Preaching Jihad in U.S. Prisons, Radical and Militant

BOSTON – Six inmates at MCI Norfolk are facing discipline after a probe into information that some convicts at the prison’s Muslim chapel were preaching jihad speeches by a former Al Qaeda recruiter, FOX25 Investigates has learned.

FOX25 confirmed a report that inmates used recordings from Al Qaeda recruiter and U.S. citizen Anwar al-Awlaki, who was killed years ago in a drone strike, to preach jihad to others at the state prison.

The state Department of Correction has confirmed six inmates who attended the prison’s Muslim chapel are facing discipline for setting up a structure of power over other inmates, requiring uniforms and demanding contracts of allegiance.

Martin Horn, a professor at John Jay College of Criminal Justice who once led New York City’s prison system and set up an intelligence center on Rikers Island, said law enforcement officials need to look at more than just the jihad preaching.

“You want to begin to look at, for example, their phone calls. You want to look at the records of who’s sending money to their account,” Horn told FOX25 Investigative Reporter Eric Rasmussen via Skype. “If one were going to try to recruit individuals to engage in the kinds of terrorist activities that most concern us, what better place to look for recruits than inside a prison?”

In a statement to FOX25, the state Department of Correction said, “It was determined that the ‘jihad’ that was being preached was in the context of personal spiritual struggle with regard to oneself, as opposed to a war against non-believers.”

A DOC spokesman said there is “no evidence that their unauthorized activities were being used as a recruiting tool for any extremist ideology.”

But Horn also says there’s good reason to investigate.

“Well, look, first of all, prisoners come out. Eventually, they’re all coming out to the community,” Horn told FOX25 Investigates. “And we know from several experiences that, often times, they can influence activities that occur on the outside.”

The Department of Correction confirms it consulted with federal law enforcement on the investigation but told FOX25 Investigates it found nothing illegal.

The six medium-security inmates, who have not been identified, are still facing discipline because prison rules forbid setting up any kind of hierarchy – like a gang – regardless of religion.

****

It is not just an issue in the United States, related reading: About that Prison in the Heart of London

*** Boston Herald in part:

Correction stated that “jihad” was being preached, but it “was in the context of a personal spiritual struggle with regards to oneself, as opposed to a war against non-believers.”

DOC spokesman Chris Fallon said federal law enforcement authorities were consulted, and there is no active criminal investigation regarding the matter.

“No criminal charges have been brought against the members of this inmate group, as there is no evidence that their unauthorized activities were being used as a recruiting tool for any extremist ideology,” the statement from Department of Corrections read. “The inmates are facing administrative disciplinary charges as a result of their alleged misconduct.”

Possible punishments against the prisoners include loss of privileges, disciplinary detention, extra duty, room or unit restrictions, Correction said.

“To be clear, inmates are not allowed to create a hierarchical structure where they would have power over other inmates,” Correction’s statement reads.

**** So what role does CAIR have in the prison system? In part:

REHABILITATION PROGRAMS

As the prison population grows in religious diversity, administrators of correctional institutions must increase their multicultural awareness. Faith-based rehabilitation programs must be voluntary. Inmates should not be forced to participate in functions designated for adherents of other faith groups. Examples of such devotional practices include confession, singing and  playing music, and holding hands with a chaplain preaching or reciting religious material.

But…. a 2009 article in the New York Times has some factual items stating otherwise:

The Justice Department’s inspector general issued a report in 2004 faulting the prison system for failing to protect against “infiltration by religious extremists.” But it said the problems rested not so much with radical chaplains but unsupervised inmates leading their own worship services.

The fomenting of extremist ideas among Muslims is not a problem in the New York State prison system, said Erik Kriss, a spokesman for the Department of Correctional Services. “We have a zero-tolerance policy for any chaplain advocating violence or extremist beliefs,” he said. The department holds meetings with chaplains to remind them of that, monitors religious literature coming in, and videotapes, audiotapes or sends guards to services, he said. In the past several years, the department removed from prison libraries an English version of the Koran that had commentary advocating violence to spread Islam, he said.

Islam is the fastest-growing religion in the prison system. About 30,000 to 40,000 conversions among federal prisoners take place each year, according to a study for the Justice Department by Mark S. Hamm, a criminologist at Indiana State University. About 6 percent of the nation’s 173,000 federal prisoners are Muslim.

Mr. Hamm’s study, published in December 2007, says that most inmates convert in prison for one of five main reasons: because they are in personal crisis, seek a spiritual dimension, are looking for a group to protect them, want to manipulate the system or are influenced by the outside world.

He concludes that generally, “there is no relationship between prisoner conversions to Islam and terrorism.” The danger lies, he said in an interview Friday, in “prison Islam,” which he identified as “small gang-like cliques that use cut-and-paste versions of the Koran” to give a religious overlay to their activities. The danger becomes acute when a member leaves prison and forms a radical cell.

Mr. Hamm said he has counted five examples of this since 2005, notably a plot hatched in a California state prison that year to attack synagogues, American military installations and Israeli officials. The four plotters belonged to a group called Jam’iyyat Ul-Islam Is-Saheeh, or the Assembly of Authentic Islam.

 

Contractors: ” Hillary Broke all the Rules”

Primer: JWICS =

The Joint Worldwide Intelligence Communications System, is a Top Secret/SCI network run by the United States’ Defense Intelligence Agency and used across the Department of Defense, Department of State, Department of Homeland Security and Department of Justice to transmit especially sensitive classified information.

FNC/EXCLUSIVETwo State Department contractors, with decades of experience protecting the United States’ most sensitive secrets, are speaking out for the first time about Hillary Clinton’s tenure as secretary of state and how the rules for government security clearance holders did not seem to apply to Clinton and her team.

“The State Department was her oyster and it was great for the [Clinton] foundation and great for the Clintons to be able to have such a great position,” Dave Whitnah told Fox News.

Whitnah said he worked within the State Department’s Office of Security Technology which is responsible for cameras and alarms and sweeping for bugs. Whitnah said everyone understood the secretary of state is the primary target of foreign intelligence services.

“The number one person would be the secretary of state and their communications,” Whitnah explained. “You can think of the Iran negotiations, nuclear negotiation, negotiations with Russia, talks with Russia. You know, anything to do with foreign policy.”

Whitnah emphasized that tens of millions of dollars were spent on technical security for Clinton that apparently was disregarded as her team traveled around the world on official U.S. government business.

“It was unfathomable that [her BlackBerry] would be used for anything other than just unclassified communication,” Whitnah said. Clinton’s devices were not certified as secure by the State Department. As for her use of a non-secure BlackBerry, Whitnah stressed that email can be intercepted and, “Even if turned off, it’s still a listening device so that’s why you take out the batteries.”

As Clinton was sworn in as secretary in January 2009, government contractor Amel Smith said he was also working at the department and: “State Department rules are clear. I helped write those rules.”

Smith says his 30 years of experience includes serving in the U.S. Army’s 82nd Airborne, before becoming a counter-intelligence and counter-espionage investigator at State tracking down breaches of classified materials. He reviewed some of the FBI witness interviews from the Clinton email investigation with Fox News, and questioned those who claimed not to have the proper training in handling sensitive information.

“I hear things like, well, I forgot, um, I don’t know that I was trained, I don’t know this. You know — every single person that had access to that information when it was sent is in violation,” Smith emphasized.

The FBI witness interviews also show secure facilities for classified information — known as SCIFs — were specially built for Clinton in her in Washington, D.C., and Chappaqua, N.Y., homes. Doors that were supposed to be locked were left open.

“If you’ve got an uncleared person in there, it’s automatically a compromise,” Smith said.

Another FBI interview summary said there were personally owned desktop computers in the secure facilities at Clinton’s homes, yet she told the FBI that she did not have a computer of any kind in these facilities.

“If somebody said they’re there, then they probably were there, and you know, the reason you would deny it was because you probably didn’t have approval,” Smith said.

Having unapproved computers in a SCIF would automatically call for a security investigation.

Asked for his reaction to Clinton’s claim that nothing she sent or received was marked classified, Whitnah called that assertion a “misrepresentation.” Fox News was first to report in June that at least one of the emails contained a classified information portion marking for “c” which is confidential. FBI Director James Comey later said in July when he recommended against criminal charges that a handful of Clinton emails contained classified markings.

But more than 2,100 emails with classified information, and at least 22 at the “top secret” level, passed through Clinton’s unsecured private server. Asked how it happened, Smith said, “Personally, there had to have been somebody moving classified information from C-LAN, C-LAN again is Secret, Confidential only, and JWICS. JWICS is where all top secret information is.”

After new emails were found in the Anthony Weiner sexting case belonging to his estranged wife Clinton aide Huma Abedin, the FBI reopened the Clinton email investigation. On Sunday, Comey said the emails did not change his recommendation against criminal charges because his investigators did not find intent to move classified materials outside secure government channels

“Whether it’s the private email server, whether it’s this private laptop. If there’s classified — one document on there — that’s classified, it’s a violation. Somebody violated [the] law,” Smith said. “Throw all the politics out the window, what we’re talking about is the defense of this nation.”

Asked about Smith and Whitnah, who filed a complaint against the State Department, a department spokesman said they were not direct hires — adding that the head of diplomatic security told the FBI that Clinton was “very responsive to security issues.”

****

And her State Department approved that security team in Benghazi

Benghazi guards turned on US diplomats in 2012 attack, sources say

stevenspic1Expand / Contract

Stevens, shown in rear wearing black, with several of the guards sources say turned on him. (Special to Fox News)

FNC: An obscure private firm hired by the State Department over internal objections to protect U.S. diplomats in Benghazi just months before the American ambassador and three others were killed was staffed with hastily recruited locals with terror ties who helped carry out the attack, multiple sources told Fox News.

The explosive charge against Wales-based Blue Mountain Group comes from several sources, including an independent security specialist who has implemented training programs at U.S. Consulates around the world, including in Benghazi, where he trained a local militia that preceded Blue Mountain. The source, who spoke on condition of anonymity, said Blue Mountain used local newspaper ads to assemble a team of 20 guards, many of whom had terror ties, after securing a $9.2 million annual contract.

“The guards who were hired were locals who were part of the Ansar al-Sharia and Al Qaeda groups operating in Benghazi,” said the source, whose assignment in Benghazi had ended in November 2011. “Whoever approved contracts at the State Department hired Blue Mountain Group and then allowed Blue Mountain Group to hire local Libyans who were not vetted.”

TIMELINE OF CLINTON’S BENGHAZI STATEMENTS

Many were members of the Libyan government-financed February 17th Martyrs Brigade, an Islamist militia that had previously guarded Americans before being replaced by Blue Mountain.

John “Tig” Tiegen, one of the CIA contractors that responded to the Sept. 11, 2012 attack and co-author of “13 Hours: The Inside Account of What Really Happened in Benghazi,” confirmed to Fox News that the local Libyans who attacked the consulate that night included guards working for Blue Mountain.

“Many of the local Libyans who attacked the consulate on the night of Sept. 11, 2012, were the actual  guards that the State Department under Hillary Clinton hired to protect the Consulate in Benghazi,” Tiegen told Fox News. “The guards were unvetted and were locals with basically no background at all in providing security. Most of them never had held a job in security in the past.

“Blue Mountain Libya, at the time of being awarded the contract by our State Department, had no employees so they quickly had to find people to work, regardless of their backgrounds,” he said.

One former guard who witnessed the attack, Weeam Mohamed, confirmed in an email sent to the Citizens Commission on Benghazi and obtained by Fox News, that at least four of the guards hired by Blue Mountain took part in the attack after opening doors to allow their confederates in.

“In the U.S. Mission, there were four people [who] belonged to the battalion February 17,” Mohamed wrote to the Commission, an independent body formed with Accuracy in Media to investigate the attack and the administration’s handling of it.

“Always armed. And they are free to move anywhere inside a building mission.

“And therefore, they had a chance to do an attack on the mission’s headquarters. They have all the details about the place. At the same time they have given the United States a painful blow,” Mohamed wrote.

Blue Mountain officials did not return multiple requests for comment. The State Department acknowledged in internal emails obtained by FoxNews.com the local recruits fell short of their duty, but discounted the claim any took an active role in the attack that resulted in the deaths of Ambassador Christopher Stevens, Foreign Service Information Officer Sean Smith and CIA contractors and former Navy SEALs Tyrone Woods and Glen Doherty.

“While the Accountability Review Board report and other reports were critical of our local guards’ performance, we are not aware of any evidence that they participated in the attacks themselves,” said State Department spokesman John Kirby.

Blue Mountain was hired in February 2012, following an uprising that ended Col. Muammar Gaddafi’s 42-year rule and plunged Libya into violent chaos. Congressional testimony in the wake of the attack on a consular office in Benghazi revealed that Stevens and his staff had made hundreds of requests for security upgrades but had been ignored by officials in Washington.

“We kept asking for additional support, including a 50-caliber mounted machine gun, but the State Department would not give it to us, because they said it would upset the locals,” the source told Fox News. “Instead, the State Department hired a company that doesn’t have employees, which then hired terrorists.”

Clare Lopez, a member of Citizens’ Commission on Benghazi, said the Clinton State Department bears blame for the security situation.

“Think about it: Hillary Clinton’s State Department actually hired the very people who, along with their jihadist allies in Benghazi, attacked us and killed U.S. Ambassador Chris Stevens and Sean Smith as well as CIA contractors Glen Doherty and Ty Woods,” Lopez said.

According to government records obtained by the Washington-based Judicial Watch, the State Department was in a “rush” to hire Blue Mountain UK, and its affiliate, Blue Mountain Libya, which together formed The Blue Mountain Group to secure the Benghazi contract.

“I understand there was a tremendous rush to get the original contract awarded, and the Service level agreement was most likely overlooked in the rush,” wrote State Department contracting officer Jan Visintainer, in a June 6, 2012, email. Emails obtained from [missing word] after the attack showed Visintainer urged Blue Mountain officials not to talk to the media.

Blue Mountain UK was formed in 2008 by David Nigel Thomas, a former Special Air Service official. Charles Tiefer, a commissioner at the Commission on Wartime Contracting, told Reuters the company was not well known.

“Blue Mountain was virtually unknown to the circles that studied private security contractors working for the United States, before the events in Benghazi,” Tiefer said.

Despite the size of the operation, and having no staff or track record with the State Department, Blue Mountain Group landed the $767,767-per-month contract to protect the Benghazi consular office, beginning on Feb. 17, 2012.

The company solicited applications in local newspapers and on websites, and very little, if any, screening of guards was done, the security specialist told Fox News. The lack of vetting led to several potentially dangerous hires beginning in March of 2012, he said.

“One of those guards hired by Blue Mountain was the younger brother of the leader of Al Qaeda of Benghazi,” he said.

In an email obtained by Judicial Watch, Jairo Saravia of the Regional Security office for the U.S. Embassy in Tripoli, told his superiors in Washington that Blue Mountain had held and lost security contracts in Tripoli, with the Corinthian Hotel and Palm City complex.

“The latest information is Blue Mountain is not licensed by the GOL (Government of Libya) to provide security services in Libya,” Saravia wrote. “I would advise not to use their services to provide security for any of our annexes and/or offices due to the sensitivity this issue has with the current GOL.”

Prior to Blue Mountain, security for Americans in Benghazi had been provided by the February 17th Martyrs Brigade under a direct agreement with the State Department. Despite its Islamist orientation, the militia included dozens of locals who had been carefully cultivated and trained by the U.S., according to the source. The majority of the February 17 Militia guards were fired without warning when Blue Mountain was hired, leading some members to turn against the Americans, he said. The State Department kept on at least three February 17 employees for patrol.

Eric Nordstrom, the regional security officer in Libya who has vast, first-hand knowledge of some 600 security requests denied to the U.S. diplomatic mission in Libya, testified on May 8, 2013, before the Congressional Committee On Oversight & Government Reform that he was aware that employees with both February 17 Martyrs Brigade and Blue Mountain had ties to Islamist terrorists.

“I had met with some of my agents and then also with some annex personnel. We discussed that,” Nordstrom told lawmakers.

Nordstrom testified that the “ferocity and intensity” of the 13-hour, four-phase attack, on the 11th anniversary of 9/11, was nothing that they had seen in Libya, or that he had seen in his time in the Diplomatic Security Service, with as many as 60 attackers in the consulate.

“I am stunned that the State Department was relying on [locals] with extremist ties to protect American diplomats,” U.S. Rep. Blake Farenthold, R-Texas, told Fox News. “That doesn’t make any sense. How does that happen?”

Fox News was able to verify through a former Libyan guard the identities of several February 17 employees hired despite terrorist ties, who he said participated in the attack. While their identities have been provided to federal authorizes, none have been prosecuted.

Dinesh D’Souza Went to Jail for this, What About this Operation?

Hat tip to OpenSecrets.org

Primer:

What is Dark Money?

Dark Money refers to political spending meant to influence the decision of a voter, where the donor is not disclosed and the source of the money is unknown. Depending upon the circumstances, Dark Money can refer to funds spent by a political nonprofit or a super PAC. Here’s how:

  • Political nonprofits are under no legal obligation to disclose their donors. When they choose not to, they are considered Dark Money groups.
  • Super PACs can also be considered Dark Money groups in certain situations. While these organizations are legally required to disclose their donors, they can accept unlimited contributions from political non-profits and “shell” corporations who may not have disclosed their donors, in these cases they are considered Dark Money groups. More here.

Boston law firm accused of massive straw-donor scheme 

Last Updated Nov 2, 2016 12:04 PM EDT

CBS: Hillary Clinton’s campaign is returning thousands of dollars in donations linked to what may be one of the largest straw-donor schemes ever uncovered.

A small law firm that has given money to Sen. Elizabeth Warren, Sen. Harry Reid, President Obama and many others is accused of improperly funneling millions of dollars into Democratic Party coffers. The program was exposed by the Center for Responsive Politics and the same team of Boston Globe investigative reporters featured in the movie “Spotlight.”

The Thornton Law Firm has just 10 partners, but dollar for dollar, it’s one of the nation’s biggest political donors, reports CBS News correspondent Tony Dokoupil.

But according to the firm’s own documents – leaked by a whistleblower — days or even hours after making these donations, partners received bonuses matching the amount they gave.

“Once the law firm knew that we had these records, they didn’t deny that this was the case,” said Scott Allen, Boston Globe’s Spotlight editor.

“If you give a donation and then somebody else reimburses you for that contribution, that is a clear violation of the spirit and the letter of the law at the state and federal levels,” Allen added.

Federal law limits partnerships, like the Thornton Law Firm, to a maximum donation of $2,700 per candidate. But campaign finance watchdogs say the firm used its individual partners as straw donors, allowing it to funnel money to campaigns well above that legal limit.

“Straw donor reimbursement systems are something both the FEC and the Department of Justice take very seriously, and people have gone to jail for this,” Center for Responsive Politics editorial director Viveca Novak said.

The Spotlight team and the Center for Responsive Politics looked at donations from three of the firm’s partners from 2010 to 2014. The trio and one of their wives gave $1.6 million, mostly to Democrats. Over the same period, they received $1.4 million back in bonuses.

A Thornton spokesman said the bonuses are legal because they came out of each partner’s ownership stake in the firm. In other words, they were paid with their own money.

In a statement, the firm said:

“We would like to make it clear that the Thornton law firm has complied with all applicable laws and regulations regarding campaign contributions. Ten years ago, it hired an outside law firm to review how it wanted to handle donations to politicians. It was given a legal opinion on how it should structure its program and then it hired an outside accountant to review and implement the program. It was a voluntary program which only involved equity partners and their own personal after-tax money to make donations.”

Through its employees, the firm gave to Democrats running in some of this year’s most hotly contested races — ones that could determine control of the U.S. Senate.

ctm-1102-straw-donor-boston-law-firm-democrats-politics.jpg

Thornton Law Firm donated to Democrats running in some of this year’s most hotly contested races — ones that could determine control of the U.S. Senate

CBS News

Massachusetts Republicans are calling for an investigation.

“In the end, it’s about restoring integrity to a process that folks are already extremely wary of,” Massachusetts Republican Party chair Kirsten Hughes said.

Allen said he’s not “confident at all” that this is an isolated program at Thornton.

“We’ve had a number of parties coming forward to us saying, ‘Hey, they do this at our place too.’ So the issue is always, can you prove it?” Allen said.

CBS News has learned the non-partisan Campaign Legal Center will file a complaint with the Federal Elections Commission Wednesday.

Sen. Elizabeth Warren, who has received nearly $130,000 from the firm since 2007, told the Boston Globe she will not return any money unless investigators find the donations were illegal.

Cyber CIA: Brennan Rebuilt the Agency for Digital Future

    

NEW DIRECTION: John Brennan at a Senate Intelligence Committee hearing on his nomination to be the director of the CIA in 2013. Brennan has restructured the agency to REUTERS/Jason Reed

John Brennan’s attempt to lead America’s spies into the age of cyberwar

The CIA director has put the U.S. spy agency through a historic restructuring to cope with the era of digital warfare. Many in the agency are unhappy with the shake-up. In a series of interviews, Brennan outlines his strategy. “I think CIA really needs to up its game.”

ReutersInvestigates:WASHINGTON – When America goes to the polls on Nov. 8, according to current and former U.S. intelligence officials, it will likely experience the culmination of a new form of information war.

A months-long campaign backed by the Russian government to undermine the credibility of the U.S. presidential election – through hacking, cyber attacks and disinformation campaigns – is likely to peak on voting day, the officials said.

Russian officials deny any such effort. But current and former U.S. officials warn that hackers could post fictional evidence online of widespread voter fraud, slow the Internet to a crawl through cyber attacks and release a final tranche of hacked emails, including some that could be doctored.

“Don’t underestimate what they can do or will do. We have to be prepared,” said Leon Panetta, who served as CIA director and defense secretary in President Barack Obama’s first term. “In some ways, they are succeeding at disrupting our process. Until they pay a price, they will keep doing it.”

John Brennan, the current CIA director, declined to comment on the Russian efforts. But he said Russian intelligence operatives have a long history of marrying traditional espionage with advances in technology. More broadly, Brennan said, the digital age creates enormous opportunities for espionage. But it also creates vulnerabilities.

Citing an array of new cyber, conventional and terrorist threats, Brennan announced the most sweeping reforms of the CIA in its 69-year history 18 months ago.

Weakening the role of the Directorate of Operations, the agency’s long-dominant arm responsible for gathering intelligence and conducting covert operations, Brennan created 10 new “mission centers” where CIA spies, analysts and hackers work together in teams focused on specific regions and issues. He also created a new Directorate for Digital Innovation to maximize the agency’s use of technology, data analytics and online spying.

The information age “has totally transformed the way we are able to operate and need to operate,” Brennan told Reuters in a series of interviews. “Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”

When a new American diplomat arrives for duty at the U.S. embassy in Moscow or Beijing, CIA official say, Russian and Chinese  intelligence operatives run data analytics programs that check the “digital dust” associated with his or her name. If the newcomer’s footprint in that dust – social media posts, cell phone calls, debit card payments – is too small, the “diplomat” is flagged as an undercover CIA officer.

The Russian-backed campaign to discredit the U.S. election is not isolated. Hackers believed to have links to Chinese intelligence began stealing the personal information of 22 million federal employees and job applicants in 2014, the worst known data breach in U.S. government history. Islamic State’s online propagandists continue to inspire lone wolf attacks in the United States even as the group loses territory.

A senior official from the Directorate of Operations, who backs the shake-up, said the agency is experiencing its greatest test in decades.

“The amount of threats and challenges that are facing this organization and this nation are greater than at any time in the last 30 years,” said the official, who declined to be named. “The days of a black passport, a fistful of dollars and a Browning pistol are over.”

INNER CIRCLE: President Barack Obama with Brennan and Chief of Staff Denis McDonough at the White House in 2013. The president and the CIA chief are criticized by some former agents for being overly cautious in Syria, Russia and elsewhere. Courtesy Pete Souza/The White House/Handout via REUTERS

“Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”

John Brennan, CIA director

James Clapper, the Director of National Intelligence, praised Brennan and his efforts to retool the CIA for a new era in an interview. So did Lisa Monaco, Brennan’s successor as the President Obama’s Homeland Security and Counterterrorism adviser.

But some current and former officials question Brennan’s strategy, arguing his reforms are too digitally focused and will create a more cautious, top-heavy spy agency. At a time when the agency needs to refocus its efforts on human espionage, they say, the concentration of power in the new mission centers weakens the ability of the Directorate of Operations to produce a new generation of elite American spies.

The reforms have hurt morale, created confusion and consumed time and attention at a time of myriad threats, according to interviews with ten former officials.

Glenn Carle, a former CIA covert officer, supports Brennan and his reforms but said they have sparked a mixed reaction among directorate of operations officials who believe human intelligence is getting short shrift.

“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention,” the often inscrutable aims of foreign leaders, Carle said. “Obtaining that is a human endeavor.”

At the same time, Brennan has stirred a different sort of criticism – that he has defied Congressional oversight. Liberal Democrats and libertarian Republicans in Congress say the Brennan-Obama tenure has been tarnished by a lack of transparency with congressional oversight committees and the public regarding surveillance, drone strikes and the agency’s use of torture against terrorism suspects during the administration of George W. Bush.

“While I think John’s overall legacy will be as a reformer, that legacy will suffer from his refusal to come to grips with the CIA’s troubled torture program,” said Senator Dianne Feinstein, D-Calif, vice chair of the Senate’s intelligence committee. “I think the new president’s CIA director must prioritize a high level of trust between the CIA and Congress to insure proper oversight is conducted.”

It’s unclear how closely the country’s next president will hew to Brennan’s strategy.

The front-runner, Democrat Hillary Clinton, has an incentive to beef up American cyber-espionage: U.S. intelligence officials blame the continuing leak of emails from her campaign on Russian-backed hacking. Clinton also expressed support for covert action in a transcript of a 2013 speech she gave to Goldman Sachs that was recently released by Wikileaks.

Republican Donald Trump, meanwhile, pledged to make cybersecurity a top priority in his administration in an October 3 speech. “For non-state terror actors, the United States must develop the ability – no matter how difficult – to track down and incapacitate those responsible and do it rapidly,” Trump said. “We should turn cyber warfare into one of our greatest weapons against the terrorists.”

In interviews at agency headquarters in Langley, Virginia, Brennan declined to comment on either candidate or discuss operational details of the CIA. But he and eight other senior CIA officials gave the most detailed description yet of their rationale for the most radical revamp of the agency since its founding in 1947.

“I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan said. “I think CIA really needs to up its game.”

JUST-WAR THEORIST

Brennan, a 61-year-old native of north New Jersey, looks like a linebacker but talks like a technocrat. He speaks excitedly about how the CIA and other government bureaucracies can be configured in “a way to ensure optimal outcomes.”

The son of devout-Catholic Irish immigrants, Brennan speaks reverently of CIA officers as public servants who risk their lives without public accolades. He joined the agency in 1980, at the age of 24, after receiving a Master’s Degree in government with a concentration in Middle Eastern studies from the University of Texas.

“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention. Obtaining that is a human endeavor.”

Glenn Carle, former CIA covert officer

Educated in various Catholic schools, including Fordham University, Brennan says he is an adherent of just war theory – a centuries-old Christian theological argument that war is justified when it is waged in self defense, as a last resort and minimizes civilian casualties. Those beliefs, he says, have guided him in one of the most controversial aspects of his tenure in the Obama administration.

As Obama’s White House counter-terrorism adviser and CIA director, Brennan played a central role in carrying out 473 U.S. airstrikes outside conventional war zones between 2009 and 2015, primarily by drone. U.S. officials estimate the attacks have killed 2,372 to 2,581 people, including 64 to 116 civilians. Human rights groups say the totals are vastly higher. Last year, for instance, a U.S. drone strike in Pakistan accidentally killed American aid worker Warren Weinstein and Italian aid worker Giovanni Lo Porto, who were both being held captive by al Qaeda.

Brennan declined to comment on specific strikes, but said, “I still can look myself in the mirror everyday and believe that I have tried to do what is morally right, what is necessary, and what is important to keep this country safe.” He also acknowledged mistakes.

“You question yourself. You beat yourself up. You try to learn from it,” Brennan said, in a rare display of emotions. “But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”

Today, Brennan says the United States faces the most complex array of threats he has seen since joining the agency 36 years ago. As a CIA analyst, operative and executive, he has lived through the Cold War espionage duels of the 1980s; the disintegration of nation-states after the 1989 fall of the Berlin Wall; the rise of non-state terrorist groups since 2001; and the current digital disruption. Now, he says, all four dynamics are converging at once.

BOLD AND INNOVATIVE RIVALS

CIA officials say their greatest state competitors are the Russian and Chinese intelligence services. While smaller countries or terrorist groups may want to strike at the United States, Russia and China are the only two adversaries with the combination of skills, resources and motivation needed to challenge Washington.

In recent years, Moscow’s Federal Security Service, or FSB, has become adept at waging “gray zone” conflicts in Ukraine, Crimea and Syria, the officials said. In all three countries, Russian intelligence operatives have deftly shrouded protagonists, objectives and war crimes in ambiguity.

GREAT RIVALS: U.S. President Barack Obama with his Chinese and Russian counterparts, Xi Jinping and Vladimir Putin, in Beijing in 2014. Washington has faced barrages of digital threats from Beijing and Moscow; CIA insiders say the two nations remain the biggest challenge for the United States. REUTERS/Pablo Martinez Monsivais

“You beat yourself up…. But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”

John Brennan, CIA director

One target is America’s increasingly politically polarized democracy. As Russian-backed hacking unfolded this summer, the Obama White House’s response fueled frustration among law enforcement and intelligence officials, according to current and former officials. The administration, they said, seemed to have no clear policy for how to respond to a new form of information warfare with no rules, norms or, it seemed, limits.

White House officials said the administration is still considering various methods of responding, but the responses won’t necessarily be made public.

China presents another challenge. Chinese businessmen and students continue trying to scoop up American state and economic secrets. In one bright spot, Beijing appears to be abiding by a 2015 pact signed by Obama and Chinese leader Xi Jinping that the two governments would not conduct economic espionage against one another. Chinese hacking appears to have slowed from the voracious rate of the past, which included hacking into the computers of the 2008 presidential campaigns of John McCain and Barack Obama but not releasing what was found.

“The question is whether or not it is due to greater care in terms of covering one’s tracks,” Brennan said of the apparent change. “Or whether or not they realize that they’re brand is being tarnished by this very rapacious appetite for vacuuming up things.”

Regional powers are also increasing their digital espionage efforts.

In 2014, the Obama administration blamed North Korea for the hacking of Sony Pictures’ computer system. This spring, U.S. prosecutors indicted seven Iranian hackers for allegedly trying to shut down a New York dam and conducting a cyber attack on dozens of U.S. banks. They also indicted three Syrian members of the “Syrian Electronic Army,” a pro-Syrian government group,  who hacked into the websites of U.S. government agencies, corporations and news organizations.

In a 2015 case that U.S. officials said marks a worrying new trend, federal prosecutors indicted a 20-year-old hacker from Kosovo. With the help of a criminal hacker, Ardit Ferizi stole the home addresses of 1,300 members of the U.S. military, providing the information to Islamic State and posting it online, and calling for attacks on the individuals. Ferizi was arrested in Malaysia, where he was studying computer science. In September, he pleaded guilty in a U.S. federal court and was sentenced to 20 years in prison.

“This blend of the criminal actor, the nation-state actor and the terrorist actor, that’s going to be the trend over the next five years,” said John Carlin, who recently stepped down as head of the Justice Department division that monitors foreign espionage in the United States.

But some active clandestine officers argue that the intelligence community has grown too reliant on technology, a trend they trace back four decades to the directorship of Stansfield Turner. Satellite photography, remote sensors and communications intercepts have become more sophisticated, but so have encryption techniques and anti-satellite weapons.

More important, they argue, is that technology is no substitute for “penetrations” – planting or recruiting human spies in foreign halls of power. The CIA missed India’s 1998 nuclear tests and misjudged Saddam Hussein’s arsenal in 2003 because it lacked spies in the right places.

Today, these current and former CIA officials contend, American policymakers have little insight into the thinking of Vladimir Putin’s inner circle. Presidents, kings and dictators often don’t share their true intentions electronically, putting this valuable information largely beyond the scope of digital spying. The best sources are still people, and these officials believe the agency is not mounting the kind of bold human spying operations it did in the past.

Brennan and other CIA officials flatly denied downplaying human intelligence. They said aggressive, high-risk human spying is under way but they cannot go into operational detail.

One of Brennan’s predecessors, Michael Hayden, former CIA chief under President George W. Bush, says the agency strayed from its core mission during the Bush years. After the Al Qaeda attacks of Sept. 11, 2001, Hayden said, the CIA had to shift to become a paramilitary organization that devoted its most talented officers to tracking and killing terrorists. It now needs to reverse that trend by focusing on espionage against rival nations, he said.

“The constant combat of the last 15 years has pushed the expertise of the case officer in the direction of the battlefield and in the direction of collecting intelligence to create physical effects,” said Hayden, using an intelligence euphemism for killing. “At the expense of what the old guys called long-range, country-on-country intelligence gathering.”

‘OPTIMIZING CAPABILITIES’

Brennan and the eight other senior CIA officials made the case that their modernization effort will address the needs and threats described by Hayden and others. Technological advances, they said, have leveled the intelligence playing field. The web’s low cost of entry, creativity and speed benefits governments, hackers and terrorists alike.

A veteran covert operative who runs a new CIA mission center compared Brennan’s reforms to the Goldwater-Nichols Act. The landmark 1986 legislation reorganized the U.S. military into a half dozen regional commands where the Army, Navy, Air Force and Marines work together. It was a response to inter-service rivalries that bedeviled the American military in Vietnam.

The CIA equivalent involves having the agency’s five main directorates – Operations (covert spies), Analysis (trends and prediction), Science and Technology (listening devices and other gadgetry) and Digital Innovation (online sleuthing) and Support (logistics) – provide the personnel needed by each regional mission center.

CORE MISSION: Former CIA Director Michael Hayden says the agency went deeply into anti-terrorist operations during the Bush years and needs to return to its traditional mission of spying. REUTERS/Brendan McDermid

Andrew Hallman, director of the new Directorate for Digital Innovation, said the CIA has embraced cloud computing as a way to better share intelligence. In a move that shocked insiders and outsiders, the CIA awarded an $600 million contract to Amazon in 2013 to build a secure cloud computing system where multiple CIA databases can be quickly accessed.

For decades, different directorates maintained their own separate databases as a security measure, said Hallman. Some of the applications the agency used were so old – up to 30 years – that the manufacturer was no longer in business.

Turning to Amazon was designed to immediately put private-sector computing advances at the fingertips of CIA operatives. It was also an admission that it was easier for the agency to buy innovation from the private sector than try to create it internally.

Several former CIA officials criticized the new team-focused system, saying it dilutes the cultures that made each agency directorate strong. The best analysts are deeply skeptical and need to be separated from covert operatives to avoid group-think, they said. And the best covert operatives are famously arrogant, a trait needed to carry out the extraordinarily difficult task of convincing foreigners to spy for America.

Richard Blee, a former CIA clandestine officer, said the agency needed reform but highlighted a separate problem created by technological change. Instant secure communications between CIA headquarters and officers in the field has centralized decision-making in Washington, Blee said. And regardless of administration, senior officials in Washington are less willing to take a risk than field officers – virtually all of whom complain about headquarters’ excessive caution.

“The mentality across the board in Washington is to take the lowest common denominator, the easiest option, the risk-free option,” Blee said. “The Chinese are taking tough decisions, the Russians are taking tough decisions and we are taking risk-averse decisions. And we are going to pay a price for that down the road.”

Brennan says his reforms will empower CIA officers: The integrated teams in each new mission center will improve speed, adaptability and effectiveness.

“To me, that’s going to be the secret of success in the future, not just for CIA but for other organizational structures,” Brennan said. “Taking full advantage of the tools, capabilities, people and expertise that you have.”

The old ways of spycraft, Brennan argues, are no longer tenable. Asked what worries him most, he gave a technocratic answer: Twentieth century American government management practices are being rendered obsolete in the digital age.

“U.S. decision making processes need to be streamlined and accelerated,” he said. “Because the problems are not going to wait for traditional discussions.”

THE LONG VIEW: CIA headquarters in Langley, Virginia. “I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan says. “I think CIA really needs to up its game.” REUTERS/Jason Reed

—————

Digitizing the CIA

By David Rohde

Additional reporting by John Walcott and Jonathan Landay

Video: Zachary Goelman

Graphics: Christine Chan

Photo editing: Barbara Adhiya

Edited by Michael Williams

 

Final Report: How Latinos have Reshaped the Electoral Map

Mexican-Americans Are Reshaping the Electoral Map In Arizona — And The U.S.

Irma Maldonado in her dorm room at Grand Canyon University in Phoenix.
Irma Maldonado in her dorm room at Grand Canyon University in Phoenix.

All photographs by Caitlin O’Hara

 

PHOENIX — In an office suite not far from the airport, Irma Maldonado, 18, expertly role-played what she’d be doing on the city’s streets in half an hour: knocking on the doors of residents and exhorting them to vote. But not everything was a game. Before a group of young canvassers headed out for the day, a team leader at the community organizing group LUCHA mentioned that someone had earlier pulled a gun on two members of the team.

“Everything was OK,” the organizer said, but Maldonado and the 15 or so other teens and 20-somethings were given safety whistles before hitting the streets.

Maldonado has a personal stake in America’s immigration debate, which has been making headlines throughout the election, particularly because of Donald Trump’s description of Mexicans as rapists and his desire to have Mexico pay for a border wall.

 

chideya-electorate-mex-1b
chideya-electorate-mex-1b-mobile

 

 

“Before going into high school — it was the summer of 2012 — my mother decided to self-deport to Mexico” with her two youngest children, Maldonado said. Maldonado, who was born and grew up in New Mexico, had a hard time adjusting to life in Nayarit, Mexico, a small state on the Pacific coast north of Puerto Vallarta, especially given that she hadn’t known her family’s status. “I think it was right when we had to move when I actually realized that my mom wasn’t actually legal here in the United States, when I was 14 years old,” she said. Her father, who has a green card, continues to work in New Mexico; Maldonado now is a first-year nursing student and lives with her 23-year-old sister in Arizona. Her mother and brother remain in Mexico.

Mexican-Americans such as Maldonado may help determine the political future of Arizona — and the nation — in a landmark election year. In an August survey, respondents were asked if Trump and Clinton made their respective parties more welcoming or more hostile to Latinos. Nine percent of Mexican-Americans said Trump made the GOP more welcoming; 74 percent said he made it more hostile. By contrast, 59 percent said Clinton made the Democratic party more welcoming; 9 percent said more hostile. An October poll by Latino Decisions found that 17 percent of Latino voters nationwide said they support Trump or are leaning toward him; 70 percent supported Clinton.

 

chideya-electorate-mex-2
chideya-electorate-mex-2-mobile

 

 

In Arizona, a state long dominated by Republicans, Clinton and Trump are in a virtual tie, according to a Monmouth University Poll released last week. Latino voters, who make up a fifth of the state’s electorate, are supporting Clinton over Trump by 35 percentage points. And critical to the electoral vote, only 9 percent of Latino voters who support Trump are in battleground states. Overall, 13 percent of the eligible voters in battleground states are Latino.

Arizona “was this strong, powerful red,” said Pita Juarez, 29, the communications director for the One Arizona coalition, an umbrella group of 14 advocacy groups, including LUCHA, that is working to boost Latino voter turnout. “Just today, we saw on FiveThirtyEight … it’s a light blue. And that’s something that I thought, really, I would never see.” (Arizona has gone back and forth between light blue and light red in FiveThirtyEight’s forecast over the last few weeks. Currently, Trump has a slight edge in the state’s forecast.)

Gabriel Sanchez, a professor of political science at the University of New Mexico and a principal at the opinion research firm Latino Decisions, said Latinos are more enthusiastic about voting this year than in 2012, having been mobilized by Trump’s comments targeting Mexicans. He added that the Republican Party will have a hard time winning over Mexican-Americans in subsequent elections unless it supports comprehensive immigration reform.

Like black millennials, younger Latinos show much weaker enthusiasm for Clinton than their elders. According to the October GenForward survey, conducted over the first half of the month, 44 percent of Latinos ages 18-30 plan to vote for Clinton and 8 percent will vote for Trump, with 10 percent going to third-party candidates. Nineteen percent said they didn’t plan to vote, and 12 percent were undecided.1GenForward, a survey by the Black Youth Project at the University of Chicago and The Associated Press-NORC Center for Public Affairs Research, queries 18- to 30-year-olds and oversamples for Latino and nonwhite respondents, in this case with a total cohort of 1,832 respondents.

 

Irma Maldonado in math class and walking to her dorm room at Grand Canyon University.
Irma Maldonado in math class and walking to her dorm room at Grand Canyon University.

 

Mark Hugo Lopez, director of Hispanic research at the Pew Research Center, said that much of the growth in the Latino electorate in coming years will be from U.S.-born Latinos entering adulthood. Like other cohorts of younger voters they tend to be more supportive of bigger government, in contrast to older Mexican-Americans, who are more likely to hold conservative views. “Mexican-Americans are more likely to be Catholic than other groups of Latinos,” he said. “They are also more likely to be third or higher generation than other U.S. Latino groups and as a result to have served in the military. Both of these characteristics correlate with conservative views on many issues.” He noted that George W. Bush won at least 40 percent of the Latino vote in 2004.

 Mexican-Americans constitute 63 percent of the 57 million U.S. Latinos. Some Mexican-Americans can trace their heritage in New Mexico and other regions later acquired as U.S. territory back to the 1600s and earlier, while others are recent immigrants. Of the 35.8 million people of Mexican descent in the U.S., 68 percent are native born, and more than a quarter of those born in Mexico have become U.S. citizens. Separate estimates from the Pew Research Center indicate there were 5.8 million unauthorized Mexican citizens in America in 2014, 52 percent of the total unauthorized immigrant population. The Census Bureau considers Latinos in the U.S. to be an ethnicity, not a race, and thus Latino respondents can also mark any or multiple races; about a quarter identify as Afro-Latino. But only 1 percent of the population of Mexico is Afro-Latino, according to a recent census in that nation, the first to count the category.2The Census surveys of the diverse Latino population continue to evolve. One experimental survey design for the 2020 Census avoids using the terms race and ethnicity in the phrasing of the question entirely.

Nationwide, 11 percent of eligible voters are Latino, but in Arizona, 22 percent of eligible voters are. The state is currently going through a fierce local battle involving Sheriff Joe Arpaio that is arguably fanning the fires of Latino voter turnout as much as the national election.

Arpaio is an outsize figure who has served as Maricopa County sheriff for 23 years; run jails where the men must wear pink underwear and striped uniforms; and organized citizen border patrols with actor Steven Seagal. Arpaio also has a December court date on a contempt charge for violating a 2011 injunction against stopping people on the suspicion that they were not in the country legally. (He alleges the prosecution is politically motivated because of his support for Trump.) And just one week from now, Arpaio faces perhaps an even bigger challenge: a re-election bid with polls showing him trailing his challenger by 15 points.

LUCHA’s canvassers are campaigning against Arpaio, and there are indications that his presence on the ballot is motivating new voters. In Maricopa County, Democratic voter rolls rose by 13 percent since 2012, according to figures released in August, compared to a 7.6 percent increase for Republicans. And many Latinos register as independents but lean Democratic.

Some of the young activists who are canvassing for LUCHA are undocumented, according to One Arizona’s Juarez, and in other areas around the country with significant Latino populations, immigrants who are not yet on a path to citizenship are playing a role in the political process. One of them is Yessica Vasquez Moctezuma, 25, a bank teller, who will graduate this fall with a bachelor’s degree in political science from the University of Texas at San Antonio. She has been in the United States for 19 years, which means she was undocumented until 2012, at which point an executive order qualified her for temporary but renewable DACA (Deferred Action for Childhood Arrivals) status.

Vasquez Moctezuma is frank in her assessment of her family’s legal status, since her parents are not eligible for DACA and continue to work without documentation.

“We are breaking some laws just by being here illegally, but we bind to the laws here,” she said. “We pay our taxes every year, like any other citizen would.” She worries that her parents, who have paid into the Social Security system — which receives an estimated $12 billion a year from undocumented immigrants and their employers — will never receive benefits and will never be able to truly retire. Still, she said, “This is why I studied political science, because I love the government here. I feel like in so many ways it’s so great.”

For her part, Irma Maldonado said she is excited about voting in her first presidential election. After remaining undecided until early October, she decided to vote for Clinton. But she added, “Honestly, this election, a lot of people are not that pumped to vote. It’s really kind of sad.” The number of Mexican-American and Latino voters who show up on Nov. 8 could determine the outcome in her state, and possibly in the nation.