RSN Fundraising Banner
FB Share
Email This Page
add comment
Politics
Five Ways a Wider Syrian War Could Go Nuclear Print
Friday, 13 September 2013 14:35

Wasserman writes: "In the wake of an apparent break in the march to a wider war, the reality of a nuclear dimension in Syria remains largely unspoken."

U.S. involvement in Syria is being discussed by both sides. (photo: Lens Yong Homsi/AP)
U.S. involvement in Syria is being discussed by both sides. (photo: Lens Yong Homsi/AP)


Five Ways a Wider Syrian War Could Go Nuclear

By Harvey Wasserman, Truthdig

13 September 13

 

n the wake of an apparent break in the march to a wider war, the reality of a nuclear dimension in Syria remains largely unspoken.

There are at least five key reasons why American military intervention in Syria's civil war could go nuclear:

(1) There's a reactor near Damascus.

It is relatively small, by most accounts containing about a kilogram (2.2 pounds) of weapons-grade uranium. That's not much in the scheme of things when it comes to building an atomic bomb. But as Alexsandr Lukashevich of the Russian Foreign Ministry puts it, "If a warhead, by design or by chance, were to hit the Miniature Neutron Source Reactor (MSNR) near Damascus, the consequences could be catastrophic."

Continue Reading: Five Ways a Wider Syrian War Could Go Nuclear

e-max.it: your social media marketing partner
 
FOCUS | Systemic Causation and Syria: Obama's Framing Problem Print
Written by <a href="index.php?option=com_comprofiler&task=userProfile&user=8706"><span class="small">George Lakoff, Reader Supported News</span></a>   
Friday, 13 September 2013 13:00

Lakoff writes: "You pick up a glass of water and drink it: direct causation. You bomb a hospital, destroying it and killing those inside: direct causation."

Portrait, George Lakoff. (photo: Bart Nagel)
Portrait, George Lakoff. (photo: Bart Nagel)


Systemic Causation and Syria: Obama's Framing Problem

By George Lakoff, Reader Supported News

13 September 13

 

very language in the world has a way in its grammar to express direct causation: a local application of force that has a local effect in place and time. You pick up a glass of water and drink it: direct causation. You bomb a hospital, destroying it and killing those inside: direct causation.

No language in the world has a way in its grammar to express systemic causation. You drill a lot more oil, burn a lot more gas, put a lot more CO2 in the air, the earth's atmosphere heats up, more moisture evaporates from the oceans yielding bigger storms in certain places and more droughts and fires in other places: systemic causation. The world ecology is a system -- like the world economy and the human brain.

From infanthood on we experience simple, direct causation. We see direct causation all around us: if we push a toy, it topples over; if our mother turns a knob on the oven, flames emerge. And so on. The same is not true of systemic causation. Systemic causation cannot be experienced directly. It has to be learned, its cases studied, and repeated communication is necessary before it can be widely understood.

The daily horrors in Syria are direct: shootings, bombings, gassings. When the media reports on "Syria" (as it should), it is reporting on the direct horrors. If "Syria" is the problem, the problem is the daily horrors, the 100,000 killed, the ongoing shootings and bombings, the persistent hatred and oppression. If the president is understood as addressing "Syria," and he proposes directly bombing Syria, the natural question is whether that eliminates the daily direct horrors. When he admits that it does not, when Secretary Kerry says correctly, "There are no good options in Syria," the question naturally arises, "Why bomb when it won't solve the direct problem, but might create other problems?"

To President Obama, "Syria" is not primarily about direct causation. It is about systemic causation as it affects the world as a whole. It is about preventing the proliferation of poison gas use and nuclear weapons. It is about the keeping and enforcement of treaties on these matters. That is what he meant when he said that the red line is not his, but "the world's red line," "the international community's red line." The president has a broad perspective. To him "Syria" does not just mean Syria; it means the effects of the horrors in Syria on the world. "Limited" bombing in Syria is not about directly stopping the horrors there; it is about an attempt to prevent proliferation of gas and nuclear weapons and about an attempt to move toward a peaceful resolution.

But the president has not made this clear, and he could not possibly do it in one speech, given that most people don't viscerally react to systemic causation, and many don't understand it at all. He could only do it by discussing it overtly, distinguishing what is systemic from what is direct, and repeating it over and over. Even then, it would be a hard sell for cognitive reasons -- even though he has good reasons to base his policy on it.

Then there is Russia. In his September 10 speech, Obama addressed the Russian plan to take control of the poison gas in Syria from Assad's hands, which Assad has assented to. He discussed the plan, but never mentioned why the usual rational distrust of Russia should not apply here. It shouldn't apply because taking control is in many ways in Russia's interests: there are business interests, and there are many Russian citizens in Syria working on technology or going to college or married to Syrians. An American bombing could lead to gas falling into the hands of jihadists from Chechnya and elsewhere, who could use gas in terrorist attacks on Russia. Russia has a very strong interest in taking control of Assad's poison gas and we can trust Russia to act in its interests. But the president didn't say that Russia has a real interest in a peaceful diplomatic resolution in Syria, just as we do. Why not? Given the deep suspicion of Russia in the American psyche, that is a hard sell, too.

Just as there are no easy direct options in Syria, so there are no easy direct short-run communication options for a reasonable policy based on systemic causation. The reason is that the communication of unfamiliar ideas like systemic causation is itself a systemic problem. You can't just mention it once and expect it to be widely understood. It has to be repeated over time by a lot of people in a lot of situations.

As a result, the president's logic of limited bombing is not understood: he wants to bomb to prevent the systemic effect of the use of poison gas, not to stop the direct killing via other means, which we cannot stop. Obama has two hard sells, which for cognitive reasons lie beyond his immediate control. Systemic causation is not a natural concept that is automatically learned. In the September 10 speech, these ideas were mentioned, but they were not put front and center. And moreover, there has been no communicative groundwork over the past five years that would help citizens understand the logic of systemic causation versus direct causation and how it applies to Syria and other issues of our times.

e-max.it: your social media marketing partner
 
The American People Have Spoken Print
Friday, 13 September 2013 08:09

Sanders writes: "None of this will be easy. But the American people have proven that if they speak out, if they flood Capitol Hill with phone calls and emails, they can stop a war. Now is the time to use that same energy and passion to save the middle class."

The American people are saying no to war according to Sen. Bernie Sanders. (photo: Kevin Dietsch/UPI)
The American people are saying no to war according to Sen. Bernie Sanders. (photo: Kevin Dietsch/UPI)


The American People Have Spoken

By Sen. Bernie Sanders, Reader Supported News

13 September 2013

 

t a time of great political division in our country President Obama has found a remarkable way to unite Americans of all political persuasions -- conservatives, progressives and moderates. With a loud and clear voice, the overwhelming majority of the American people, across the political spectrum, are saying NO to another war in the Middle East -- Syria's bloody and complicated civil war.

There are two major reasons why the people in this country are adamantly opposed to the U.S.'s military intervention in Syria.

First, of course, is the much discussed "war weariness." The United States has been at war in Afghanistan for 12 years, and the war in Iraq dragged on for nearly nine years. The cost of these wars has been horrendous: more than 6,700 American deaths; hundreds of thousands suffering from traumatic brain injury and post-traumatic stress disorder; and a financial cost of between $4 trillion to $6 trillion by the time the last war veteran receives needed care. Further, as a result of the ineptitude and dishonesty of foreign policy decisions made in Vietnam, Afghanistan and Iraq, the American people worry deeply about the unintended consequences of another military venture.

But there's another reason why Americans are reluctant to get involved in a third Middle East war in 12 years. And that relates to the fact that Congress today has a 14 percent favorability rating and millions of Americans have absolutely no confidence that the U.S. House or Senate is even remotely concerned about their needs or views.

Here's the truth. The middle class in this country is collapsing. The number of Americans living in poverty is nearly the highest on record and the gap between the very rich and everyone else is growing wider and wider. And very few people in Washington give a damn.

Year after year the American people have begged the Congress and the president to move aggressively to protect the middle class from total collapse. And, so far, their leaders have failed to act. Today, the American people are demanding action to create jobs for their kids and retirement security for their parents.

They are deeply worried about the state of the economy, and they have every reason to worry. Here's what's going on:

  • Real unemployment: Counting those who have given up looking for work and those who are working part-time when they need a full time job, the real unemployment rate is 13.7 percent, not 7.3 percent.
  • Average wages: Non-supervisory workers have seen their wages go down by eight cents an hour since the beginning of the so-called recovery and are now a paltry $8.77 an hour.
  • Income and wealth inequality: From 2009-2012, the richest 1 percent of Americans captured 95 percent of all new income, while the typical middle class family has seen their income go down by more than2,100. The Walton family, the owners of Wal-Mart, are worth more than $100 billion and own more wealth than the bottom 40 percent of Americans.
  • College unaffordability: Over the past 30 years, the cost of a college education has gone up by more than 250 percent. The average American graduating from college this year is drowning in debt of more than35,000. Even worse, hundreds of thousands of high school graduates are unable to go to college each and every year not because they are unqualified, but because they can't afford it.
  • Childhood poverty: We live in the richest country in the world, yet one out of five children in the U.S. is stuck in poverty. And the reality is that children living in poverty in America today are more likely to stay in poverty when they grow up than in any other advanced country on earth.

The lesson to be learned from the widespread opposition to the war is that the American people standing together can make a difference. Building on that momentum, now is the time to demand that Congress create millions of decent-paying jobs repairing our crumbling roads, bridges, dams, culverts, schools and housing.

We need to end our dependence on dirty fossil fuels that are threatening the planet and move toward energy efficiency and renewable energy. We must increase the minimum wage to at least $10.10 an hour and lift millions of Americans out of poverty. We must fundamentally rewrite our trade policy so that American products, not American jobs, are our No. 1 export. We must stand up to the greed on Wall Street by breaking up too-big-to-fail banks that have done so much damage to the economy. And, we must make college affordable so that every qualified American can get the education they need to reclaim the American dream.

None of this will be easy. But the American people have proven that if they speak out, if they flood Capitol Hill with phone calls and emails, they can stop a war. Now is the time to use that same energy and passion to save the middle class.


e-max.it: your social media marketing partner
 
Obama bin Sultan and Bandar ibn Israel Print
Written by <a href="index.php?option=com_comprofiler&task=userProfile&user=5494"><span class="small">Steve Weissman, Reader Supported News</span></a>   
Thursday, 12 September 2013 13:54

Weissman writes: "How much did Obama's threat of a not-so-limited U.S. military strike push Russia and Syria to accept, at least in words, the international control and destruction of Syrian chemical weapons?"

Syrian President Bashar al-Assad. photo: AP
Syrian President Bashar al-Assad. photo: AP


Obama bin Sultan and Bandar ibn Israel

By Steve Weissman, Reader Supported News

12 September 13

 

ow much did Obama's threat of a not-so-limited U.S. military strike push Russia and Syria to accept, at least in words, the international control and destruction of Syrian chemical weapons?

How much did the threat of losing a Congressional vote on military authorization push Obama to grab onto Putin's offer with its lack of specifics and enormous difficulties in implementation?

Americans will debate both questions well into the next presidential election. But these are only the political atmospherics surrounding a much larger strategic question. Will the redline issue of chemical weapons end up escalating the war against Bashar al-Assad? Or will the long-term Russian cooperation Obama will need to control and destroy Assad's chemical weapons end up slowing down the brutal momentum of the Syrian civil war?

The point man behind all this global intrigue is an old Washington favorite, the Saudi prince Bandar bin Sultan al-Saud, who is pushing the U.S. to provide the military muscle for a Sunni takeover of Syria. Now, with Vladimir Putin's masterful diplomacy, Bandar's mission has become a whole lot trickier.

Appointed the director general of Saudi Intelligence this past July, Bandar took responsibility for installing a compliant Sunni regime in Damascus. As the Wall Street Journal reported, his appointment convinced officials inside the U.S. Central Intelligence Agency that Saudi Arabia "was serious about toppling Syrian President Bashar al-Assad."

Having previously served as Saudi ambassador to Washington from 1983 to 2005, Bandar pulled major strings under five U.S. presidents. He worked closely with the CIA to arm the anti-Soviet Mujihadeen in Afghanistan, which ended in the creation of the Taliban and al-Qaeda. He played a supporting role in the Iran-Contra scandal, and loudly urged the invasion of Iraq in 2003. As Craig Unger documented in "House of Bush, House of Saud," he also grew so personally and financially close to the Bush family that George W nicknamed him Bandar Bush.

Slipping into the shadows in 2006, Prince Bandar encouraged Vice President Dick Cheney to join Sunni leaders in a new sectarian alliance against Iran and its Shia allies in Syria and Lebanon. Sy Hersh described this "redirection" of American policy in The New Yorker, and I showed the continuity in "How Obama Fans the Flames of Islam's Holy Wars." Far from doing nothing, as his hawkish detractors claim, Obama began using the CIA to help the gas-rich Qataris, and increasingly Bandar and the Saudis, fly in heavy arms to the Sunni rebels in Syria. Many of these Sunni rebels - like Jabhat-al-Nusrah - have links to al-Qaeda, an inconvenient truth that John Kerry and his new neocon allies are falling all over themselves to minimize.

The effort is embarrassing. Kerry's chief source on the subject, Elizabeth O'Bagy, worked for the neocon Institute for the Study of War and was affiliated with the Syrian Emergency Task Force, which supported the supposedly moderate rebels that she, Kerry, and Senator John McCain were boosting. According to Politico, she has since been fired for falsely claiming to have completed her Ph.D.

Prince Bandar, Senators McCain and Lindsey Graham, and the die-hard neocons are all using the highly circumstantial evidence that Assad was behind the August chemical weapons attacks on the outskirts of Damascus. They are openly fanning the flames of a larger war all the way to Tehran. "Humanitarian interventionists" like Obama's national security advisor Susan Rice and U.N. ambassador Samantha Power also seem to favor more war.

The Israelis are also backing the escalation in Syria. They had earlier hesitated because they had found Assad easy to deal with over the Golan Heights, which they continue to occupy. Their major interest remains building an alliance against Iran, and - unlike the Saudis - they would like to see the war in Syria go on without either side winning, hoping to grind down the Iranians, Hezbollah, and their Sunni antagonists. The prince has nonetheless grown close to Tel Aviv, and his Arab enemies have dubbed him "Bandar ibn Israel."

Where, then, does Obama stand? In his Tuesday night speech, Obama sounded far more hawk than dove, playing up the very real suffering of those who underwent the gassing while hypocritically ignoring America's own use of white phosphorus and depleted Uranium and its support of the Israelis and Saddam Hussein using chemical weapons. He appealed to the chauvinistic nonsense of "American exceptionalism," and went out of his way to sell military intervention in Syria as part of his opposition to Iran's nuclear program.

At the same time, he has U.S. Special Forces in Jordan training Sunni rebels to fight in Syria as part of what Bandar and the Saudis call their "southern strategy" for strengthening the opposition south and east of Damascus. The White House is also setting Putin up to be the fall guy for delaying military escalation in Syria.

The problem with all this is that it hardly encourages the kind of cooperation Obama needs to control and destroy Assad's chemical weapons, a task that will take many years. It also ignores Putin's own experience with Prince Bandar. According to the widely respected British journalist Ambrose Evans-Pritchard, Bandar met with the Russian leader at Putin's dacha outside Moscow early in August.

"We understand Russia's great interest in the oil and gas in the Mediterranean from Israel to Cyprus. And we understand the importance of the Russian gas pipeline to Europe. We are not interested in competing with that. We can cooperate in this area," Bandar said, purporting to speak with the full backing of the U.S. He also pledged to safeguard Russia's naval base in Syria if Assad was toppled.

Bandar made an interesting offer, with economic implications involving major Saudi arms purchases from Russia and global cooperation between OPEC and the Russians. But, reports Evans-Pritchard, Bandar also hinted at a Chechen terrorist attack on Russia's Winter Olympics next year. "I can give you a guarantee to protect the Winter Olympics next year," he allegedly promised. "The Chechen groups that threaten the security of the games are controlled by us."

If Putin did not go along, Bandar implied that the Saudis might allow the Chechens to attack the Winter Olympics. With Mafia-like threats of that sort, I doubt that Putin will prove terribly cooperative if Obama continues to channel Prince Bandar al-Sultan al Saud.



A veteran of the Berkeley Free Speech Movement and the New Left monthly Ramparts, Steve Weissman lived for many years in London, working as a magazine writer and television producer. He now lives and works in France, where he is researching a new book, "Big Money: How Global Banks, Corporations, and Speculators Rule and How To Break Their Hold."

Reader Supported News is the Publication of Origin for this work. Permission to republish is freely granted with credit and a link back to Reader Supported News.

e-max.it: your social media marketing partner
 
The Cowboy of the NSA Print
Written by <a href="index.php?option=com_comprofiler&task=userProfile&user=27552"><span class="small">Shane Harris, Foreign Policy</span></a>   
Thursday, 12 September 2013 13:52

Harris writes: "On Aug. 1, 2005, Lt. Gen. Keith Alexander reported for duty as the 16th director of the National Security Agency, the United States' largest intelligence organization. He seemed perfect for the job."

Lt. Gen. Keith Alexander. photo: Saul Loeb/AFP/Getty Images
Lt. Gen. Keith Alexander. photo: Saul Loeb/AFP/Getty Images


The Cowboy of the NSA

By Shane Harris, Foreign Policy

12 September 13

 

Inside Gen. Keith Alexander's all-out, barely-legal drive to build the ultimate spy machine.

n Aug. 1, 2005, Lt. Gen. Keith Alexander reported for duty as the 16th director of the National Security Agency, the United States' largest intelligence organization. He seemed perfect for the job. Alexander was a decorated Army intelligence officer and a West Point graduate with master's degrees in systems technology and physics. He had run intelligence operations in combat and had held successive senior-level positions, most recently as the director of an Army intelligence organization and then as the service's overall chief of intelligence. He was both a soldier and a spy, and he had the heart of a tech geek. Many of his peers thought Alexander would make a perfect NSA director. But one prominent person thought otherwise: the prior occupant of that office.

Air Force Gen. Michael Hayden had been running the NSA since 1999, through the 9/11 terrorist attacks and into a new era that found the global eavesdropping agency increasingly focused on Americans' communications inside the United States. At times, Hayden had found himself swimming in the murkiest depths of the law, overseeing programs that other senior officials in government thought violated the Constitution. Now Hayden of all people was worried that Alexander didn't understand the legal sensitivities of that new mission.

"Alexander tended to be a bit of a cowboy: 'Let's not worry about the law. Let's just figure out how to get the job done,'" says a former intelligence official who has worked with both men. "That caused General Hayden some heartburn."

The heartburn first flared up not long after the 2001 terrorist attacks. Alexander was the general in charge of the Army's Intelligence and Security Command (INSCOM) at Fort Belvoir, Virginia. He began insisting that the NSA give him raw, unanalyzed data about suspected terrorists from the agency's massive digital cache, according to three former intelligence officials. Alexander had been building advanced data-mining software and analytic tools, and now he wanted to run them against the NSA's intelligence caches to try to find terrorists who were in the United States or planning attacks on the homeland.

By law, the NSA had to scrub intercepted communications of most references to U.S. citizens before those communications can be shared with other agencies. But Alexander wanted the NSA "to bend the pipe towards him," says one of the former officials, so that he could siphon off metadata, the digital records of phone calls and email traffic that can be used to map out a terrorist organization based on its members' communications patterns.

"Keith wanted his hands on the raw data. And he bridled at the fact that NSA didn't want to release the information until it was properly reviewed and in a report," says a former national security official. "He felt that from a tactical point of view, that was often too late to be useful."

Hayden thought Alexander was out of bounds. INSCOM was supposed to provide battlefield intelligence for troops and special operations forces overseas, not use raw intelligence to find terrorists within U.S. borders. But Alexander had a more expansive view of what military intelligence agencies could do under the law.

"He said at one point that a lot of things aren't clearly legal, but that doesn't make them illegal," says a former military intelligence officer who served under Alexander at INSCOM.

In November 2001, the general in charge of all Army intelligence had informed his personnel, including Alexander, that the military had broad authority to collect and share information about Americans, so long as they were "reasonably believed to be engaged" in terrorist activities, the general wrote in a widely distributed memo.

The general didn't say how exactly to make this determination, but it was all the justification Alexander needed. "Hayden's attitude was 'Yes, we have the technological capability, but should we use it?' Keith's was 'We have the capability, so let's use it,'" says the former intelligence official who worked with both men.

Hayden denied Alexander's request for NSA data. And there was some irony in that decision. At the same time, Hayden was overseeing a highly classified program to monitor Americans' phone records and Internet communications without permission from a court. At least one component of that secret domestic spying program would later prompt senior Justice Department officials to threaten resignation because they thought it was illegal.

But that was a presidentially authorized program run by a top-tier national intelligence agency. Alexander was a midlevel general who seemed to want his own domestic spying operation. Hayden was so troubled that he reported Alexander to his commanding general, a former colleague says. "He didn't use that atomic word - 'insubordination' - but he danced around it."

The showdown over bending the NSA's pipes was emblematic of Alexander's approach to intelligence, one he has honed over the course of a 39-year military career and deploys today as the director of the country's most powerful spy agency.

Alexander wants as much data as he can get. And he wants to hang on to it for as long as he can. To prevent the next terrorist attack, he thinks he needs to be able to see entire networks of communications and also go "back in time," as he has said publicly, to study how terrorists and their networks evolve. To find the needle in the haystack, he needs the entire haystack.

"Alexander's strategy is the same as Google's: I need to get all of the data," says a former administration official who worked with the general. "If he becomes the repository for all that data, he thinks the resources and authorities will follow."

That strategy has worked well for Alexander. He has served longer than any director in the NSA's history, and today he stands atop a U.S. surveillance empire in which signals intelligence, the agency's specialty, is the coin of the realm. In 2010, he became the first commander of the newly created U.S. Cyber Command, making him responsible for defending military computer networks against spies, hackers, and foreign armed forces - and for fielding a new generation of cyberwarriors trained to penetrate adversaries' networks. Fueled by a series of relentless and increasingly revealing leaks from former NSA contractor Edward Snowden, the full scope of Alexander's master plan is coming to light.

Today, the agency is routinely scooping up and storing Americans' phone records. It is screening their emails and text messages, even though the spy agency can't always tell the difference between an innocent American and a foreign terrorist. The NSA uses corporate proxies to monitor up to 75 percent of Internet traffic inside the United States. And it has spent billions of dollars on a secret campaign to foil encryption technologies that individuals, corporations, and governments around the world had long thought protected the privacy of their communications from U.S. intelligence agencies.

The NSA was already a data behemoth when Alexander took over. But under his watch, the breadth, scale, and ambition of its mission have expanded beyond anything ever contemplated by his predecessors. In 2007, the NSA began collecting information from Internet and technology companies under the so-called PRISM program. In essence, it was a pipes-bending operation. The NSA gets access to the companies' raw data - including e-mails, video chats, and messages sent through social media - and analysts then mine it for clues about terrorists and other foreign intelligence subjects. Similar to how Alexander wanted the NSA to feed him with intelligence at INSCOM, now some of the world's biggest technology companies - including Google, Microsoft, Facebook, and Apple - are feeding the NSA. But unlike Hayden, the companies cannot refuse Alexander's advances. The PRISM program operates under a legal regime, put in place a few years after Alexander arrived at the NSA, that allows the agency to demand broad categories of information from technology companies.

Never in history has one agency of the U.S. government had the capacity, as well as the legal authority, to collect and store so much electronic information. Leaked NSA documents show the agency sucking up data from approximately 150 collection sites on six continents. The agency estimates that 1.6 percent of all data on the Internet flows through its systems on a given day - an amount of information about 50 percent larger than what Google processes in the same period.

When Alexander arrived, the NSA was secretly investing in experimental databases to store these oceans of electronic signals and give analysts access to it all in as close to real time as possible. Under his direction, it has helped pioneer new methods of massive storage and retrieval. That has led to a data glut. The agency has collected so much information that it ran out of storage capacity at its 350-acre headquarters at Fort Meade, Maryland, outside Washington, D.C. At a cost of more than $2 billion, it has built a new processing facility in the Utah desert, and it recently broke ground on a complex in Maryland. There is a line item in the NSA's budget just for research on "coping with information overload."

Yet it's still not enough for Alexander, who has proposed installing the NSA's surveillance equipment on the networks of defense contractors, banks, and other organizations deemed essential to the U.S. economy or national security. Never has this intelligence agency - whose primary mission is espionage, stealing secrets from other governments - proposed to become the electronic watchman of American businesses.

This kind of radical expansion shouldn't come as a surprise. In fact, it's a hallmark of Alexander's career. During the Iraq war, for example, he pioneered a suite of real-time intelligence analysis tools that aimed to scoop up every phone call, email, and text message in the country in a search for terrorists and insurgents. Military and intelligence officials say it provided valuable insights that helped turn the tide of the war. It was also unprecedented in its scope and scale. He has transferred that architecture to a global scale now, and with his responsibilities at Cyber Command, he is expanding his writ into the world of computer network defense and cyber warfare.

As a result, the NSA has never been more powerful, more pervasive, and more politically imperiled. The same philosophy that turned Alexander into a giant - acquire as much data from as many sources as possible - is now threatening to undo him. Alexander today finds himself in the unusual position of having to publicly defend once-secret programs and reassure Americans that the growth of his agency, which employs more than 35,000 people, is not a cause for alarm. In July, the House of Representatives almost approved a law to constrain the NSA's authorities - the closest Congress has come to reining in the agency since the 9/11 attacks. That narrow defeat for surveillance opponents has set the stage for a Supreme Court ruling on whether metadata - the information Alexander has most often sought about Americans - should be afforded protection under the Fourth Amendment's prohibition against "unreasonable searches and seizures," which would make metadata harder for the government to acquire.

Alexander declined Foreign Policy's request for an interview, but in response to questions about his leadership, his respect for civil liberties, and the Snowden leaks, he provided a written statement.

"The missions of NSA and USCYBERCOM are conducted in a manner that is lawful, appropriate, and effective, and under the oversight of all three branches of the U.S. government," Alexander stated. "Our mission is to protect our people and defend the nation within the authorities granted by Congress, the courts and the president. There is an ongoing investigation into the damage sustained by our nation and our allies because of the recent unauthorized disclosure of classified material. Based on what we know to date, we believe these disclosures have caused significant and irreversible harm to the security of the nation."

In lieu of an interview about his career, Alexander's spokesperson recommended a laudatory profile about him that appeared in West Point magazine. It begins: "At key moments throughout its history, the United States has been fortunate to have the right leader -- someone with an ideal combination of rare talent and strong character -- rise to a position of great responsibility in public service. With General Keith B. Alexander ... Americans are again experiencing this auspicious state of affairs."

Lawmakers and the public are increasingly taking a different view. They are skeptical about what Alexander has been doing with all the data he's collecting - and why he's been willing to push the bounds of the law to get it. If he's going to preserve his empire, he'll have to mount the biggest charm offensive of his career. Fortunately for him, Alexander has spent as much time building a political base of power as a technological one.

Those who know Alexander say he is introspective, self-effacing, and even folksy. He's fond of corny jokes and puns and likes to play pool, golf, and Bejeweled Blitz, the addictive puzzle game, on which he says he routinely scores more than 1 million points.

Alexander is also as skilled a Washington knife fighter as they come. To get the NSA job, he allied himself with the Pentagon brass, most notably Donald Rumsfeld, who distrusted Hayden and thought he had been trying to buck the Pentagon's control of the NSA. Alexander also called on all the right committee members on Capitol Hill, the overseers and appropriators who hold the NSA's future in their hands.

When he was running the Army's Intelligence and Security Command, Alexander brought many of his future allies down to Fort Belvoir for a tour of his base of operations, a facility known as the Information Dominance Center. It had been designed by a Hollywood set designer to mimic the bridge of the starship Enterprise from Star Trek, complete with chrome panels, computer stations, a huge TV monitor on the forward wall, and doors that made a "whoosh" sound when they slid open and closed. Lawmakers and other important officials took turns sitting in a leather "captain's chair" in the center of the room and watched as Alexander, a lover of science-fiction movies, showed off his data tools on the big screen.

"Everybody wanted to sit in the chair at least once to pretend he was Jean-Luc Picard," says a retired officer in charge of VIP visits.

Alexander wowed members of Congress with his eye-popping command center. And he took time to sit with them in their offices and explain the intricacies of modern technology in simple, plain-spoken language. He demonstrated a command of the subject without intimidating those who had none.

"Alexander is 10 times the political general as David Petraeus," says the former administration official, comparing the NSA director to a man who was once considered a White House contender. "He could charm the paint off a wall."

Alexander has had to muster every ounce of that political savvy since the Snowden leaks started coming in June. In closed-door briefings, members of Congress have accused him of deceiving them about how much information he has been collecting on Americans. Even when lawmakers have screamed at him from across the table, Alexander has remained "unflappable," says a congressional staffer who has sat in on numerous private briefings since the Snowden leaks. Instead of screaming back, he reminds lawmakers about all the terrorism plots that the NSA has claimed to help foil.

"He is well aware that he will be criticized if there's another attack," the staffer says. "He has said many times, 'My job is to protect the American people. And I have to be perfect.'"

There's an implied threat in that statement. If Alexander doesn't get all the information he wants, he cannot do his job. "He never says it explicitly, but the message is, 'You don't want to be the one to make me miss,'" says the former administration official. "You don't want to be the one that denied me these capabilities before the next attack."

Alexander has a distinct advantage over most, if not all, intelligence chiefs in the government today: He actually understands the multibillion-dollar technical systems that he's running.

"When he would talk to our engineers, he would get down in the weeds as far as they were. And he'd understand what they were talking about," says a former NSA official. In that respect, he had a leg up on Hayden, who colleagues say is a good big-picture thinker but lacks the geek gene that Alexander was apparently born with.

"He looked at the technical aspects of the agency more so than any director I've known," says Richard "Dickie" George, who spent 41 years at the NSA and retired as the technical director of the Information Assurance Directorate. "I get the impression he would have been happy being one of those guys working down in the noise," George said, referring to the front-line technicians and analysts working to pluck signals out of the network.

Alexander, 61, has been a techno-spy since the beginning of his military career. After graduating from West Point in 1974, he went to West Germany, where he was initiated in the dark arts of signals intelligence. Alexander spent his time eavesdropping on military communications emanating from East Germany and Czechoslovakia. He was interested in the mechanics that supported this brand of espionage. He rose quickly through the ranks.

"It's rare to get a commander who understands technology," says a former Army officer who served with Alexander in 1995, when Alexander was in charge of the 525th Military Intelligence Brigade at Fort Bragg, North Carolina. "Even then he was into big data. You think of the wizards as the guys who are in their 20s." Alexander was 42 at the time.

At the turn of the century, Alexander took the big-data approach to counterterrorism. How well that method worked continues to be a matter of intense debate. Surely discrete interceptions of terrorists' phone calls and emails have helped disrupt plots and prevent attacks. But huge volumes of data don't always help catch potential plotters. Sometimes, the drive for more data just means capturing more ordinary people in the surveillance driftnet.

When he ran INSCOM and was horning in on the NSA's turf, Alexander was fond of building charts that showed how a suspected terrorist was connected to a much broader network of people via his communications or the contacts in his phone or email account.

"He had all these diagrams showing how this guy was connected to that guy and to that guy," says a former NSA official who heard Alexander give briefings on the floor of the Information Dominance Center. "Some of my colleagues and I were skeptical. Later, we had a chance to review the information. It turns out that all [that] those guys were connected to were pizza shops."

A retired military officer who worked with Alexander also describes a "massive network chart" that was purportedly about al Qaeda and its connections in Afghanistan. Upon closer examination, the retired officer says, "We found there was no data behind the links. No verifiable sources. We later found out that a quarter of the guys named on the chart had already been killed in Afghanistan."

Those network charts have become more massive now that Alexander is running the NSA. When analysts try to determine if a particular person is engaged in terrorist activity, they may look at the communications of people who are as many as three steps, or "hops," removed from the original target. This means that even when the NSA is focused on just one individual, the number of people who are being caught up in the agency's electronic nets could easily be in the tens of millions.

According to an internal audit, the agency's surveillance operations have been beset by human error and fooled by moving targets. After the NSA's legal authorities were expanded and the PRISM program was implemented, the agency inadvertently collected Americans' communications thousands of times each year, between 2008 and 2012, in violation of privacy rules and the law.

Yet the NSA still pursued a counterterrorism strategy that relies on ever-bigger data sets. Under Alexander's leadership, one of the agency's signature analysis tools was a digital graph that showed how hundreds, sometimes thousands, of people, places, and events were connected to each other. They were displayed as a tangle of dots and lines. Critics called it the BAG - for "big ass graph" - and said it produced very few useful leads. CIA officials in charge of tracking overseas terrorist cells were particularly unimpressed by it. "I don't need this," a senior CIA officer working on the agency's drone program once told an NSA analyst who showed up with a big, nebulous graph. "I just need you to tell me whose ass to put a Hellfire missile on."

Given his pedigree, it's unsurprising that Alexander is a devotee of big data. "It was taken as a given for him, as a career intelligence officer, that more information is better," says another retired military officer. "That was ingrained."

But Alexander was never alone in his obsession. An obscure civilian engineer named James Heath has been a constant companion for a significant portion of Alexander's career. More than any one person, Heath influenced how the general went about building an information empire.

Several former intelligence officials who worked with Heath described him as Alexander's "mad scientist." Another called him the NSA director's "evil genius." For years, Heath, a brilliant but abrasive technologist, has been in charge of making Alexander's most ambitious ideas a reality; many of the controversial data-mining tools that Alexander wanted to use against the NSA's raw intelligence were developed by Heath, for example. "He's smart, crazy, and dangerous. He'll push the technology to the limits to get it to do what he wants," says a former intelligence official.

Heath has followed Alexander from post to post, but he almost always stays in the shadows. Heath recently retired from government service as the senior science advisor to the NSA director - Alexander's personal tech guru. "The general really looked to him for advice," says George, the former technical director. "Jim didn't mind breaking some eggs to make an omelet. He couldn't do that on his own, but General Alexander could. They brought a sense of needing to get things done. They were a dynamic duo."

Precisely where Alexander met Heath is unclear. They have worked together since at least 1995, when Alexander commanded the 525th Military Intelligence Brigade and Heath was his scientific sidekick. "That's where Heath took his first runs at what he called 'data visualization,' which is now called 'big data,'" says a retired military intelligence officer. Heath was building tools that helped commanders on the field integrate information from different sensors - reconnaissance planes, satellites, signals intercepts - and "see" it on their screens. Later, Heath would work with tools that showed how words in a document or pages on the Internet were linked together, displaying those connections in the form of three-dimensional maps and graphs.

At the Information Dominance Center, Heath built a program called the "automatic ingestion manager." It was a search engine for massive sets of data, and in 1999, he started taking it for test runs on the Internet.

In one experiment, the retired officer says, the ingestion manager searched for all web pages linked to the website of the Defense Intelligence Agency (DIA). Those included every page on the DIA's site, and the tool scoured and copied them so aggressively that it was mistaken for a hostile cyberattack. The site's automated defenses kicked in and shut it down.

On another occasion, the searching tool landed on an anti-war website while searching for information about the conflict in Kosovo. "We immediately got a letter from the owner of the site wanting to know why was the military spying on him," the retired officer says. As far as he knows, the owner took no legal action against the Army, and the test run was stopped.

Those experiments with "bleeding-edge" technology, as the denizens of the Information Dominance Center liked to call it, shaped Heath and Alexander's approach to technology in spy craft. And when they ascended to the NSA in 2005, their influence was broad and profound. "These guys have propelled the intelligence community into big data," says the retired officer.

Heath was at Alexander's side for the expansion of Internet surveillance under the PRISM program. Colleagues say it fell largely to him to design technologies that tried to make sense of all the new information the NSA was gobbling up. But Heath had developed a reputation for building expensive systems that never really work as promised and then leaving them half-baked in order to follow Alexander on to some new mission.

"He moved fairly fast and loose with money and spent a lot of it," the retired officer says. "He doubled the size of the Information Dominance Center and then built another facility right next door to it. They didn't need it. It's just what Heath and Alexander wanted to do." The Information Operations Center, as it was called, was underused and spent too much money, says the retired officer. "It's a center in search of a customer."

Heath's reputation followed him to the NSA. In early 2010, weeks after a young al Qaeda terrorist with a bomb sewn into his underwear tried to bring down a U.S. airliner over Detroit on Christmas Day, the director of national intelligence, Dennis Blair, called for a new tool that would help the disparate intelligence agencies better connect the dots about terrorism plots. The NSA, the State Department, and the CIA each had possessed fragments of information about the so-called underwear bomber's intentions, but there had been no dependable mechanism for integrating them all and providing what one former national security official described as "a quick-reaction capability" so that U.S. security agencies would be warned about the bomber before he got on the plane.

Blair put the NSA in charge of building this new capability, and the task eventually fell to Heath. "It was a complete disaster," says the former national security official, who was briefed on the project. "Heath's approach was all based on signals intelligence [the kind the NSA routinely collects] rather than taking into account all the other data coming in from the CIA and other sources. That's typical of Heath. He's got a very narrow viewpoint to solve a problem."

Like other projects of Heath's, the former official says, this one was never fully implemented. As a result, the intelligence community still didn't have a way to stitch together clues from different databases in time to stop the next would-be bomber. Heath - and Alexander - moved on to the next big project.

"There's two ways of looking at these guys," the retired military officer says. "Two visionaries who took risks and pushed the intelligence community forward. Or as two guys who blew a monumental amount of money."

As immense as the NSA's mission has become -- patrolling the world's data fields in search of terrorists, spies, and computer hackers - it is merely one phase of Alexander's plan. The NSA's primary mission is to protect government systems and information. But under his leadership, the agency is also extending its reach into the private sector in unprecedented ways.

Toward the end of George W. Bush's administration, Alexander helped persuade Defense Department officials to set up a computer network defense project to prevent foreign intelligence agencies - mainly China's - from stealing weapons plans and other national secrets from government contractors' computers.

Under the Defense Industrial Base initiative, also known as the DIB, the NSA provides the companies with intelligence about the cyberthreats it's tracking. In return, the companies report back about what they see on their networks and share intelligence with each other.

Pentagon officials say the program has helped stop some cyber-espionage. But many corporate participants say Alexander's primary motive has not been to share what the NSA knows about hackers. It's to get intelligence from the companies - to make them the NSA's digital scouts. What is billed as an information-sharing arrangement has sometimes seemed more like a one-way street, leading straight to the NSA's headquarters at Fort Meade.

"We wanted companies to be able to share information with each other," says the former administration official, "to create a picture about the threats against them. The NSA wanted the picture."

After the DIB was up and running, Alexander proposed going further. "He wanted to create a wall around other sensitive institutions in America, to include financial institutions, and to install equipment to monitor their networks," says the former administration official. "He wanted this to be running in every Wall Street bank."

That aspect of the plan has never been fully implemented, largely due to legal concerns. If a company allowed the government to install monitoring equipment on its systems, a court could decide that the company was acting as an agent of the government. And if surveillance were conducted without a warrant or legitimate connection to an investigation, the company could be accused of violating the Fourth Amendment. Warrantless surveillance can be unconstitutional regardless of whether the NSA or Google or Goldman Sachs is doing it.

"That's a subtle point, and that subtlety was often lost on NSA," says the former administration official. "Alexander has ignored that Fourth Amendment concern."

The DIB experiment was a first step toward Alexander's taking more control over the country's cyberdefenses, and it was illustrative of his assertive approach to the problem. "He was always challenging us on the defensive side to be more aware and to try and find and counter the threat," says Tony Sager, who was the chief operating officer for the NSA's Information Assurance Directorate, which protects classified government information and computers. "He wanted to know, 'Who are the bad guys? How do we go after them?'"

While it's a given that the NSA cannot monitor the entire Internet on its own and that it needs intelligence from companies, Alexander has questioned whether companies have the capacity to protect themselves. "What we see is an increasing level of activity on the networks," he said recently at a security conference in Canada. "I am concerned that this is going to break a threshold where the private sector can no longer handle it and the government is going to have to step in."

Now, for the first time in Alexander's career, Congress and the general public are expressing deep misgivings about sharing information with the NSA or letting it install surveillance equipment. A Rasmussen poll of likely voters taken in June found that 68 percent believe it's likely the government is listening to their communications, despite repeated assurances from Alexander and President Barack Obama that the NSA is only collecting anonymous metadata about Americans' phone calls. In another Rasmussen poll, 57 percent of respondents said they think it's likely that the government will use NSA intelligence "to harass political opponents."

Some who know Alexander say he doesn't appreciate the depth of public mistrust and cynicism about the NSA's mission. "People in the intelligence community in general, and certainly Alexander, don't understand the strategic value of having a largely unified country and a long-term trust in the intelligence business," says a former intelligence official, who has worked with Alexander. Another adds, "There's a feeling within the NSA that they're all patriotic citizens interested in protecting privacy, but they lose sight of the fact that people don't trust the government."

Even Alexander's strongest critics don't doubt his good intentions. "He's not a nefarious guy," says the former administration official. "I really do feel like he believes he's doing this for the right reasons." Two of the retired military officers who have worked with him say Alexander was seared by the bombing of the USS Cole in 2000 and later the 9/11 attacks, a pair of major intelligence failures that occurred while he was serving in senior-level positions in military intelligence. They said he vowed to do all he could to prevent another attack that could take the lives of Americans and military service members.

But those who've worked closely with Alexander say he has become blinded by the power of technology. "He believes they have enough technical safeguards in place at the NSA to protect civil liberties and perform their mission," the former administration official says. "They do have a very robust capability - probably better than any other agency. But he doesn't get that this power can still be abused. Americans want introspection. Transparency is a good thing. He doesn't understand that. In his mind it's 'You should trust me, and in exchange, I give you protection.'"

On July 30 in Las Vegas, Alexander sat down for dinner with a group of civil liberties activists and Internet security researchers. He was in town to give a keynote address the next day at the Black Hat security conference. The mood at the table was chilly, according to people who were in attendance. In 2012, Alexander had won plaudits for his speech at Black Hat's sister conference, Def Con, in which he'd implored the assembled community of experts to join him in their mutual cause: protecting the Internet as a safe space for speech, communications, and commerce. Now, however, nearly two months after the first leaks from Snowden, the people around the table wondered whether they could still trust the NSA director.

His dinner companions questioned Alexander about the NSA's legal authority to conduct massive electronic surveillance. Two guests had recently written a New York Times op-ed calling the NSA's activities "criminal." Alexander was quick to debate the finer points of the law and defend his agency's programs - at least the ones that have been revealed - as closely monitored and focused solely on terrorists' information.

But he also tried to convince his audience that they should help keep the NSA's surveillance system running. In so many words, Alexander told them: The terrorists only have to succeed once to kill thousands of people. And if they do, all of the rules we have in place to protect people's privacy will go out the window.

Alexander cast himself as the ultimate defender of civil liberties, as a man who needs to spy on some people in order to protect everyone. He knows that in the wake of another major terrorist attack on U.S. soil, the NSA will be unleashed to find the perpetrators and stop the next assault. Random searches of metadata, broad surveillance of purely domestic communications, warrantless seizure of stored communications - presumably these and other extraordinary measures would be on the table. Alexander may not have spelled out just what the NSA would do after another homeland strike, but the message was clear: We don't want to find out.

Alexander was asking his dinner companions to trust him. But his credibility has been badly damaged. Alexander was heckled at his speech the next day at Black Hat. He had been slated to talk at Def Con too, but the organizers rescinded their invitation after the Snowden leaks. And even among Alexander's cohort, trust is flagging.

"You'll never find evidence that Keith sits in his office at lunch listening to tapes of U.S. conversations," says a former NSA official. "But I think he has a little bit of naiveté about this controversy. He thinks, 'What's the problem? I wouldn't abuse this power. Aren't we all honorable people?' People get into these insular worlds out there at NSA. I think Keith fits right in."

One of the retired military officers, who worked with Alexander on several big-data projects, said he was shaken by revelations that the agency is collecting all Americans' phone records and examining enormous amounts of Internet traffic. "I've not changed my opinion on the right balance between security versus privacy, but what the NSA is doing bothers me," he says. "It's the massive amount of information they're collecting. I know they're not listening to everyone's phone calls. No one has time for that. But speaking as an analyst who has used metadata, I do not sleep well at night knowing these guys can see everything. That trust has been lost."

e-max.it: your social media marketing partner
 
<< Start < Prev 3051 3052 3053 3054 3055 3056 3057 3058 3059 3060 Next > End >>

Page 3057 of 3432

THE NEW STREAMLINED RSN LOGIN PROCESS: Register once, then login and you are ready to comment. All you need is a Username and a Password of your choosing and you are free to comment whenever you like! Welcome to the Reader Supported News community.

RSNRSN