An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
Amicus Brief Tech companies This is an employment epidemic across the nation where companies sponsor foreign national for domestic jobs, leaving thousands to train their replacements. We have not addresses how many could be purposely placed for industrial espionage.
Apple, Google, Microsoft pile in: 97 US tech firms file brief against Trump’s travel ban
In part from ZDNet: Immigrants or their children founded 200 US companies that generate $4.2 trillion in annual revenues, the brief highlights, among them Apple, AT&T, and Google, as well as Ford, General Electric, McDonald’s, Boeing, and Disney.
“Businesses and employees have little incentive to go through the laborious process of sponsoring or obtaining a visa, and relocating to the United States, if an employee may be unexpectedly halted at the border.
“Skilled individuals will not wish to immigrate to the country if they may be cut off without warning from their spouses, grandparents, relatives, and friends. They will not pull up roots, incur significant economic risk, and subject their family to considerable uncertainty to immigrate to the United States in the face of this instability.” Full article here.
***
The H1-B visa program has a cap to the number allowed to be issued. It is a visa program that needs more scrutiny by Congress for the sake of American employees. There have been abuses to the program and further companies like Disney hire foreign nationals to replaced domestic employees driving down the salary costs.
Janet Napolitano, the former Secretary of the Department of Homeland security and now the president of the University of California system knows it all so well and how to work the system.
In part from the LATimes: Using a visa loophole to fire well-paid U.S. information technology workers and replace them with low-paid immigrants from India is despicable enough when it’s done by profit-making companies such as Southern California Edison and Walt Disney Co.
But the latest employer to try this stunt sets a new mark in what might be termed “job laundering.” It’s the University of California. Experts in the abuse of so-called H-1B visas say UC is the first public university to send the jobs of American IT staff offshore. That’s not a distinction UC should wear proudly. Full op-ed here.
*** One of 5 huge examples beyond California is:
Pfizer Connecticut R&D
In 2008, workers at pharmaceutical giant Pfizer’s New London and Groton (Connecticut) research and development campus raised the alarm: They were being replaced by Indian workers on H-1B visas and forced to train their replacements. Those outsourced workers were scheduled to return to India, where they will run the same systems as their U.S. counterparts, albeit at a cheaper rate and with diminished benefits. The move was part of an outsourcing agreement signed in 2005 between Pfizer, Infosys Technologies and Satyam Computer Services. More here.
***
A 100 page Joint Venture report for tech companies includes the following text:
Silicon Valley has an extraordinarily large share of residents who are foreign born (37.4%, compared to California, 27.1%, or the United States, 13.3%). This population share increases to 50% for the employed, core working age population (ages 25-44), and even higher for certain occupational groups. For instance, nearly 74% of all Silicon Valley employed Computer and Mathematical workers ages 25-44 in 2014 were foreign-born. Correspondingly, the region also has an incredibly large share of foreign-language speakers, with 51% of Silicon Valley’s population over age five speaking a language other than exclusively English at home (compared to 43% in San Francisco, 44% in California, and 21% in the United States as a whole). This majority share in 2014 was up from 49% in 2011.
*** The Senate held a hearing in 2015 with a few former employees that were forced to train their foreign replacements. Many of these employees are paid a severance package but it also includes a major stipulation to remain mute on the topic as noted below:
My former company, a large utility company, replaced 220 American IT workers with H-1Bs…we would have to train them in order to receive our severance packages. This was one of the most humiliating situations that I have ever been in as an IT professional.
The whole IT department was going through the same fate as myself. Those were the longest and hardest five months of my life. Not only did I lose a work family, but I lost my job and my self-esteem. We had constant emails sent by HR that we could not talk about this situation to anyone or make posts to social media. If we did, we would be fired immediately and not get our severance. Read the full article here.
WASHINGTON — Through two executive orders signed Tuesday, President Obama put in place a structure to fortify the government’s defenses against cyber attacks and protect the personal information the government keeps about its citizens.
The orders came the same day as Obama sent to Congress a proposed 2017 budget that includes $19 billion for information technology upgrades and other cyber initiatives.
The president will discuss efforts to address the cyber threat facing the country and get the executives’ feedback on how the government and private sector can forge a relationship to improve cybersecurity in the United States, according to The White House. The meeting will be held in the Situation Room and attendees include AT&T CEO Randall Stephenson and Northrup Grumman CEO Wesley Bush.
Not until February of 2016, did Obama launch the Cybersecurity National Action Plan which was headed by Tom Donilon, his National Security Advisor and Sam Palmisano, former CEO of IBM. There was no traction and given the recent cyber intrusions, there is likely a LOT of ‘ooops’ coming from the White House and should. No corporation, bank, government agency or other private entity ever wants to publically announced they have been hacked or their vulnerability, as it only invites more cyber chaos but the United States including top government agencies and the White House along with the State Department have all been victim of both Russian and Chinese cyber attacks of various forms.
***
Sen. Ted Cruz says he hopes the incoming Trump administration is tougher on dealing with cyberattacks than the “weakness” he saw from President Obama on hacking by Russia and other foreign adversaries.
“One of the reasons these cyberattacks are so prevalent is that Barack Obamaand his administration have rolled over for eight years,” Cruz said Thursday on “The Mike Gallagher Show.”
“They have shown nothing but weakness and appeasement in the face of those attacks. This is something I hope and believe will change with the new administration,” he said.
Cruz insisted neither Russian hacking nor WikiLeaks revelations last year about the Democratic Party significantly influenced Donald Trump’svictory in the presidential election.
“I think that there’s no evidence whatsoever that Russia’s efforts against us, which have been longstanding, did anything to affect the campaign,” said Cruz, who competed against Trump in last year’s GOP primaries.
“It’s, frankly, patently absurd,” Cruz added of claims Russia or WikiLeaks helped Trump win. “You can’t credibly argue that [WikiLeaks’] disclosures impacted the election because most voters never heard it.” More here from TheHill.
‘From Awareness to Action: A Cybersecurity Agenda for the 45th President’
A task force co-chaired by two U.S. lawmakers and a former federal CIO is issuing a 34-page report recommending a cybersecurity agenda for the incoming Trump administration. The report recommends the new administration jettison outdated ways the federal government tackles cybersecurity, noting: “Once-powerful ideas have been transformed into clichés.”
The report from the CSIS Cyber Policy Task Force – From Awareness to Action: A Cybersecurity Agenda for the 45th President – will be formally unveiled on Jan. 5. It comes from the think tank Center for Strategic and International Studies, which sponsored the Commission on Cybersecurity for the 44th Presidency that made recommendations to then-President-elect Barack Obama in 2008.
“In the eight years since that report was published, there has been much activity, but despite an exponential increase in attention to cybersecurity, we are still at risk and there is much for the next administration to do,” the new report’s introduction states.
Cybersecurity Goals for Trump Administration
The task force outlined five major issues President-elect Donald Trump and his administration should address, including:
Deciding on a new international strategy to account for a very different and dangerous global security environment.
Making a greater effort to reduce and control cybercrime.
Accelerating efforts to secure critical infrastructures and services and improving cyber hygiene across economic sectors. As part of this, the Trump administration must develop a new approach to securing government agencies and services and improve authentication of identity.
Identifying where federal involvement in resource issues, such as research or workforce development, is necessary, and where such efforts are best left to the private sector.
Considering how to organize the U.S. effort to defend cyberspace. Clarifying the role of the Department of Homeland Security is crucial, and the new administration must either strengthen DHS or create a new cybersecurity agency.
Ditching Outmoded Security Practices
Task force members recommend the new administration should get rid of outdated ways the federal government tackles cybersecurity. The report notes: “Statements about strengthening public-private partnerships, information sharing or innovation lead to policy dead ends. … Once-powerful ideas have been transformed into clichés. Others have become excuses for inaction.”
As an example, the task force cites the National Strategy for Trusted Identities in Cyberspace, a government initiative unveiled in 2011, which envisioned a cyber-ecosystem that promotes trust and security while performing sensitive transactions online. The task force contends NSTIC “achieved little,” asserting that such initiatives fail because they aren’t attuned to market forces. “There are few takers for a product or service for which there is no demand or for which there are commercial alternatives.”
The task force makes recommendations on dozens of policies and technologies.
On encryption, for instance, it suggests that the president develop a policy that supports the use of strong encryption for privacy and security while specifying the conditions and processes under which assistance from the private sector for lawful access to data can be required. It also states that the president should direct the National Institute of Standards and Technology to work with encryption experts, technology providers and internet service providers to develop standards and ways to protect applications and data in the cloud and provide secure methods for data resiliency and recovery.
“Ultimately,” the report says, “encryption policy requires a political decision on risk. Untrammeled use of encryption increases the risk from crime and terrorism, but societies may find this risk acceptable given the difficulty of imposing restrictions. No one in our groups believed that risk currently justifies restrictions.”
Battling Cybercrime
In battling cybercrime, the task force sees “active defense,” a term it says has become associated with vigilantism, hack back and cyber privateers, as only a stopgap measure to address the private sector’s frustration over the apparent impunity of trans-border criminals. The Trump administration should seek ways to help companies move beyond their traditional perimeter defenses and focus on identifying federal actions that could disrupt cybercriminals’ business model or expand the work of federal agencies and service providers against botnets, according to the report.
To make cybercrime less profitable, the task force recommends the new administration identify actions that would impede the monetization of stolen data and credentials. Other recommendations include accelerating the move to multifactor authentication and identifying better ways to counter and disrupt botnets, a growing risk as more devices become connected to the internet. The task force says this could be done by expanding the ability to obtain civil injunctions for use against botnets and raising the penalties for using botnets against critical infrastructure.
The role of the military to protect civilian critical infrastructure turned out to be among the most contentious issues the group debated. A few task force members said that the Defense Department should play an expanded and perhaps leading role in critical infrastructure protection, according to the report. Most members, though, believed that this mission must be assigned to a civilian agency, not to DoD or a law enforcement agency such as the FBI.
“While recognizing that the National Security Agency, an element of DoD, has unrivaled skills, we believe that the best approach is to strengthen DHS, not to make it a ‘mini-NSA,’ and to focus its mission on mitigation of threats and attacks, not on retaliation, intelligence collection or law enforcement,” the report states.
Organizing Government Cybersecurity
DHS is the focal point in cybersecurity protection among civilian agencies as well as civilian-led critical infrastructure. The task force recommends that an independent agency be established within DHS focused exclusively on cybersecurity.
The task force says Trump should quickly name a new cybersecurity coordinator and elevate the White House position two notches to assistant to the president from special assistant to the president. Also, the group says Trump should back away from his pledge to conduct a cybersecurity review, as was done at the beginning of the Obama administration.
The task force co-chairs are:
Rep. Michael McCaul, R-Texas, chairman of the House Homeland Security Committee and co-founder of the Congressional Cybersecurity Caucus;
Sen. Sheldon Whitehouse, D-R.I., sponsor of legislation to require federal law enforcement and national security agencies to account for cyberattacks;
Karen Evans, a cybersecurity adviser to the Trump transition team who’s national director of the U.S. Cyber Challenge and formerly served as White House administrator for e-government and information technology, a position now known as U.S. CIO; and
Sameer Bhalotra, co-founder and CEO of the cybersecurity startup Stackrox and a senior associate at CSIS.
CSIS Senior Vice President James Lewis, the think tank’s cybersecurity expert, served as the task force project director.
How bad is it?
USAToday:
Exhibit A: The Social Security Administration system still runs on a platform written in the 1960s in the COBOL programming language, and takes 400 people just to maintain, Obama said.
“If we’re going to really secure those in a serious way, then we need to upgrade them,” Obama told reporters Tuesday after meeting with advisers on the issue. “And that is something that we should all be able to agree on. This is not an ideological issue. It doesn’t matter whether there’s a Democratic President or a Republican President. If you’ve got broken, old systems — computers, mainframes, software that doesn’t work anymore — then you can keep on putting a bunch of patches on it, but it’s not going to make it safe.”
To implement those upgrades, Obama created two new entities Tuesday: The first, a Commission on Enhancing National Cybersecurity, will be made up of business, technology, national security and law enforcement leaders who will make recommendations to strengthen online security in the public and private sectors. It will deliver a report to the president by Dec. 1.
The second, a Federal Privacy Council, will bring together chief privacy officers from 25 federal agencies to coordinate efforts to protect the vast amounts of data the federal government collects and maintains about taxpayers and citizens.
Obama’s cybersecurity adviser, Michael Daniel, said the structure allows the administration to move forward even without additional authority from Congress by “driving our executive authority to the limit.”
The administration’s plan will look at cybersecurity both inside and outside the government. There will be more training and shared resources among government agencies, 48 dedicated teams to respond to attacks, and student loan forgiveness to help recruit top technical talent.
But the will plan also promote better security practices throughout the economy, by encouraging through multi-factor authentication that uses additional information in addition to a password. The government is also looking to reduce its use of Social Security numbers the unique identifier for all Americans.
Across the government, the Obama administration wants to spend $19 billion on cybersecurity in 2017, a 35% increase over 2016. But the plan does not rely on an increase in funding. “We can do quite a bit of it even without the additional resources,” Daniel said.
The White House said it also plans to create the new position of Chief Information Security Officer to coordinate modernization efforts across the government, including a a $3.1 billion Information Technology Modernization Fund. “That’s a key role that many private-sector companies have long implemented, and it’s a good practice for the federal government,” said Tony Scott, the U.S. Chief Information Officer.
The president is expected to meet with national security advisers Tuesday morning to launch the new effort.
Mixing fine jewelry with costume jewelry gives the appearance it is all real, same with the news and who is promoting it or wearing it. So, how well did you read the WHOLE story and share it? Did you check it with other sources? Did you consider the original source or check the author?
Consider the following of which this site has previously published several times with warnings.
One more important item, the fake news and propaganda is NOT all political or simply centered about candidates or the election. This is where ‘group-think’ begins and festers, which is NOT thinking at all.
More and more, posts and commentaries on the Internet in Russia and even abroad are generated by professional trolls, many of whom receive a higher-than-average salary for perpetuating a pro-Kremlin dialogue online.
There are thousands of fake accounts on Twitter, Facebook, LiveJournal, and vKontakte, all increasingly focused on the war in Ukraine. Many emanate from Russia’s most famous “troll factory,” the Internet Research center, an unassuming building on St. Petersburg’s Savushkina Street, which runs on a 24-hour cycle. In recent weeks, former employees have come forward to talk to RFE/RL about life inside the factory, where hundreds of people work grinding, 12-hour shifts in exchange for 40,000 rubles ($700) a month or more.
St. Petersburg blogger Marat Burkhard spent two months working at Internet Research in the department tasked with clogging the forums on Russia’s municipal websites with pro-Kremlin comments. In the following interview, he describes a typical day and the type of assignments he encountered. The interview is here.
WaPo: The flood of “fake news” this election season got support from a sophisticated Russian propaganda campaign that created and spread misleading articles online with the goal of punishing Democrat Hillary Clinton, helping Republican Donald Trump and undermining faith in American democracy, say independent researchers who tracked the operation.
Russia’s increasingly sophisticated propaganda machinery — including thousands of botnets, teams of paid human “trolls,” and networks of websites and social-media accounts — echoed and amplified right-wing sites across the Internet as they portrayed Clinton as a criminal hiding potentially fatal health problems and preparing to hand control of the nation to a shadowy cabal of global financiers. The effort also sought to heighten the appearance of international tensions and promote fear of looming hostilities with nuclear-armed Russia.
Two teams of independent researchers found that the Russians exploited American-made technology platforms to attack U.S. democracy at a particularly vulnerable moment, as an insurgent candidate harnessed a wide range of grievances to claim the White House. The sophistication of the Russian tactics may complicate efforts by Facebook and Google to crack down on “fake news,” as they have vowed to do after widespread complaints about the problem.
There is no way to know whether the Russian campaign proved decisive in electing Trump, but researchers portray it as part of a broadly effective strategy of sowing distrust in U.S. democracy and its leaders. The tactics included penetrating the computers of election officials in several states and releasing troves of hacked emails that embarrassed Clinton in the final months of her campaign.
“They want to essentially erode faith in the U.S. government or U.S. government interests,” said Clint Watts, a fellow at the Foreign Policy Research Institute who along with two other researchers has tracked Russian propaganda since 2014. “This was their standard mode during the Cold War. The problem is that this was hard to do before social media.”
Watts’s report on this work, with colleagues Andrew Weisburd and J.M. Berger, appeared on the national security blog War on the Rocks this month under the headline “Trolling for Trump: How Russia Is Trying to Destroy Our Democracy.” Another group, called PropOrNot, a nonpartisan collection of researchers with foreign policy, military and technology backgrounds, planned to release its own findings Friday showing the startling reach and effectiveness of Russian propaganda campaigns.
The researchers used Internet analytics tools to trace the origins of particular tweets and mapped the connections among social-media accounts that consistently delivered synchronized messages. Identifying website codes sometimes revealed common ownership. In other cases, exact phrases or sentences were echoed by sites and social-media accounts in rapid succession, signaling membership in connected networks controlled by a single entity.
PropOrNot’s monitoring report, which was provided to The Washington Post in advance of its public release, identifies more than 200 websites as routine peddlers of Russian propaganda during the election season, with combined audiences of at least 15 million Americans. On Facebook, PropOrNot estimates that stories planted or promoted by the disinformation campaign were viewed more than 213 million times.
Some players in this online echo chamber were knowingly part of the propaganda campaign, the researchers concluded, while others were “useful idiots” — a term born of the Cold War to describe people or institutions that unknowingly assisted Soviet Union propaganda efforts.
The Russian campaign during this election season, researchers from both groups say, worked by harnessing the online world’s fascination with “buzzy” content that is surprising and emotionally potent, and tracks with popular conspiracy theories about how secret forces dictate world events.
Some of these stories originated with RT and Sputnik, state-funded Russian information services that mimic the style and tone of independent news organizations yet sometimes include false and misleading stories in their reports, the researchers say. On other occasions, RT, Sputnik and other Russian sites used social-media accounts to amplify misleading stories already circulating online, causing news algorithms to identify them as “trending” topics that sometimes prompted coverage from mainstream American news organizations.
The speed and coordination of these efforts allowed Russian-backed phony news to outcompete traditional news organizations for audience. Some of the first and most alarming tweets after Clinton fell ill at a Sept. 11 memorial event in New York, for example, came from Russian botnets and trolls, researchers found. (She was treated for pneumonia and returned to the campaign trail a few days later.)
This followed a spate of other misleading stories in August about Clinton’s supposedly troubled health. The Daily Beast debunked a particularly widely read piece in an article that reached 1,700 Facebook accounts and was read online more than 30,000 times. But the PropOrNot researchers found that the version supported by Russian propaganda reached 90,000 Facebook accounts and was read more than 8 million times. The researchers said the true Daily Beast story was like “shouting into a hurricane” of false stories supported by the Russians.
This propaganda machinery also helped push the phony story that an anti-Trump protester was paid thousands of dollars to participate in demonstrations, an allegation initially made by a self-described satirist and later repeated publicly by the Trump campaign. Researchers from both groups traced a variety of other false stories — fake reports of a coup launched at Incirlik Air Base in Turkey and stories about how the United States was going to conduct a military attack and blame it on Russia — to Russian propaganda efforts.
The final weeks of the campaign featured a heavy dose of stories about supposed election irregularities, allegations of vote-rigging and the potential for Election Day violence should Clinton win, researchers said.
“The way that this propaganda apparatus supported Trump was equivalent to some massive amount of a media buy,” said the executive director of PropOrNot, who spoke on the condition of anonymity to avoid being targeted by Russia’s legions of skilled hackers. “It was like Russia was running a super PAC for Trump’s campaign. . . . It worked.”
He and other researchers expressed concern that the U.S. government has few tools for detecting or combating foreign propaganda. They expressed hope that their research detailing the power of Russian propaganda would spur official action.
A former U.S. ambassador to Russia, Michael A. McFaul, said he was struck by the overt support that RT and Sputnik expressed for Trump during the campaign, even using the #CrookedHillary hashtag pushed by the candidate.
McFaul said Russian propaganda typically is aimed at weakening opponents and critics. Trump’s victory, though reportedly celebrated by Putin and his allies in Moscow, may have been an unexpected benefit of an operation that already had fueled division in the United States. “They don’t try to win the argument,” said McFaul, now director of the Freeman Spogli Institute for International Studies at Stanford University. “It’s to make everything seem relative. It’s kind of an appeal to cynicism.”
The Kremlin has repeatedly denied interfering in the U.S. election or hacking the accounts of election officials. “This is some sort of nonsense,” Dmitry Peskov, press secretary for Putin, said last month when U.S. officials accused Russia of penetrating the computers of the Democratic National Committee and other political organizations.
The findings about the mechanics of Russian propaganda operations largely track previous research by the Rand Corp. and George Washington University’s Elliott School of International Affairs.
“They use our technologies and values against us to sow doubt,” said Robert Orttung, a GWU professor who studies Russia. “It’s starting to undermine our democratic system.”
The Rand report — which dubbed Russian propaganda efforts a “firehose of falsehood” because of their speed, power and relentlessness — traced the country’s current generation of online propaganda work to the 2008 incursion into neighboring Georgia, when Russia sought to blunt international criticism of its aggression by pushing alternative explanations online.
The same tactics, researchers said, helped Russia shape international opinions about its 2014 annexation of Crimea and its military intervention in Syria, which started last year. Russian propaganda operations also worked to promote the “Brexit” departure of Britain from the European Union.
Another crucial moment, several researchers say, came in 2011 when the party of Russian President Vladimir Putin was accused of rigging elections, sparking protests that Putin blamed the Obama administration — and then-Secretary of State Clinton — for instigating.
Putin, a former KGB officer, announced his desire to “break the Anglo-Saxon monopoly on the global information streams” during a 2013 visit to the broadcast center for RT, formerly known as Russia Today.
“For them, it’s actually a real war, an ideological war, this clash between two systems,” said Sufian Zhemukhov, a former Russian journalist conducting research at GWU. “In their minds, they’re just trying to do what the West does to Russia.”
RT broadcasts news reports worldwide in several languages, but the most effective way it reaches U.S. audiences is online.
Its English-language flagship YouTube channel, launched in 2007, has 1.85 million subscribers and has had a total of 1.8 billion views, making it more widely viewed than CNN’s YouTube channel, according to a George Washington University report this month.
Though widely seen as a propaganda organ, the Russian site has gained credibility with some American conservatives. Trump sat for an interview with RT in September. His nominee for national security adviser, retired Lt. Gen. Michael T. Flynn, traveled to Russia last year for a gala sponsored by the network. He later compared it to CNN.
The content from Russian sites has offered ready fodder for U.S.-based websites pushing far-right conservative messages. A former contractor for one, the Next News Network, said he was instructed by the site’s founder, Gary S. Franchi Jr., to weave together reports from traditional sources such as the Associated Press and the Los Angeles Times with ones from RT, Sputnik and others that provided articles that often spread explosively online.
“The readers are more likely to share the fake stories, and they’re more profitable,” said Dyan Bermeo, who said he helped assemble scripts and book guests for Next News Network before leaving because of a pay dispute and concerns that “fake news” was crowding out real news.
In just the past 90 days — a period that has included the closing weeks of the campaign, Election Day and its aftermath — the YouTube audience of Next News Network has jumped from a few hundred thousand views a day to a few million, according to analytics firm Tubular Labs. In October alone, videos from Next News Network were viewed more than 56 million times.
Franchi said in an e-mail statement that Next News Network seeks “a global perspective” while providing commentary aimed at U.S. audiences, especially with regard to Russian military activity. “Understanding the threat of global war is the first step to preventing it,” he said, “and we feel our coverage assisted in preventing a possible World War 3 scenario.”
Motherboard: A much-discussed research paper out of Oxford this month concluded that millions of tweets about the presidential election are generated by highly automated Twitter accounts. According to the authors’ analysis, about a third of pro-Trump traffic, and one fifth of pro-Clinton tweets, is “driven by bots and highly automated accounts.”
The Oxford study pegged Twitter accounts as highly automated if they posted at least 50 times a day using any one of a group of election hashtags—such as #MAGA, #TrumpTrain, #ImWithHer, and #StrongerTogether—over a three-day period.
The paper conceded that “extremely active” humans might post 50 or more times per day on one of the 52 hashtags they selected, “especially if they are simply retweeting the content they find in their social media feed.”
At the Electome, a project of the Media Lab at MIT, we use complex machine learning algorithms to analyze the election conversation on Twitter. The Oxford paper made us curious about the possibility of spotting bots in the dashboard we recently built for journalists covering the election.
Bot detection can be challenging, partly because they come in different varieties. Some are purely automated accounts, while others layer some manual curation on top of automated tweets.
Last week, we noticed a spike while searching our Twitter data on the keyword “rigged.”
In early September, the “rigged” discussion on Twitter, which previously had revolved around a variety of issues including economic inequality and the electoral process, shifted suddenly toward immigration—that is, tweets containing the word “rigged” also used terms connected to immigration.
Digging into the data, we found one verbatim tweet showing up across a dozen or so handles, each of which posted the same message over and over each day: “Immigration Policy is RIGGED against American Workers #Trump2016 #FeelTheBern.”
Beyond using identical phrasing—including idiosyncratic capitalization—the tweets coming from these accounts all linked to the same video, which compares statements by Donald Trump and Bernie Sanders about immigration policy. Each video, in turn, linked to the same anti-Clinton Twitter account.
Although the accounts don’t have the telltale bot profile image—the egg—based on their characteristics and activity, including breakneck output of strikingly similar content, these are clearly spam handles, and apparently at least somewhat automated.
Wading in further, we found that each account puts out a stream of photos and GIFs on a given theme, on top of a common rotation of anti-Clinton videos and memes.
The bots follow the same playbook: Publicly they tweet the same innocuous content fitting their theme, while simultaneously flooding the replies of public figures and media outlets—essentially piggybacking on famous tweets to influence users who see those tweets’ replies—with campaign-driven videos and memes.
One apparent bot account has pumped out more than 27,000 tweets since its creation in March, with content that tends to mix videos of Clinton advisor John Podesta with memes from the 1970s film A Clockwork Orange:
A zombie-themed account boasts 30,000 tweets since April: Podesta mingled with the undead:
Then there’s the seeming food porn handle that has put out 21,000 tweets since March: Podesta plus photogenic snacks:
In the last few days, these three accounts have tweeted thousands of times, sometimes hundreds of posts in a single hour. Most went entirely dark on October 30, for some reason, then geared up early on October 31 to put out hundreds more by noon.
Spambots like these have been spotted at other points in this election. In April, a conservative activist noticed a few hundred accounts frantically tweeting an identical call to file federal complaints against Ted Cruz for robocalls.
In June, a reporter for New York magazine mined the feeds of three pro-Trump, alt-right accounts, noting that they consistently replied to Trump’s tweets within mere seconds and with memes attached. Like the accounts we’ve identified here, many of their replies lacked any connection to the subject of Trump’s original tweet.
Last week, one of those three accounts circulated a hoax image of immigration officers arresting Hispanic voters, according to ProPublica’s Electionland.
Difficult as it is to track down accounts like these or gauge their prevalence, it’s even harder to discern how they might affect the overall Twitter discussion about the election. Whether or not the Oxford analysis proves accurate, its authors performed a service merely by raising public awareness of election bots. More here including additional tweets.
****
Then there was that weird FBI release on Twitter:
FBI to Conduct Internal Probe of Election-Season Tweets
GovernmentExec: Suddenly renewed activity on an FBI Twitter account publicizing Freedom of Information Act releases has prompted an internal bureau review of the propriety of such activity so close to the Nov. 8 election, according to a source involved in the matter.
In emails obtained by Government Executive sent to an ex-investigative reporter who filed complaints, the deputy at the FBI’s Office of Professional Responsibility on Tuesday revealed that the complaint about possible political favoritism in tweeting has been referred to the FBI’s Inspection Division.
“Upon the completion of its investigation, the matter will be referred to my office for adjudication,” wrote Candice Will, assistant director of the Office of Professional Responsibility to Jonathan Hutson, a former investigative reporter and now a media consultant. He received a similar email from Nancy McNamara, assistant director of the FBI’s Inspection Division, with two more FBI employees copied.
An FBI official told Government Executive that on Oct. 30, electronic patches were sent through the FBI’s content management system to fix the automatic feed of information that goes through the FOIA Twitter account.
First reported on Thursday by the liberal-leaning news service Think Progress, the new probe comes days after questions were raised about the FBI FOIA office’s release on Monday of 129 pages of documents pertaining to the 2001-2005 investigation of President Bill Clinton’s last-minute pardon of fugitive financier Marc Rich, whose wife was a longtime Clinton donor.
That probe, led for a time by current FBI Director James Comey as a U.S. attorney, ended with no prosecutions, which is why the Hillary Clinton campaign immediately complained that its timing seemed questionable. “Absent a (Freedom of Information Act) deadline, this is odd,” Clinton campaign spokesman Brian Fallon tweeted. “Will FBI be posting docs on Trumps’ housing discrimination in ‘70s?”
It also comes less than a week after Comey shook up the presidential race with his letter to lawmakers and FBI staff suggesting that newly uncovered emails in an unrelated probe might be “pertinent” to the bureau’s suspended investigation Hillary Clinton’s mishandling of State Department emails.
The FBI responded to this week’s complaints with a statement outlining its FOIA policies:
“The FBI’s Records Management Division receives thousands of FOIA requests annually which are processed on a first in, first out basis,” it said. “By law, FOIA materials that have been requested three or more times are posted electronically to the FBI’s public reading room shortly after they are processed. Per the standard procedure for FOIA, these materials became available for release and were posted automatically and electronically to the FBI’s public reading room in accordance with the law and established procedures.”
But critics have now zeroed in on the bureau’s Twitter account at the FBI Records Vault. As noted by ex-investigative reporter Hutson, who first filed a complaint with the Justice Department inspector general, the FBI’s FOIA Twitter account had been silent for the past year. “For the first few years after its 2011 launch, most of its tweets produced only 10 re-tweets, the most being 122,” Hutson said. “But suddenly, at 4:00 a.m. on Sunday, Oct. 30, it roared to life, not for business and not usual.”
The Tweet on Bill Clinton’s Marc Rich pardon, which was part of a probe on the Clinton Foundation, “was highly negative for Hillary Clinton” because it didn’t mention that no charges were brought, while another recent FBI tweet, announcing new documents pertaining to Republican candidate Donald Trump’s father’s past housing industry activities, favored Trump by “calling him a philanthropist,” which in Hutson’s view is “editorial shading.”
Also, Hutson said, “it is significant and telling” that the FBI FOIA people also recently tweeted the FBI’s ethics manual. “That shows they know full well that is it illegal for bureau employees to influence or effect the outcome of an election.” Hutson believes there may be violations of the Hatch Act, Justice Department guidelines and the FBI ethics manual. The FBI vault item on the Clinton Foundation, he pointed out, now has 9,000 re-tweets.
FOIA specialists consulted by Government Executive had mixed evaluations of this turn of events, both for the release of the FOIA documents and the related tweeting. “It’s nothing abnormal,” said Ronald Kessler, an author and longtime investigative journalist who has written on the FBI. “People don’t understand that it would be improper for the FBI to withhold a release of material to try to manipulate media coverage simply because agents happen to finish their work on it late Friday afternoon or just before an election. Like all of us humans, agents try to work extra hard to finish a project that is close to completion before a long weekend.”
Anne Weismann, executive director of the Campaign for Accountability, said after all her years of sending FOIA requests to the FBI, she found it “astonishing” that the FBI is tweeting, saying it “adds to the unprecedented nature” of this fall’s FBI’s intervention in the presidential race. She also found it odd that the FBI released what appears to be a “first round, partial” file of documents in the Marc Rich case, “with no context.” “Unless you knew they were talking about a major, very serious investigation of a former president, you wouldn’t know that the FBI never prosecuted Clinton,” she said. “I’ve pushed the FBI in litigation for release of documents on a rolling basis, and they always say no.”
Alex Howard, a senior analyst at the Sunlight Foundation, said the FBI has some flexibility in releasing documents. “Agencies are mandated to acknowledge a FOIA request in 20 days, although many in practice do not. Unless an agency is under instruction by a judge to release records responsive to a FOIA lawsuit on a specified timeline or by a given deadline, however, agencies can have some discretion in when they disclose records to a requester, unless their FOIA regulations specify otherwise. The “first in, first out” standard is one such rule: some agencies have pending FOIA requests going back over a decade.”
Daniel Schuman, policy director for Demand Progress, said, “There’s not enough information to make a judgment, which is why we would welcome an independent investigation, but on its face it is unusual.”
NEW DIRECTION: John Brennan at a Senate Intelligence Committee hearing on his nomination to be the director of the CIA in 2013. Brennan has restructured the agency to REUTERS/Jason Reed
The CIA director has put the U.S. spy agency through a historic restructuring to cope with the era of digital warfare. Many in the agency are unhappy with the shake-up. In a series of interviews, Brennan outlines his strategy. “I think CIA really needs to up its game.”
ReutersInvestigates:WASHINGTON – When America goes to the polls on Nov. 8, according to current and former U.S. intelligence officials, it will likely experience the culmination of a new form of information war.
A months-long campaign backed by the Russian government to undermine the credibility of the U.S. presidential election – through hacking, cyber attacks and disinformation campaigns – is likely to peak on voting day, the officials said.
Russian officials deny any such effort. But current and former U.S. officials warn that hackers could post fictional evidence online of widespread voter fraud, slow the Internet to a crawl through cyber attacks and release a final tranche of hacked emails, including some that could be doctored.
“Don’t underestimate what they can do or will do. We have to be prepared,” said Leon Panetta, who served as CIA director and defense secretary in President Barack Obama’s first term. “In some ways, they are succeeding at disrupting our process. Until they pay a price, they will keep doing it.”
John Brennan, the current CIA director, declined to comment on the Russian efforts. But he said Russian intelligence operatives have a long history of marrying traditional espionage with advances in technology. More broadly, Brennan said, the digital age creates enormous opportunities for espionage. But it also creates vulnerabilities.
Citing an array of new cyber, conventional and terrorist threats, Brennan announced the most sweeping reforms of the CIA in its 69-year history 18 months ago.
Weakening the role of the Directorate of Operations, the agency’s long-dominant arm responsible for gathering intelligence and conducting covert operations, Brennan created 10 new “mission centers” where CIA spies, analysts and hackers work together in teams focused on specific regions and issues. He also created a new Directorate for Digital Innovation to maximize the agency’s use of technology, data analytics and online spying.
The information age “has totally transformed the way we are able to operate and need to operate,” Brennan told Reuters in a series of interviews. “Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”
When a new American diplomat arrives for duty at the U.S. embassy in Moscow or Beijing, CIA official say, Russian and Chinese intelligence operatives run data analytics programs that check the “digital dust” associated with his or her name. If the newcomer’s footprint in that dust – social media posts, cell phone calls, debit card payments – is too small, the “diplomat” is flagged as an undercover CIA officer.
The Russian-backed campaign to discredit the U.S. election is not isolated. Hackers believed to have links to Chinese intelligence began stealing the personal information of 22 million federal employees and job applicants in 2014, the worst known data breach in U.S. government history. Islamic State’s online propagandists continue to inspire lone wolf attacks in the United States even as the group loses territory.
A senior official from the Directorate of Operations, who backs the shake-up, said the agency is experiencing its greatest test in decades.
“The amount of threats and challenges that are facing this organization and this nation are greater than at any time in the last 30 years,” said the official, who declined to be named. “The days of a black passport, a fistful of dollars and a Browning pistol are over.”
“Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”
James Clapper, the Director of National Intelligence, praised Brennan and his efforts to retool the CIA for a new era in an interview. So did Lisa Monaco, Brennan’s successor as the President Obama’s Homeland Security and Counterterrorism adviser.
But some current and former officials question Brennan’s strategy, arguing his reforms are too digitally focused and will create a more cautious, top-heavy spy agency. At a time when the agency needs to refocus its efforts on human espionage, they say, the concentration of power in the new mission centers weakens the ability of the Directorate of Operations to produce a new generation of elite American spies.
The reforms have hurt morale, created confusion and consumed time and attention at a time of myriad threats, according to interviews with ten former officials.
Glenn Carle, a former CIA covert officer, supports Brennan and his reforms but said they have sparked a mixed reaction among directorate of operations officials who believe human intelligence is getting short shrift.
“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention,” the often inscrutable aims of foreign leaders, Carle said. “Obtaining that is a human endeavor.”
At the same time, Brennan has stirred a different sort of criticism – that he has defied Congressional oversight. Liberal Democrats and libertarian Republicans in Congress say the Brennan-Obama tenure has been tarnished by a lack of transparency with congressional oversight committees and the public regarding surveillance, drone strikes and the agency’s use of torture against terrorism suspects during the administration of George W. Bush.
“While I think John’s overall legacy will be as a reformer, that legacy will suffer from his refusal to come to grips with the CIA’s troubled torture program,” said Senator Dianne Feinstein, D-Calif, vice chair of the Senate’s intelligence committee. “I think the new president’s CIA director must prioritize a high level of trust between the CIA and Congress to insure proper oversight is conducted.”
It’s unclear how closely the country’s next president will hew to Brennan’s strategy.
The front-runner, Democrat Hillary Clinton, has an incentive to beef up American cyber-espionage: U.S. intelligence officials blame the continuing leak of emails from her campaign on Russian-backed hacking. Clinton also expressed support for covert action in a transcript of a 2013 speech she gave to Goldman Sachs that was recently released by Wikileaks.
Republican Donald Trump, meanwhile, pledged to make cybersecurity a top priority in his administration in an October 3 speech. “For non-state terror actors, the United States must develop the ability – no matter how difficult – to track down and incapacitate those responsible and do it rapidly,” Trump said. “We should turn cyber warfare into one of our greatest weapons against the terrorists.”
In interviews at agency headquarters in Langley, Virginia, Brennan declined to comment on either candidate or discuss operational details of the CIA. But he and eight other senior CIA officials gave the most detailed description yet of their rationale for the most radical revamp of the agency since its founding in 1947.
“I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan said. “I think CIA really needs to up its game.”
JUST-WAR THEORIST
Brennan, a 61-year-old native of north New Jersey, looks like a linebacker but talks like a technocrat. He speaks excitedly about how the CIA and other government bureaucracies can be configured in “a way to ensure optimal outcomes.”
The son of devout-Catholic Irish immigrants, Brennan speaks reverently of CIA officers as public servants who risk their lives without public accolades. He joined the agency in 1980, at the age of 24, after receiving a Master’s Degree in government with a concentration in Middle Eastern studies from the University of Texas.
“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention. Obtaining that is a human endeavor.”
Educated in various Catholic schools, including Fordham University, Brennan says he is an adherent of just war theory – a centuries-old Christian theological argument that war is justified when it is waged in self defense, as a last resort and minimizes civilian casualties. Those beliefs, he says, have guided him in one of the most controversial aspects of his tenure in the Obama administration.
As Obama’s White House counter-terrorism adviser and CIA director, Brennan played a central role in carrying out 473 U.S. airstrikes outside conventional war zones between 2009 and 2015, primarily by drone. U.S. officials estimate the attacks have killed 2,372 to 2,581 people, including 64 to 116 civilians. Human rights groups say the totals are vastly higher. Last year, for instance, a U.S. drone strike in Pakistan accidentally killed American aid worker Warren Weinstein and Italian aid worker Giovanni Lo Porto, who were both being held captive by al Qaeda.
Brennan declined to comment on specific strikes, but said, “I still can look myself in the mirror everyday and believe that I have tried to do what is morally right, what is necessary, and what is important to keep this country safe.” He also acknowledged mistakes.
“You question yourself. You beat yourself up. You try to learn from it,” Brennan said, in a rare display of emotions. “But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”
Today, Brennan says the United States faces the most complex array of threats he has seen since joining the agency 36 years ago. As a CIA analyst, operative and executive, he has lived through the Cold War espionage duels of the 1980s; the disintegration of nation-states after the 1989 fall of the Berlin Wall; the rise of non-state terrorist groups since 2001; and the current digital disruption. Now, he says, all four dynamics are converging at once.
BOLD AND INNOVATIVE RIVALS
CIA officials say their greatest state competitors are the Russian and Chinese intelligence services. While smaller countries or terrorist groups may want to strike at the United States, Russia and China are the only two adversaries with the combination of skills, resources and motivation needed to challenge Washington.
In recent years, Moscow’s Federal Security Service, or FSB, has become adept at waging “gray zone” conflicts in Ukraine, Crimea and Syria, the officials said. In all three countries, Russian intelligence operatives have deftly shrouded protagonists, objectives and war crimes in ambiguity.
“You beat yourself up…. But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”
One target is America’s increasingly politically polarized democracy. As Russian-backed hacking unfolded this summer, the Obama White House’s response fueled frustration among law enforcement and intelligence officials, according to current and former officials. The administration, they said, seemed to have no clear policy for how to respond to a new form of information warfare with no rules, norms or, it seemed, limits.
White House officials said the administration is still considering various methods of responding, but the responses won’t necessarily be made public.
China presents another challenge. Chinese businessmen and students continue trying to scoop up American state and economic secrets. In one bright spot, Beijing appears to be abiding by a 2015 pact signed by Obama and Chinese leader Xi Jinping that the two governments would not conduct economic espionage against one another. Chinese hacking appears to have slowed from the voracious rate of the past, which included hacking into the computers of the 2008 presidential campaigns of John McCain and Barack Obama but not releasing what was found.
“The question is whether or not it is due to greater care in terms of covering one’s tracks,” Brennan said of the apparent change. “Or whether or not they realize that they’re brand is being tarnished by this very rapacious appetite for vacuuming up things.”
Regional powers are also increasing their digital espionage efforts.
In 2014, the Obama administration blamed North Korea for the hacking of Sony Pictures’ computer system. This spring, U.S. prosecutors indicted seven Iranian hackers for allegedly trying to shut down a New York dam and conducting a cyber attack on dozens of U.S. banks. They also indicted three Syrian members of the “Syrian Electronic Army,” a pro-Syrian government group, who hacked into the websites of U.S. government agencies, corporations and news organizations.
In a 2015 case that U.S. officials said marks a worrying new trend, federal prosecutors indicted a 20-year-old hacker from Kosovo. With the help of a criminal hacker, Ardit Ferizi stole the home addresses of 1,300 members of the U.S. military, providing the information to Islamic State and posting it online, and calling for attacks on the individuals. Ferizi was arrested in Malaysia, where he was studying computer science. In September, he pleaded guilty in a U.S. federal court and was sentenced to 20 years in prison.
“This blend of the criminal actor, the nation-state actor and the terrorist actor, that’s going to be the trend over the next five years,” said John Carlin, who recently stepped down as head of the Justice Department division that monitors foreign espionage in the United States.
But some active clandestine officers argue that the intelligence community has grown too reliant on technology, a trend they trace back four decades to the directorship of Stansfield Turner. Satellite photography, remote sensors and communications intercepts have become more sophisticated, but so have encryption techniques and anti-satellite weapons.
More important, they argue, is that technology is no substitute for “penetrations” – planting or recruiting human spies in foreign halls of power. The CIA missed India’s 1998 nuclear tests and misjudged Saddam Hussein’s arsenal in 2003 because it lacked spies in the right places.
Today, these current and former CIA officials contend, American policymakers have little insight into the thinking of Vladimir Putin’s inner circle. Presidents, kings and dictators often don’t share their true intentions electronically, putting this valuable information largely beyond the scope of digital spying. The best sources are still people, and these officials believe the agency is not mounting the kind of bold human spying operations it did in the past.
Brennan and other CIA officials flatly denied downplaying human intelligence. They said aggressive, high-risk human spying is under way but they cannot go into operational detail.
One of Brennan’s predecessors, Michael Hayden, former CIA chief under President George W. Bush, says the agency strayed from its core mission during the Bush years. After the Al Qaeda attacks of Sept. 11, 2001, Hayden said, the CIA had to shift to become a paramilitary organization that devoted its most talented officers to tracking and killing terrorists. It now needs to reverse that trend by focusing on espionage against rival nations, he said.
“The constant combat of the last 15 years has pushed the expertise of the case officer in the direction of the battlefield and in the direction of collecting intelligence to create physical effects,” said Hayden, using an intelligence euphemism for killing. “At the expense of what the old guys called long-range, country-on-country intelligence gathering.”
‘OPTIMIZING CAPABILITIES’
Brennan and the eight other senior CIA officials made the case that their modernization effort will address the needs and threats described by Hayden and others. Technological advances, they said, have leveled the intelligence playing field. The web’s low cost of entry, creativity and speed benefits governments, hackers and terrorists alike.
A veteran covert operative who runs a new CIA mission center compared Brennan’s reforms to the Goldwater-Nichols Act. The landmark 1986 legislation reorganized the U.S. military into a half dozen regional commands where the Army, Navy, Air Force and Marines work together. It was a response to inter-service rivalries that bedeviled the American military in Vietnam.
The CIA equivalent involves having the agency’s five main directorates – Operations (covert spies), Analysis (trends and prediction), Science and Technology (listening devices and other gadgetry) and Digital Innovation (online sleuthing) and Support (logistics) – provide the personnel needed by each regional mission center.
Andrew Hallman, director of the new Directorate for Digital Innovation, said the CIA has embraced cloud computing as a way to better share intelligence. In a move that shocked insiders and outsiders, the CIA awarded an $600 million contract to Amazon in 2013 to build a secure cloud computing system where multiple CIA databases can be quickly accessed.
For decades, different directorates maintained their own separate databases as a security measure, said Hallman. Some of the applications the agency used were so old – up to 30 years – that the manufacturer was no longer in business.
Turning to Amazon was designed to immediately put private-sector computing advances at the fingertips of CIA operatives. It was also an admission that it was easier for the agency to buy innovation from the private sector than try to create it internally.
Several former CIA officials criticized the new team-focused system, saying it dilutes the cultures that made each agency directorate strong. The best analysts are deeply skeptical and need to be separated from covert operatives to avoid group-think, they said. And the best covert operatives are famously arrogant, a trait needed to carry out the extraordinarily difficult task of convincing foreigners to spy for America.
Richard Blee, a former CIA clandestine officer, said the agency needed reform but highlighted a separate problem created by technological change. Instant secure communications between CIA headquarters and officers in the field has centralized decision-making in Washington, Blee said. And regardless of administration, senior officials in Washington are less willing to take a risk than field officers – virtually all of whom complain about headquarters’ excessive caution.
“The mentality across the board in Washington is to take the lowest common denominator, the easiest option, the risk-free option,” Blee said. “The Chinese are taking tough decisions, the Russians are taking tough decisions and we are taking risk-averse decisions. And we are going to pay a price for that down the road.”
Brennan says his reforms will empower CIA officers: The integrated teams in each new mission center will improve speed, adaptability and effectiveness.
“To me, that’s going to be the secret of success in the future, not just for CIA but for other organizational structures,” Brennan said. “Taking full advantage of the tools, capabilities, people and expertise that you have.”
The old ways of spycraft, Brennan argues, are no longer tenable. Asked what worries him most, he gave a technocratic answer: Twentieth century American government management practices are being rendered obsolete in the digital age.
“U.S. decision making processes need to be streamlined and accelerated,” he said. “Because the problems are not going to wait for traditional discussions.”
Supporters hail CIA director John Brennan as a devoted public servant with a strong moral core and a tenacious work ethic. He has increased the recruitment of minority intelligence officers and promoted women to senior posts. He wears a lanyard around his neck every day that celebrates LGBT diversity at the CIA.
But some former covert operatives say Brennan is too cautious and political. Liberals accuse Brennan of protecting the CIA instead of forcing it to become more accountable to Congress. In particular, they blame Brennan for convincing President Barack Obama to oppose the release of the full 6,000-page U.S. Senate report detailing torture by the CIA during the presidency of George W. Bush. In private hearings, they said, Brennan bristled at questions from senators regarding the report.
After CIA officials searched the computer of a Senate staffer investigating torture, an outraged Sen. Dianne Feinstein accused Brennan’s CIA of provoking a “constitutional crisis” by thwarting Congress’ ability to perform its mandated right to oversee the executive-branch agency. Two other Democratic Senators called for Brennan’s resignation. Obama and White House Chief of Staff Denis McDonough aggressively defended Brennan, who eventually apologized to Feinstein.
“The exhaustive 6,000-page Senate Intelligence Committee report fully documented the program,” Feinstein told Reuters, “but the CIA under John’s leadership has had difficulty confronting this dark chapter and learning from its mistakes.”
Leon Panetta, who served as President Obama’s first CIA director, said he understood Brennan’s desire to protect CIA officers who carried out interrogation methods deemed legal at the time by the Bush administration. But he said it was important to also be open with Congress and the public.
“I think you can do both,” Panetta said. “You can protect people there [at the CIA]. And be honest with the American people.”
Brennan and his aides vehemently defend his reforms, his transparency and his response to the Senate torture investigation, which they say exaggerated the scale of CIA abuse. They say Brennan, who opposes waterboarding, successfully struck a middle course – ending torture while protecting the identities of CIA operatives.
“He did more to stand up for human rights than any other official in the administration,” said Harold Hongju Koh, a Yale Law School professor who served as Hillary Clinton’s top legal adviser in the State Department.
In the interview, Brennan said the actions of CIA officials who exceeded the Bush-era interrogation guidelines were “reprehensible.” But he said the Senate report exaggerated the scale of abuse. Brennan contended that the vast majority of CIA officers followed the Bush-era guidelines and were being unfairly “maligned by individuals who have political agendas.”
“When we do things that are within our authorized mandate, things that we are directed to do by our presidents, things that are deemed lawful by our Department of Justice,” Brennan said, “for us to be dragged through the coals on that, I find that reprehensible as well.”
Friends say Brennan say he has privately expressed frustration with the White House’s cautious response to the war in Syria and growing Russian assertiveness. But, they add, he is in many ways similar to Obama himself, questioning America’s ability to unilaterally change the world.
Brennan declined to comment on his own policy views. But he said, “I really feel as though my moral compass is pretty similar” to Obama’s. And he echoed a central tenet of Obama’s worldview.
The U.S. should act as the “world’s organizer of support to countries that are in desperate need,” Brennan said, but “recognize that our influence and power over the course of events is limited.”
—————
Digitizing the CIA
By David Rohde
Additional reporting by John Walcott and Jonathan Landay