Monday, October 16, 2017

PART 3:THE SHADOW FACTORY:THE ULTRA SECRET NSA FROM 9/11 TO THE EAVESDROPPING ON AMERICA

THE SHADOW FACTORY
The Ultra Secret NSA from 9/11 to the To The Eavesdropping on America 
BY JAMES BAMFORD 


Pentagon 
Cindy Farkus again broke into Hayden’s meeting, but this time she was almost running. Another plane had hit the second tower, she said. “One plane’s an accident, two planes is an attack,” said Hayden, who immediately adjourned his meeting and asked Farkus to quickly summon the agency’s top security officials to his office. L. Kemp Ensor, the National Security Agency’s associate director for security, walked into the director’s office with his assistants. “As they were walking through the door, I knew exactly what we needed to do and I said, ‘All nonessential personnel out of here.’ Out of the complex,” said Hayden. 
Image result for images of Mark Rossini
Throughout the NSA, loudspeakers began sounding. “All nonessential personnel are to leave the building,” came the announcement over and over. Within Alec Station, CIA officers and FBI agents stared at the television in disbelief. “I saw the second plane hit in the office and it was like, oh my God, we’re under attack,” said FBI agent Mark Rossini. “No one uttered it. We just knew, we just knew. It was just frantic. Then we were just trying to find information—trying to find everything we could that’s on cable traffic, what’s being written. In some respects, we had no idea what was going on—we couldn’t really do anything. Everybody immediately suspected it was bin Laden.” 

Shortly after nine, Theodore Olson, the Bush administration’s solicitor general, heard about the hijackings and quickly turned on his office television. His wife, Barbara Olson, forty-five, a talk-show regular, was flying to Los Angeles that morning, and he was worried that she might have been on one of the planes that crashed into the World Trade Center. A fixture on cable networks for her strident advocacy of conservative and far-right issues, Olson was on Flight 77 in seat 3E, a few seats behind and across from Hanjour. 

After a brief mental calculation, Ted Olson figured his wife’s plane could not have gotten to New York that quickly. Suddenly, a secretary rushed in. “Barbara is on the phone,” she said. Olson jumped for the receiver. “Our plane has been hijacked!” she said quickly, but after a few seconds the phone went dead. Olson immediately called the command center at Justice and alerted them to the fact that there was yet another hijacked plane—and that his wife was on it. He also said she was able to communicate, though her first call had been cut off. 
Image result for images of Ted Olson
Minutes later, Barbara called back. Speaking very quietly, she said the hijackers did not know she was making this call. All the passengers, she said, had been herded to the back by men who had used knives and box cutters to hijack the plane. The pilot, she said, had announced that the plane had been hijacked shortly after takeoff. Ted Olson then told her about the two other planes that had been hijacked that morning and flown into the World Trade Center. “I think she must have been partially in shock from the fact that she was on a hijacked plane,” Olson recalled. “She absorbed the information.” 

“What shall I tell the pilot? What can I tell the pilot to do?” Barbara said, trying to remain calm. Ted asked if she could tell where the plane was at that moment. She said she could see houses and, after asking someone, said she thought the plane was heading northeast. Then they reassured each other that the plane was still up in the air, still flying, and that it would come out all right. “It’s going to come out okay,” Olson told his wife, who agreed. 

But Ted Olson knew the situation was anything but all right. “I was pretty sure everything was not going to be okay,” he recalled. “I, by this time, had made the calculation that these were suicide persons, bent on destroying as much of America as they could.” “I love you,” she said as they exchanged feelings for each other. Then the phone suddenly went dead again. While waiting for another call, Olson remained glued to the television. It was now about 9:30.[personally I do not think any of these calls took place DC] 

At 9:24, the FAA had alerted officials at N.O.R.A.D about the missing plane. Officials there immediately sent out a scramble order to their Air National Guard unit at Langley Air Force Base in Hampton, Virginia. At 129 miles away, it was the closest alert base to Washington. As Langley’s scramble horn blared and the battle stations light turned yellow, Major Dean Eckmann, a Northwest Airlines pilot serving his regular National Guard rotation, ran for his fighter. Joining him were Major Brad Derrig and Captain Craig Borgstrom. Six minutes later, N.O.R.A.D’s three F-16's, each loaded with six missiles, were wheels up. The mission for Eckmann and his two fellow pilots was to somehow find Flight 77 before it found its target, and possibly shoot it down. But that would require the authorization of the president, then in an elementary school in Sarasota, Florida. “I don’t think any fighter pilot in the United States would have ever thought they would be flying combat air patrols over American cities,” Eckmann said. “That was huge, huge culture shock.” 

At 9:29, with the plane thirty-eight miles west of the Pentagon and flying at seven thousand feet, Hanjour turned off the autopilot and took control of the stick. At that same moment, Dulles tower air traffic control operator Danielle O’Brien spotted an unidentified blip on her radar screen. Although she didn’t know it at the time, it was the missing Flight 77. 

The alarmed controllers quickly called to warn their colleagues at Reagan National Airport, which was located close to downtown Washington. “Fast-moving primary target,” they said, indicating that a plane without a transponder was heading their way. Tom Howell, the controller next to O’Brien, glanced over at her screen and his eyes grew wide. “Oh my God!” he yelled. “It looks like he’s headed to the White House! We’ve got a target headed right for the White House!” At full throttle, American Flight 77 was traveling at about five hundred miles per hour directly toward P-56, the prohibited airspace surrounding the White House and the Capitol. Because of its speed and the way it maneuvered and turned, everyone in the radar room of Dulles Airport’s tower assumed it was a military jet. 

At the N.S.A, the one group Hayden could not move to Ops 1 was the counter terrorism unit, eight floors up on the top of Ops 2B. He visited the unit and described the employees working there as “emotionally shattered.” “One of the more emotional parts of the day, for me,” said Hayden. “I went into our C.T [counter terrorism] shop and our logistics folks were tacking up blackout curtains because we can’t move the C.T shop in the midst of this.” Hayden called his wife, Jeanine, at their home a few miles away and asked her to locate their children. 

Hayden then ordered the counter terrorism unit to focus their attention on Middle Eastern intercepts and to translate and analyze them immediately as they were received, rather than starting with the oldest in the stack first, as was normally the case. It was then that analysts finally translated the two messages sent the day before, between pay phones in a highly dangerous area of Afghanistan and people in Saudi Arabia. To their shock, one said, “Tomorrow is zero hour,” and the other said, “The match begins tomorrow.” Whether they were referring to the attack or to something else, such as the assassination of Massoud, was unknown; the messages were too brief and vague. Still, the N.S.A would wait until the next day, September 12, before distributing the information to anyone else in Washington. 

Within the tower at Dulles Airport, the tension rippling through the air was almost visible. The supervisor in the radar room began a countdown as the unknown plane got closer and closer to the White House. “He’s twelve miles west,” he said. “He’s moving very fast eastbound—okay, guys, where is he now? . . . Eleven miles west, ten miles west, nine miles west.” About that point, he picked up the phone to the Secret Service office at the White House. “We have an unidentified, very fast-moving aircraft inbound toward your vicinity,” he said, counting down the miles. “Eight miles west. Seven miles west.” 

Many within Alec Station believed the C.I.A might be the target of Flight 77—a similar scenario had once been planned by Ramzi Yousef, the man who bombed the World Trade Center in 1993. “We thought it was coming for the CIA,” said FBI agent Mark Rossini. “So they evacuated the building, but we stayed. We were in the basement; I thought we’d be okay. We were in N.H.B [New Headquarters Building]. It was all underground up to the fourth floor, so I thought if the plane comes in it’s not really going to hit us, it’s going to hit the ground. Or it’s going to hit O.H.B [Old Headquarters Building]; it’s not really going to hit us. So we all stayed.” 

At the White House the warning came into the tightly packed Situation Room, down a flight of stairs from the Oval Office, where three watch officers continuously monitor computers carrying reports from the various intelligence agencies. A rush of fear suddenly washed over Franklin C. Miller, the director for defense policy. The White House could be going down, he thought. Then he had an aide send out an e-mail with the names of those present “so that when and if we died, someone would know who was in there,” he said. 

Secret Service officers quickly rushed into Vice President Dick Cheney’s office. “We have to move,” said one agent. “We’re moving now, sir; we’re moving.” Once out, they hustled him down to the Presidential Emergency Operations Center, a special tube like bunker under the East Wing of the building. The rest of the White House staff were told to get out and away from the building as quickly as possible. “Get out, get out, this is real,” shouted members of the bomb squad running through the building. “All the way to H Street, please,” one uniformed Secret Service officer yelled. “Women, drop your heels and run, drop your heels and run,” yelled one Secret Service agent. “Suddenly, the gates that never open except for authorized vehicles just opened and the whole White House just flooded out,” recalled Press Secretary Jennifer Millerwise. 

At 9:34, with the plane five miles west-southwest of the Pentagon, Hanjour began a complex, 330-degree right turn. 

“Six miles,” said the supervisor. “Five miles, four miles.” He was just about to say three miles when the plane suddenly turned away. “In the room, it was almost a sense of relief,” recalled air traffic controller Danielle O’Brien. “This must be a fighter. This must be one of our guys sent in, scrambled to patrol our capital and to protect our president, and we sat back in our chairs and breathed for just a second. In the meantime, all the rest of the planes are still flying and we’re taking care of everything else.” 

Then at about two thousand feet and four miles southwest of the building, Hanjour pointed the nose down and increased to near maximum speed. “He’s turning back in!” O’Brien yelled. “He’s turning back eastbound!” O’Brien’s fellow traffic controller Tom Howell also saw the turn and began to yell to the supervisor. “Oh my God, John, he’s coming back!” Arlington, Virginia, police officer Richard Cox could hardly believe his eyes. He grabbed for his microphone and called dispatch. “It’s an American Airlines plane, headed east down over the pike, possibly toward the Pentagon,” he said excitedly. 

Traveling at 530 miles per hour and with 36,200 pounds of jet fuel aboard, Flight 77 smashed into the gray concrete wall of the Pentagon. The jet hit with such force that it penetrated four of the five concentric rings of corridors and offices surrounding a gazebo in the center court, long nicknamed Ground Zero.[Bullshit, NO PLANE,hit the Pentagon DC] 

“We lost radar contact with that aircraft,” recalled O’Brien. “And we waited. And we waited. And your heart is just beating out of your chest waiting to hear what’s happened.” 

“Dulles, hold all of our inbound traffic,” said a voice. “The Pentagon’s been hit.” “I remember some folks gasping,” recalled O’Brien. “I think I remember a couple of expletives.” “It’s just like a big pit in your stomach because you weren’t able to do anything about it to stop it,” said Tom Howell. “That’s what I think hurt the most.”

At the Justice Department, Ted Olson heard on the television that an explosion had taken place at the Pentagon. Although no one identified the aircraft involved, he knew it was Flight 77, carrying his wife. “I did and I didn’t want to,” he recalled. “But I knew.” 

The N.S.A, made up of more than fifty buildings containing more than seven million square feet of space, was an easy place to hit. Following definite word that the Pentagon had been struck and that there were still one or more hijacked aircraft headed toward Washington, Hayden ordered the three to four thousand remaining essential personnel to immediately leave the agency’s three tall towers. They were to relocate to the three-story Ops 1 building, the old low-rise A-shaped structure that was the agency’s first home in Fort Meade. All four buildings were interconnected, so employees never had to go outside. 

In Ops 1, Hayden and his top staff marched through the automatic glass doors of the third-floor National Security Operations Center, the agency’s “war room.” Normally quiet and sedate, the N.S.O.C suddenly became a beehive of activity, with watch officers and signals intelligence officials fielding messages to and from the worldwide listening posts searching for answers in the dim light. All were watching for a CRITIC (Critical Intelligence) message—which took highest precedence—warning of where the next attack might come. 

At 9:53 a.m., less than fifteen minutes after Flight 77 hit the Pentagon, analysts picked up a phone call from a bin Laden operative in Afghanistan to a phone number in the former Soviet republic of Georgia. The person in Afghanistan said that he had “heard good news,” and indicated that a fourth target was yet to be hit—a possible reference to United Flight 93 that would crash in Pennsylvania before reaching its intended target in Washington. 

“I got in touch with George Tenet,” said Hayden. “He said, ‘What do you have?’ and I passed on whatever information we had.” Hayden then called his wife back, said he was okay, and found out that his children had been located and were safe. 

Over the next hours and days, it would become clear to Hayden that the men who attacked America lived, planned, and communicated not only within the country but even within the N.S.A’s own community. It would also become clear to him that the pressures would be enormous to begin turning the N.S.A’s massive ears inward, and to start filling its near bottomless data storage capacity with the words and voices of millions of Americans. For years, under his leadership, the agency had deliberately taken an overly cautious approach to eavesdropping and, possibly as a result, contributed to the intelligence failures that led to the attacks. Now he had a different priority. “Number one, security,” he said. “We’ve got to defend ourselves.”


BOOK TWO 
TARGETS
Opportunity 
Image result for images of John Poindexter
Five miles north of the Pentagon, on a bridge crossing the Potomac from Maryland into Virginia, John Poindexter was on his way to work in Arlington at the moment Hani Hanjour drove Flight 77 into the building. On his finger was a large ring from the Naval Academy, where he graduated at the top of his class in 1958, and on his sleeves were cuff links with the White House seal. A retired rear admiral and former Reagan national security adviser, he had become deeply involved in the arms for-hostages scandal, where money from covert arms sales to Iran was siphoned off to illegally support counter insurgents in Nicaragua. After disappearing from public life, he began turning his attention away from waging wars with guns and guerrillas and toward a new form of warfare, one that would instead use complex mathematical algorithms and computer-based pattern recognition techniques to defeat an enemy, focusing on the new emerging threat of terrorism. The idea was to find the enemy before he could find us. 

Moments after the plane hit the Pentagon, Poindexter received an urgent call on his cell phone from his wife, Linda, who told him about the attack. “Mark is okay,” she said, referring to their son, who was a commander on the staff of the navy’s chief of naval operations. “He wasn’t in the building.” Poindexter’s first thought was relief. Then he began seeing connections to the type of work he had been doing. “I realized this was a well-coordinated attack of the type that we had been working to prevent,” he said. 

The more he heard on the radio, about terrorists seizing aircraft and using them as weapons of mass destruction, the more he became convinced that his work was the answer to similar attacks in the future. In the Cold War, indications of pending attacks came via advanced radar systems— on land, on sea, and in the air—designed to detect incoming aircraft and missiles, or satellites that could discover their imminent launch. But the new terrorists turn everyday items into weapons, from cars and trucks to dinghies and jumbo jets. By the time they have struck, it is too late to detect them. What was needed was a way to find them at the earliest possible moment; what was needed were the ideas and techniques he and his colleagues at Syntek Technologies had been working on for years. 

Arriving at work in time to witness the South Tower collapse on television, Poindexter became frustrated and discouraged. Despite six years of hard effort, they had not been able to convince the intelligence community of the need to adopt their ideas and concepts. As most of the staff departed early for home, Poindexter, the company’s senior vice president, remained behind, thinking of how in a matter of hours the world had suddenly changed. “I stayed most of the day,” he said, “thinking about what needed to be done.” 

Schooled at Annapolis and trained as a scientist, sixty-five-year-old John Poindexter was a man with a great understanding of schematic diagrams, wiring charts, and military order. Tall and bulky with a hairless scalp, a bushy white mustache, and a fondness for pipes, starched white shirts, and dull gray suits, he was the technocrat’s technocrat. The answer to all things could be found in a test tube, a circuit board, or a mainframe. Thus Poindexter was convinced the answer to the complex problem of Middle Eastern terrorism was simply to place the everyday actions, public and private, of all Americans under a massive government magnifying glass. 

Early on September 12 he contacted J. Brian Sharkey, an old friend who had previously worked for the Pentagon’s cutting-edge laboratory, the Defense Advanced Research Projects Agency (D.A.R.P.A). In 1999, as the deputy director of D.A.R.P.A’s Information Systems Office, Sharkey had introduced a program dubbed Total Information Awareness (T.I.A), a name George Orwell would have liked. Eventually T.I.A died on the vine and Sharkey left D.A.R.P.A to become a vice president at S.A.I.C, the giant defense contracting firm. But now, with America in the grip of fear, T.I.A’s time had finally come. 

Poindexter and Sharkey held a meeting in a parked car off a Maryland highway. Both were energized by the idea of turning information into a weapon, of vacuuming up everyone’s digital trail, their parking receipts and Web searches, their bookstore visits and their gas station fill-ups, and then using supercomputers and complex algorithms to discover who among us is a terrorist. The data collected would be from public, private, and government databases, from Web browsers such as Google, from credit agencies and credit card companies, and from the Social Security Administration. Every bit had a history and every keystroke told a story. Known as data mining, it was automated surveillance on steroids. 
Image result for images of Dr. Anthony Tether.
On October 15, at a local Arlington fish restaurant—Gaffney’s Restaurant, Oyster & Ale House—Sharkey outlined T.I.A to D.A.R.P.A’s new director, Dr. Anthony Tether. By the time the oyster shells were empty, Tether wholeheartedly endorsed the idea and then suggested that Sharkey run the operation. Unwilling to give up his very lucrative defense contracting salary at S.A.I.C, Sharkey instead thought of Poindexter. A few days later, while the two were sailing on the Chesapeake aboard Poindexter’s forty two-foot sloop Bluebird, Sharkey suggested to his friend that he talk with Tether about taking the job. Poindexter liked the idea and a meeting with Tether was set up. For the admiral, it would be a second chance to save the world—again in his own secret way. This time, instead of a covert arms-for-hostages deal he would build the information equivalent of an atomic bomb. 

Not a man of small ideas, Poindexter arrived at the meeting with Tether prepared with a presentation titled “A Manhattan Project for Counter Terrorism.” He would become the Edward Teller of the information age. Like the old atomic-bomb development facility at Oak Ridge, Tennessee, the facility that Poindexter envisioned would employ the best and the brightest minds in computer science, physics, and information technology. But instead of intending to explode trillions of electrons and protons in a million different directions, Poindexter wanted to do the opposite. He wanted to collect into one “ultra-large” data warehouse billions of seemingly inconsequential bits of data and from that establish who might hijack the next plane or blow up the next building or take down the next bridge. He believed that with the right combination of hardware, software, and brainpower, he would be able to tie the purchase of a Leatherman knife at Target with a Web search on American Airlines and a speeding ticket in  Oklahoma and discover Nawaf al-Hazmi before he had a chance to board Flight 77. “How are we going to find terrorists and preempt them, except by following their trail?” asked Poindexter. 

In an atmosphere of hysteria, and with an administration unable to shovel dollars into counter terrorism projects fast enough, it was an easy sell. Tether said he would fund the project if Poindexter would run it. Poindexter readily agreed, and by January 2002, what would possibly become the largest data-surveillance system ever built was placed into the hands of a man once convicted of five felony counts of lying to Congress, destroying official documents, and obstructing congressional investigations. If Poindexter was a man of big ideas, he was also a man of big scandals, a factor that didn’t seem to bother Tether. 

During the Reagan administration, Poindexter was the highest-ranking official to be found guilty during the Iran-Contra affair. He was sentenced to prison by a federal judge who called him “the decision-making head” of a plot to deceive Congress. Later, an appeals court overturned the conviction on a technicality, holding that the testimony Poindexter gave to Congress about Iran-Contra was immunized, and therefore couldn’t be used against him at his trial. 
Image result for images of Booz Allen Hamilton
Dubbed the Information Awareness Office, Poindexter’s organization grew rapidly. With about $200 million in funding, Poindexter farmed out much of the research into how to build such a system to a wide range of corporations and universities that would do the heavy lifting. The companies were mostly large defense contractors such as Booz Allen Hamilton and Raytheon, and small boutique intelligence consultancies like Hicks & Associates. The universities ranged from Cornell and Columbia in the east to the University of California at Berkeley in the west. 
Image result for images of Ted Senator
Ted Senator, one of Poindexter’s colleagues, used a metaphor to describe the difficult task ahead in creating T.I.A. “Our task is akin to finding dangerous groups of needles hidden in stacks of needle pieces,” he said. “This is much harder than simply finding needles in a haystack: we have to search through many stacks, not just one; we do not have a contrast between shiny, hard needles and dull, fragile hay; we have many ways of putting the pieces together into individual needles and the needles into groups of needles; and we cannot tell if a needle or group is dangerous until it is at least partially assembled. So, in principle at least, we must track all the needle pieces all of the time and consider all possible combinations.” 

As with a prefabricated mansion, each contractor worked on a separate section of T.I.A. Among them was the Evidence Extraction and Link Discovery program, which Ted Senator described to a group of technologists in 2002: 

We’ve all seen what’s meant by links and relationships in the past year. Many newspaper articles have appeared about the events of September 11, typically accompanied by very nice graphics that show the relationships between the hijackers—some roomed together in Hamburg, some had airline tickets purchased on the same credit card at the same time, some traveled to Las Vegas at the same time, and the pilots trained together and, most important to our ability to have detected the plot in advance, engaged in suspicious and inexpiable behavior that was reported during this training. These articles had as their theme: “we had the information but didn’t put it together.” 

And that is what E.E.L.D is all about: developing techniques that allow us to find relevant information about links between people, organizations, places, and things—from the masses of available data, putting it together by connecting these bits of information into patterns that can be evaluated and analyzed, and learning what patterns discriminate between legitimate and suspicious behavior. 

T.I.A also included Scalable Social Network Analysis (S.S.N.A), which was projected to distinguish potential terrorist cells from ordinary groups of people through an analysis of various everyday activities, such as telephone calls, A.T.M withdrawals, and meetings; and Activity, Recognition, and Monitoring (A.R.M), which sought to develop computerized cameras capable of watching, recording, and learning how people act and behave—to “capture human activities in surveillance environments.” In other words, the object was to develop hidden cameras to determine whether someone was acting out of the ordinary. Finally, oblivious to calling attention to the Orwellian nature of his new organization, Poindexter personally designed an official seal for the Information Awareness Office with a pyramid topped by a piercing, disembodied, all-seeing eye. Within a month of opening for business, Poindexter began reaching out to the intelligence community—his future customers—and offering them a portal to his operation. This was a highly secret computer network through which the various agencies could interact with T.I.A’s sophisticated systems. Agencies would access the network through a “node,” a dedicated desktop computer located within each agency. Among the agencies interested was the N.S.A, which could never have enough computer help to sift through and analyze its ocean of intercepts. By tying into the T.I.A network, the agency would be able to experiment with new analytical software developed by Poindexter’s group. To work out the arrangement, Poindexter met with Hayden and the agency began installing the T.I.A nodes. Once they were installed, the agency started running stacks of intercepted e-mail and other communications through the system, testing various programs and exchanging data with other intelligence community users. 

In the fall of 2002, Poindexter’s luck ran out when conservative New York Times columnist William Safire, a staunch and longtime privacy advocate, caught wind of both T.I.A and Poindexter. His resulting November 14 column, entitled “You Are Suspect,” was merciless. Calling TIA “the super snoop’s dream,” he went on to say, “Here is what will happen to you”: 

Every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend—all these transactions and communications will go into what the Defense Department describes as “a virtual, centralized grand database.” 

Safire was no less severe on Poindexter himself, calling him “the disgraced admiral.” Others, including members of Congress, quickly jumped on the bandwagon and T.I.A went on life support. The end for Poindexter finally came when it was discovered that one of his programs involved a bizarre use of stock-market techniques to predict potential terrorist attacks. He resigned on August 29 and a month later House and Senate leaders came to agreement on scrapping the funding for T.I.A. 

Rather than truly dying, however, the controversial domestic data mining operation simply slipped deeper into the shadows—and ended up at the N.S.A. 


Hunters 
In the days immediately following the attacks, General Hayden had a major decision to make. He had to decide whether to continue to go forward with his massive, long-term reorganization plan, designed to revitalize the N.S.A’s workforce and modernize its worldwide eavesdropping network, or quickly change gears to focus on the immediate terrorist threat. On September 13, he called a meeting in his office. 

“We had all the senior leadership of the agency in this room,” said Hayden. “About thirty-five people . . . all the key leaders. We had them all in the room. I said, ‘Okay, we had a plan and we had a transformational road map and we made some decisions, now this [9/11] has happened. Do we need to revisit any of the trajectories that we put the agency on?’ And this was one of those frank and wide-ranging discussions. Every man and woman in the room said, ‘Go faster. No change in direction. If anything, accelerate all the changes under way.’ ” 

Ironically, at a time when most of the intelligence agencies were recalling previously retired workers, the NSA went ahead with their plan to offer incentives for employees to take early outs. “This was within thirty days of the attack,” said Hayden, “with the whole system stretched by the challenges of the new war. We had a lot of people leave and actually paid some people to leave.” 

The problem was that many of the people at the NSA had the right skills for the wrong targets. The agency had to move out many of the longtime Soviet linguists and high-frequency specialists to make room for Urdu and Dari speakers, and experts at dissecting and reverse-engineering the Internet. “We could not squeeze any more juice out of retraining,” said Hayden. “We had spent a decade trying to retrain people for the new kinds of missions, and now it was time to get new people in here. And the only way you can get new people in here is to let other people go. And we were criticized for that. Someone who’s as good at her job as [Congresswoman] Jane Harmon, the senior member on the [House Intelligence Committee, who] pays a lot of attention to us and is very conscientious and comes out to visit us and is very supportive, even she kind of said, ‘What is this all about?’ and said so in a public way. And I quietly pointed out to her, ‘It was a tough decision, but it was a right decision.’ ” 

The N.S.A’s personnel problems began in the early 1990's with the end of the Cold War. “We were a third smaller at the end of the 1990's than we were at the beginning,” said Hayden. “We downsized in the worst possible way—we shut the front door. For most of the decade of the 1990's, we hired fewer than two hundred people a year—civilians—in an agency that had over twenty thousand civilians in 1990; [we had] fifteen thousand by 2000.” By 2004, according to Hayden, the new recruits had jumped to 1,500 a year. 

But of those numbers, the largest group hired were not code breakers but security guards. “Garrison no longer equates to sanctuary,” said Hayden. “So we’re hiring guards. We’re renting some, too. Number two, we’ve increased our polygraphers. Number three, linguists. Number four, analysts. And there almost ain’t a number five . . . We focused on what I call wartime languages—Arabic, all the languages of Afghanistan, and then selected languages in other parts of the world, [like the] Horn of Africa.” The man in charge of hiring and recruiting was Harvey Davis. “We let the hiring program atrophy,” he said, referring to the 1990's. “But now there is a transformation under way, and we are recruiting and hiring at a feverish pace.” 

At the same time, entire departments quickly packed up and shipped out to the Middle East. Many took with them small, transportable “suitcase kits,” packed with eavesdropping equipment for targeting suspected terrorists. Made by S.W.S Securities, a small NSA contractor, they could handle rugged terrain and track low-powered radio transmissions, the kind produced by people in hiding and using shortwave radios and generators. They were also capable of detecting smaller signals obscured by large transmitters. Designed only for short-term use before disposal, they lasted about six weeks.

But according to Steve Uhrig, the president of S.W.S, bin Laden and his men had the advantage. “Anyone with a little computer understanding could get something up and running for him,” he said. “If he kept his transmissions short, moved frequently, he could even put the transmitter ten miles away from where he is, run a ground microwave relay to a hilltop, and bounce it off a satellite; put it under an oil company’s name . . . It could provide the perfect cover.” For security, employees and their kits were picked up at local parking lots, rather than at their homes or at the agency, and driven to Baltimore-Washington International Airport. Back at headquarters, many employees worked round the clock. “When people say they are going to meet at eight,” said one, “you have to ask if they mean eight in the morning or eight at night.” 

On the eighth floor of Ops 2B, Michael Hayden sought to restore a feeling of normalcy and confidence at the N.S.A. He also knew that there would be an immediate effort to push the NSA to the brink of the abyss. “On the thirteenth of September,” said Hayden, “I gave an address to an empty room, but we beamed it throughout our entire enterprise, about free peoples always having to decide the balance of security and their liberties, and that we through our tradition have always planted our banner way down here on the end of the spectrum toward security [possibly meant liberty]. And then I told the workforce . . . there are going to be a lot of pressures to push that banner down toward security, and our job at N.S.A was to keep America free by making Americans feel safe again. So this balance between security and liberty was foremost in our mind.” 

But it was Hayden himself who would grab the banner and lead the charge away from liberty and toward a security state. As the smoke cleared, and the details about Mihdhar and Hazmi and the Yemen ops center began to emerge, he knew exactly what had happened. Worried about congressional concerns over privacy, unhappy about the public’s image of the N.S.A as an evil eavesdropper, and hoping to avoid the slippery slope that led to the Church and Pike Committee investigations of the 1970's, he had turned a deaf ear to signals heading into the U.S. from suspected terrorist locations overseas. This despite the fact that closely monitoring these communications was part of his responsibility—provided certain F.I.S.A court rules were followed. 

Hayden had preferred instead to play it safe and leave those communications to the F.B.I., which had neither the technology nor the capability to do that type of collection. “I had an agency,” said Hayden, “that, you know, for decades—well, since the mid-1970's—had, frankly, played a bit back from the line so as not to get close to anything that got the agency’s fingers burned in the Church-Pike era.” As a result, the agency limited the monitoring of international communications to foreign diplomatic establishments in Washington and New York and a half dozen other F.I.S.A targets. Mihdhar and Hazmi were not among them. 

But the times had now changed, and Hayden changed with them. Civil liberties were out, Fortress America was in. Even Hayden’s ever-present football metaphors became more aggressive. “We’re going to live on the edge,” he would say. “My spikes will have chalk on them.” In Haydenese, launching war against al-Qaeda became “playing a little offense rather than having a perpetual first down and goal on the three-yard line in the homeland.” He would often say that the N.S.A had long been “gatherers”— passively picking information from the airwaves as it passed by. Now they would become “hunters,” actively going after that information wherever it was. 

Almost immediately after the attacks, Hayden beefed up the coverage of communications between Afghanistan and the U.S. Then, on his own initiative and without White House approval, he dropped the F.I.S.A mandated rule of minimization on those communications, leaving in the names and other details of American citizens without court approval. 

Soon thereafter, Vice President Dick Cheney called George Tenet and asked him if the N.S.A could do more. “I called Mike to relay the vice president’s inquiry,” said Tenet. “Mike made it clear that he could do no more within the existing authorities.” Nine months earlier, soon after Bush and Cheney were elected, Hayden had presented them with a top secret transition book outlining the challenges and limitations his agency was facing, noting both the fiber-optic revolution and F.I.S.A’s limitations. 

“The volumes and routing of data make finding and processing nuggets of intelligence information more difficult,” it said. The best way to find those nuggets, Hayden suggested in the report, was to tap into the worldwide telecommunications web—voice as well as data—to “live on the network,” even though that meant picking up many American communications. Hayden’s recommendation was to make the NSA “a powerful, permanent presence on a global telecommunications network that will host the ‘protected’ communications of Americans as well as the targeted communications of adversaries.” In other words, tap into the international communications flowing into and out of the U.S., something he had been reluctant to aggressively pursue prior to the attacks on 9/11 due to concern over F.I.S.A. 

“We went to see the vice president together,” Tenet said. “Mike laid out what could be done . . . We began to concentrate on the possible connections between the domestic front and the data we were collecting overseas. We would identify al-Qaeda members and other terrorists overseas and often discover that they had relatives, acquaintances, or business ties in the United States. Each rock overturned abroad led to ants scurrying every which way, including many toward the United States.” 

The next meeting was in the White House with the president. Seated around the long conference table in the Situation Room with Bush, Cheney, and Condoleezza Rice were the key intelligence chiefs. Hayden, the kid from “the Ward,” Pittsburgh’s tough North Side, was a man impressed with power. He once beamed as he boasted of going to a baseball game with Rice. Now the president of the United States was putting his arm around him and calling him “Mikey,” his childhood nickname. “Is there anything more we could be doing, given the current laws?” Bush asked the gathering. “There is,” said Hayden. He then gave the president a brief summary of the NSA’s signals intelligence operations against al-Qaeda. 

“He showed me the plans for this country to pick up a conversation,” said Bush, “listen to conversations from people outside the country, inside the country, who had an affiliation with al-Qaeda, or were al-Qaeda. He said, ‘I think we can design a program, Mr. President, that will enable us to have a quick response to be able to detect and deter a potential attack.’ I said, ‘That’s interesting, General.’ I said, ‘That makes a lot of sense to me.’ I said, ‘You’re not going to listen inside the country.’ [He said,] ‘No, this is calls from outside the country in, or inside out, to people who we know or suspect are affiliated with al-Qaeda.’ And I remember some of those phone calls coming out of California prior to September the 11th attacks by the killers—just thinking maybe if we’d have listened to those on a quick response basis, you know, it might have helped prevent the attacks. My second question was, is it legal?” 

Hayden then brought up F.I.S.A and complained that it was designed for an earlier period of time. It was designed for the 1970's, he said, when international communications signals, its principal focus, traveled through the air and domestic calls, which they were prohibited from monitoring,were transmitted over wires. Thus the law placed most restriction on the wired communications. “When the law was passed,” he said, “almost all local calls were on a wire and almost all long-haul communications were in the air. In an age of cell phones and fiber optic cables, that has been reversed . . . with powerful and unintended consequences for how NSA can lawfully acquire a signal.” To correct the problem, Hayden proposed a new concept: “hot pursuit.” 

Under F.I.S.A, if the N.S.A was eavesdropping on the Yemen ops center and a call was made to the U.S., the intercept operator could legally listen in as long as the target was in Yemen. But as soon as the two parties hung up, the N.S.A intercept operator might want to begin targeting the American number immediately. “From that decision to coverage is measured in minutes,” Hayden said. Because the person is in the U.S., however, the N.S.A would now have to get a F.I.S.A warrant to begin targeting that number, a process Hayden claimed was “slow and cumbersome.” Instead he told the president he wanted authority to secretly bypass the court and begin monitoring all of the target’s international communications immediately—in other words, “in hot pursuit.” The standards for what represented a “reasonable” intrusion into Americans’ privacy had changed, Hayden said, “as smoke billowed from two American cities and a Pennsylvania farm field.” 
Image result for images of Bob Deitz,
F.I.S.A, however, already provided for “hot pursuit”—it allowed intercept operators to begin listening immediately, as long as they would apply for the warrant within three days. Yet even that was too cumbersome and time-consuming for Hayden and Bob Deitz, Hayden’s top lawyer at the N.S.A, who argued that the whole exercise was a waste of both time and paper—a total bother. “The problem with the seventy-two-hour rule,” he said, is that “it is not a freebie. It is not you get to do whatever you want for seventy-two hours . . . My concern is not lawyer time, although that is precious enough. My concern is analyst time, and the issue that most concerns us is your counter terrorism experts and analysts do not grow on trees . . . Analysts talk to each other. They do memorandum. They pass the memorandum on to shift supervisors . . . Then it has to go to our lawyers. Then it has to go to a group of lawyers at the Department of Justice; and then, ultimately, it has to go to the attorney general.” And then there was all that paper. “F.I.S.A applications,” he said, “now are approximately three-fourths of an inch thick. That is paper producing . . . I suggest that that is simply a waste of that paper and effort and analysts’ time.”

But in a democracy, eavesdropping on citizens, the most intrusive act a government can perform, has traditionally been done with care and deliberation, checks and balances, lest the government itself become the enemy. Eavesdropping in East Germany during the Cold War was very quick and efficient—and therefore pervasive. And during that same period, eavesdropping by the N.S.A rapidly accelerated due to limited outside oversight. Hayden’s real problem today was not so much velocity—speed—as it was volume; he wanted to be able to target thousands of people simultaneously, some briefly and some long term, without the hassle of justifying them to anyone higher than an anonymous shift supervisor. 

In fact, according to James Baker, the Justice Department official most familiar with the F.I.S.A court as the head of the Office of Intelligence Policy and Review since 2002, the warrants can be handled as quickly as in a matter of minutes. “We’ve done it in a matter of a day; we’ve done it in a matter of hours; we’ve done it in a matter of minutes,” he said in 2007. “Very rapidly. Extremely rapidly . . . The point is, there’s been no loss of foreign intelligence information. That’s the key thing . . . The American people have not been put at any risk because of this process going on.” 

Nor, he said, were there any technical advances that prevented the court from doing its job. “The Congress in 1978,” he said, “wanted to enable the government to collect all that information . . . I just want the American people to be reassured that there’s not some pot of electrons out there floating around that we can’t somehow get at technically because of the regime that F.I.S.A sets up . . . I submit that F.I.S.A works today. I believe that it’s been effective in protecting the American people from threats from foreign powers, from hostile terrorist groups, from hostile foreign governments, and at the same time it’s been effective in protecting the American people’s privacy.” 

For years Hayden had avoided targeting Americans as much as possible. One slip and it was headlines and congressional hearings. But Michael Hayden was a man who spent his life tacking whichever way the political winds happened to be blowing, and now he would simply tack again, this time far to starboard. His goal was always to stay afloat and make it to the next larger port. For Hayden, that now required jettisoning the F.I.S.A court and launching his own top-secret eavesdropping operation at home against American citizens. The N.S.A would now become an agency of hunters. 


FISA
As far as Michael Hayden was willing to go, Cheney wanted to go much further—to even allow the N.S.A to eavesdrop on purely domestic to domestic communications, phone calls as well as e-mail, without a warrant. If people within the U.S. with suspected links to al-Qaeda made calls, even to the house next door, Cheney believed the N.S.A should be tapping in, regardless of F.I.S.A. “Either we’re serious about fighting the war on terror or we’re not,” he said. “Either we believe that there are individuals out there doing everything they can to try to launch more attacks, to try to get ever deadlier weapons to use against us, or we don’t. The president and I believe very deeply that there’s a hell of a threat, that it’s there for anybody who wants to look at it. And that our obligation and responsibility given our job is to do everything in our power to defeat the terrorists. And that’s exactly what we’re doing.” 
Image result for images of CheneyImage result for images of David S. Addington
Cheney’s position was shared by his longtime aide and top legal adviser, forty-four-year-old David S. Addington, who became the chief legal architect of the warrant less eavesdropping program. He once told a senior Justice Department lawyer, “We’re one bomb away from getting rid of that obnoxious [F.I.S.A] court.” “He and the vice president had abhorred FISA’s intrusion on presidential power ever since its enactment in 1978,” said Jack Goldsmith, who headed the Justice Department’s Office of Legal Counsel during the Bush administration—which he would later label “the terror presidency.” “After 9/11 they and other top officials in  the administration dealt with F.I.S.A the way they dealt with other laws they didn’t like: they blew through them in secret based on flimsy legal opinions they guarded closely so no one could question the legal basis for the operations.” 

One reason why Cheney and Addington hated the court was its tendency to resist attempts by the Bush administration to push beyond the legal boundaries, even before the attacks of 9/11. Judges on the court kicked back more wiretap requests from the Bush administration than from the four previous presidential administrations combined. In its first twenty-two years, the court modified only two F.I.S.A eavesdropping requests out of the 13,102 applications that were approved. And in twenty of the first twenty-one annual reports issued by the court, up until 1999, the Justice Department reported that no orders were modified or denied. But beginning with the arrival of George W. Bush in 2001, the judges modified 179 of the 5,645 requests for court-ordered surveillance and rejected or deferred at least six—the first outright rejections in the court’s history—between 2003 and 2004. 

Nevertheless, of all the courts in the history of the United States, it is likely none has ever been as accommodating to government lawyers. Such facts worry Jonathan Turley, a George Washington University law professor who worked for the N.S.A as an intern while in law school in the 1980's. The F.I.S.A “courtroom,” hidden away on the top floor of the Justice Department building (because even its location is supposed to be secret), is a heavily protected, windowless, bug-proof S.C.I.F. “When I first went into the F.I.S.A court as a lowly intern at the NSA, frankly, it started a lifetime of opposition for me to that court,” said Turley. “I was shocked with what I saw. I was convinced that the judge in that S.C.I.F would have signed anything that we put in front of him. And I wasn’t entirely sure that he had actually read what we put in front of him. But I remember going back to my supervisor at N.S.A and saying, ‘That place scares the daylights out of me.’ ” 
Image result for images of Royce C. Lamberth.
The F.I.S.A judges are also agreeable to calls twenty-four hours a day if the N.S.A or F.B.I. has an urgent warrant request. On one Saturday in April 2002, for example, four cars filled with F.B.I. agents suddenly pulled up to the front door of the home of Royce C. Lamberth. A bald and burly fifty nine-year-old Texan with a fondness for John Grisham novels, he was mowing his lawn at the time. But rather than arrest him, the agents were there to request an emergency court hearing to obtain seven top-secret warrants to eavesdrop on Americans. 

As the presiding justice of the FISA court, Lamberth had become accustomed to holding the secret hearings in his living room. “My wife, Janis . . . has to go upstairs because she doesn’t have a Top Secret clearance,” he said. “My beloved cocker spaniel, Taffy, however, remains at my side on the assumption that the surveillance targets cannot make her talk. The FBI knows Taffy well. They frequently play with her while I read some of those voluminous tomes at home.” FBI agents will even knock on the judge’s door in the middle of the night. “On the night of the bombings of the U.S. embassies in Africa, I started the first emergency hearings in my living room at 3:00 a.m.,” recalled Lamberth, who was first appointed to the court in 1995. “From the outset, the FBI suspected bin Laden, and the surveillance's I approved that night and in the ensuing days and weeks all ended up being critical evidence at the trial in New York.” 

Lamberth, who first decided to become a lawyer at age seven, became a thorn in the side of the Bush administration soon after the inauguration. “Those who know me know the chief justice did not put me on this court because I would be a rubber stamp for whatever the executive branch was wanting to do,” he said. “I ask questions.” In March, he sent a letter to Attorney General John Ashcroft raising questions about a F.I.S.A request to eavesdrop on a member of Hamas, the militant Palestinian group. The issue involved whether the F.B.I. was seeking authority to eavesdrop on targets without informing the court of pending criminal investigations involving the subject’s status. F.I.S.A judges were always concerned that investigators might use the court, with its lower probable cause standard, as a back door to obtain eavesdropping warrants in standard criminal cases—something that was forbidden. Given Lamberth’s conscientiousness and the fact that the court was rejecting an increasing number of F.I.S.A applications, Cheney and Addington began looking for a way to bypass the troublesome court altogether. 

Enacted by a bipartisan Congress in 1978, F.I.S.A was a response to revelations that the N.S.A had conducted warrant less eavesdropping on Americans. To deter future presidents and N.S.A directors from ever again bypassing the court and the warrant procedure, Congress put sharp teeth  in the statute, making violation a felony punishable by a $10,000 fine and five years in prison. Hard time. And each warrant less interception was a separate violation. 
Image result for images of John C. Yoo
Cheney was undeterred. The 9/11 attack occurred on his watch and he was determined not to let something like it happen again. He also had serious disagreements with even the existence of F.I.S.A, an impediment on presidential power that he believed “served to erode the authority I think the president needs to be effective, especially in a national security area.” He turned to Attorney General Ashcroft to find a way to get around it. Ashcroft, in turn, handed the assignment to John C. Yoo, an extremely aggressive, thirty-four-year-old Bush appointee who advocated for unprecedented presidential powers in times of war. He was also greatly impressed with the N.S.A. “Sigint [signals intelligence] is even more important in this war than in those of the last century,” he said. 

Yoo argued forcefully to Ashcroft and Cheney that both the agency’s weapons and the law were a product of the last century. “The government had to figure out how to tap into al-Qaeda’s communications networks,” he said. “We can’t say well, that line is the devoted line for Osama bin Laden to talk to his lieutenants. Or we know they use that frequency, because they use the Internet, and they use cell phones and telephone calls just like you and I do. No. This is a good example of where existing laws were not up to the job, because under existing laws like F.I.S.A, you have to have the name of somebody, have to already suspect that someone’s a terrorist before you can get a warrant. You have to have a name to put in the warrant to tap their phone calls, and so it doesn’t allow you as a government to use judgment based on probability, to say: ‘Well, 1 percent probability of the calls from or maybe 50 percent of the calls are coming out of this one city in Afghanistan, and there’s a high probability that some of those calls are terrorist communications. But we don’t know the names of the people making those calls.’ You want to get at those phone calls, those e-mails, but under FISA you can’t do that.” 

Ten days after the attacks, Yoo wrote an internal memorandum arguing that the NSA could use “electronic surveillance techniques and equipment that are more powerful and sophisticated than those available to law enforcement agencies in order to intercept telephonic communications and observe the movement of persons but without obtaining warrants for such uses.” He noted that while such unprecedented and intrusive actions might be rejected on constitutional grounds during normal times, they are now justified as a result of the 9/11 attacks. During such times, he said, “the government may be justified in taking measures which in less troubled conditions could be seen as infringements of individual liberties.” 

Yoo thought that constitutional guarantees instantly evaporate following a terrorist attack. “It appears clear that the Fourth Amendment’s warrant requirement does not apply to surveillance and searches undertaken to protect the national security from external threats,” he said. In another memo, this one to Alberto Gonzales, the White House counsel, he reiterated his view that the president’s powers trump the Constitution. “Our office recently concluded,” he wrote, “that the Fourth Amendment had no application to domestic military operations.” 

Hayden, not privy to the Justice Department’s legal opinions, said he relied on the legal advice of his general counsel, Robert L. Deitz, and his staff for his decision to go along with the warrant less surveillance program. “Three guys,” Hayden said, “whose judgment I trust; three guys who have advised me and who have told me not to do things in the past—and laid out the questions. And they came back with a real comfort level that this was within the president’s authority . . . It probably would have presented me with a—with a bit of a dilemma if the N.S.A lawyers had said, no, we don’t think so. But they didn’t.” 

Given that neither Deitz nor any other N.S.A lawyer was trusted by the White House with the legal rationale for what they were doing, how could his lawyers evaluate the decision? It rather calls their “comfort level” into question. “Before I arrived [in October 2003],” said Jack Goldsmith, “not even NSA lawyers were allowed to see the Justice Department’s legal analysis of what NSA was doing.” He added, “They did not want the legal analysis scrutinized by anyone, even inside the executive branch.” 

Except for the presiding judge, Royce Lamberth, the F.I.S.A court was also kept in the dark about the N.S.A’s warrant less program. But rather than being asked for his view on the legality of the operation, Lamberth, probably the most experienced person in the country on the topic, was simply told that this was a presidential decision, period. The meeting, with Hayden and Yoo, took place in the office of Attorney General John Ashcroft. During the meeting, which lasted nearly an hour, Lamberth said little and agreed to keep his fellow judges uninformed. “It was clear no one was asking him to approve it,” said one person at the meeting. 

“That was absolutely clear.” Years later Lamberth would harshly criticize the program. “We have to understand you can fight the war [on terrorism] and lose everything if you have no civil liberties left when you get through fighting the war.” 

While Lamberth believed he had no legal power to prevent the president’s actions—or even disclose them—he did make an attempt to keep any of the F.I.S.A cases that entered his court free of taint from the program. He did this by insisting that the Justice Department flag any F.I.S.A requests that were based, in any way, on the warrant less program. Lamberth had initially become alarmed when a number of requests crossing his desk failed to indicate the origin of the evidence of probable cause that was being presented—evidence, he believed, that originated from warrant less eavesdropping. By the time the N.S.A operation was up and running in the fall of 2001, between 10 and 20 percent of all the requests coming into the F.I.S.A court were tainted by what is known in the legal profession as “the fruit of the poisonous tree,” that is, the warrant less program. 
Image result for images of Colleen Kollar-Kotelly
When Lamberth’s tour on the court ended in 2002, he was succeeded by Colleen Kollar-Kotelly, like Lamberth a district court judge in the District of Columbia. She was also briefed on the program and continued to maintain the “firewall” separating legal F.I.S.A requests from the warrant less program. But the spillage into her court from the program became so bad that Kollar-Kotelly decided she had to take action. She insisted that the legal requests be accompanied by sworn affidavits—subject to perjury charges—attesting that the applications contained no product from the warrantless operation. 

On October 1, Hayden gave a highly secret briefing to members of the House and Senate intelligence committees regarding his ad hoc decision to drop the minimization requirements on the intercepts between Afghanistan and the U.S. The fact that without even presidential approval the names of presumed-innocent Americans were now being sent to the FBI, CIA, and other agencies surprised and angered a number of those briefed, including Nancy Pelosi. A Democratic congresswoman from California and the House minority leader, she was also the ranking Democrat on the House Intelligence Committee. Hayden may also have touched obliquely on the warrant less eavesdropping, which at that time had not yet begun. 

A few days later Pelosi sent a classified letter to Hayden expressing her concerns about the agency’s legal authority to expand its domestic operations. In the briefing, she wrote, “you indicated that you had been operating since the Sept. 11 attacks with an expansive view of your authorities” with respect to electronic surveillance and intelligence-gathering operations. “I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting.” In his response, Hayden acknowledged that he had not gotten White House approval. “In my briefing,” he wrote, “I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” 

Just days after the briefing, on October 4, Hayden received authorization to bypass the Foreign Intelligence Surveillance Court and begin eavesdropping on international communications to and from Americans without a warrant. Loaded with new money, freed of the F.I.S.A court, he now turned his attention to building his new worldwide surveillance empire.

Mission
In early October, Mike Hayden met a group of employees in a large windowless conference room just down the hall from his office. Sitting and standing around a giant doughnut-shaped table, they were the charter members of the most secret operation in the nation’s most secret agency. They were also the first NSA employees since the mid-1970's to eavesdrop on the phone calls and messages of American citizens without a judicial warrant and in contravention to existing laws. In a very unusual move reflecting the questionable nature of the program, Hayden made participation in it voluntary. Each person also had to sign a special document acknowledging they had been briefed on the “special collection program” and agreeing under penalty of prison never to reveal any details of it to anyone not specifically cleared for the mission. And like its predecessors, Operations Shamrock and Minaret, it was also given a code word, which itself was secret. 

“Let me tell you what I told them when we launched the program,” said Hayden. “This is the morning of 6 October in our big conference room—about eighty, ninety folks in there—and I was explaining what the president had authorized, and I ended up by saying, ‘And we’re going to do exactly what he said, and not one photon or one electron more’ . . . It was very closely held. We had to read people into the program specifically . . . This was walled off inside NSA; that’s the compartment that it was in.” 

As the first intercepts began appearing on computer screens and digital  recorders that first Saturday in October, less than a month after the attacks, one issue stood out above all others: whom to target. What criteria were the intercept operators to use to decide whether the American on the other end of that phone call or e-mail was linked to al-Qaeda or an innocent citizen constitutionally guaranteed the right to privacy? Under F.I.S.A, the Congress put that decision in the hands of the F.I.S.A court judges, independent arbiters with great experience and knowledge in the law, as well as extensive experience in determining whether there was probable cause—the high standard required by the Fourth Amendment—to begin targeting someone as a member of al-Qaeda. 

Hayden’s secret program bypassed the judges and instead left those decisions far down the food chain, to people with no legal training at all— “shift supervisors,” according to both Hayden and his top lawyer, Bob Deitz. The N.S.A would become judge, jury, and eavesdropper all in one. “I don’t make those decisions,” said Hayden. “The director of Sigint out there doesn’t make those decisions. Those decisions are made at the program level and at the level of our counter terrorism officer.” Defensively, he noted, “I’m trying to communicate to you that the people who are doing this, okay, go shopping in Glen Burnie and their kids play soccer in Laurel. And they know the law. They know American privacy better than the average American, and they’re dedicated to it . . . This isn’t a drift net out there where we’re soaking up everyone’s communications. We’re going after very specific communications that our professional judgment tells us we have reason to believe are those associated with people who want to kill Americans. That’s what we’re doing.” Deitz added, “So this is not—this isn’t simply Liberty Hall.” 

In addition to the issue of impartial judge versus partial eavesdropper, there is the question of different standards for deciding if an American is somehow affiliated with a terrorist organization. “They’re targeted on al-Qaeda,” said Hayden. “There is a probable cause standard. Every targeting is documented. There is a literal target folder that explains the rationale and the answers to the questions on a very lengthy checklist as to why this particular [phone] number we believe to be associated with the enemy.” 

But the term “probable cause” at the N.S.A is a misnomer. In fact, their standard is “reasonableness,” which is much lower than that required by both F.I.S.A and the Fourth Amendment. “The standard that is most applicable to the operations of N.S.A,” said Hayden, “is the standard of reasonableness, you know—is this reasonable?” He then gave an example of how the warrant less system works. “N.S.A in the conduct of its foreign intelligence work intercepts a communication from a known terrorist, let’s say in the Middle East, and the other end of that communication is in the United States. There—one end of that communication involves a protected person, all right? Everything N.S.A is doing is legal up to that point. It is targeting the foreign end, it has a legitimate reason for targeting it, and so on, all right? But now, suddenly, we have bumped into the privacy rights of a protected person, okay? And no warrant is involved, okay? We don’t go to a court. But through procedures . . . we must apply a standard to protecting the privacy of that individual.” 

Inevitably, mistakes are made and innocent people are targeted. “Clearly,” Hayden acknowledged, “I think logic would dictate that if you’re using a probable cause standard as opposed to absolute certitude, sometimes you may not be right.” But, he added defensively, that doesn’t make the initial decision wrong. “To put someone on targeting under N.S.A anywhere in the world . . . and at some point end targeting doesn’t mean that the first decision was wrong, it just means this was not a lucrative target for communications intelligence.” 

The NSA’s track record on accuracy, however, leaves much to be desired. As even Hayden now admits, the agency got the war in Iraq completely wrong. “When we didn’t find the weapons after the invasion and the occupation,” he said, “I brought our analysts in, NSA. Now, they’re not all source, they just do Sigint. And I said, ‘Come on, we got five things out there, chem, bio, nukes, missiles, and UAV's, give me your confidence level on each one . . . zero to ten, how confident were you on the day we kicked off the war?’ . . . Nukes was lowest at three, missiles was highest at ten, everything else was five, seven, and eight . . . As we went further into this—I had them back in a month or two later—their whole tone and demeanor had changed. There was a lack of confidence. Everything was being marshmallowed to me, a lot of possibles and could haves and maybes and so on.” 

The NSA scanned thousands of calls in the U.S. without a warrant, some briefly and others for longer periods. Those considered suspicious—about five hundred people at any one time during the beginning of the program and about one hundred people by 2007—would become targets. Overseas the number of people targeted by the N.S.A on any particular day ranged from five thousand to seven thousand. Occasionally, following the capture of an al-Qaeda computer or terrorist, the numbers would jump as new names and phone numbers were discovered in databases or phone books. Also, there was a built-in multiplier effect: if one person was targeted and he was in communication with a dozen other people about whom the agency became suspicious, they also could end up on the N.S.A’s phone-tree target list. And if a person in the U.S. seemed particularly important, the N.S.A could then go to the F.I.S.A court, meet the probable cause standard, and obtain a warrant to begin monitoring his or her communications. According to Hayden, “There were other circumstances in which clearly you wanted more than the coverage of international communications, and under this authorization, you would have to go to the F.I.S.A court in order to get a warrant for any additional coverage.” 

Had the warrant less eavesdropping system been in effect prior to 9/11, Hayden insists, both Mihdhar and Hazmi would have been detected. “I can demonstrate,” he said, “how the physics and the math would work . . . Had this been in place prior to the attacks, the two hijackers who were in San Diego, Khalid al-Mihdhar and Nawaf al-Hazmi, almost certainly would have been identified as who they were, what they were, and most importantly, where they were.” In fact, there was no need for such a system. If Hayden had simply done as his job allowed and traced the calls and e-mail back from the Yemen ops center and obtained a F.I.S.A warrant for the California phone numbers and e-mail address, he would have discovered who, what, and where they were back in the spring of 2000. And then by monitoring their domestic communications, the F.B.I. could have discovered the other members of the group. 

Those involved in the warrant less eavesdropping operation soon began to realize its limitations. By gaining speed and freedom they sacrificed order and understanding. Rather than focusing on the most important and potentially productive targets, which was required when going through the F.I.S.A court, they took a shotgun approach. They began monitoring thousands and thousands of “al-Qaeda affiliates,” all of which proved unproductive, flooding the FBI with useless intercept reports, slowing down legitimate investigations, and placing thousands of innocent names on secret blacklists. The Do Not Fly list alone quickly ballooned from about twenty to over forty thousand names, many generated by the NSA’s warrant less program as the agency zoomed from dangerously under reacting prior to 9/11 to dangerously overreacting afterward. 

For nearly thirty years, the NSA’s massive ear had been locked in place pointing outward. Now Hayden broke the lock and once again turned it inward, eavesdropping on Americans without a warrant. Nearly rusted on its pedestal and in need of new wiring, the NSA would require a major overhaul, from the intercept stations on the front end to the powerful supercomputers in the center to the analytical teams on the back end.

next
Highlander 140s




FAIR USE NOTICE


THIS SITE CONTAINS COPYRIGHTED MATERIAL THE USE OF WHICH HAS NOT ALWAYS BEEN SPECIFICALLY AUTHORIZED BY THE COPYRIGHT OWNER. AS A JOURNALIST, I AM MAKING SUCH MATERIAL AVAILABLE IN MY EFFORTS TO ADVANCE UNDERSTANDING OF ARTISTIC, CULTURAL, HISTORIC, RELIGIOUS AND POLITICAL ISSUES. I BELIEVE THIS CONSTITUTES A 'FAIR USE' OF ANY SUCH COPYRIGHTED MATERIAL AS PROVIDED FOR IN SECTION 107 OF THE US COPYRIGHT LAW.

IN ACCORDANCE WITH TITLE 17 U.S.C. SECTION 107, THE MATERIAL ON THIS SITE IS DISTRIBUTED WITHOUT PROFIT TO THOSE WHO HAVE EXPRESSED A PRIOR INTEREST IN RECEIVING THE INCLUDED INFORMATION FOR RESEARCH AND EDUCATIONAL PURPOSES. COPYRIGHTED MATERIAL CAN BE REMOVED ON THE REQUEST OF THE OWNER.

No comments:

Part 1 Windswept House A VATICAN NOVEL....History as Prologue: End Signs

Windswept House A VATICAN NOVEL  by Malachi Martin History as Prologue: End Signs  1957   DIPLOMATS schooled in harsh times and in the tough...