Leaked document reveals extent of contracting in Afghanistan

So you think this is what only the government and the military can do? Think again – my latest, in Salon:

And here’s the contractors leading the way on this $400 million contract:

Posted in Corporations, Intelligence, Military Industrial Complex, Spies for Hire | Leave a comment

Just as I thought: U.S. prevented ROK retaliation in 2010

Robert Gates’ new book on his time as Secretary of Defense makes an amazing claim that shows how close we were to war in Korea in 2010. It also describes how the United States stopped the South from launching an air strike at the time.

Well, I’m not surprised. And I will humbly take credit for being the only reporter to pick up on the U.S. actions, as it happened. My reporting was initially posted on Twitter during the 2010 confrontation between North and South Korea over a disputed maritime border, and later recounted in Salon. The Gates story shows I was right on the money – and, if I can say so myself, quite prescient.

Here’s the story, as reported today by AFP:

South Korea declined to comment Wednesday on revelations that the United States talked it down from launching a retaliatory air strike on North Korea in 2010. The claims were made in the newly published memoir of former US defense secretary Robert Gates.

The 2010 incident followed the North’s surprise shelling of a South Korean border island in November of that year. The attack triggered what Gates labelled a “very dangerous crisis”, with the South Korean government of then-president Lee Myung-Bak initially insisting on a robust military response.

Here’s the interesting part, with key points in bold:

South Korea’s original plans for retaliation were, we thought, disproportionately aggressive, involving both aircraft and artillery,” Gates wrote in his memoir.

“We were worried the exchanges could escalate dangerously,” he added. Over the next few days, Gates said he, US President Barack Obama and then secretary of state Hillary Clinton had numerous telephone calls with their South Korean counterparts in an effort to calm things down. “Ultimately, South Korea simply returned artillery fire on the location of the North Koreans’ batteries that had started the whole affair,” he said.

Now I didn’t report these exact facts, obviously. But I reported at the time it happened that the Pentagon had basically ordered the South Korean military to stand down. I gleaned this by carefully reading through the lines of an important DoD press conference on the day of the incident. Here’s how I recounted the story last year in Salon in an article about the most recent crisis with the DPRK:

At the height of the crisis, on Dec. 16, 2010, Gen. James Cartwright, the outspoken vice chairman of the Joint Chiefs of Staff, told reporters that he was deeply concerned about the situation escalating out of control. In words designed to be heard in Seoul, he made it clear that the Pentagon wanted to ratchet down the situation. If North Korea “misunderstood” or reacted “in a negative way” by firing back, he said, “that would start potentially a chain reaction of firing and counter-firing.  What you don’t want to have happen out of that is for the escalation to be — for us to lose control of the escalation.” Cartwright, and the Pentagon, had no desire to be drawn into a war that was not of their own making.

Few noticed the significance of these words – but I did. Four days later, I tweeted: “When Gen. Cartwright warned of a ‘chain reaction’ that would cause the United States to ‘lose control of the escalation,’ he was talking to SK -not NK.” The morning the military drills were scheduled to restart, many reporters and Korea-watchers on Twitter were predicting that a second Korean War was about to begin. Then, as the time came close for the first live-firing to commence, the South Korean military put out the word that the exercises would be “delayed” because of weather. They were – and then were scrapped altogether. Cartwright’s warning apparently worked. The crisis ended.

Every once in a while it’s nice to know you were were right as a reporter and outdid the rest of the pack. Readers of my blog and Twitter feed know that I’m a big critic of the standard U.S. reporting on North Korea, and I believe my stories from 2010 underscore the validity of that critique. In recent days I had a conversation with a prominent national security reporter who says he was stung by my comments a few years ago on his snarky and totally unprofessional stories on North Korea. Hopefully this post will convince him that I was serious. Snark is not journalism. Ever.

Posted in Archives, Korea | Leave a comment

Stay tuned

To my readers: Apologies for the skimpy posting this year. I’m working on a major piece about an intelligence contractor nobody’s ever heard of and can see the light at the end of the tunnel. Keep checking back, or follow my posts on Twitter. But no worries: I’ll be back! And meanwhile, WORLD BOOGIE IS COMING!

Posted in Archives | Leave a comment

November 22, 1963 – The View from Tokyo

I was 12 when JFK was shot. At the time, I was living in Tokyo, where I’d arrived as a kid during the U.S. Occupation. Early on the morning of November 23, 1963, my father woke me and my siblings up with his transistor radio broadcasting the news from the U.S. Army’s Far East Network: Kennedy had been shot; he was dead. “Assassinated? Assassinated?” my mother kept asking. It seemed impossible, and still does all these years later. Here’s how we read about in the Japanese newspapers.

Some of the details here are fascinating, particularly how much was known about Lee Harvey Oswald in the first 24 hours. There’s even signs of the hidden world we’d later learn so much about (see that ad on the upper left for CAT? That’s Civil Air Transport, the proprietary airline of the CIA). The assassination was a huge event in Japan in part because JFK’s cabinet was en route at the time to Tokyo, where they were to open talks with Japan’s rightist government. In fact, Kennedy was scheduled to deliver a live address to the Japanese people that night, and many had stayed up all night to hear it – only to learn the tragic news. For me it seems almost poetic justice that JFK’s daughter, Caroline, just arrived in Tokyo as the U.S. ambassador. I wish her well.

In any case, those shots in Dallas opened my eyes to a darker America and confirmed to me the trepidations I was feeling after a trip to Vietnam I’d made a few months earlier with my family. That’s when I first learned how bad that war was becoming, and after Kennedy it kept escalating and getting worse and things seemed to spin out of control. It was just the beginning of an incredible decade of strife, horror and wonder that helped shape my life. Perhaps above all, it made me love newspapers and how they could keep us all informed. Maybe I owe my interest in journalism to those dark days.

Posted in Archives, Asia | Leave a comment

Bill Binney on the WSJ’s NSA-telecom revelations

There was only one person I wanted to contact when I read the Wall Street Journal’s astonishing report that the NSA has built a surveillance system capable of spying on 75 percent of all U.S. Internet traffic: Bill Binney.

Binney is the NSA whistleblower who spent nearly 40 years at the agency developing ways to track and analyze foreign intelligence flowing over the global telecom system. That was before he left in disgust over the NSA’s unconstitutional, post-9/11 warrantless wiretapping and its corrupt relationship with contractors. “Got lots of thoughts,” Binney began, after I emailed him the Journal article this morning and asked him for his take on the story.

Here’s key point of the WSJ piece:

The NSA, in conjunction with telecommunications companies, has built a system that can reach deep into the U.S. Internet backbone and cover 75% of traffic in the country, including not only metadata but the content of online communications.

To begin with, Binney said, that underscores everything he’s been saying all along about his former agency and its alliance with the private telecommunications industry. “They copy and store everything that the ‘Upstream’ system gets for them.” he said. What we see in the report, he added, “is the San Francisco AT&T NSA room with Narus, which copies everything on the line.”

Binney was referring to the infamous “secret room” at AT&T discovered by the technician-turned-whistleblower Mark Klein. He confirmed in 2003 what many suspected at the time: that NSA had basically set up a pipe to the U.S. Internet system and was downloading – using equipment made by Narus, now owned by Boeing – everything it could get its hands on for later analysis. One Narus device on a fiber optic line, Binney once told me, could download 1.2 million one thousand-character emails every second, or over over 100 billion emails a day. Imagine how many messages and phone calls one of those could suck up when placed by NSA at one of hundreds of telecom nodes around the country run by the likes of AT&T and Verizon (see Binney’s list of potential nodes below).

In recent weeks, the Guardian and the Washington Post have been reporting on top-secret documents leaked by Edward Snowden that largely confirm these claims. They’ve shown that the NSA downloads and analyzes huge streams of domestic intelligence obtained through court orders to telecom companies and, through software programs such as PRISM, indiscriminately collect communications records on people in the United States, the European Union, Brazil, Latin America, South Korea, Japan, India and many other countries.

It’s a privatized global dragnet – I’ve wrote about it in detail in SPIES FOR HIRE and many articles over the past five years (for the telecom-NSA angle, see in particular this piece I wrote for The Nation in 2006, “Watching What You Say: How are AT&T, Sprint, MCI and other telecommunications giants cooperating with the National Security Agency’s warrantless surveillance program?”)

The Journal report, written by the crack team of Siobhan Gorman and Jennifer Valentino-Devries, significantly advanced the Guardian and Post stories by getting former intelligence officials and former and current executives with key telecom companies to talk. The NSA, Gorman and her partner wrote, has “built a surveillance network that covers more Americans’ Internet communications than officials have publicly disclosed.” Here’s their key points:

The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say…

The systems operate like this: The NSA asks telecom companies to send it various streams of Internet traffic it believes most likely to contain foreign intelligence. This is the first cut of the data.

These requests don’t ask for all Internet traffic. Rather, they focus on certain areas of interest, according to a person familiar with the legal process. “It’s still a large amount of data, but not everything in the world,” this person says.

The second cut is done by NSA. It briefly copies the traffic and decides which communications to keep based on what it calls “strong selectors”—say, an email address, or a large block of computer addresses that correspond to an organization it is interested in. In making these decisions, the NSA can look at content of communications as well as information about who is sending the data…

The surveillance system is built on relationships with telecommunications carriers that together cover about 75% of U.S. Internet communications. They must hand over what the NSA asks for under orders from the secret Foreign Intelligence Surveillance Court. The firms search Internet traffic based on the NSA’s criteria, current and former officials say…

In our email conversation, Binney cautioned that the court restrictions on the NSA, as limited as they are, don’t necessarily affect other agencies. The NSA, he said, doesn’t consider information collected “until someone at NSA looks at it. But that doesn’t mean that that applies to the FBI or the CIA.”

He referred me, as he has done before in discussing government surveillance, to the March 2011 testimony before the Senate Judiciary Committee of former FBI Director Robert Mueller. In that testimony, Mueller said the following in response to a question from Senator Herb Kohl about how the FBI may have missed certain information about Major Nidal Malik Hasan, the shooter at Fort Hood:

What we found as a result of the Hasan incident was that there were gaps that we had to fill. Immediately afterwards, we looked at our procedures. We found that we could do much better — a better job in information sharing with DoD [the Department of Defense, which includes the NSA]. And consequently, today elements of the Department of Defense serve on our National Joint Terrorism Task Force…

We put into place technological improvements relating to the capabilities of a database to pull together past emails as – and future ones as they come in, so that it does not require an individualized search, so putting together a technological improvement to enhance our capabilities. Lastly, we…have not just one office that is reviewing, say, communications traffic but have a redundancy of review at headquarters as well to make certain that we don’t miss something.

“Remember Mueller’s testimony, where he said with one query he can get all past and future emails as they come in,” Binney reminded me today. “Unless an NSA person looked at a U.S. email, it would not be a violation of any rule. And here again, that doesn’t count FBI or CIA or [Britain’s] GCHQ or any other of the ‘Five Eyes’ partners [which also include Australia, New Zealand and Canada] using XKeyScore to query data in the NSA storage, either for upstream collection, or data added by PRISM.”

He added that this “also applies to DHS, with their word lists for searches. And if they are using their word lists to pull data out of upstream or PRISM or any other program, it is for sure they are getting a match on just about everything.”

In other words, the NSA is downloading and storing 75 percent of all U.S. domestic Internet traffic. And analysts – many of them contractors – at the FBI, CIA, DHS and other counter-terrorism agencies get to root around in these communications for anything they deem of interest. But basically, they’re downloading it all, storing it (in Utah, for example) and then going back and analyzing it all, content included (not just metadata), and “sharing” that intelligence throughout our massive national security state.

Binney first made these arguments to me in 2012, and I was astounded. Almost afraid to know the answer, I asked him for assurance: “So you’re saying that all calls are being stored for later? We really do have a surveillance state, don’t we?” And I’ll never forget what he said in response.

My point is it’s better than anything than the KGB, the Stasi, or the Gestapo and SS ever had. Even the Chinese can’t do anything to match this, although they’re trying to get there I know. The Libyans did it. They bought some equipment from a French company to monitor all the calls in their country. Same thing: monitoring their population. The Chinese want to do it, the Syrians, all of them. This is what totalitarian states want to do. When you set up this kind of thing you are setting up the foundation for converting to a totalitarian state…People over there [at NSA] are afraid to talk about, and I don’t blame them. They have kids in college. My kids are gone. I don’t have anything to lose here. But I have a lot to stand up for. I don’t have any fear.

Today, Binney continues to speak out, without fear. His last point on the Journal report was the most intriguing.

In their Journal story, Gorman and Valentino-Devries wrote that, even before 2001, the NSA set up special Internet intercept programs “through arrangements with foreign Internet providers,” and “still has such arrangements in many countries, particularly in the Middle East and Europe.” Then, after the 9/11 attacks, “these intercept systems were expanded to include key Internet networks within the U.S. through partnerships with U.S. Internet backbone providers.” And most amazingly, “for the 2002 Winter Olympics in Salt Lake City, the FBI and NSA “arranged with Qwest Communications International Inc. to use intercept equipment for a period of less than six months around the time of the event. It monitored the content of all email and text communications in the Salt Lake City area.”

All of this is very familiar territory to Binney. Remember his last title at NSA: “Technical Director of the World Geopolitical and Military Analysis Reporting Group.” According to his bio at the Government Accountability Project, Binney “mentored some 6000 technical analysts that eavesdropped on foreign nations, collecting private phone calls and emails for NSA databases.” So he knew the technical, fiber-optic side of this territory better than anybody else at NSA. And probably still does.

In fact, Binney told me, he’d recently been studying the global fiber optic networks mentioned in the article. If he was working at the NSA, he said, he would identify “major points” in the lines “where he’d put Narus or Verint devices, or similar collection equipment to acquire most of the WWW [Internet] data. I have identified these convergent points in fiber optic lines.”

So imagine, if you will, the NSA’s global listening network, brought to you by AT&T, Verizon, BT, and Deutsche Telekom (AKA T-Mobile), as well as all those contractors (Booz Allen Hamilton, SAIC, etc.) who supply the software and analytical services. What follows, and posted on the map at the top of this story, are all the cities where your conversations – email, phone, everything – are being monitored, in Binney’s opinion. Folks, I think we have reached new levels in surveillance and privatization.

Bill Binney’s list of the most likely surveillance nodes:

AT&T — See a map of its backbone domestic network here.

Seattle, San Francisco, San Jose, Los Angeles, San Diego, Denver, Phoenix Kansas City, Dallas, Salt Lake City, Chicago, St. Louis, Nashville, Cleveland Atlanta, Orlando, Miami, Boston, New York, Newark, Washington Toronto, Amsterdam, Frankfurt, Paris, London Bangalore, Tokyo, Shanghai, Hong Kong, Singapore, Sydney


Seattle, San Francisco, San Jose, Los Angeles, San Diego, Portland Las Vegas, Phoenix, Salt Lake City, Denver, Dallas, Houston, Kansas City St. Louis, Chicago, Atlanta, Detroit, Orlando, Miami, Charlotte, Richmond Washington, Philadelphia, New York, Boston London, Paris, Amsterdam, Tokyo, Hong Kong, Singapore

BT Group (British Telecom — North American network map)

Stockholm, Frankfurt, London 1, London 2. Seattle, Sunnyvale, Burbank, Los Angles, Salt Lake, Denver, Phoenix, Tucson, Houston, Chicago, Kansas City, Atlanta, Tampa, Washington Newark, New York, Miami Buenos Aires, Rio De Janeiro, Santiago, Lima, Mexico City, Bogota Tokyo, Hong Kong, Singapore, Sydney, Mumbai

Deutsche Telekom (which owns T-Mobilenetwork map)

Stockholm, Copenhagen, London, Paris, Marseille, Amsterdam, Hamburg, Hanover, Frankfurt, Nuremberg, Zurich, Vienna New York, Philadelphia, Dallas, Chicago, Los Angeles, San Francisco, Tokyo

UPDATE I: A federal judge has rebuked the NSA for “repeatedly misleading the court that oversees its surveillance on domestic soil, including a program that is collecting tens of thousands of domestic e-mails and other Internet communications of Americans each year.”

UPDATE II: Everything is fine: the NSA said this (and more) about the WSJ report:

The NSA does not sift through and have unfettered access to 75% of the United States’ online communications.

OK, then. But whatever you do, don’t ever believe this guy.

Former NSA Director Michael J. Hayden: Whenever he speaks, keep this image in mind.

Posted in Corporations, Intelligence, Military Industrial Complex, Spies for Hire | Leave a comment