which revealed that, among other abuses, the N.S.A. had illegally intercepted telegrams to and from the United States, led to the passage of the 1978 Foreign Intelligence Surveillance Act, or FISA, to protect citizens from unlawful surveillance. “When I first came in, I heard from all my elders that ‘we’ll never be able to collect intelligence again,’” the former official said. “They’d whine, ‘Why do we have to report to oversight committees?’” But, over the next few years, he told me, the agency did find a way to operate within the law. “We built a system that protected national security and left people able to go home at night without worrying whether what they did that day was appropriate or legal.”
After the attacks of September 11, 2001, it was clear that the intelligence community needed to get more aggressive and improve its performance. The Administration, deciding on a quick fix, returned to the tactic that got intelligence agencies in trouble thirty years ago: intercepting large numbers of electronic communications made by Americans. The N.S.A.’s carefully constructed rules were set aside.
Last December, the Times reported that the N.S.A. was listening in on calls between people in the United States and people in other countries, and a few weeks ago USA Today reported that the agency was collecting information on millions of private domestic calls. A security consultant working with a major telecommunications carrier told me that his client set up a top-secret high-speed circuit between its main computer complex and Quantico, Virginia, the site of a government-intelligence computer center. This link provided direct access to the carrier’s network core—the critical area of its system, where all its data are stored. “What the companies are doing is worse than turning over records,” the consultant said. “They’re providing total access to all the data.”
“This is not about getting a cardboard box of monthly phone bills in alphabetical order,” a former senior intelligence official said. The Administration’s goal after September 11th was to find suspected terrorists and target them for capture or, in some cases, air strikes. “The N.S.A. is getting real-time actionable intelligence,” the former official said.
The N.S.A. also programmed computers to map the connections between telephone numbers in the United States and suspect numbers abroad, sometimes focussing on a geographic area, rather than on a specific person—for example, a region of Pakistan. Such calls often triggered a process, known as “chaining,” in which subsequent calls to and from the American number were monitored and linked. The way it worked, one high-level Bush Administration intelligence official told me, was for the agency “to take the first number out to two, three, or more levels of separation, and see if one of them comes back”—if, say, someone down the chain was also calling the original, suspect number. As the chain grew longer, more and more Americans inevitably were drawn in.
FISA requires the government to get a warrant from a special court if it wants to eavesdrop on calls made or received by Americans. (It is generally legal for the government to wiretap a call if it is purely foreign.) The legal implications of chaining are less clear. Two people who worked on the N.S.A. call-tracking program told me they believed that, in its early stages, it did not violate the law. “We were not listening to an individual’s conversation,” a defense contractor said. “We were gathering data on the incidence of calls made to and from his phone by people associated with him and others.” Similarly, the Administration intelligence official said that no warrant was needed, because “there’s no personal identifier involved, other than the metadata from a call being placed.”
But the point, obviously, was to identify terrorists. “After you hit something, you have to figure out what to do with it,” the Administration intelligence official told me. The next step, theoretically, could have been to get a suspect’s name and go to the fisa court for a warrant to listen in. One problem, however, was the volume and the ambiguity of the data that had already been generated. (“There’s too many calls and not enough judges in the world,” the former senior intelligence official said.) The agency would also have had to reveal how far it had gone, and how many Americans were involved. And there was a risk that the court could shut down the program.
Instead, the N.S.A. began, in some cases, to eavesdrop on callers (often using computers to listen for key words) or to investigate them using traditional police methods. A government consultant told me that tens of thousands of Americans had had their calls monitored in one way or the other. “In the old days, you needed probable cause to listen in,” the consultant explained. “But you could not listen in to generate probable cause. What they’re doing is a violation of the spirit of the law.” One C.I.A. officer told me that the Administration, by not approaching the FISA court early on, had made it much harder to go to the court later.
The Administration intelligence official acknowledged that the implications of the program had not been fully thought out. “There’s a lot that needs to be looked at,” he said. “We are in a technology age. We need to tweak fisa, and we need to reconsider how we handle privacy issues.”
Marc Rotenberg, the executive director of the Electronic Privacy Information Center, believes that if the White House had gone to Congress after September 11th and asked for the necessary changes in FISA “it would have got them.” He told me, “The N.S.A. had a lot of latitude under FISA to get the data it needed. I think the White House purposefully ignored the law, because the President did not want to do the monitoring under FISA. There is a strong commitment inside the intelligence community to obey the law, and the community is getting dragged into the mud on this.”
General Hayden, who as the head of the N.S.A. supervised the intercept program, is seen by many as a competent professional who was too quick to follow orders without asking enough questions. As one senior congressional staff aide said, “The concern is that the Administration says, ‘We’re going to do this,’ and he does it—even if he knows better.” Former Democratic Senator Bob Kerrey, who was a member of the 9/11 Commission, had a harsher assessment. Kerrey criticized Hayden for his suggestion, after the Times exposé, that the N.S.A.’s wiretap program could have prevented the attacks of 9/11. “That’s patently false and an indication that he’s willing to politicize intelligence and use false information to help the President,” Kerrey said.
Hayden’s public confirmation hearing last week before the Senate Intelligence Committee was unlike the tough-minded House and Senate investigations of three decades ago, and added little to what is known about the wiretap program. One unexamined issue was the effectiveness of the N.S.A. program. “The vast majority of what we did with the intelligence was ill-focussed and not productive,” a Pentagon consultant told me. “It’s intelligence in real time, but you have to know where you’re looking and what you’re after.”
On May 11th, President Bush, responding to the USA Today story, said, “If Al Qaeda or their associates are making calls into the United States, or out of the United States, we want to know what they are saying.” That is valid, and a well-conceived, properly supervised intercept program would be an important asset. “Nobody disputes the value of the tool,” the former senior intelligence official told me. “It’s the unresolved tension between the operators saying, ‘Here’s what we can build,’ and the legal people saying, ‘Just because you can build it doesn’t mean you can use it.’ ” It’s a tension that the President and his advisers have not even begun to come to terms with.
Issue of 2006-05-29
Posted 2006-05-22
Seymour M. Hersh | Talk of the Town | May 22, 2006
A few days before the start of the confirmation hearing for General Michael Hayden, who has been nominated by President Bush to be the head of the C.I.A., I spoke to an official of the National Security Agency who recently retired. The official joined the N.S.A. in the mid-nineteen-seventies, soon after contentious congressional hearings that redefined the relationship between national security and the public’s right to privacy. The hearings, which revealed that, among other abuses, the N.S.A. had illegally intercepted telegrams to and from the United States, led to the passage of the 1978 Foreign Intelligence Surveillance Act, or FISA, to protect citizens from unlawful surveillance. “When I first came in, I heard from all my elders that ‘we’ll never be able to collect intelligence again,’” the former official said. “They’d whine, ‘Why do we have to report to oversight committees?’” But, over the next few years, he told me, the agency did find a way to operate within the law. “We built a system that protected national security and left people able to go home at night without worrying whether what they did that day was appropriate or legal.”
After the attacks of September 11, 2001, it was clear that the intelligence community needed to get more aggressive and improve its performance. The Administration, deciding on a quick fix, returned to the tactic that got intelligence agencies in trouble thirty years ago: intercepting large numbers of electronic communications made by Americans. The N.S.A.’s carefully constructed rules were set aside.
Last December, the Times reported that the N.S.A. was listening in on calls between people in the United States and people in other countries, and a few weeks ago USA Today reported that the agency was collecting information on millions of private domestic calls. A security consultant working with a major telecommunications carrier told me that his client set up a top-secret high-speed circuit between its main computer complex and Quantico, Virginia, the site of a government-intelligence computer center. This link provided direct access to the carrier’s network core—the critical area of its system, where all its data are stored. “What the companies are doing is worse than turning over records,” the consultant said. “They’re providing total access to all the data.”
“This is not about getting a cardboard box of monthly phone bills in alphabetical order,” a former senior intelligence official said. The Administration’s goal after September 11th was to find suspected terrorists and target them for capture or, in some cases, air strikes. “The N.S.A. is getting real-time actionable intelligence,” the former official said.
The N.S.A. also programmed computers to map the connections between telephone numbers in the United States and suspect numbers abroad, sometimes focussing on a geographic area, rather than on a specific person—for example, a region of Pakistan. Such calls often triggered a process, known as “chaining,” in which subsequent calls to and from the American number were monitored and linked. The way it worked, one high-level Bush Administration intelligence official told me, was for the agency “to take the first number out to two, three, or more levels of separation, and see if one of them comes back”—if, say, someone down the chain was also calling the original, suspect number. As the chain grew longer, more and more Americans inevitably were drawn in.
FISA requires the government to get a warrant from a special court if it wants to eavesdrop on calls made or received by Americans. (It is generally legal for the government to wiretap a call if it is purely foreign.) The legal implications of chaining are less clear. Two people who worked on the N.S.A. call-tracking program told me they believed that, in its early stages, it did not violate the law. “We were not listening to an individual’s conversation,” a defense contractor said. “We were gathering data on the incidence of calls made to and from his phone by people associated with him and others.” Similarly, the Administration intelligence official said that no warrant was needed, because “there’s no personal identifier involved, other than the metadata from a call being placed.”
But the point, obviously, was to identify terrorists. “After you hit something, you have to figure out what to do with it,” the Administration intelligence official told me. The next step, theoretically, could have been to get a suspect’s name and go to the fisa court for a warrant to listen in. One problem, however, was the volume and the ambiguity of the data that had already been generated. (“There’s too many calls and not enough judges in the world,” the former senior intelligence official said.) The agency would also have had to reveal how far it had gone, and how many Americans were involved. And there was a risk that the court could shut down the program.
Instead, the N.S.A. began, in some cases, to eavesdrop on callers (often using computers to listen for key words) or to investigate them using traditional police methods. A government consultant told me that tens of thousands of Americans had had their calls monitored in one way or the other. “In the old days, you needed probable cause to listen in,” the consultant explained. “But you could not listen in to generate probable cause. What they’re doing is a violation of the spirit of the law.” One C.I.A. officer told me that the Administration, by not approaching the FISA court early on, had made it much harder to go to the court later.
The Administration intelligence official acknowledged that the implications of the program had not been fully thought out. “There’s a lot that needs to be looked at,” he said. “We are in a technology age. We need to tweak fisa, and we need to reconsider how we handle privacy issues.”
Marc Rotenberg, the executive director of the Electronic Privacy Information Center, believes that if the White House had gone to Congress after September 11th and asked for the necessary changes in FISA “it would have got them.” He told me, “The N.S.A. had a lot of latitude under FISA to get the data it needed. I think the White House purposefully ignored the law, because the President did not want to do the monitoring under FISA. There is a strong commitment inside the intelligence community to obey the law, and the community is getting dragged into the mud on this.”
General Hayden, who as the head of the N.S.A. supervised the intercept program, is seen by many as a competent professional who was too quick to follow orders without asking enough questions. As one senior congressional staff aide said, “The concern is that the Administration says, ‘We’re going to do this,’ and he does it—even if he knows better.” Former Democratic Senator Bob Kerrey, who was a member of the 9/11 Commission, had a harsher assessment. Kerrey criticized Hayden for his suggestion, after the Times exposé, that the N.S.A.’s wiretap program could have prevented the attacks of 9/11. “That’s patently false and an indication that he’s willing to politicize intelligence and use false information to help the President,” Kerrey said.
Hayden’s public confirmation hearing last week before the Senate Intelligence Committee was unlike the tough-minded House and Senate investigations of three decades ago, and added little to what is known about the wiretap program. One unexamined issue was the effectiveness of the N.S.A. program. “The vast majority of what we did with the intelligence was ill-focussed and not productive,” a Pentagon consultant told me. “It’s intelligence in real time, but you have to know where you’re looking and what you’re after.”
On May 11th, President Bush, responding to the USA Today story, said, “If Al Qaeda or their associates are making calls into the United States, or out of the United States, we want to know what they are saying.” That is valid, and a well-conceived, properly supervised intercept program would be an important asset. “Nobody disputes the value of the tool,” the former senior intelligence official told me. “It’s the unresolved tension between the operators saying, ‘Here’s what we can build,’ and the legal people saying, ‘Just because you can build it doesn’t mean you can use it.’ ” It’s a tension that the President and his advisers have not even begun to come to terms with.
Filed under
Congress,
Pakistan,
Seymour Hersh
by Winter Patriot
on Monday, May 22, 2006
[
link |
| home
]
Subscribe to:
Posts (Atom)