An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
So it is Flat Tax or Fair Tax? Uncertain at this point. Will it be a reform plank devised by Trump’s financial advisors? Humm, will it be a reform piece of legislation created by the House Republicans? Another humm…but lets look at the following for clues.
***
A Better Way Forward on Tax Reform
In June, Ways and Means Republicans led the effort to unveil a “Better Way for Tax Reform.” This bold Blueprint delivers a 21st century tax code built for growth – the growth of families’ paychecks, the growth of American businesses, and the growth of our nation’s economy.
The Blueprint also provides unprecedented simplicity and fairness for taxpayers, which means most Americans will be able to file their taxes on a form as simple as a postcard.
With a simpler, fairer tax code, Americans need a simpler, fairer tax collector. The Blueprint redesigns the Internal Revenue Service (IRS) into an agency with a singular focus: Service First.
BOSTON – Six inmates at MCI Norfolk are facing discipline after a probe into information that some convicts at the prison’s Muslim chapel were preaching jihad speeches by a former Al Qaeda recruiter, FOX25 Investigates has learned.
FOX25 confirmed a report that inmates used recordings from Al Qaeda recruiter and U.S. citizen Anwar al-Awlaki, who was killed years ago in a drone strike, to preach jihad to others at the state prison.
The state Department of Correction has confirmed six inmates who attended the prison’s Muslim chapel are facing discipline for setting up a structure of power over other inmates, requiring uniforms and demanding contracts of allegiance.
Martin Horn, a professor at John Jay College of Criminal Justice who once led New York City’s prison system and set up an intelligence center on Rikers Island, said law enforcement officials need to look at more than just the jihad preaching.
“You want to begin to look at, for example, their phone calls. You want to look at the records of who’s sending money to their account,” Horn told FOX25 Investigative Reporter Eric Rasmussen via Skype. “If one were going to try to recruit individuals to engage in the kinds of terrorist activities that most concern us, what better place to look for recruits than inside a prison?”
In a statement to FOX25, the state Department of Correction said, “It was determined that the ‘jihad’ that was being preached was in the context of personal spiritual struggle with regard to oneself, as opposed to a war against non-believers.”
A DOC spokesman said there is “no evidence that their unauthorized activities were being used as a recruiting tool for any extremist ideology.”
But Horn also says there’s good reason to investigate.
“Well, look, first of all, prisoners come out. Eventually, they’re all coming out to the community,” Horn told FOX25 Investigates. “And we know from several experiences that, often times, they can influence activities that occur on the outside.”
The Department of Correction confirms it consulted with federal law enforcement on the investigation but told FOX25 Investigates it found nothing illegal.
The six medium-security inmates, who have not been identified, are still facing discipline because prison rules forbid setting up any kind of hierarchy – like a gang – regardless of religion.
Correction stated that “jihad” was being preached, but it “was in the context of a personal spiritual struggle with regards to oneself, as opposed to a war against non-believers.”
DOC spokesman Chris Fallon said federal law enforcement authorities were consulted, and there is no active criminal investigation regarding the matter.
“No criminal charges have been brought against the members of this inmate group, as there is no evidence that their unauthorized activities were being used as a recruiting tool for any extremist ideology,” the statement from Department of Corrections read. “The inmates are facing administrative disciplinary charges as a result of their alleged misconduct.”
Possible punishments against the prisoners include loss of privileges, disciplinary detention, extra duty, room or unit restrictions, Correction said.
“To be clear, inmates are not allowed to create a hierarchical structure where they would have power over other inmates,” Correction’s statement reads.
**** So what role does CAIR have in the prison system? In part:
REHABILITATION PROGRAMS
As the prison population grows in religious diversity, administrators of correctional institutions must increase their multicultural awareness. Faith-based rehabilitation programs must be voluntary. Inmates should not be forced to participate in functions designated for adherents of other faith groups. Examples of such devotional practices include confession, singing and playing music, and holding hands with a chaplain preaching or reciting religious material.
But…. a 2009 article in the New York Times has some factual items stating otherwise:
The Justice Department’s inspector general issued a report in 2004 faulting the prison system for failing to protect against “infiltration by religious extremists.” But it said the problems rested not so much with radical chaplains but unsupervised inmates leading their own worship services.
The federal Bureau of Prisons said Friday that it had taken steps to monitor attempts to radicalize prisoners, better vet the people who conduct inmate religious services, expand chaplain training and screen written materials. While the potential for radicalization is there, “we see no evidence that inmates are being converted to Islam by extremists in federal prisons,” said a spokeswoman, Traci L. Billingsley.
The fomenting of extremist ideas among Muslims is not a problem in the New York State prison system, said Erik Kriss, a spokesman for the Department of Correctional Services. “We have a zero-tolerance policy for any chaplain advocating violence or extremist beliefs,” he said. The department holds meetings with chaplains to remind them of that, monitors religious literature coming in, and videotapes, audiotapes or sends guards to services, he said. In the past several years, the department removed from prison libraries an English version of the Koran that had commentary advocating violence to spread Islam, he said.
Islam is the fastest-growing religion in the prison system. About 30,000 to 40,000 conversions among federal prisoners take place each year, according to a study for the Justice Department by Mark S. Hamm, a criminologist at Indiana State University. About 6 percent of the nation’s 173,000 federal prisoners are Muslim.
Mr. Hamm’s study, published in December 2007, says that most inmates convert in prison for one of five main reasons: because they are in personal crisis, seek a spiritual dimension, are looking for a group to protect them, want to manipulate the system or are influenced by the outside world.
He concludes that generally, “there is no relationship between prisoner conversions to Islam and terrorism.” The danger lies, he said in an interview Friday, in “prison Islam,” which he identified as “small gang-like cliques that use cut-and-paste versions of the Koran” to give a religious overlay to their activities. The danger becomes acute when a member leaves prison and forms a radical cell.
Mr. Hamm said he has counted five examples of this since 2005, notably a plot hatched in a California state prison that year to attack synagogues, American military installations and Israeli officials. The four plotters belonged to a group called Jam’iyyat Ul-Islam Is-Saheeh, or the Assembly of Authentic Islam.
The Joint Worldwide Intelligence Communications System, is a Top Secret/SCI network run by the United States’ Defense Intelligence Agency and used across the Department of Defense, Department of State, Department of Homeland Security and Department of Justice to transmit especially sensitive classified information.
FNC/EXCLUSIVE: Two State Department contractors, with decades of experience protecting the United States’ most sensitive secrets, are speaking out for the first time about Hillary Clinton’s tenure as secretary of state and how the rules for government security clearance holders did not seem to apply to Clinton and her team.
“The State Department was her oyster and it was great for the [Clinton] foundation and great for the Clintons to be able to have such a great position,” Dave Whitnah told Fox News.
Whitnah said he worked within the State Department’s Office of Security Technology which is responsible for cameras and alarms and sweeping for bugs. Whitnah said everyone understood the secretary of state is the primary target of foreign intelligence services.
“The number one person would be the secretary of state and their communications,” Whitnah explained. “You can think of the Iran negotiations, nuclear negotiation, negotiations with Russia, talks with Russia. You know, anything to do with foreign policy.”
Whitnah emphasized that tens of millions of dollars were spent on technical security for Clinton that apparently was disregarded as her team traveled around the world on official U.S. government business.
“It was unfathomable that [her BlackBerry] would be used for anything other than just unclassified communication,” Whitnah said. Clinton’s devices were not certified as secure by the State Department. As for her use of a non-secure BlackBerry, Whitnah stressed that email can be intercepted and, “Even if turned off, it’s still a listening device so that’s why you take out the batteries.”
As Clinton was sworn in as secretary in January 2009, government contractor Amel Smith said he was also working at the department and: “State Department rules are clear. I helped write those rules.”
Smith says his 30 years of experience includes serving in the U.S. Army’s 82nd Airborne, before becoming a counter-intelligence and counter-espionage investigator at State tracking down breaches of classified materials. He reviewed some of the FBI witness interviews from the Clinton email investigation with Fox News, and questioned those who claimed not to have the proper training in handling sensitive information.
“I hear things like, well, I forgot, um, I don’t know that I was trained, I don’t know this. You know — every single person that had access to that information when it was sent is in violation,” Smith emphasized.
The FBI witness interviews also show secure facilities for classified information — known as SCIFs — were specially built for Clinton in her in Washington, D.C., and Chappaqua, N.Y., homes. Doors that were supposed to be locked were left open.
“If you’ve got an uncleared person in there, it’s automatically a compromise,” Smith said.
Another FBI interview summary said there were personally owned desktop computers in the secure facilities at Clinton’s homes, yet she told the FBI that she did not have a computer of any kind in these facilities.
“If somebody said they’re there, then they probably were there, and you know, the reason you would deny it was because you probably didn’t have approval,” Smith said.
Having unapproved computers in a SCIF would automatically call for a security investigation.
Asked for his reaction to Clinton’s claim that nothing she sent or received was marked classified, Whitnah called that assertion a “misrepresentation.” Fox News was first to report in June that at least one of the emails contained a classified information portion marking for “c” which is confidential. FBI Director James Comey later said in July when he recommended against criminal charges that a handful of Clinton emails contained classified markings.
But more than 2,100 emails with classified information, and at least 22 at the “top secret” level, passed through Clinton’s unsecured private server. Asked how it happened, Smith said, “Personally, there had to have been somebody moving classified information from C-LAN, C-LAN again is Secret, Confidential only, and JWICS. JWICS is where all top secret information is.”
After new emails were found in the Anthony Weiner sexting case belonging to his estranged wife Clinton aide Huma Abedin, the FBI reopened the Clinton email investigation. On Sunday, Comey said the emails did not change his recommendation against criminal charges because his investigators did not find intent to move classified materials outside secure government channels
“Whether it’s the private email server, whether it’s this private laptop. If there’s classified — one document on there — that’s classified, it’s a violation. Somebody violated [the] law,” Smith said. “Throw all the politics out the window, what we’re talking about is the defense of this nation.”
Asked about Smith and Whitnah, who filed a complaint against the State Department, a department spokesman said they were not direct hires — adding that the head of diplomatic security told the FBI that Clinton was “very responsive to security issues.”
****
And her State Department approved that security team in Benghazi
Benghazi guards turned on US diplomats in 2012 attack, sources say
Expand / Contract
Stevens, shown in rear wearing black, with several of the guards sources say turned on him. (Special to Fox News)
FNC: An obscure private firm hired by the State Department over internal objections to protect U.S. diplomats in Benghazi just months before the American ambassador and three others were killed was staffed with hastily recruited locals with terror ties who helped carry out the attack, multiple sources told Fox News.
The explosive charge against Wales-based Blue Mountain Group comes from several sources, including an independent security specialist who has implemented training programs at U.S. Consulates around the world, including in Benghazi, where he trained a local militia that preceded Blue Mountain. The source, who spoke on condition of anonymity, said Blue Mountain used local newspaper ads to assemble a team of 20 guards, many of whom had terror ties, after securing a $9.2 million annual contract.
“The guards who were hired were locals who were part of the Ansar al-Sharia and Al Qaeda groups operating in Benghazi,” said the source, whose assignment in Benghazi had ended in November 2011. “Whoever approved contracts at the State Department hired Blue Mountain Group and then allowed Blue Mountain Group to hire local Libyans who were not vetted.”
Many were members of the Libyan government-financed February 17th Martyrs Brigade, an Islamist militia that had previously guarded Americans before being replaced by Blue Mountain.
John “Tig” Tiegen, one of the CIA contractors that responded to the Sept. 11, 2012 attack and co-author of “13 Hours: The Inside Account of What Really Happened in Benghazi,” confirmed to Fox News that the local Libyans who attacked the consulate that night included guards working for Blue Mountain.
“Many of the local Libyans who attacked the consulate on the night of Sept. 11, 2012, were the actual guards that the State Department under Hillary Clinton hired to protect the Consulate in Benghazi,” Tiegen told Fox News. “The guards were unvetted and were locals with basically no background at all in providing security. Most of them never had held a job in security in the past.
“Blue Mountain Libya, at the time of being awarded the contract by our State Department, had no employees so they quickly had to find people to work, regardless of their backgrounds,” he said.
One former guard who witnessed the attack, Weeam Mohamed, confirmed in an email sent to the Citizens Commission on Benghazi and obtained by Fox News, that at least four of the guards hired by Blue Mountain took part in the attack after opening doors to allow their confederates in.
“In the U.S. Mission, there were four people [who] belonged to the battalion February 17,” Mohamed wrote to the Commission, an independent body formed with Accuracy in Media to investigate the attack and the administration’s handling of it.
“Always armed. And they are free to move anywhere inside a building mission.
“And therefore, they had a chance to do an attack on the mission’s headquarters. They have all the details about the place. At the same time they have given the United States a painful blow,” Mohamed wrote.
Blue Mountain officials did not return multiple requests for comment. The State Department acknowledged in internal emails obtained by FoxNews.com the local recruits fell short of their duty, but discounted the claim any took an active role in the attack that resulted in the deaths of Ambassador Christopher Stevens, Foreign Service Information Officer Sean Smith and CIA contractors and former Navy SEALs Tyrone Woods and Glen Doherty.
“While the Accountability Review Board report and other reports were critical of our local guards’ performance, we are not aware of any evidence that they participated in the attacks themselves,” said State Department spokesman John Kirby.
Blue Mountain was hired in February 2012, following an uprising that ended Col. Muammar Gaddafi’s 42-year rule and plunged Libya into violent chaos. Congressional testimony in the wake of the attack on a consular office in Benghazi revealed that Stevens and his staff had made hundreds of requests for security upgrades but had been ignored by officials in Washington.
“We kept asking for additional support, including a 50-caliber mounted machine gun, but the State Department would not give it to us, because they said it would upset the locals,” the source told Fox News. “Instead, the State Department hired a company that doesn’t have employees, which then hired terrorists.”
Clare Lopez, a member of Citizens’ Commission on Benghazi, said the Clinton State Department bears blame for the security situation.
“Think about it: Hillary Clinton’s State Department actually hired the very people who, along with their jihadist allies in Benghazi, attacked us and killed U.S. Ambassador Chris Stevens and Sean Smith as well as CIA contractors Glen Doherty and Ty Woods,” Lopez said.
According to government records obtained by the Washington-based Judicial Watch, the State Department was in a “rush” to hire Blue Mountain UK, and its affiliate, Blue Mountain Libya, which together formed The Blue Mountain Group to secure the Benghazi contract.
“I understand there was a tremendous rush to get the original contract awarded, and the Service level agreement was most likely overlooked in the rush,” wrote State Department contracting officer Jan Visintainer, in a June 6, 2012, email. Emails obtained from [missing word] after the attack showed Visintainer urged Blue Mountain officials not to talk to the media.
Blue Mountain UK was formed in 2008 by David Nigel Thomas, a former Special Air Service official. Charles Tiefer, a commissioner at the Commission on Wartime Contracting, told Reuters the company was not well known.
“Blue Mountain was virtually unknown to the circles that studied private security contractors working for the United States, before the events in Benghazi,” Tiefer said.
Despite the size of the operation, and having no staff or track record with the State Department, Blue Mountain Group landed the $767,767-per-month contract to protect the Benghazi consular office, beginning on Feb. 17, 2012.
The company solicited applications in local newspapers and on websites, and very little, if any, screening of guards was done, the security specialist told Fox News. The lack of vetting led to several potentially dangerous hires beginning in March of 2012, he said.
“One of those guards hired by Blue Mountain was the younger brother of the leader of Al Qaeda of Benghazi,” he said.
In an email obtained by Judicial Watch, Jairo Saravia of the Regional Security office for the U.S. Embassy in Tripoli, told his superiors in Washington that Blue Mountain had held and lost security contracts in Tripoli, with the Corinthian Hotel and Palm City complex.
“The latest information is Blue Mountain is not licensed by the GOL (Government of Libya) to provide security services in Libya,” Saravia wrote. “I would advise not to use their services to provide security for any of our annexes and/or offices due to the sensitivity this issue has with the current GOL.”
Prior to Blue Mountain, security for Americans in Benghazi had been provided by the February 17th Martyrs Brigade under a direct agreement with the State Department. Despite its Islamist orientation, the militia included dozens of locals who had been carefully cultivated and trained by the U.S., according to the source. The majority of the February 17 Militia guards were fired without warning when Blue Mountain was hired, leading some members to turn against the Americans, he said. The State Department kept on at least three February 17 employees for patrol.
Eric Nordstrom, the regional security officer in Libya who has vast, first-hand knowledge of some 600 security requests denied to the U.S. diplomatic mission in Libya, testified on May 8, 2013, before the Congressional Committee On Oversight & Government Reform that he was aware that employees with both February 17 Martyrs Brigade and Blue Mountain had ties to Islamist terrorists.
“I had met with some of my agents and then also with some annex personnel. We discussed that,” Nordstrom told lawmakers.
Nordstrom testified that the “ferocity and intensity” of the 13-hour, four-phase attack, on the 11th anniversary of 9/11, was nothing that they had seen in Libya, or that he had seen in his time in the Diplomatic Security Service, with as many as 60 attackers in the consulate.
“I am stunned that the State Department was relying on [locals] with extremist ties to protect American diplomats,” U.S. Rep. Blake Farenthold, R-Texas, told Fox News. “That doesn’t make any sense. How does that happen?”
Fox News was able to verify through a former Libyan guard the identities of several February 17 employees hired despite terrorist ties, who he said participated in the attack. While their identities have been provided to federal authorizes, none have been prosecuted.
Dark Money refers to political spending meant to influence the decision of a voter, where the donor is not disclosed and the source of the money is unknown. Depending upon the circumstances, Dark Money can refer to funds spent by a political nonprofit or a super PAC. Here’s how:
Political nonprofits are under no legal obligation to disclose their donors. When they choose not to, they are considered Dark Money groups.
Super PACs can also be considered Dark Money groups in certain situations. While these organizations are legally required to disclose their donors, they can accept unlimited contributions from political non-profits and “shell” corporations who may not have disclosed their donors, in these cases they are considered Dark Money groups. More here.
Boston law firm accused of massive straw-donor scheme
Last Updated Nov 2, 2016 12:04 PM EDT
CBS: Hillary Clinton’s campaign is returning thousands of dollars in donations linked to what may be one of the largest straw-donor schemes ever uncovered.
A small law firm that has given money to Sen. Elizabeth Warren, Sen. Harry Reid, President Obama and many others is accused of improperly funneling millions of dollars into Democratic Party coffers. The program was exposed by the Center for Responsive Politics and the same team of Boston Globe investigative reporters featured in the movie “Spotlight.”
The Thornton Law Firm has just 10 partners, but dollar for dollar, it’s one of the nation’s biggest political donors, reports CBS News correspondent Tony Dokoupil.
But according to the firm’s own documents – leaked by a whistleblower — days or even hours after making these donations, partners received bonuses matching the amount they gave.
“Once the law firm knew that we had these records, they didn’t deny that this was the case,” said Scott Allen, Boston Globe’s Spotlight editor.
“If you give a donation and then somebody else reimburses you for that contribution, that is a clear violation of the spirit and the letter of the law at the state and federal levels,” Allen added.
Federal law limits partnerships, like the Thornton Law Firm, to a maximum donation of $2,700 per candidate. But campaign finance watchdogs say the firm used its individual partners as straw donors, allowing it to funnel money to campaigns well above that legal limit.
“Straw donor reimbursement systems are something both the FEC and the Department of Justice take very seriously, and people have gone to jail for this,” Center for Responsive Politics editorial director Viveca Novak said.
The Spotlight team and the Center for Responsive Politics looked at donations from three of the firm’s partners from 2010 to 2014. The trio and one of their wives gave $1.6 million, mostly to Democrats. Over the same period, they received $1.4 million back in bonuses.
A Thornton spokesman said the bonuses are legal because they came out of each partner’s ownership stake in the firm. In other words, they were paid with their own money.
In a statement, the firm said:
“We would like to make it clear that the Thornton law firm has complied with all applicable laws and regulations regarding campaign contributions. Ten years ago, it hired an outside law firm to review how it wanted to handle donations to politicians. It was given a legal opinion on how it should structure its program and then it hired an outside accountant to review and implement the program. It was a voluntary program which only involved equity partners and their own personal after-tax money to make donations.”
Through its employees, the firm gave to Democrats running in some of this year’s most hotly contested races — ones that could determine control of the U.S. Senate.
Massachusetts Republicans are calling for an investigation.
“In the end, it’s about restoring integrity to a process that folks are already extremely wary of,” Massachusetts Republican Party chair Kirsten Hughes said.
Allen said he’s not “confident at all” that this is an isolated program at Thornton.
“We’ve had a number of parties coming forward to us saying, ‘Hey, they do this at our place too.’ So the issue is always, can you prove it?” Allen said.
CBS News has learned the non-partisan Campaign Legal Center will file a complaint with the Federal Elections Commission Wednesday.
Sen. Elizabeth Warren, who has received nearly $130,000 from the firm since 2007, told the Boston Globe she will not return any money unless investigators find the donations were illegal.
NEW DIRECTION: John Brennan at a Senate Intelligence Committee hearing on his nomination to be the director of the CIA in 2013. Brennan has restructured the agency to REUTERS/Jason Reed
The CIA director has put the U.S. spy agency through a historic restructuring to cope with the era of digital warfare. Many in the agency are unhappy with the shake-up. In a series of interviews, Brennan outlines his strategy. “I think CIA really needs to up its game.”
ReutersInvestigates:WASHINGTON – When America goes to the polls on Nov. 8, according to current and former U.S. intelligence officials, it will likely experience the culmination of a new form of information war.
A months-long campaign backed by the Russian government to undermine the credibility of the U.S. presidential election – through hacking, cyber attacks and disinformation campaigns – is likely to peak on voting day, the officials said.
Russian officials deny any such effort. But current and former U.S. officials warn that hackers could post fictional evidence online of widespread voter fraud, slow the Internet to a crawl through cyber attacks and release a final tranche of hacked emails, including some that could be doctored.
“Don’t underestimate what they can do or will do. We have to be prepared,” said Leon Panetta, who served as CIA director and defense secretary in President Barack Obama’s first term. “In some ways, they are succeeding at disrupting our process. Until they pay a price, they will keep doing it.”
John Brennan, the current CIA director, declined to comment on the Russian efforts. But he said Russian intelligence operatives have a long history of marrying traditional espionage with advances in technology. More broadly, Brennan said, the digital age creates enormous opportunities for espionage. But it also creates vulnerabilities.
Citing an array of new cyber, conventional and terrorist threats, Brennan announced the most sweeping reforms of the CIA in its 69-year history 18 months ago.
Weakening the role of the Directorate of Operations, the agency’s long-dominant arm responsible for gathering intelligence and conducting covert operations, Brennan created 10 new “mission centers” where CIA spies, analysts and hackers work together in teams focused on specific regions and issues. He also created a new Directorate for Digital Innovation to maximize the agency’s use of technology, data analytics and online spying.
The information age “has totally transformed the way we are able to operate and need to operate,” Brennan told Reuters in a series of interviews. “Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”
When a new American diplomat arrives for duty at the U.S. embassy in Moscow or Beijing, CIA official say, Russian and Chinese intelligence operatives run data analytics programs that check the “digital dust” associated with his or her name. If the newcomer’s footprint in that dust – social media posts, cell phone calls, debit card payments – is too small, the “diplomat” is flagged as an undercover CIA officer.
The Russian-backed campaign to discredit the U.S. election is not isolated. Hackers believed to have links to Chinese intelligence began stealing the personal information of 22 million federal employees and job applicants in 2014, the worst known data breach in U.S. government history. Islamic State’s online propagandists continue to inspire lone wolf attacks in the United States even as the group loses territory.
A senior official from the Directorate of Operations, who backs the shake-up, said the agency is experiencing its greatest test in decades.
“The amount of threats and challenges that are facing this organization and this nation are greater than at any time in the last 30 years,” said the official, who declined to be named. “The days of a black passport, a fistful of dollars and a Browning pistol are over.”
“Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”
James Clapper, the Director of National Intelligence, praised Brennan and his efforts to retool the CIA for a new era in an interview. So did Lisa Monaco, Brennan’s successor as the President Obama’s Homeland Security and Counterterrorism adviser.
But some current and former officials question Brennan’s strategy, arguing his reforms are too digitally focused and will create a more cautious, top-heavy spy agency. At a time when the agency needs to refocus its efforts on human espionage, they say, the concentration of power in the new mission centers weakens the ability of the Directorate of Operations to produce a new generation of elite American spies.
The reforms have hurt morale, created confusion and consumed time and attention at a time of myriad threats, according to interviews with ten former officials.
Glenn Carle, a former CIA covert officer, supports Brennan and his reforms but said they have sparked a mixed reaction among directorate of operations officials who believe human intelligence is getting short shrift.
“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention,” the often inscrutable aims of foreign leaders, Carle said. “Obtaining that is a human endeavor.”
At the same time, Brennan has stirred a different sort of criticism – that he has defied Congressional oversight. Liberal Democrats and libertarian Republicans in Congress say the Brennan-Obama tenure has been tarnished by a lack of transparency with congressional oversight committees and the public regarding surveillance, drone strikes and the agency’s use of torture against terrorism suspects during the administration of George W. Bush.
“While I think John’s overall legacy will be as a reformer, that legacy will suffer from his refusal to come to grips with the CIA’s troubled torture program,” said Senator Dianne Feinstein, D-Calif, vice chair of the Senate’s intelligence committee. “I think the new president’s CIA director must prioritize a high level of trust between the CIA and Congress to insure proper oversight is conducted.”
It’s unclear how closely the country’s next president will hew to Brennan’s strategy.
The front-runner, Democrat Hillary Clinton, has an incentive to beef up American cyber-espionage: U.S. intelligence officials blame the continuing leak of emails from her campaign on Russian-backed hacking. Clinton also expressed support for covert action in a transcript of a 2013 speech she gave to Goldman Sachs that was recently released by Wikileaks.
Republican Donald Trump, meanwhile, pledged to make cybersecurity a top priority in his administration in an October 3 speech. “For non-state terror actors, the United States must develop the ability – no matter how difficult – to track down and incapacitate those responsible and do it rapidly,” Trump said. “We should turn cyber warfare into one of our greatest weapons against the terrorists.”
In interviews at agency headquarters in Langley, Virginia, Brennan declined to comment on either candidate or discuss operational details of the CIA. But he and eight other senior CIA officials gave the most detailed description yet of their rationale for the most radical revamp of the agency since its founding in 1947.
“I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan said. “I think CIA really needs to up its game.”
JUST-WAR THEORIST
Brennan, a 61-year-old native of north New Jersey, looks like a linebacker but talks like a technocrat. He speaks excitedly about how the CIA and other government bureaucracies can be configured in “a way to ensure optimal outcomes.”
The son of devout-Catholic Irish immigrants, Brennan speaks reverently of CIA officers as public servants who risk their lives without public accolades. He joined the agency in 1980, at the age of 24, after receiving a Master’s Degree in government with a concentration in Middle Eastern studies from the University of Texas.
“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention. Obtaining that is a human endeavor.”
Educated in various Catholic schools, including Fordham University, Brennan says he is an adherent of just war theory – a centuries-old Christian theological argument that war is justified when it is waged in self defense, as a last resort and minimizes civilian casualties. Those beliefs, he says, have guided him in one of the most controversial aspects of his tenure in the Obama administration.
As Obama’s White House counter-terrorism adviser and CIA director, Brennan played a central role in carrying out 473 U.S. airstrikes outside conventional war zones between 2009 and 2015, primarily by drone. U.S. officials estimate the attacks have killed 2,372 to 2,581 people, including 64 to 116 civilians. Human rights groups say the totals are vastly higher. Last year, for instance, a U.S. drone strike in Pakistan accidentally killed American aid worker Warren Weinstein and Italian aid worker Giovanni Lo Porto, who were both being held captive by al Qaeda.
Brennan declined to comment on specific strikes, but said, “I still can look myself in the mirror everyday and believe that I have tried to do what is morally right, what is necessary, and what is important to keep this country safe.” He also acknowledged mistakes.
“You question yourself. You beat yourself up. You try to learn from it,” Brennan said, in a rare display of emotions. “But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”
Today, Brennan says the United States faces the most complex array of threats he has seen since joining the agency 36 years ago. As a CIA analyst, operative and executive, he has lived through the Cold War espionage duels of the 1980s; the disintegration of nation-states after the 1989 fall of the Berlin Wall; the rise of non-state terrorist groups since 2001; and the current digital disruption. Now, he says, all four dynamics are converging at once.
BOLD AND INNOVATIVE RIVALS
CIA officials say their greatest state competitors are the Russian and Chinese intelligence services. While smaller countries or terrorist groups may want to strike at the United States, Russia and China are the only two adversaries with the combination of skills, resources and motivation needed to challenge Washington.
In recent years, Moscow’s Federal Security Service, or FSB, has become adept at waging “gray zone” conflicts in Ukraine, Crimea and Syria, the officials said. In all three countries, Russian intelligence operatives have deftly shrouded protagonists, objectives and war crimes in ambiguity.
“You beat yourself up…. But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”
One target is America’s increasingly politically polarized democracy. As Russian-backed hacking unfolded this summer, the Obama White House’s response fueled frustration among law enforcement and intelligence officials, according to current and former officials. The administration, they said, seemed to have no clear policy for how to respond to a new form of information warfare with no rules, norms or, it seemed, limits.
White House officials said the administration is still considering various methods of responding, but the responses won’t necessarily be made public.
China presents another challenge. Chinese businessmen and students continue trying to scoop up American state and economic secrets. In one bright spot, Beijing appears to be abiding by a 2015 pact signed by Obama and Chinese leader Xi Jinping that the two governments would not conduct economic espionage against one another. Chinese hacking appears to have slowed from the voracious rate of the past, which included hacking into the computers of the 2008 presidential campaigns of John McCain and Barack Obama but not releasing what was found.
“The question is whether or not it is due to greater care in terms of covering one’s tracks,” Brennan said of the apparent change. “Or whether or not they realize that they’re brand is being tarnished by this very rapacious appetite for vacuuming up things.”
Regional powers are also increasing their digital espionage efforts.
In 2014, the Obama administration blamed North Korea for the hacking of Sony Pictures’ computer system. This spring, U.S. prosecutors indicted seven Iranian hackers for allegedly trying to shut down a New York dam and conducting a cyber attack on dozens of U.S. banks. They also indicted three Syrian members of the “Syrian Electronic Army,” a pro-Syrian government group, who hacked into the websites of U.S. government agencies, corporations and news organizations.
In a 2015 case that U.S. officials said marks a worrying new trend, federal prosecutors indicted a 20-year-old hacker from Kosovo. With the help of a criminal hacker, Ardit Ferizi stole the home addresses of 1,300 members of the U.S. military, providing the information to Islamic State and posting it online, and calling for attacks on the individuals. Ferizi was arrested in Malaysia, where he was studying computer science. In September, he pleaded guilty in a U.S. federal court and was sentenced to 20 years in prison.
“This blend of the criminal actor, the nation-state actor and the terrorist actor, that’s going to be the trend over the next five years,” said John Carlin, who recently stepped down as head of the Justice Department division that monitors foreign espionage in the United States.
But some active clandestine officers argue that the intelligence community has grown too reliant on technology, a trend they trace back four decades to the directorship of Stansfield Turner. Satellite photography, remote sensors and communications intercepts have become more sophisticated, but so have encryption techniques and anti-satellite weapons.
More important, they argue, is that technology is no substitute for “penetrations” – planting or recruiting human spies in foreign halls of power. The CIA missed India’s 1998 nuclear tests and misjudged Saddam Hussein’s arsenal in 2003 because it lacked spies in the right places.
Today, these current and former CIA officials contend, American policymakers have little insight into the thinking of Vladimir Putin’s inner circle. Presidents, kings and dictators often don’t share their true intentions electronically, putting this valuable information largely beyond the scope of digital spying. The best sources are still people, and these officials believe the agency is not mounting the kind of bold human spying operations it did in the past.
Brennan and other CIA officials flatly denied downplaying human intelligence. They said aggressive, high-risk human spying is under way but they cannot go into operational detail.
One of Brennan’s predecessors, Michael Hayden, former CIA chief under President George W. Bush, says the agency strayed from its core mission during the Bush years. After the Al Qaeda attacks of Sept. 11, 2001, Hayden said, the CIA had to shift to become a paramilitary organization that devoted its most talented officers to tracking and killing terrorists. It now needs to reverse that trend by focusing on espionage against rival nations, he said.
“The constant combat of the last 15 years has pushed the expertise of the case officer in the direction of the battlefield and in the direction of collecting intelligence to create physical effects,” said Hayden, using an intelligence euphemism for killing. “At the expense of what the old guys called long-range, country-on-country intelligence gathering.”
‘OPTIMIZING CAPABILITIES’
Brennan and the eight other senior CIA officials made the case that their modernization effort will address the needs and threats described by Hayden and others. Technological advances, they said, have leveled the intelligence playing field. The web’s low cost of entry, creativity and speed benefits governments, hackers and terrorists alike.
A veteran covert operative who runs a new CIA mission center compared Brennan’s reforms to the Goldwater-Nichols Act. The landmark 1986 legislation reorganized the U.S. military into a half dozen regional commands where the Army, Navy, Air Force and Marines work together. It was a response to inter-service rivalries that bedeviled the American military in Vietnam.
The CIA equivalent involves having the agency’s five main directorates – Operations (covert spies), Analysis (trends and prediction), Science and Technology (listening devices and other gadgetry) and Digital Innovation (online sleuthing) and Support (logistics) – provide the personnel needed by each regional mission center.
Andrew Hallman, director of the new Directorate for Digital Innovation, said the CIA has embraced cloud computing as a way to better share intelligence. In a move that shocked insiders and outsiders, the CIA awarded an $600 million contract to Amazon in 2013 to build a secure cloud computing system where multiple CIA databases can be quickly accessed.
For decades, different directorates maintained their own separate databases as a security measure, said Hallman. Some of the applications the agency used were so old – up to 30 years – that the manufacturer was no longer in business.
Turning to Amazon was designed to immediately put private-sector computing advances at the fingertips of CIA operatives. It was also an admission that it was easier for the agency to buy innovation from the private sector than try to create it internally.
Several former CIA officials criticized the new team-focused system, saying it dilutes the cultures that made each agency directorate strong. The best analysts are deeply skeptical and need to be separated from covert operatives to avoid group-think, they said. And the best covert operatives are famously arrogant, a trait needed to carry out the extraordinarily difficult task of convincing foreigners to spy for America.
Richard Blee, a former CIA clandestine officer, said the agency needed reform but highlighted a separate problem created by technological change. Instant secure communications between CIA headquarters and officers in the field has centralized decision-making in Washington, Blee said. And regardless of administration, senior officials in Washington are less willing to take a risk than field officers – virtually all of whom complain about headquarters’ excessive caution.
“The mentality across the board in Washington is to take the lowest common denominator, the easiest option, the risk-free option,” Blee said. “The Chinese are taking tough decisions, the Russians are taking tough decisions and we are taking risk-averse decisions. And we are going to pay a price for that down the road.”
Brennan says his reforms will empower CIA officers: The integrated teams in each new mission center will improve speed, adaptability and effectiveness.
“To me, that’s going to be the secret of success in the future, not just for CIA but for other organizational structures,” Brennan said. “Taking full advantage of the tools, capabilities, people and expertise that you have.”
The old ways of spycraft, Brennan argues, are no longer tenable. Asked what worries him most, he gave a technocratic answer: Twentieth century American government management practices are being rendered obsolete in the digital age.
“U.S. decision making processes need to be streamlined and accelerated,” he said. “Because the problems are not going to wait for traditional discussions.”
Supporters hail CIA director John Brennan as a devoted public servant with a strong moral core and a tenacious work ethic. He has increased the recruitment of minority intelligence officers and promoted women to senior posts. He wears a lanyard around his neck every day that celebrates LGBT diversity at the CIA.
But some former covert operatives say Brennan is too cautious and political. Liberals accuse Brennan of protecting the CIA instead of forcing it to become more accountable to Congress. In particular, they blame Brennan for convincing President Barack Obama to oppose the release of the full 6,000-page U.S. Senate report detailing torture by the CIA during the presidency of George W. Bush. In private hearings, they said, Brennan bristled at questions from senators regarding the report.
After CIA officials searched the computer of a Senate staffer investigating torture, an outraged Sen. Dianne Feinstein accused Brennan’s CIA of provoking a “constitutional crisis” by thwarting Congress’ ability to perform its mandated right to oversee the executive-branch agency. Two other Democratic Senators called for Brennan’s resignation. Obama and White House Chief of Staff Denis McDonough aggressively defended Brennan, who eventually apologized to Feinstein.
“The exhaustive 6,000-page Senate Intelligence Committee report fully documented the program,” Feinstein told Reuters, “but the CIA under John’s leadership has had difficulty confronting this dark chapter and learning from its mistakes.”
Leon Panetta, who served as President Obama’s first CIA director, said he understood Brennan’s desire to protect CIA officers who carried out interrogation methods deemed legal at the time by the Bush administration. But he said it was important to also be open with Congress and the public.
“I think you can do both,” Panetta said. “You can protect people there [at the CIA]. And be honest with the American people.”
Brennan and his aides vehemently defend his reforms, his transparency and his response to the Senate torture investigation, which they say exaggerated the scale of CIA abuse. They say Brennan, who opposes waterboarding, successfully struck a middle course – ending torture while protecting the identities of CIA operatives.
“He did more to stand up for human rights than any other official in the administration,” said Harold Hongju Koh, a Yale Law School professor who served as Hillary Clinton’s top legal adviser in the State Department.
In the interview, Brennan said the actions of CIA officials who exceeded the Bush-era interrogation guidelines were “reprehensible.” But he said the Senate report exaggerated the scale of abuse. Brennan contended that the vast majority of CIA officers followed the Bush-era guidelines and were being unfairly “maligned by individuals who have political agendas.”
“When we do things that are within our authorized mandate, things that we are directed to do by our presidents, things that are deemed lawful by our Department of Justice,” Brennan said, “for us to be dragged through the coals on that, I find that reprehensible as well.”
Friends say Brennan say he has privately expressed frustration with the White House’s cautious response to the war in Syria and growing Russian assertiveness. But, they add, he is in many ways similar to Obama himself, questioning America’s ability to unilaterally change the world.
Brennan declined to comment on his own policy views. But he said, “I really feel as though my moral compass is pretty similar” to Obama’s. And he echoed a central tenet of Obama’s worldview.
The U.S. should act as the “world’s organizer of support to countries that are in desperate need,” Brennan said, but “recognize that our influence and power over the course of events is limited.”
—————
Digitizing the CIA
By David Rohde
Additional reporting by John Walcott and Jonathan Landay