Intelligence DA - UTNIF 2015

Embed Size (px)

Citation preview

  • 8/16/2019 Intelligence DA - UTNIF 2015

    1/231

    ***NEGATIVE***

  • 8/16/2019 Intelligence DA - UTNIF 2015

    2/231

  • 8/16/2019 Intelligence DA - UTNIF 2015

    3/231

    Drones

  • 8/16/2019 Intelligence DA - UTNIF 2015

    4/231

    Drones Funding DA: CBP

  • 8/16/2019 Intelligence DA - UTNIF 2015

    5/231

    Shell

    Drones are a funding bonanza for he CBPBarr! "#"$ "%  http://www.ciponline.org/research/entry/numbers-game-government-

    agencies-falsely-report-meaningless-deportationom Barry, senior analyst at the Center forInternational Policy in ashington, !C, directs the institute"s #ransBorder Pro$ect. Barrycofounded the International %elations Center&'()(-*++)&where he helped establish itsoreign Policy in ocus, mericas Policy, lobal ood eighbor, and %ight eb programs.!01 is building its drone 2eet at a rapid pace  despite its continuing inability todemonstrate their purported cost-e3ectiveness. #he unarmed Predator and uardians 4themaritime variant5 cost about 6*+ million each. 7et !01 has little to show for its 89spending spree other than stacs of sei;ed mari$uana and several thousand immigrants whocrossed the border without visas.

    side from a &oninuing funding bonanza for border se&uri!'  to pursue its

    drone strategy !01 is also counting on the ederal viation dministration to continueauthori;ing the use of more domestic airspace by the unarmed drones. nd seems setto comply, having approved

  • 8/16/2019 Intelligence DA - UTNIF 2015

    6/231

    Tha 0re&(s he 1S e&ono)!2er(ilo0s(e %#"%#"3 http://www.dhs.gov/blog/*+'=/+*/'*/budget-impacts-border-security Commissioner %. il GerliowseBudget Impacts on Border 1ecurity

    CBP has made great strides in maing it easier and safer for lawful travelers andcargo to cross our borders. e@ve invested in paperless technologies and partnered withprivate industry to roll out improvements lie automated passport control, and we@veimplemented trusted traveler programs to help ease wait times at our ports of entry. e@vegiven our Border Patrol agents and our ir and Farine personnel better e?uipment andresources to ensure that our borders are secure.

    e have committed to do more. But we can@t because of he un&erain budge

    &li)ae4  or eMample:

      Improving our increasingly obsolete nonintrusive inspection and detectiontechnology is on hold.  #his technology detects illegal goods and materials and reduces

    the time it taes to conduct to these inspections, moving trade and travel faster.This is .ial o he 14S4 e&ono)!4  

    8pgrading and replacing remote and mobile video surveillance systems in the %io rande9alley in #eMas is on hold. #hese technologies are vital to improving CBP@s situationalawareness, oEcer and agent safety, and detection capabilities.  Improving the operational systems and analytic tools that support our ational #argetingCenter is on hold. #he #C supports !01 e3orts to identify and deter transnational criminalorgani;ations and these operational systems help identify terrorists and criminalsattempting to cross our borders.

    Lnhancing CBP@s ability to analy;e geospatial intelligence is on hold. #his capability isessential for identifying traEc patterns along the border as well as for prioriti;ing BorderPatrol and ir and Farine deployments.

      Beginning the procurement process to NM outdated and ineEcient Border Patrol facilities ison hold. #his would allow CBP to address a portion of its deferred maintenance baclog,ensuring the safety and well-being of CBP sta3 and supporting operations in the Neld.

    I have + years of eMperience in career law enforcement. shutdown would be a needlesshardship for our nearly >+,+++ dedicated and professional CBP employees, their families,and for the nation. early all of them O more than =

  • 8/16/2019 Intelligence DA - UTNIF 2015

    7/231

    1niueness ; No.e)ber#De&e)ber "+ arrett F. ra3 is a senior sta3 writer for Politico

    Faga;ine. 0e was the editor of ashingtonian maga;ine for Nve years and is author of #he #hreat FatriM: #he BI at ar. %ead more:http://www.politico.com/maga;ine/story/*+'/'+/border-patrol-the-green-monster-''***+.htmliM;;+,+++ total personnel&everything from desert agents on horsebac to insect inspectors atairports&but also operates a 2eet of some *=+ planes, helicopters and unmanned aerial

    vehicles lie the Predator drones the military sent to Ira? and fghanistan, maing CBP boththe largest law enforcement air force in the world and e?uivalent roughly to the si;e ofBra;il@s entire combat air force.

     #he Border Patrol wing of this vast apparatus has eMperienced particularly dramaticgrowth: By the time the Bush administration left ashington, the Nercely independentagency&part police force, part occupying army, part frontier cavalry&had gone from beinga comparatively tiny, undermanned bacwater of the Austice !epartment to a *',+++-personarm of the largest federal law enforcement agency in the country.

    %ead more: http://www.politico.com/maga;ine/story/*+'/'+/border-patrol-the-green-monster-''***+.htmliM;;

  • 8/16/2019 Intelligence DA - UTNIF 2015

    8/231

    ?in(s ; Drones ge funding for he border ,arol

    Drones (e! funding )agne for border ,arolNBC Ne0s @#"#"+  http://www.nbcnews.com/storyline/immigration-border-crisis/eyes-

    sy-are-pricey-border-patrol-drones-worth-money-n'=(>http://www.nbcnews.com/storyline/immigration-border-crisis/eyes-sy-are-pricey-border-patrol-drones-worth-money-n'=(>0igh above the 8.1.-FeMican border, Predator drones 2y in relative ?uiet. #hey are theBorder Patrol"s sentinels in the sy as thousands of immigrants 2ood over the invisible linedividing the two countries and a political Nrestorm over what to do about the crisis rages inashington. #he bird"s eye view a3orded by drones doesn"t come cheap. #he hite 0ousewants an additional 6 T Border Parol 0ans he )one! and i 0ans he drones' regory

    Fceal, a law professor and drone eMpert at Pepperdine 8niversity, told BC ews. T#his is

    the ind of crisis where, if you are Border Patrol, you sei;e the opportunity to get morefunding from Congress.U

  • 8/16/2019 Intelligence DA - UTNIF 2015

    9/231

    Inernal ?in( ; Drones Cos e>e&i.e

    1AV ighs are less e,ensi.e han )anned air&rafsFichael C.

  • 8/16/2019 Intelligence DA - UTNIF 2015

    10/231

  • 8/16/2019 Intelligence DA - UTNIF 2015

    11/231

    Drones sa.e )one! ; and a> Hus shifs o e,ensi.e e&hPando "#"#"+ https://pando.com/*+'/+'/

  • 8/16/2019 Intelligence DA - UTNIF 2015

    12/231

    Srea)ling 2e! o E&ono)!

    CBP funding &ru&ial o (ee, he 1S e&ono)! runningNTE1 "3 http://www.nteu.org/8nionDEce/legconference/*+'=/CBPunding.pdf  tional

     #reasury Lmployees 8nion, #L8 is widely nown as a smart, tough organi;ation, well-respected for its nowledge of federal employee issues. nd for its determination to worwith federal agencies, with Congress, and in the courts to protect, promote and eMpand therights of those it represents. 1ince '(

  • 8/16/2019 Intelligence DA - UTNIF 2015

    13/231

    Drone ?oan DA

  • 8/16/2019 Intelligence DA - UTNIF 2015

    14/231

    Shell

    CBP drones loaned ou o )uli,le agen&iesCushing "##" #im, sta3 writer for #ech !irt

    https://www.techdirt.com/articles/*+'

  • 8/16/2019 Intelligence DA - UTNIF 2015

    15/231

    other natural resources for the 81 eological 1urvey, LF, the Bureau of andFanagement, the 81 orest 1ervice, the !epartment of atural %esources, and theational Dceanic and tmospheric dministration.

    ThaJs (e! o )ainain o&eansSelbe #"K#"+ http://voices.nationalgeographic.com/*+'/+

  • 8/16/2019 Intelligence DA - UTNIF 2015

    16/231

  • 8/16/2019 Intelligence DA - UTNIF 2015

    17/231

     #he oceans clearly dominate the world spatially, encompassing around )* per cent of thesurface of the planet.

     #he vast eMtent of the oceans only tells part of the story, however.

     #he oceans are critical to the global en.iron)en and hu)an sur.i.al  in

    numerous ways O they are vital to the global nutrient cycling, represent a eyrepository and supporter of biological diversity on a world scale and play a fundamentalrole in driving the global atmospheric system.

    Coastal and marine environments support and sustain ey habitats and livingresources, notably Nsheries and a?uaculture. #hese resources continue to provide acritical source of food for hundreds of )illions of people.

     #he Nshing industry supports the livelihoods of an estimated =+ million people worldwide and Nsheries supply more than '= per cent of the animal protein consumed by .*billion people globally.

    Foreover, the oceans are an increasing source of energy resources and underpin theglobal economy through sea borne trade.

    Dverall, it has been estimated that >' per cent of global P is sourced from the oceans andcoastal areas within '++m of the sea.

    Coasts and marine ;ones also provide essential, but often not fully acnowledged,ecosystem services.

    Coasts and marine ;ones are therefore of critical importance across scales, from theglobal to the regional, national and sub-national coastal community levels. t the same timethe oceans also remain largely 4(= per cent5 uneMplored.

  • 8/16/2019 Intelligence DA - UTNIF 2015

    18/231

    Drones ?oaned 7u

    CBP drones loaned ou/ol.eron ""#%"#"%  Aoe . olverton, II, A.!. is a correspondent for #he ew

    merican and travels fre?uently nationwide speaing on topics of nulliNcation, the !,and the surveillance state. 0e can be reached at $wolverton\thenewamerican.com. Aoe .olverton, II, A.!. is a correspondent for #he ew merican and travels fre?uentlynationwide speaing on topics of nulliNcation, the !, and the surveillance state.http://www.thenewamerican.com/usnews/item/'

  • 8/16/2019 Intelligence DA - UTNIF 2015

    19/231

    Drones (% o&ean )onioring

    Drones &ru&ial for o&ean )onioringBa&(Counr! Voi&es ""#%"#" opinion and commentary blog

    https://baccountryvoices.wordpress.com/*+'

  • 8/16/2019 Intelligence DA - UTNIF 2015

    20/231

    A> resri&s shing drones

    Pri.a&! &on&erns s!)ie shing .iolaion in.esigaion6o)ans @#K#" http://www.Neldandstream.com/blogs/Neld-notes/*+'

  • 8/16/2019 Intelligence DA - UTNIF 2015

    21/231

    is&

  • 8/16/2019 Intelligence DA - UTNIF 2015

    22/231

    2% i))igraion refor)

    Drones &ru&ial o ,ass i))igraion refor)Tre.izo $#"$#" Perla #revi;o ri;ona !aily 1tar +http://tucson.com/business/drones-

    ey-tool-to-border-security/articleS(*('e=)b-bab=-=d)V-b)(b-dc)f+'aac3=.htmlmong the limitations, the internal reports revealed that Border Patrol agents often are notavailable to respond because of rugged terrain or other assignments, the Center forInvestigative %eporting found.

    lles said the internal report was misused and doesn"t re2ect apprehensions in the ;onewhere the radar was used. CBP is getting two of the 6= million 9!L% systems andplans to deploy at least one in ri;ona in about a year. t the recent Congressionalhearing he told FcCain the goal was to have siM radars.

    hatever shape comprehensive immigration reform taes in the end, Isacson said,it"s not liely to pass without re?uiring the use of more drones.

    HPutting more drones and technology on the border is an easy way to convincemore conservative members of Congress to vote for this,H he said. HIt feels it"sinevitable.H

  • 8/16/2019 Intelligence DA - UTNIF 2015

    23/231

    Inel Good

  • 8/16/2019 Intelligence DA - UTNIF 2015

    24/231

    NSA Good DA

  • 8/16/2019 Intelligence DA - UTNIF 2015

    25/231

    "NC Shell

    6e&rui)en sable' bu on he brin( ; di, &rushes NSA &a,abiliiesBru)el #"#"3 http://www.npr.org/*+'=/+

  • 8/16/2019 Intelligence DA - UTNIF 2015

    26/231

    Calls for resrain an( NSA )orale6eed "%#K#" http://bgr.com/*+'/FF#+*/++'ors . !espite that, she said, there is still a strong interest in public service amongfederal $ob seeers.] 1he said DPF is looing at how to maintain the current number ofabout * million federal worers while adding more in critical areas. ] DPF is woring withagencies on a number of ways to boost morale and improve employee hiring and retention,including enhanced training for management and greater engagement between agencyleaders and employees.

    Personnel uali! in inel &ru&ial o address all global hreas ; hisou0eighs s,e&i& s&enariosEllison " #o introduce our speaer today is dmiral !avid Lllison. 0e@s a

  • 8/16/2019 Intelligence DA - UTNIF 2015

    27/231

    boundless regional instability , deNne a future of eMtreme uncertainty. #his is anational security environment that demands an intelligen ce professional withuni?ue characteristics. Protecting and defending our national security interestsre?uires intelligence professionals who are adaptive, agile, and forward thining ,ever endeavoring to anticipate the future, anticipating the future rat her thanreacting to the future. It is no longer enough to focus attention on one area to the

    eMclusion of others. Intelligence professionals no longer have the luMury of slowlyand deliberately refocusing their attentions, and no longer can they succeed as anintelligence professional with $ust understanding the past and the present.  #oday@sintelligence professional must be able to anticipate future events. Preparing intelligenceprofessionals capable of meeting such an enormous challenge demands tha t we place themin an environment that fosters creativity and innovation and one in which eMploration,collaboration, and integration are commonplace.

    Inelligen&e &a,a&i! (e! o so, &!bererroris) ; onl! ,roa&i.ea,,roa&h sol.es6udner "

    Fartin %udner 4*+':

  • 8/16/2019 Intelligence DA - UTNIF 2015

    28/231

    resilience. #he information sharing that already taes place with and among criticalinfrastructure staeholders, as and when appropriate, can be reinforced by promotinge3ective public R private partnership and colla boration in cyber-security. Intelligenceservices could provide signiNcant support for such initiatives by virtue of their access tothreat information, technical and analytic eMpertise, and investigative eMperience.

     #he challenges confronting cyber-security cannot be dealt with solely at a technical-

    operational level but re?u ire a more inclusive approach at the national level. #heessential need is to protect an information-based society as a whole rather than merely theprotection of cyber-based infrastructures. part from stimulating investment in defensivetechnologies, this approach would entail a proactive cyber-security initiative on the part ofintelligence services to prevent attacs rather than merely react to them. V reateremphasis must also be directed at combating cyber eMploitations which target governmentand business secrets . orestalling cyber-espionage and the theft of intellectual propertyand sensitive information is be&o)ing a (e! obHe&i.e of 14S4 &!ber sraeg!, and isliewise emerging as a core responsibility of the security and int elligence communities ofmost other countries as well. %etired dmiral Fie FcConnell, the former !irector of 8.1.ational Intelligence, has discussed the uni?u e capabilities of 8.1. intelligenceagencies which could be enlisted to help protect merican companies from cyber-espionage and attac. V= #he ey ?uestion is how that capability can be harnessed andmade available to the private sector so that critical infrastructure can be better protected.overnment L3ects at Prevention lthough the 8.1. is developing more robust and proactivecyber-security capabilities, the main priority, ac cording to FcConnell, should be to protectmerica@s critical infrastructure, such as the Nnancial sector, the electric power grid,and transportat ion from cyber-attac, and to stop the theft of intellectual property throughcyber-espionage #he 8nited 1tates@s Cyberspace 1trategic Plan aims to improve cybersecurity resiliency with technology that enables secure software developmentX to introduceeconomic incentives lie maret-based , legal, regulatory, or institutionalinterventions,aswellasstrategie s to help security professionals mae infringements morecostly and diEcult for attacers. V> L3orts by the merican government to enact legislationauthori;ing a more robust and proactive cyber-security plan involving the IntelligenceCommunity and private sector staeholders failed to gain 1enate approval and lapsed by

    mid-*+'*. But, shortly before the ovember *+'* presidential election, President BaracDbama issued the classiNed Presidential Policy !irective *+ setting out guidelinesauthori;ing proactive measures to thwart cyber attacs on the 8.1. government andprivate computer networs. V)

    Ba&(doors in )iliar! &o))uni&aions are ,ri)e arges for &!bererroris) 0hi&h &an rigger nu&lear &oni&4Friz K, ormer Captain of the 8.1. rmy, Aason, Auly, 0acing uclear Command andControl, www.icnnd.org/!ocuments/AasonSrit;S0acingSC*.doc

     #he 81 uses the two-man rule to achieve a higher level of security in nuclear a3airs. 8nderthis rule two authori;ed personnel must be present and in agreement during critical stages

    of nuclear command and control. #he President must $ointly issue a launch order with the1ecretary of !efenseX Finuteman missile operators must agree that the launch order isvalidX and on a submarine, both the commanding oEcer and eMecutive oEcer must agreethat the order to launch is valid. In the 81, in order to eMecute a nuclear launch, anLmergency ction Fessage 4LF5 is needed. #his is a preformatted message that directsnuclear forces to eMecute a speciNc attac. #he contents of an LF change daily and consistof a compleM code read by a human voice. %egular monitoring by shortwave listeners andvideos posted to 7ou#ube provide insight into how these wor. #hese are issued from theFCC, or in the event of destruction, from the designated hierarchy of command and control

    http://www.icnnd.org/Documents/Jason_Fritz_Hacking_NC2.dochttp://www.icnnd.org/Documents/Jason_Fritz_Hacking_NC2.doc

  • 8/16/2019 Intelligence DA - UTNIF 2015

    29/231

    centres. Dnce a command centre has conNrmed the LF, using the two-man rule, thePermissive ction in 4P5 codes are entered to arm the weapons and the message is sentout. #hese messages are sent in digital format via the secure utomatic !igital etwor andthen relayed to aircraft via single-sideband radio transmitters of the 0igh re?uency lobalCommunications 1ystem, and, at least in the past, sent to nuclear capable submarines via9ery ow re?uency 4reenemeier *++V, 0ardisty '(V=5. #he technical details of 9

    submarine communication methods can be found online, including PC-based 9 reception.1ome reports have noted a Pentagon review, which showed a potential Telectronic bacdoor into the 81 avy@s system for broadcasting nuclear launch orders to #ridentsubmarinesU 4Peterson *++5. #he investigation showed that cyber terrorists could potentially inNltrate this networ and insert false orders for launch.  #he investigationled to Telaborate new instructions for validating launch ordersU 4Blair *++

  • 8/16/2019 Intelligence DA - UTNIF 2015

    30/231

    access to these systems as they are most liely on a closed networ. 0owever, if they aretransmitting wirelessly, that may provide an entry point, and information gained through theinternet may reveal the details, such as passwords and software, for gaining entranceto the closed networ. If access was obtained, a false alarm could be followed bysomething lie a !!o1 attac, so the operators believe an attac may be imminent,yet they can no longer verify it. #his could add pressure to the decision maing

    process, and if coordinated precisely, could appear as a Nrst round LFP burst. #errorist groups could also attempt to launch a non-nuclear missile, such as the oneused by orway, in an attempt to fool the system. #he number of states who possesssuch technology is far greater than the number of states who possess nuclear weapons.Dbtaining them would be considerably easier, especially when enhancingoperations through computer networ operations. Combining traditional terroristmethods with cyber techni?ues opens opportunities neither could accomplish ontheir own. or eMample, radar stations might be more vulnerable to a computer attac,while satellites are more vulnerable to $amming from a laser beam, thus together they denydual phenomenology. Fapping communications networs through cyberreconnaissance may eMpose weanesses, and automated scanning devices createdby more eMperienced hacers can be readily found on the internet.  Intercepting or

    spooNng communications is a highly compleM science. #hese systems are designed toprotect against the world@s most powerful and well funded militaries. 7et, there arerecurring ga3es, and the very nature of asymmetric warfare is to bypasscompleMities by Nnding simple loopholes. or eMample, commercially available softwarefor voice-morphing could be used to capture voice commands within the command andcontrol structure, cut these sound bytes into phonemes, and splice it bac together in orderto issue false voice commands 4ndersen *++', Chapter '>5. 1pooNng could also be usedto escalate a volatile situation in the hopes of starting a nuclear war. TIn Aune '((V, agroup of international hacers calling themselves Filw+rm haced the web site of India@sBhabha tomic %esearch Center 4B%C5 and put up a spoofed web page showing amushroom cloud and the teMt TIf a nuclear war does start, you will be the Nrst to screamU4!enning '(((5. 0acer web-page defacements lie these are often derided by critics ofcyber terrorism as simply being a nuisance which causes no signiNcant harm. 0owever, web-page defacements are becoming more common, and they point towards alarmingpossibilities in subversion. !uring the *++) cyber attacs against Lstonia, a counterfeitletter of apology from Prime Finister ndrus nsip was planted on his political party website4rant *++)5. #his too place amid the confusion of mass !!o1 attacs, real world protests,and accusations between governments.

    Turns all i),a&sL&urren &a,abiliies are (e! o foreign ,oli&!de&isions2u,&i(as "4Garolis, ssistant Professor at oughborough 8niversity for International%elations, T#he Importance of Intelligence to International 1ecurityU, D9 V *+'

  • 8/16/2019 Intelligence DA - UTNIF 2015

    31/231

    information. hen they meet, the contest is uneven: M/hen inelligen&e &lashes

    0ih ,oli&! ,referen&e' inelligen&e loses 0hen infor)aion runs u,

    agains ,o0er' infor)aion is he &asual!4  Indeed, when information is countered

    by perception or, more accurately, conception, evidence is discounted@ 4ry W 0ochstein,'((, p. *+5. #hus, in practice intelligence information will be $udged upon its ability

    to support a chosen course of action which has been formed even before the searchfor information, in this way creating a reversed nowledge/power relationship. nadditional variable at the centre of security intelligence is secrecy, since: ^ithout secrets itis not intelligence@ 4arner, *++(, p. (5. 1ecrecy is important not $ust as barrier tosurveillance O it permeates aspects of the process itself. 1ome actions mae no sense unlesscarried out with an element of ^surprise@, such as arrests 40erman, *++', p. =5. 0owever,secrecy also raises ey issues of legality, morality and accountability.

    urthermore, intelligence is not only a foundation for state policies O i has al0a!s

    had a signi&an role in infor)ing and eer&ising a&ions ha are no

    0idel! a,,re&iaed and' indeed' )a! a&uall! brea&h do)esi& or

    inernaional la04  Fostly debated is ^covert action@ or ^special political action@ aspractised by the CI. Intelligence agencies not only engage in rather passive activity ofgathering intelligence on world a3airs, but also try to intervene covertly to in2uence events.1ome authors see covert action as essential to intelligence 4%ussel, *++), p. *V'5, whilesome characteri;ed it as an additional activity, somewhat separate from the main business

    of intelligence. OInelligen&e is infor)aion and infor)aion gahering' no

    doing hings o ,eo,le no=one ges hur b! i' a leas no dire&l!4 So)e

    agen&ies do indeed &arr! ou &o.er a&ion' 0hi&h &onfuses he ehi&al

    issues' bu his a se,arable and subsidiar! fun&ion  40erman, *++, p. 'V+5.

    lso, inelligen&e )ehods ha.e been a,,lied in order o disru, he

    a&i.iies of &ri)inal organizaions ha are in.ol.ed in drugs' ar)s or

    ,eo,le ra-&(ing . 1ince (/'', due to perceived terrorist threats, even moreattention has been given to this development by the convergence of security, policeand military intelligence. 0owever, could it be said that the modern transformation ofintelligence by the application of highly sophisticated surveillance and informationtechnology has overshadowed the fact that, at its core, it remains an intellectual processQFost intelligence e3ort since (/'' has been put into the investigation and prevention ofterrorist attacs. Fany analytical techni?ues deploy sophisticated software facilitating theanalysis of relational data. 0owever, the cleverness of the software cannot provide a^technological NM@: analysis remains at heart an intellectual eMercise based onreasoning 4%ussel, *++), p. *'

  • 8/16/2019 Intelligence DA - UTNIF 2015

    32/231

    %NC 1ST 6EAD

    The o.erall resilien&e of inelligen&e anal!sis ru),s s,e&i& e.en,redi&ion/irz " !r. Aames A. irt; is !ean of the 1chool of International raduate 1tudies and former Chairman of the!epartment of ational 1ecurity 3airs at the aval Postgraduate 1chool, Fonterey, California. former Chairmanof the Intelligence 1tudies 1ection of the International 1tudies ssociation, he was President of the International1ecurity and rms Control 1ection of the merican Political 1cience ssociation. graduate of the 8niversity of!elaware, with a Ph.!. from Columb ia 8niversity, ew 7or City, !r. irt; is the author and co-edito r of severalboos on intelligence and arms control Aames A. irt; 4*+':*, !DI: '+.'+V+/+VV=+>+).*+'ered earl! enough so ha ,oli&!)a(ers and o,eraors &ana(e e>e&i.e a&ion to prevent the occurrence of some nefarious act or attac. S,e&i&e.en ,redi&ion is indeed he MMhol! grailJJ of inelligen&e anal!sis, and analystssometimes do manage to warn of speciNc events before they unfold. In '(* navalintelligence analysts predicted the Aapanese attac on Fidway #he Intelligence Communitydetected 1oviet e3orts to place medium range missiles in Cuba before these actions becamea fait accompli . ' Bu for heorei&al' bureau&rai&' and &ognii.e reasons' s,e&i&e.en ,redi&ion is eraordinaril! di-&ul o a&hie.e in practice. Su&&ess ends obe he e&e,ion' no he nor). Indications and 0arning inelligen&e o>ers a,o0erful and i),oran alernai.e o a fo&us on s,e&i& e.e n ,redi&ion thatmight in fact be better suited to contemporary threat s posed by non-state actors or rogue

    regimes.

  • 8/16/2019 Intelligence DA - UTNIF 2015

    33/231

    1niueness ; orale

    Ne0 leadershi, and 7ba)a allo0 ne0 &onden&e in NSASroebel 3#"K#"+ %euters sta3 http://www.reuters.com/article/*+'/+=/'(/us-usa-

    security-rogers-id81B%LI+*A*+'+='(%ogers faces big challenges. Forale among the 1"s tens of thousands of employees hastaen a hit, and %ogers said many people in the agency found it both uncomfortableand perpleMing to be under public scrutiny.] %etired ir orce eneral Fichael 0ayden, aformer director of both the 1 and CI, said it was instructive that Dbama chose %ogers,and veteran 1 civilian %ichard edgett to be his deputy, at a time when thepresident was under enormous pressure to conduct a house cleaning of the agency .]It was, 0ayden said, a Hvote of conNdenceH in the 1 and its sta3 , and a sign that,despite some reforms, Dbama plans no sharp cutbac in the agency"s aggressiveglobal surveillance.] H#hey were the obvious choices before 1nowden, and they were thechoices after 1nowden. This is a ,o0erful )essage o send o he 0or(for&e' H

    0ayden said.] second former senior 8.1. intelligence oEcial who nows %ogerspredicted he would be a Hmuch more inclusiveH leader than his predecessor , thesometimes-combative rmy eneral Geith leMander, who led the agency for more thaneight years.

    Bera!al b! Congress and he Presiden &rushes SA )orale' 0hi&hi),a& &a,aibliies

  • 8/16/2019 Intelligence DA - UTNIF 2015

    34/231

    edge at times. t an ugust press conference, the president praised the men and womenof the intelligence community as patriots and then, understandably and correctly,characteri;ed those who have raised their voices against various 1 programs as patriots,too.] air enough, in some general rhetorical sense. But to the people at ort Feade, thepresident@s words $ust e?uated his own worforce with those who routinely accusethat same worforce of felonies. #hat doesn@t go down easily.] Perhaps what is

    missing here is a personal touch. hen President Dbama released CI interrogationmemos in *++(, an event that !avid Ignatius e?uated to a car bomb going o3 in thedriveway, the president visited angley. visit to ort Feade today, to than andsupport an embattled and routinely traduced worforce, would be almostsacramental in its character, delivering both sign and substance of the president@scommitment.] It would also set a precedent. In the siMty-one-year history of the 1, no!emocratic president has ever visited the agency.] #here are a lot of riss involved in the

    controversy that Ldward 1nowden started. #he greatest of all, perhaps, is he i),a&

    of an uninfor)ed blizzard of a&&usaions on he )orale of our inelligen&e

    0or(ers . #he last thing the nation needs is for this community to ride out of town with theran Fillers of today still standing.

  • 8/16/2019 Intelligence DA - UTNIF 2015

    35/231

    1niueness ; 6e&ruiing

    6e&rui)en sable' bu on he brin( ; di, &rushes NSA &a,abiliiesBru)el #"#"3 http://www.npr.org/*+'=/+

  • 8/16/2019 Intelligence DA - UTNIF 2015

    36/231

    1ince the late '((+s, the 1 has been running recruiting programs out ofuniversities across the country, with minimal pushbac from students oradministrations. #his success is unparalleled, and it@s mostly due to the steady,reliable stream of talent that 2ows from universities into the agency. 8nlie the!epartment of !efense, the 1 has hardly any vacancies O about 'Z of its positions

    at any given time. #hat@s because the agency puts a premium on recruiting: it has',=++ employees involved, at least part time, with the employment process. Fost of these recruiting e3orts tae place on university campuses, and V+Z of the 1@shires are for entry-level positions. But students at do;ens of schools are currently maingthe connections needed to begin a discussion about the 1@s hiring practices. #heserecruitment programs are now viewed by some as controversial, given recent revelationsabout the 1, including but not limited to their awesome capacities for spying on students.

     #here are two main ways to recruit on campuses: through the Centers of cademicLMcellence designation 4CL5, and the CyperCorps: 1cholarship for 1ervice.

    NSA re&ruiing is ne

    ess)er )/'V/"+  http://www.networworld.com/article/**)'/security+/hcers-wanted-report-nsa-not-having-trouble-Nling-cybersecurity-$obs.html Lllen Fessmer is asenior editor at etwor orld. 1he covers news and technology trends related toinformation security.

    In spite of the headlines about 1 secrets leaed by former 1 contractor Ldward1nowden, he NSA see)s o nd no shorage of ,eo,le 0aning o 0or(

    here4  %! says 1, Tthe country@s largest and leading employer of cybersecurityprofessionals,U is doing well in hiring, with fewer than 'Z of their positions goingvacant for any length of time. mention is made in the %! report that some federalagencies thin they are being outbid for cybersecurity personnel by the 1, BI and!epartment of 0omeland 1ecurity.] T1 also has a very low turnover rate 4losing no

    more to voluntary ?uits than to retirements5,U the %! report states. TDne reason isthat it pays attention to senior technical development programs to ensure that employeesstay current and engaged.U] %! says 1 does devote a lot of time and energy to thetas of Nnding the cybersecurity professionals it needs, having a total of ',=++ involvingin the recruiting and employment process, with outreach into many universities, especiallythose with a Treputation for educating people who go into the military.U] Lighty percent of1 cybersecurity hires are entry level, with most having bachelor@s degrees. 1also has a Tvery intensive schooling system, lasting as long as three years forsome,U the report notes, adding, Tor the most part, our interview suggests that the 1maes rather than buys cybersecurity professionals.U #he 1 today absorbs a third ofall 1cholarship for 1ervice graduates, the report says, partly because it has the most $obopenings and Talso because it has a reputation for hiring the best hacers.U

    NSA role )odel in re&ruiing e&h alen2o,, +#"+#"3  http://federalnewsradio.com/technology/*+'=/+/want-to-grab-cyber-talent-loo-to-better-pay/ %eporter / nchor http://www.federalnewsradio.com and '=++Fin ashington.

    gencies loo to 1] 1ome agencies are wrestling with the handcu3s and maingprogress, despite some bruises. #he ational 1ecurity gency has had an easier

  • 8/16/2019 Intelligence DA - UTNIF 2015

    37/231

    time than some others in attracting new cybersecurity graduates. 8nlie other civilianagencies, students are more liely to now what they@ll be doing in cyber at the 1and they@re more liely to build Tstreet credibility ,U as Barg Bulman puts it, which canhelp them later in their careers.] #he 1 also is among a growing number of agenciesthat can o3er higher salaries to $unior cybersecurity professionals, thans toCongress. 1tarting salaries are around 6>=,+++

    NSA is &rushing i a re&ruiing?ibi&(i Sen! Polla( "+ http://www.rand.org/content/dam/rand/pubs/researchSreports/%%++/%%

  • 8/16/2019 Intelligence DA - UTNIF 2015

    38/231

    1niueness ; 6e&ruiing ; orale

    orale high enough o )ainain re&ruiingCheung "+ writer, associated press

    http://www.neMtgov.com/cybersecurity/*+'/+V/snowden-e3ect/('=))/

    onetheless, $ob seeers appear undeterred. ] CI spoesman Christopher hite saysmore than V+,+++ people applied for $obs with the agency in *+'

  • 8/16/2019 Intelligence DA - UTNIF 2015

    39/231

    1niueness ; 6e&ruiing ; AT Sno0den

    NSA has )ainained re&ruiing des,ie Sno0den &risis6euers "%#"+#" http://www.cnbc.com/*+'

  • 8/16/2019 Intelligence DA - UTNIF 2015

    40/231

    the eMperience to have that on their resume.U] !eborah Page, a 9irginia-based eMecutivesearch consultant with the FcCormic roup who speciali;es in information security $obsearches, says, Te aren@t seeing any challenges at the momentU with recruitingtalent in the wae of 1nowden, Tor at least I@m not.U

    Sno0den didnJ i),a& re&ruiing&Garr! "#"+#" Brendan Fcarry is an award-winning reporter and editor forFilitary.com. 0e writes breaing news and feature stories on a range of topics, from thePentago http://defensetech.org/*+'

  • 8/16/2019 Intelligence DA - UTNIF 2015

    41/231

    1niueness ; 6e&ruiing ; 6e,uaion

    NSA )a(es ha&(ers if he! (ee, u, re&ruiing?ibi&(i Sen! Polla( "+ http://www.rand.org/content/dam/rand/pubs/researchSreports/%%++/%%

  • 8/16/2019 Intelligence DA - UTNIF 2015

    42/231

    current government recruiting restrictions. Geep in mind O many can attest that thefederal government@s hiring process is less than streamlined. It isn@t easy to Nnd the rightcandidate who is willing to tae a lower salary, has the necessary certiNcations, can get aclearance, and is willing to $ump through any federal government hiring hoops.

    !01 is asing Congress to relaM federal salary re?uirements for cybersecurity hires,

    a move the ational 1ecurity gency 415 has done that has increased itsattractiveness to cyber talent. bump in salary could go a long way in helping?ualiNed candidates feel the value of public service.

    NSA 6EP1TATI7N susains iVeron $##"+ !an 9erton is ed1coop"s Lditorial !irector. veteran technology

     $ournalist with *+ years of eMperience covering the federal governmenthttp://fedscoop.com/real-cybersecurity-worforce-challenge-hiring-best-best-hacers

    ess than ' percent of 1"s positions are vacant at any given time, according to the%and study. nd very few cybersecurity professionals ?uit their $obs at 1. ccordingto the %and researchers, 1"s success is partly the result of the amount of e3ort itputs into employee development and training.] HDur interview suggests that he NSA

    )a(es raher han bu!s &!berse&uri! ,rofessionals ,H the report states. nd

    while V+ percent of 1"s new hires are entry-level employees with bachelor"sdegrees, the agency has one of the most intensive training programs in the world.or some, that training lasts for up to three years.]  here 1cholarship or 1ervicegraduates go to wor. here 1cholarship or 1ervice graduates go to wor.] HDnly oneorgani;ation can be the most prestigious place to wor, and for this line ofwor...1 is hard to beat,H the report states. #he agency, according to the %and study,consistently absorbs one-third of all 1cholarship for 1ervice raduates because of itsreputation for hiring the best hacers.] 1 also has V+ people dedicated to recruitment,with another

  • 8/16/2019 Intelligence DA - UTNIF 2015

    43/231

    1niueness ; 6e&ruiing ; Te&h 2e!

    Shin! e&h (e! o NSA re&ruiing

    /streamlining-cybersecurity-hiring-process/  Aillian 0amilton has wored in a variety of ProgramFanagement roles for multiple ederal overnment contractors. 1he has helped managepro$ects in training and I#. 1he received her Bachelors degree in Business with an emphasisin Fareting from Penn 1tate 8niversity and her FB from the 8niversity of PhoeniM.

    hat@s the best way to attract cyber talentQ Foney and mission. hen you lac inone, mae sure you@re ade?uately selling the other.

    It@s time to get real with the cybersecurity recruits in the defense industry .cnowledge the pay gap. or to close the gap, but don@t pretend that it doesn@t eMist.0elp potential candidates understand their value to the mission of the organi;ation and letthem now they are appreciated. 1peaing of the mission O tell them about it as much

    as is appropriately possible. 1upporting national security is a big deal. #he eyrecruiting strategy for the 1 is letting recruits now he!Jll be 0or(ing on he

    &uing edge of e&hnolog! ; 0ih o,,oruniies ha are lierall!

    i),ossible in he &o))er&ial se&or .

    %ecruiters can also go a long way in eeping top talent interested by streamliningthe hiring process. Consider how your hiring practices could be scaring o3 the best talent.0ow crucial are your ?uestionnairesQ hat is your application processQ Fae things as easyas possible for your most in-demand Nelds. hen it comes to in-demand positions, liecybersecurity, it is time to scrutini;e all the elements of the procedure. Dne way to competeis to be smarter and more eEcient in the hiring process.

    Te&hni&al &uing edge (e! o (ee, u, NSA re&ruiingIT/orld #%#""  http://www.itworld.com/article/*)+*

  • 8/16/2019 Intelligence DA - UTNIF 2015

    44/231

  • 8/16/2019 Intelligence DA - UTNIF 2015

    45/231

    1niueness ; 6eenion

    NSA reaining o, alen a high raes7o +#%#"3 reg Dtto 4\gregotto5. #ech reporter \fedscoop. Covering the intersection

    of technology and government. http://fedscoop.com/nsa-mie-rogers-worforce-challenges

    %etaining the 1"s worforce have been a challenge that %ogers said he has thoughta lot about since becoming 1 director and head of 8.1. Cyber Command one year ago.hile the 1 competes for top talent, he has spent time studying the di3erences betweenthe public and private sector worforce. In taling with people in 1ilicon 9alley, %ogerslearned that people generally bounce from company to company, staying for two toNve years.] %ogers said his model is completely di3erent: 1 has a (>.) percentworforce retention rate for the past year.] H #hat is a great testament to the cultureand the mission,H %ogers said. He are motivated to no end, we have great respect foreach other and we are dedicated to the idea of how we defend the nation in a lawful,accountable framewor.H

  • 8/16/2019 Intelligence DA - UTNIF 2015

    46/231

    1niueness ; 7ba)a Defended NSA

    7ba)a si&(ing 0ih he NSANa(ashi)a "%#"#"  https://www.washingtonpost.com/world/national-security/white-

    house-to-preserve-controversial-policy-on-nsa-cyber-command-leadership/*+'+

  • 8/16/2019 Intelligence DA - UTNIF 2015

    47/231

     #he Dbama administration has decided to preserve a controversial arrangementunder which a single military oEcial is permitted to direct both the ational 1ecuritygency and the military@s cyberwarfare command despite an eMternal review panel@srecommendation against doing so, according to 8.1. oEcials.] #he decision by PresidentDbama comes amid signs that the hite 0ouse is not inclined to place signiNcant newrestraints on the 1@s activities and favors maintaining an agency program that collects

    data on virtually all phone calls of mericans, although it is liely to impose additionalprivacy-protection measures.] 1ome oEcials, including top 8.1. intelligence oEcials, hadargued that the 1 and Cyber Command should be placed under separateleadership to ensure greater accountability and avoid an undue concentration of power.]Tollowing a thorough interagency review, the administration has decided that eepingthe positions of 1 !irector and Cyber Command commander together  as one, dual-hatted position is the most e3ective approach to accomplishing both agencies@ missions,Uhite 0ouse spoeswoman Caitlin 0ayden said in an e-mail to #he ashington Post. ] #heannouncement comes as an eMternal panel appointed by Dbama to review 8.1. surveillancepolicies submitted its report on riday. ccording to some 8.1. oEcials, the panel waseMpected to recommend that the 1-Cyber Command leadership be split and that theagency@s phone program be modiNed by having the phone companies or a third party holdthe records, not the 1.] #he Nve-member panel made more than + recommendations,which the hite 0ouse is free to re$ect or modify as it conducts its own review of 1surveillance. #hat review is eMpected to be completed in Aanuary.] T#he big picture isthere@s not going to be that much JadditionalK constraintU by the hite 0ouse, said a8.1. oEcial, speaing on the condition of anonymity to discuss internal deliberations.T #hey@re really not hurting Jthe 1K that much.U

    7ba)a su&&essfull! defended he NSA/ies "#%"#"+ http://www.newrepublic.com/article/''>*V/obamas-nsa-speech-wasnt-apology-it-was-clever-defense  #his story was cross-posted at awfare. Ben$amin ittes iseditor in chief of awfare and a 1enior ellow in overnance 1tudies at the Brooings

    Institution.President Dbama@s speech on riday and its accompanying  Presidential Policy !irective4P!!-*V5 cover a lot of ground, announce a bunch of reforms, announce plans anddirection for more, and ic still others over to Congress. #he speech contained asurprisingly Nerce defense of 1, one that some of the agency@s critics appear notto have noticed. %eactions to the speech have been curiously favorable fromdiverse ?uarters. I described the speech as a big 0in for he inelligen&e

    &o))uni! , as did colleagues at this Brooings event and in this awfare Podcast. #heew 7or #imes opened its editorial on the speech by declaring:] In the days after Ldward1nowden revealed that the 8nited 1tates government was collecting vast amounts ofmericans@ data&phone records and other personal information&in the name of nationalsecurity, President Dbama defended the data sweep and said the merican peopleshould feel comfortable with its collection. Dn riday, after seven months of increasinglyuncomfortable revelations and growing public outcry, Fr. Dbama gave a speech that wasin large part an admission that he had been wrong.

    http://www.newrepublic.com/article/116284/obamas-nsa-speech-wasnt-apology-it-was-clever-defensehttp://www.newrepublic.com/article/116284/obamas-nsa-speech-wasnt-apology-it-was-clever-defensehttp://www.newrepublic.com/article/116284/obamas-nsa-speech-wasnt-apology-it-was-clever-defensehttp://www.newrepublic.com/article/116284/obamas-nsa-speech-wasnt-apology-it-was-clever-defense

  • 8/16/2019 Intelligence DA - UTNIF 2015

    48/231

    1niueness ; AT )eadaa resri&ions

    Curren resri&ions oo s)all o i),a& )oraleBa(er and Sanger 3#"#"3 http://www.nytimes.com/*+'=/+=/+*/us/politics/giving-in-a-

    little-on-national-security-agency-data-collection.htmlQSrR+  ew 7or #imes

    or years after the attacs of 1ept. '', *++', even as the ational 1ecurity gencyNercely defended its secret e3orts to sweep up domestic telephone data, there weredoubters inside the agency who considered the program wildly eMpensive with fewsuccesses to show for it.] 1o as Congress moves to tae the government out of thebusiness of indiscriminate bul collection of domestic calling data, the agency ishardly resisting. ormer intelligence oEcials, in fact, said riday that the idea to store thedata with telecommunications companies rather than the government was suggested toPresident Dbama in *+'< by en. Geith B. leMander, then the .1.. director, who saw thechange as a way for the president to respond to criticism without losing programsthe .1.. deemed more vital.]  #he limits on bul collection are the centerpiece of

    legislation now advancing in the 0ouse that would be the Nrst signiNcant response to the spying revelations by Ldward A. 1nowden, a former .1.. contractor. In addition tonew restrictions on domestic data sweeps, the plan would re?uire moretransparency and introduce ostensibly independent voices into secret intelligencecourt proceedings.] But as one recently departed senior intelligence oEcial put it on riday,T #his is hardly ma$or change.U]  #he legislation would still leave an eMpansivesurveillance apparatus capable of tracing vast ?uantities of data. 1ome of the mostsweeping programs disclosed by Fr. 1nowden, particularly those focused on internationalcommunications, would remain una3ected. #he .1.. could continue e3orts to breaprivate encryption systems, and information about mericans could still be swept up iforiginating overseas.

    http://www.nytimes.com/2015/05/02/us/politics/giving-in-a-little-on-national-security-agency-data-collection.html?_r=0http://www.nytimes.com/2015/05/02/us/politics/giving-in-a-little-on-national-security-agency-data-collection.html?_r=0http://www.nytimes.com/2015/05/02/us/politics/giving-in-a-little-on-national-security-agency-data-collection.html?_r=0http://www.nytimes.com/2015/05/02/us/politics/giving-in-a-little-on-national-security-agency-data-collection.html?_r=0

  • 8/16/2019 Intelligence DA - UTNIF 2015

    49/231

    1niueness ; AT O7ba)a Visi N1

    NSA doesnJ &are abu 7ba)a .isisFriedersdorf "%#"#" 4Conor riedersdorf is a sta3 writer at #he tlantic, where he

    focuses on politics and national a3airs. 0e lives in 9enice, California, and is the foundingeditor of #he Best of Aournalism, a newsletter devoted to eMceptional nonNction. T!o 7ou #rust #he ashington Post"s 1ources on Forale at the 1QU,http://www.theatlantic.com/politics/archive/*+'

  • 8/16/2019 Intelligence DA - UTNIF 2015

    50/231

    1niueness ; AT oonlighing

    oonlighing i),ro.es he NSA hrough &or,orae ,arnershi,s

    6ogers "#%#"+ 1 Chiefhttps://www.nsa.gov/publicSinfo/speechesStestimonies/*Voct'Sdirnsa.shtml

    _: 7es. #here have been some reports recently about employees of the 1 woringpart time in the private sector, some former employees going on to the privatesector. 0ow is that a3ecting morale within the 1 and is there any concern about, younow, that particular relationship with the private sector and classiNed information sort of

     $umping from within the borders of the 1Q] F%. %DL%1: irst, we have a formal set ofprocesses that must be applied when individuals are going to do something inaddition to their 1 duties. e review that consistently over time and whencircumstances change. hat was acceptable at one point, we@ll say, hey, that -- that@s notacceptable anymore, the circumstances have changed the nature of the relationshipbetween the outside entity and us is di3erent. 1o we do that on a recurring basis.] or some,it@s as simple, for eMample, as someone with a language bacground says, hey, loo, I wantto use my language outside 1 in a contractor basis because I thin it@ll increase my sills.nd so sometimes we@ll say, yes, that maes sense. 1ometimes we won@t. In terms of, younow, the 2ow of partnerships and information bac and forth, I have been very public aboutsaying, for the ational 1ecurity gency, I would lie us to create a model wheremembers of our worforce don@t necessarily spend

  • 8/16/2019 Intelligence DA - UTNIF 2015

    51/231

    ?in( ; 6esri&ions (ill )orale

    Calls for resrain an( NSA )orale6eed "%#K#" http://bgr.com/*+'

  • 8/16/2019 Intelligence DA - UTNIF 2015

    52/231

    1en. Aon #ester, !-Font., said at a Fay > hearing of the 1enate subcommittee on theLEciency and L3ectiveness of ederal Programs and the ederal orforce that manypoliticians are using federal worers as a punching bag during budget negotiations .]Tederal worers didn@t cause our budget problems and they should not be ascapegoat to score political points,U #ester said.] A. !avid CoM, president of the mericanederation of overnment Lmployees, said federal employees have been the target of

    attacs for more than four years that have re?uired them to contribute more to theirpensions and endure furloughs.] T #hey are sic and tired of simultaneously beingCongress@ and the administration@s punching bag and #F,U he said.] #he morale of!efense !epartment employees was improving until the worforce was hit byfurloughs last year, according to Paige 0inle-Bowles, deputy assistant secretary ofdefense for civilian personnel policy at !o!.

  • 8/16/2019 Intelligence DA - UTNIF 2015

    53/231

    ?in( ; 6esri&ions (ill re&ruiing

    Curailing ,rogra)s de,resses NSA re&rui)enFarr %"+ 4Christina, 1ta3 writer of venturebeat, #echnology and health correspondent #homson %euters `

    *+' O *+'=, 1, struggling to recruit top talent, turns to 1ilicon 9alley,http://www.reuters.com/article/*+'/+V/+)/tech-nsa-id81*+_!'7C*+'+V+)5nne euberger, specialassistant to 1 !irector Fichael %ogers, said this wee she feared the agency would no longer beable to recruit top technologists, since  former contractor Ldward 1nowden blew the lid o3the eMtent of its spying activities.] t a seminar organi;ed by the non-proNt ongow oundation in 1anrancisco, she eMtended a plea to an audience replete with tech worers to consider acareer in government, or at least apply for a fellowship.] 1ilicon 9alley has a reputation fordisdain of government regulation, and many of its largest players from oogle to #witter have been outspoen in

    their criticism of the spy agency in the wae of 1nowden"s revelations.] 1enior 1 oEcials havedownplayed the repercussions of the revelations previously.] But euberger said that, inthe long run, the agency might struggle to eep pace with technology.] !escribing herrole as an intermediary between the public and technology sectors, euberger promised to HrebuildtrustH in the wae of what she called Hmedia leas. H] #he 1 spent months Hsoul-searchingH andnow plans to engage with the media. It is already in tals to eMtend privacy protections abroad and has started

    taing meetings, she added. #he 1 is eager to mae versions of previously classiNeddocuments available to the public.] ith distrust, Tour own worforce becomesdemorali;ed. Dur programs are curtailed,U she said. He need to Nnd a balance ofeMperience and new ideas.U

  • 8/16/2019 Intelligence DA - UTNIF 2015

    54/231

    ?in( ; 7.ersigh (ills )orale

    7.ersigh (ills agen&! )oraleBrennan "#"3#"3  https://www.brennancenter.org/blog/how-NM-congressional-oversight

    9ictoria Bassetti Brennan Center Contributor 9ictoria Bassetti is a Brennan Centercontributor. 1he is the author of TLlectoral !ysfunction: 1urvival Fanual for merican9oters,U published by #he ew Press in *+'*.elcome to *'st century congressional oversight, an unpredictable blend of partisanhacery, prosaic toil, and rare but eMtraordinary wor 4the 1enate Intelligence Committee@storture report5.] s a new Congress dawns, it@s time to gear up for two years ofTinvestigatory-palloo;a,U as one former agency head appointed by President Dbama calledit. It@s inevitable, as we near a presidential election with a partisan split between thelegislative and eMecutive branches. It@s also highly doubtful that much of thisforthcoming congressional oversight will be productive.] Congress far too oftenengages in oversight that is TlacadaisicalU and caught up in the Tgotcha cycle,U theformer agency head added.] H1ome hearings are worthwhile and uncover useful information,but others amount to an all-day eMercise in congressional preening,H said %on eich, aformer !DA oEcial and now dean of the 8niversity of Baltimore 1chool of aw. orse, a fairamount of it is Hmere harassment,H he noted. 1o much so that another agency chief onceturned to one of his aides during an oversight hearing and ased, Thy would anyone taethis $ob againQU] Dne former high-raning !epartment of Austice oEcial said that during histime at the agency *+ percent of the oversight was e3ectiveX + percent was a washX and +percent was political nonsense.] #he failure of Congress to conduct comprehensive ande3ective oversight is shameful. ith federal government spending at more than *<percent of the gross domestic product and employing more than *.= million people, whodoesn@t thin that someone needs to mind the storeQ TIndependent review is alwaysvaluable,U said eich, who guided !DA through the ast and urious hearings.] orse, thetype of oversight Congress conducts today is often counterproductive. It wastes valuabletime, leads to minimal improvements, and inhibits good government. former

    !epartment of Lnergy oEcial told me that the agency@s sta3  was ama;ed at the Tintensityof all the investigationsU in the Nrst four years of the Dbama dministration. #hey  feltbeleaguered, even as they continued to do their $obs. Bu i hur )orale and

    )ade ,eo,le e&essi.el! sensii.e abou inernal &o))uni&aions .

  • 8/16/2019 Intelligence DA - UTNIF 2015

    55/231

    ?in( ; Ba&(doors

    Ba&(door ,rogra)s (e! for he NSA?e.! "#"#"+  http://www.wired.com/*+'/+'/nsa-surveillance/  In *++>, my ired proNle

    of publisher and Internet guru #im D@%eilly was included in TBest of #echnology riting*++>,U an anthology of tech writing. I accepted the assignment to edit the neMt collectionand in all *++), the digitalculture imprint of the 8niversity of Fichigan published T#he Bestof #echnology riting *++).U I grew up in Philadelphia, where my heart was broen by thePhillies 4now I@m ind of stunned at their recent success, which borders on dynastic and issurely a sign of the apocalypse5, and went to Central 0igh 1chool and #emple 8niversitythere. #hen I got an F.. in literature at Penn 1tate. 4I was chosen to receive the Nrst!istinguished lumni ward from the Lnglish !epartment there, something no one in 0appy9alley would have predicted during my time there.5 ow I live in ew 7or City and westernFassachusetts with my wife, Pulit;er Pri;e-winning $ournalist and author #eresa CarpenterOwhose recent boo is ew 7or !iaries '>+(-*++(O and our college-age son.

     #he dual mission of the 1 generates cognitive dissonance. %ight on its home page,

    the 1 says its core missions are Tto protect 8.1. national security systems and to produceforeign signals intelligence information.U #he oEcials repeatedly claimed they pursue bothresponsibilities with e?ual vigor. #here@s a built-in con2ict here: If 8.1. industries distributestrong encryption throughout the world, it should mae the 1@s signals-gathering

     $ob much harder. 7et the 1 says it welcomes encryption. 4#he oEcials even impliedthat the tension between the two missions winds up maing both e3orts more robust.5onetheless, the 1nowden leas indicate that the 1 has engaged in numerous e3ortsthat tamper with the security of merican products. #he oEcials resisted thischaracteri;ation. hy, they ased, would they compromise security of products they usethemselves, lie indows, Cisco routers, or the encryption standards they allegedlycompromisedQ] #hey believe their intelligence gathering is palatable because it@scontrolled by laws, regulations, and internal oversight. ooing at the world throughtheir eyes, there is no privacy threat in collecting massive amounts of information & ifaccess to that information is rigidly controlled and minimali;ed. #his includes e3orts toeMcise data 4about mericans, mainly5 that should have not been collected in the Nrstplace. #he 1 feels that if people new about these controls, they@d be DG with thecollection. #his argument reminded me of something I learned from my approved 1source in the '((+s. #he oEcial who concocted the Clipper Chip scheme had a vision whereprivate citi;ens could use encryption. But the 1, though its built-in bacdoor chip,would be able to access the information when it needed to. The o-&ial &alled his

    .ision ONir.ana4  #he 1 is still envisioning irvana, this time a system with huge

    haystacs accessed only when national security is at stae. But many people believe thevery creation of those government-owned haystacs is a privacy violation, and possiblyunconstitutional.

    Ba&(doors (e! o signi &a,abiliies&arh! "3 4#om, is national a3airs correspondent for uardian 81, */*

  • 8/16/2019 Intelligence DA - UTNIF 2015

    56/231

    saying such TbacdoorsU would not be harmful to privacy, would not fatallycompromise encryption and would not ruin international marets for 81 technologyproducts. %ogers mounted an elaborate defense of Barac Dbama@s evolvingcybersecurity strategy in an appearance before an audience of cryptographers, techcompany security oEcers and national security reporters at the ew mericaoundation in ashington. In an hour-long ?uestion-and-answer session, %ogers said

    a cyber-attac against 1ony pictures by orth Gorea last year showed the urgencyand diEculty of defending against potential cyber threats. BI doubles down on orth Goreaaccusation for 1ony Pictures hac %ead more TIf you loo at the topology of that attac from orth Gorea against1ony Pictures Lntertainment, it literally bounced all over the world before it got to California,U %ogers said.

    TInfrastructure located on multiple continents, in multiple di3erent geographic regions.U or most of theappearance, however, %ogers was on the defensive, at pains to eMplain how legal ortechnological protections could be put in place to ensure that government access tothe data of 81 technology companies would not result in abuse by intelligenceagencies. #he hite 0ouse is trying to broer a deal with companies such as pple,

     7ahoo and oogle, to ensure holes in encryption for the government to accessmobile data, cloud computing and other data. T^Bacdoor@ is not the conteMt I woulduse, because when I hear the phrase ^bacdoor@ I thin: ^ell this is ind of shady,

    why wouldn@t you want to go in the front door, be very publicQ@U %ogers said. Tecan create a legal framewor for how we do this.U dvertisement %ogers, who is also commanderof 81 Cyber Command, said the government was playing catch-up not only in establishingdefenses against cyber attacs but in laying out its own rules of cyber warfare,including when retaliation was appropriate. Te@re not mature and we@re clearly notwhere we need to be,U %ogers said. T#ae the nuclear eMample. If you go bac in theNrst '+, *+ years, we were still debating about, ^ell, what are the fundamentalconcepts of deterrenceQ@ #his whole idea of mutually assured destruction O thatdidn@t develop in Nve years, for eMample. ll of that has taen time. Cyber is nodi3erent.U %ogers admitted that concerns about 81 government inNltration of 81companies@ data represented a business ris for 81 companies, but he suggestedthat the greater threat was from cyber-attacs . TI thin it@s a very valid concern to say ^oo, are

    we losing 81 maret segment hereQ@U %ogers said. That@s the economic impact of thisQ I $ustthin, between a combination of technology, legality and policy, we can get to abetter place than we are now.U 81 technology companies have bridled atgovernment pressure to introduce weanesses in encryption systems in order toensure government access to data streams, and technical eMperts have warned thatthere is no way to create a TbacdoorU in an encryption system without summarilycompromising it. n appearance by Dbama at a cybersecurity conference at 1tanford 8niversity last wee totout cooperation between the government and 81 tech companies was upstaged by an impassioned speech byppleXs chief eMecutive, #im Coo, who warned of the Tdire conse?uencesU of sacriNcing the right to online privacy.dvertisement #he basic discomfort of the new partnership the government would lie to see with technologycompanies once again burst into full view on Fonday when leM 1tamos, the chief information security oEcer at

     7ahoo, challenged %ogers on his recommendation for built-in Tdefects-slash-bacdoors, or golden master eysU to

    serve government purposes. 1tamos ased %ogers how companies such as 7ahoo, with '.<billion users worldwide, would be eMpected to reply to parallel re?uests forbacdoors from foreign governments, and told %ogers such bacdoors would be lieTdrilling a hole through a windshieldU. TI@ve got a lot of world-class cryptographersat the ational 1ecurity gency,U replied %ogers, sipping over the ?uestion offoreign government re?uests. TI thin that this is technically feasible. ow it needsto done within a framewor.

  • 8/16/2019 Intelligence DA - UTNIF 2015

    57/231

    ?in( ; Bio)eri&s

    NSA bio)eri&s (e! o broader inel &a,abiliies

  • 8/16/2019 Intelligence DA - UTNIF 2015

    58/231

    documents obtained from the former agency contractor Ldward A. 1nowden. hile oncefocused on written and oral communications, the .1.. now considers facial images,Nngerprints and other identiNers $ust as important to its mission of tracingsuspected terrorists and other intelligence targets, the documents show. TIt@s not $ustthe traditional communications we@re after: It@s taing a full-arsenal approach that digitallyeMploits the clues a target leaves behind in their regular activities on the net  to compile

    biographic and biometric informationU that can help Timplement precisiontargeting,U noted a *+'+ document. Dne .1.. PowerPoint presentation from *+'', foreMample, displays several photographs of an unidentiNed man & sometimes bearded,other times clean-shaven & in di3erent settings, along with more than two do;en datapoints about him. #hese include whether he was on the #ransportation 1ecuritydministration no-2y list, his passport and visa status, nown associates or suspectedterrorist ties, and comments made about him by informants to merican intelligenceagencies. It is not clear how many people around the world, and how many mericans,might have been caught up in the e3ort. either federal privacy laws nor the nation@ssurveillance laws provide speciNc protections for facial images. iven the .1..@s foreignintelligence mission, much of the imagery would involve people overseas whose data wasscooped up through cable taps, Internet hubs and satellite transmissions. Because the

    agency considers images a form of communications content, the .1.. would bere?uired to get court approval for imagery of mericans collected through itssurveillance programs, $ust as it must to read their emails or eavesdrop on their phoneconversations, according to an .1.. spoeswoman. Cross-border communications inwhich an merican might be emailing or teMting an image to someone targeted bythe agency overseas could be eMcepted. Civil-liberties advocates and other critics areconcerned that the power of the improving technology, used by government and industry,could erode privacy. Tacial recognition can be very invasive,U said lessandro c?uisti, aresearcher on facial recognition technology at Carnegie Fellon 8niversity. T#here are stilltechnical limitations on it, but the computational power eeps growing, and thedatabases eep growing, and the algorithms eep improving.U 1tate and local lawenforcement agencies are relying on a wide range of databases of facial imagery,

    including driver@s licenses and aceboo, to identify suspects. #he .B.I. isdeveloping what it calls its TneMt generation identiNcationU pro$ect to combine itsautomated Nngerprint identiNcation system with facial imagery and other biometricdata. #he 1tate !epartment has what several outside eMperts say could be thelargest facial imagery database in the federal government, storing hundreds ofmillions of photographs of merican passport holders and foreign visa applicants.nd the !epartment of 0omeland 1ecurity is funding pilot pro$ects at policedepartments around the country to match suspects against faces in a crowd. #he.1.., though, is uni?ue in its ability to match images with huge troves of privatecommunications. Te would not be doing our $ob if we didn@t see ways to continuouslyimprove the precision of signals intelligence activities & aiming to counteract the e3orts ofvalid foreign intelligence targets to disguise themselves or conceal plans to harm the 8nited1tates and its allies,U said 9anee F. 9ines, the agency spoeswoman. 1he added that the.1.. did not have access to photographs in state databases of driver@s licenses or topassport photos of mericans, while declining to say whether the agency had access to the1tate !epartment database of photos of foreign visa applicants. 1he also declined to saywhether the .1.. collected facial imagery of mericans from aceboo and other socialmedia through means other than communications intercepts. T#he government and theprivate sector are both investing billions of dollars into face recognitionU researchand development, said Aennifer ynch, a lawyer and eMpert on facial recognition andprivacy at the Llectronic rontier oundation in 1an rancisco. T #he government leads the

  • 8/16/2019 Intelligence DA - UTNIF 2015

    59/231

    way in developing huge face recognition databases, while the private sector leads inaccurately identifying people under challenging conditions.U Fs. ynch said a handful ofrecent court decisions could lead to new constitutional protections for the privacy ofsensitive face recognition data. But she added that the law was still unclear and thatashington was operating largely in a legal vacuum. aura !onohue, the director of theCenter on ational 1ecurity and the aw at eorgetown aw 1chool, agreed. T#here are very

    few limits on this,U she said. Congress has largely ignored the issue. T8nfortunately, ourprivacy laws provide no eMpress protections for facial recognition data,U said 1enator lranen, !emocrat of Finnesota, in a letter in !ecember to the head of the ational

     #elecommunications and Information dministration, which is now studying possiblestandards for commercial, but not governmental, use. acial recognition technology can stillbe a clumsy tool. It has diEculty matching low-resolution images, and photographs ofpeople@s faces taen from the side or angles can be impossible to match against mug shotsor other head-on photographs. !alila B. Fegherbi, an eMpert on facial recognition technologyat the 8niversity of Fassachusetts at owell, eMplained that Twhen pictures come in di3erentangles, di3erent resolutions, that all a3ects the facial recognition algorithms in thesoftware.U #hat can lead to errors, the documents show. *+'' PowerPoint showed oneeMample when #undra ree;e, the .1..@s main in-house facial recognition program, wasased to identify photos matching the image of a bearded young man with dar hair. #he

    document says the program returned * results, and displays several that were obviouslyfalse hits, including one of a middle-age man. 1imilarly, another *+'' .1.. documentreported that a facial recognition system was ?ueried with a photograph of Dsama binaden. mong the search results were photos of four other bearded men with only slightresemblances to Bin aden. But the technology is powerful. Dne *+'' PowerPoint showedhow the software matched a bald young man, shown posing with another man in front of awater par, with another photo where he has a full head of hair, wears di3erent clothes andis at a di3erent location. It is not clear how many images the agency has ac?uired. #he.1.. does not collect facial imagery through its bul metadata collectionprograms, including that involving mericans@ domestic phone records, authori;ed under1ection *'= of the Patriot ct, according to Fs. 9ines. #he .1.. has accelerated itsuse of facial recognition technology under the Dbama administration, the documentsshow, intensifying its e3orts after two intended attacs on mericans that $arred the hite

    0ouse. #he Nrst was the case of the so-called underwear bomber, in which 8mar aroubdulmutallab, a igerian, tried to trigger a bomb hidden in his underwear while 2ying to!etroit on Christmas in *++(. Aust a few months later, in Fay *+'+, aisal 1hah;ad, aPaistani-merican, attempted a car bombing in #imes 1?uare. #he agency@s use of facialrecognition technology goes far beyond one program previously reported by #he uardian,which disclosed that the .1.. and its British counterpart, eneral Communications0ead?uarters, have $ointly intercepted webcam images, including seMually eMplicit material,from 7ahoo users. #he .1.. achieved a technical breathrough in *+'+ when analysts Nrstmatched images collected separately in two databases & one in a huge .1.. databasecode-named Pinwale, and another in the government@s main terrorist watch list database,nown as #ide & according to .1.. documents. #hat ability to cross-reference images hasled to an eMplosion of analytical uses inside the agency. #he agency has created teams ofTidentity intelligenceU analysts who wor to combine the facial images with other records

    about individuals to develop comprehensive portraits of intelligence targets. #he agency hasdeveloped sophisticated ways to integrate facial recognition programs with a wide range ofother databases. It intercepts video teleconferences to obtain facial imagery, gathers airlinepassenger data and collects photographs from national identity card databases created byforeign countries, the documents show. #hey also note that the .1.. was attempting togain access to such databases in Paistan, 1audi rabia and Iran. #he documents suggestthat the agency has considered getting access to iris scans through its phone andemail surveillance programs. But ased whether the agency is now doing so, oEcialsdeclined to comment. #he documents also indicate that the .1.. collects iris scans of

  • 8/16/2019 Intelligence DA - UTNIF 2015

    60/231

    foreigners through other means. In addition, the agency was woring with the C.I.. and the1tate !epartment on a program called Pisces, collecting biometric data on border crossingsfrom a wide range of countries. Dne of the .1..@s broadest e3orts to obtain facial images isa program called ellspring, which strips out images from emails and othercommunications, and displays those that might contain passport images. In addition to in-house programs, the .1.. relies in part on commercially available facial recognition

    technology, including from PittPatt, a small company owned by oogle, the documentsshow. #he .1.. can now compare spy satellite photographs with interceptedpersonal photographs taen outdoors to determine the location. Dne documentshows what appear to be vacation photographs of several men standing near asmall waterfront doc in *+''. It matches their surroundings to a spy satellite imageof the same doc taen about the same time, located at what the documentdescribes as a militant training facility in Paistan.

  • 8/16/2019 Intelligence DA - UTNIF 2015

    61/231

    ?in( ; Pres 6esrain

    Allo0ing resri&ions on he NSA &rushes rus be0een Pres andNSA ; &rushes inel &a,a&i!

  • 8/16/2019 Intelligence DA - UTNIF 2015

    62/231

    ?in( ; Cours

    Cour a&ion agains he NSA uniuel! &rushes )oraleSa.age "+ 4Charlie, ew 7or #imes, '/*.] #he privacy board@s legal criti?ue of the program wasapproved by !avid Fedine, the board@s chairman and a former ederal #rade CommissionoEcial in the Clinton administrationX Patricia F. ald, a retired federal appeals court $udgenamed to the bench by President Aimmy CarterX and Aames . !empsey, a civil libertiesadvocate who speciali;es in technology issues.] But the other two members & %achel .Brand and Llisebeth Collins Coo, both of whom were Austice !epartment lawyers in theeorge . Bush administration & re$ected the Nnding that the program was illegal. ]

     #hey wrote in separate dissents that the board should have focused eMclusively onpolicy and left legal analysis to the courts. ast month, two ederal !istrict Court $udgesreached opposite legal conclusions in separate lawsuits challenging the program.] Fs. Brandwrote that while the legal ?uestion was TdiEcult,U the government@s legal theory was Tatleast a reasonable reading, made in good faith by numerous oEcials in two administrationsof di3erent parties.U 1he also worried that declaring that counterterrorism oEcialsThave been operating this program unlawfully for yearsU  &ould da)age )orale

    and )a(e agen&ies o.erl! &auious in a(ing se,s o ,roe& he &ounr! .

  • 8/16/2019 Intelligence DA - UTNIF 2015

    63/231

    ?in( ; Se&ion @%

    Vindi&aion on @% &ru&ial o NSA )orale boosLhe ,lan i,s haDIlanain @#%#"+ http://news.yahoo.com/thumbs-nsa-internet-spying-foreigners-

    *'+

  • 8/16/2019 Intelligence DA - UTNIF 2015

    64/231

    valuable and sub$ect to intense oversight,H said board member Llisebeth Collins Coo, aformer %epublican sta3 member of the 1enate Audiciary Committee.] 1ome activists stronglydisagreed.] H#he board"s recommendations would leave in place the government"s ability tospy on its citi;ens & along with their friends, family members and business partnersoverseas & without any suspicion of wrongdoing,H complained Lli;abeth oitein of theBrennan Center for Austice in ew 7or.] #he report appears to lengthen the already-

    long odds against lawmaers who want to put restrictions of the 1ection )+*programs. #he 0ouse recently passed legislation seeing to cut o3 funding for searching)+* data connected to mericans, but ey senators oppose any changes to the program.

  • 8/16/2019 Intelligence DA - UTNIF 2015

    65/231

    ?in( ; Pri.a&!

    ore Pri.a&! is bad for NSA o do is Hob' good no0Sales " 4athan, law professor at eorge Fason 8niversity. 0e served in the eorge . Bush administration

    at the Austice !epartment and as deputy assistant secretary of homeland security for policy, 1 Privacy Breaches: #he Bad and the ood, http://www.nationalreview.com/corner/+*/nsa-privacy-breaches-bad-and-good-nathan-sales5 ast night@s ashington Post story about 1 privacy breaches contains news that@sboth bad and, perhaps uneMpectedly, good. #he bad news is that 1 analysts are sometimes gathering and accessinginformation in violation of statutes and eMecutive orders. #he good news is that the government hasmeaningful oversight mechanisms to Nnd and NM these problems. or a number ofyears, the 1 has been collecting large troves of data in an e3ort to trac downterrorists whose identities are unnown. Bul data collection can be a powerfulnational-security tool. *++* study found that such a program could have identiNedthe lins among all '( of the (/'' hi$acers.   But bul collection also raises very real concerns about privacyand civil liberties. #he ey therefore is to establish and enforce strict limits on what the government can do with the data it

    compiles. e want oEcials to be able to Nnd the neMt Fohamed tta  but not, for eMample, to looup long-lost high-school sweethearts. #hat brings us to the Post story. n internal 1 audit from last spring reportedly Tcounted*,))> incidents in the preceding '* months of unauthori;ed collection, storage, access to or distribution of legally protected

    communications.U Fost of the breaches were unintentional, and many were fairly minor.  1ome analysts accessed information they shouldn@t have because of typos, and others did so because they failed to follow the 1@sstandard operating procedures. Dther violations were more problematic & e.g., the unauthori;ed sharing of protected content.

    early as important as the fact that these breaches occurred is the fact that theywere caught and, one hopes, rectiNed. #he government increasingly is usingcomputer systems with technological safeguards that monitor who accesses whatinformation when and for what purposes. Bac in *++V, oEcials were able to immediately identify - andpunish O a group of 1tate !epartment contractors who snooped around in various presidential candidates@ passport Nles.  #hesetools aren@t $ust good for security. #hey@re also good for privacy. #hey can helpensure that government oEcials are faithfully using the new surveillance powersthey@ve gained since (/''.  Internal oversight is a good start, but it isn@t enough on its own. #he 1 should bereporting any breaches, and what it@s doing to NM them, to outside watchdogs & especially Congress and the I1 court. #hat@s whyit@s troubling to read that the 1 might be saniti;ing what its overseers see when composing reports for outside consumption.ccording to the Post, Tagency personnel are instructed to remove details and substitute more generic language in reports to the

     Austice !epartment and the DEce of the !irector of ational Intelligence.U 0uman beings inevitably maemistaes, and spies are not eMempt from this law of nature. #he critical ?uestion iswhether there are mechanisms to detect the mistaes and correct them. #he 1audit gives some reason for optimism that such safeguards are in place at theagency. But we could all breathe a bit easier if the 1 ept Congress and other overseers more fully in the loop.

    http://www.nationalreview.com/corner/356024/nsa-privacy-breaches-bad-and-good-nathan-saleshttp://www.nationalreview.com/corner/356024/nsa-privacy-breaches-bad-and-good-nathan-saleshttp://www.nationalreview.com/corner/356024/nsa-privacy-breaches-bad-and-good-nathan-saleshttp://www.nationalreview.com/corner/356024/nsa-privacy-breaches-bad-and-good-nathan-saleshttp://www.nationalreview.com/corner/356024/nsa-privacy-breaches-bad-and-good-nathan-sales

  • 8/16/2019 Intelligence DA - UTNIF 2015

    66/231

    ?in( ; Ba&(lash

    NSA ba&(lashes agains 7ba)a hro0ing he) under he busAllen "#%K#" Bob llen is a veteran of more than

  • 8/16/2019 Intelligence DA - UTNIF 2015

    67/231

    ?in( ; P6IS

    P6IS is (e! o NSA eibili! /orsall " 4#im, >/)/'Z,pple P -'.>Z, aceboo B -*.'

  • 8/16/2019 Intelligence DA - UTNIF 2015

    68/231

    around the internet looing to see what it can Nnd. nd %ussian state baced 4ifeven by a blind eye if not actual encouragement5 attempts to rootle through thedata are well nown. In my native 8G there@s also an attempt 4nown as theT1noopers@ CharterU collo?uially5 to push through government having the powers todo this sort of monitoring on 8G citi;ens and residents. 1omething to which I@mvehemently opposed as should we all be. But while I@m opposed to my government spying on me Irather assume that foreign governments are going to spy on me. Aust as my own government spies uponforeigners. #hat@s rather the point of having a government in the Nrst place. #hat the 1 is looing at asmuch information and data it can get on what those nefarious foreigners are up tooutside the 81 doesn@t seem ob$ectionable to me in the slightest. Indeed, I ratherthin that that@s the purpose of government, to protect us, and it@s the reason wehire the spies in the Nrst place. #hey@re doing eMactly what they should be: looingfor those who would do us, the citi;enry, harm and then attempting to prevent themdoing so. 1ure, the foreigners aren@t going to be very happy about it all: but their own governments 4or perhaps Ishould say ToursU5 are doing as much of it to 81 citi;ens as they can. #he dividing line, the where it moves frombeing entirely reasonable and sensible to being an outrage that must be prevented, is when governments do thissort of thing to their own citi;ens.

  • 8/16/2019 Intelligence DA - UTNIF 2015

    69/231

    Inernal ?in( ; orale (% re&ruiing

    orale &rash (ills federal e),lo!!e re&rui)en and reenionFier&e Go.ern)en 3#$#"+ http://www.Nercegovernment.com/story/low-employee-

    morale-hindering-recruitment-and-retention/*+'-+=-+>   ierceovernment tracs the latestdevelopments in the 8.1. government. ederal managers rely on our free, four-times-per-wee email newsletter for news on: Collaboration #ransparency W Dpen overnment CDDP/#elewor 1ocial Fedia and ov *.+ ederal Budget gency ews

    The de&lining )orale of federal e),lo!ees is )a(ing i di-&ul o reain

    e,erien&ed alen and re&rui !oung &andidaes ino ,ubli& ser.i&es , top

    agency oEcials told a 1enate panel Fay >.] 9arying factors such as furloughs, a three-year pay free;e, hiring free;es and ongoing budget uncertainties have and willcontinue to factor heavily into employees" decisions about when to depart, said Paige0inle-Bowles, deputy assistant secretary of defense for civilian personnel policy.] bout '<percent of the !efense !epartment"s civilian employees are currently eligible to retire andthat number is eMpected to rise to

  • 8/16/2019 Intelligence DA - UTNIF 2015

    70/231

    overall morale among 1enior LMecutives and 1enior Professionals at their agencies as Tlowor very low.U] #his is a problem that is bleeding into the government@s ability torecruit top talent, retain their eMisting employees and eep employees woringtowards their agency@s mission. 0owever, there may be ways to help improvemorale and mae the federal worforce more happy and productive in their $obs.

  • 8/16/2019 Intelligence DA - UTNIF 2015

    71/231

    Inernal ?in( ; orale (% ,ersonnel

    orale (ills sa> uali!Barre 6ose and ?ee "3 Barrett %ose W ee recruits senior and mid-level eMecutives,as well as professional sta3, in: pre-sales and service delivery professionals for information

    technology vendors sales and mareting technical and engineering for manufacturingNnance, human resources, and administration http://www.barrettrose.com/the-high-cost-of-low-morale-and-what-to-do-about-it/

    A &osl! indi&aor of lo0 )orale is high urno.er  when employees leavebecause they are not happy with their $obs and have few eMternal reasons to stay.

     #he negative impact of employee turnover is disconcerting because of its tremendousimpact both Nnancially and on productivity levels. Fore importantly, when employeesleave, they tae with them the nowledge, sills and ability that helped contributeto the goals, proNt and performance of the organi;ation.J>K #he 1aratoga Institutesuggests that the average internal cost of turnover ranges from a minimum of one year@spay and beneNts to a maMimum of two years salary. Dther research indicates that totalturnover costs can reach as high as '=+Z of an employee@s base salary.J)K 0igh turnover

    also means that signiNcant recruitment and replacement costs will be incurred. ] nothercost of low morale is increased absenteeism. worforce that is present andhealthy accomplishes more. ccording to an article in #he eading Ldge, dissatisNedworers crave an escape from their oEces, even if those escapes are onlytemporary.JVK 1ic days cost the organi;ation money and production, as well as increasedhealth and insurance costs. hen employees feel dissatisNed, are not as invested inthe wor they produce or discontented with managers, the level of absenteeismincreases,J(K leading to less productivity. 8nscheduled employee absenteeism costs anaverage of (Z of payroll.J'+K 0owever, absenteeism does not necessarily mean thatemployees hate their $obs. It can also stem from not feeling empowered or well-trained toperform.J''K

  • 8/16/2019 Intelligence DA - UTNIF 2015

    72/231

    Inernal ?in( ; orale ?oss   ?ea(s

    orale &rash Q lea(s

  • 8/16/2019 Intelligence DA - UTNIF 2015

    73/231

    is not, and no intelligence specialist who is nowledgeable about the damage causedby leas would disagree.  #his presents an important anomaly in public discourse: early all of thecompelling evidence in support of the argument that leas are causing serious damage is available only in theclassiNed domain. It thus seems daunting to mae a persuasive public case for legal correctives to addressunauthori;ed disclosures when so little of the evidence for it can be discussed publicly. Proponents for better laws&it will soon become clear why I am one of these& sometimes feel that this is not a fair Nght. reedom-of-the-pressadvocates and professional $ournalists eMert disproportionate in2uence on this debate, at least when compared to

    advocates of criminal penalties for the leaing and publishing of sensitive classiNed intelligence. But I have come tobelieve that irst mendment ob$ections to criminal penalties for disclosing classiNed intelligence now demand amore critical reconsideration than we have given them to date.< Dnce we get over this hurdle, it will be more of afair Nght, a more reasoned debate. #he 1eriousness of 8nauthori;ed !isclosures ny sources and methods ofintelligence will remain guarded in secret. Fy administration will not tal about how we gather intelligence, if wegather intelligence, and what the intell igence says. #hat@s for the protection of the merican people. President

    eorge . Bush, following the '' 1eptember *++' terrorist attacs on the orld #rade Center and the Pentagon. Itis a myth, too commonly held outside the Intelligence Community 4IC5, that leas really do not domuch harm. #he genealogy of this erroneous view traces to the publication of #hePentagon Papers in '()'. fter much government carping about all the damage that those #op 1ecretrevelations in the press would do to 81 national security, few today would claim that any damage was done at all.

    nd I am unaware of any that was done to intelligence. #he Pentagon Papers 2ap too us o3 the scent. #he view that leas are harmless is further nourished by other popular myths that the government over-classiNes everything &including intelligence&and classiNes way too much. #his seduction has

    become a creed among uncleared, anti-secrecy proponents. But this, too, at least in regard to intelligence, I wouldargue, is wrong. recent classiNed study of media leas has convincingly shown that leas do cause agreat d