Thanksgiving Day Terror. Black Swan Exercise

Related reading: Predicting Future Military Threats: Implications of the Black Swan

Donald Trump’s transition team is getting a helping hand from the Obama administration on national security matters.

The administration is giving the president-elect and a select few of his top advisers sensitive intelligence briefings.

And, in addition, Trump and his team will take part in two so-called ‘black swan’ exercises that simulate a domestic or national security emergency.

The exercises are intended to help an incoming administration learn how to manage a crisis in real time in case there is some kind of global or domestic emergency in the first days of a Trump presidency.

A black swan exercise would, for example, ensure that a fledgling Trump administration knows how to activate the proper federal agencies to maintain stability.

According to a briefing book from the nonpartisan Center for Presidential Transition, in 2008 the Bush administration hosted two black swan exercises for then president-elect Obama’s national security team. More here from ABC.

Black Swan operations and exercises have been practiced also in the United Kingdom.

**** What is on the horizon regarding terror?

Islamic State is urging its followers to carry out acts of terrorism in New York City during the upcoming, Macy’s Thanksgiving Day Parade.  Jamie Schram writes in this morning’s (Nov. 14, 2016) New York Post, that “ISIS is offering a detailed how-to on using trucks as weapons of mass destruction — noting that the Macy’s Thanksgiving Parade would be an ‘excellent target.”

Rumiyah2(1).jpg

MEMRI: On November 11, 2016, Al-Hayat, one of the media centers of the Islamic State (ISIS), released the third issue of its monthly magazine Rumiyah featuring an article calling on lone wolves in the U.S. and Europe to use trucks to target large outdoor conventions, crowded streets, outdoor markets, festivals, parades, and political rallies. The article also emphasized the importance of using trucks in terrorist attacks, and provided suggestions on “ideal vehicles” to use and tactical tips for the preparation and planning of attacks.

Rumiyah3.jpg

The article, titled “Just Terror Tactics,” features images of rental trucks from companies such as Hertz and U-Haul, as well as a picture showing the Macy’s Thanksgiving Day Parade in New York City. It begins by highlighting the “destructive capability” of motor vehicles and referring to the Bastille Day attack in Nice, France on July 14, 2016. While praising the Nice attacker, the article states: “This was superbly demonstrated in the attack launched by the brother Mohamed Lahouaiej-Bouhlel who, while traveling at the speed of approximately 90 kilometers per hour, plowed his 19-ton load-bearing truck into crowds celebrating Bastille Day in Nice, France, harvesting through his attack the slaughter of 86 Crusader citizens and injuring 434 more.”

Rumiyah4(1).jpg

The article stresses the importance of using a vehicle that can inflict maximum damage, and describes the “ideal” vehicles for lone wolf attacks as “load-bearing trucks, large in size, reasonably fast in speed or rate of acceleration, heavy in weight, double-wheeled, possessing a slightly raised chassis.” The article continued: “If accessible, [vehicles] with a metal outer frame which are usually found in older cars [should be used], as the stronger outer frame allows for more damage to be caused when the vehicle is slammed into crowds, contrary to newer cars that are usually made of plastics and other weaker materials.”

Providing suggestions on how to acquire the vehicle, the article noted that buying it is the “easiest” option; however, it also mentioned renting, borrowing from relatives and acquaintances, hotwiring, and carjacking as additional options. Under “applicable targets” the article listed: “Large outdoor conventions and celebrations, pedestrian-congested streets, outdoor markets, festivals, parades and political rallies.”

The article further emphasized that in order to inflict maximum damage, attackers should consider targeting “any outdoor attraction that draws large crowds,” stating that “it is not conditional to target gatherings restricted to government or military personnel only. All so-called ‘civilian’ (and low-security) parades and gatherings are fair game and more devastating to Crusader nations.”

As for “preparation and planning,” the article recommended “assessing vehicle for roadworthiness, filling vehicle with a sufficient amount of fuel, mapping out the route of the attack, surveying the route for obstacles, such as posts, signs, barriers, humps, bus stops, dumpsters, and if accessible, a secondary weapon should be attained.”

The article also provided ideas for attackers to use in order to declare their affiliation to ISIS to “have their motives acknowledged” such as writing “ISIS will remain” or “I am a soldier of the Islamic State” on pieces of papers and throwing them out of the vehicle’s window during the attack.

The article concludes by instructing attackers to stay inside their vehicles until they are no longer movable and then to start shooting pedestrians, first responders and security forces until they are killed.

****

Black Swan exercises are those that prepare for the unexpected and several events worldwide have been part of these operations.

1. Electromagnetic Pulse (EMP) or Solar Burst

As The Heritage Foundation highlighted in the documentary 33 Minutes,[3] an EMP attack could throw America back to the pre-Industrial Revolution era. A powerful solar burst would have the same impact. Should either event occur, people would have little time to react, and the damage would be incalculable.

If the U.S. were to lose power for any prolonged period of time, given the sheer number of people located in the interior of the country, mass starvation and death would become a reality. Most experts consider these events as highly unlikely ones, so little investment or planning is done related to them.

2. Pandemic Virus

Although the U.S. has prepared for a pandemic influenza outbreak, little preparation has gone into other potential viruses. More importantly, it is the unknown virus or “super virus” that represents a Black Swan for America. Recall that it was less than 30 years ago that AIDS first began embedding itself in North America. If a far more deadly and communicable virus hits America, the U.S. would quickly expend its existing resources.

3. Nuclear or Radiological Event

The U.S. has extensive knowledge of what would happen if a nuclear or radiological explosion occurred in a major American city. Theory, however, is a poor replacement for the reality of large numbers of deaths, burn victims, and physical debris. As former Vice President Dick Cheney wisely concluded, because of the sheer consequences, even a 1 percent chance of such an event occurring requires the nation to expend the necessary resources to prevent it.

4. Super-Volcanic Eruption

Seismic activity around the Yellowstone caldera is monitored, but tectonic shifts miles below the surface could result in the buildup of pressure and a super-volcanic eruption. The volcano beneath Yellowstone previously erupted, causing destruction as far away as California, Iowa, and Louisiana. An eruption, though unlikely given current readings, could have truly catastrophic consequences.

5. Nor’Easter/Hurricane

Hurricanes strike America with a fair degree of frequency. A Black Swan event would be a Nor’easter combined with a powerful hurricane that strikes New York City in the same manner as Hurricane Katrina struck New Orleans. Between the massive flooding and wind damage, New York City could sustain casualties and physical destruction well in excess of Katrina.

How Prepared Is the U.S.?

The honest and unfortunate answer to that question is unknown and, despite attempts to ascertain that answer, will not be known if existing policy remains in place. A Black Swan by definition becomes a Black Swan because it results in catastrophic outcomes. This “delicate” balance between preparing for events and not being able to prepare adequately for all events represents the ultimate risk-based decision making.

From 2003 to 2011, the U.S. Department of Homeland Security (DHS) distributed roughly $40 billion in funding to states and localities across America. Despite years of reporting requirements, DHS is fundamentally unable to state with any degree of certainty which capabilities exist, where those capabilities exist, the level of those capabilities, and the remaining capability needs. DHS knows it has funded the acquisition of many things, but specifics beyond that are unquantifiable.

Specifically, to gain a full accounting, Congress should:

  • Be fiscally responsible. Rather than continue to spread federal funds using an “inch thick and a mile wide” mentality, Congress should target federal funds at the highest-risk states, cities, and counties where the funds could meaningfully increase the security of Americans, including reducing the number of high-risk cities that are eligible for special funding.
  • Examine cooperative agreements. The need for equality downplays the need for the grant structure and invites another approach—such as the use of cooperative agreements, where the federal government and the states can sit down as true and equal partners and negotiate outcomes at the beginning and then direct funds to achieve those desired outcomes without the need for yearly applications.
  • Appoint a Black Swan commission. Rather than wait until after a catastrophic event has occurred, Congress should appoint an independent commission for the express purpose of analyzing the threats of a potential Black Swan, identifying existing capabilities, and making recommendations on how best to correct errors made thus far and accelerate closing the gap between where the nation stands today and where it needs to be tomorrow. The commission must have the independence and resources to quickly do its job after a full review of the status quo.

Expect the Unexpected

If the catastrophe in Japan has taught any lessons, it is that America must prepare for the unexpected with as much vigor as it prepares for the expected. Because a Black Swan can be so catastrophic, in many ways the ideal role for the federal government is to lead an effort surrounding those events. With the nation’s current fiscal challenges, conserving resources for catastrophic events is more vital than ever. More here from Heritage.

Trust Even Less on the Internet Thanks to Real Russian Trolls

Daily, I am asked if this is true or that is true….admittedly it is getting harder each day to vet stories for accuracy and to dissect them for what is accurate and other parts being flatly false. That is what trolls do, mix accuracy with falsehoods so the reader assumes it is all factual….ah not so much.

So, what sites to do visit often and have come to rely on them? InfoWars or Zerohedge? Well what about people that are curiously appearing to be friends with you on Facebook or new followers on Twitter? Take caution and read carefully below, you reliance on truth and accuracy just got harder. Even some in the media are being punked.

Related reading: KGB Model: Army of Russia Trolls vs. America

Related reading: Even Russian Diplomats in DC are Trolling Obama Admin

Related reading: Are you Sick of Hearing About Russia? Putin Loves it

Here we go and hat tip to these fellas for taking many months of investigation to sound the warnings.

****   

Trolling for Trump: How Russia Is Trying to Destroy Our Democracy

Trump isn’t the end of Russia’s information war against America. They are just getting started.

WotR: In spring 2014, a funny story crossed our social media feeds. A petition on whitehouse.gov called for“sending Alaska back to Russia,” and it quickly amassed tens of thousands of signatures. The media ran a number of amused stories on the event, and it was quickly forgotten.

The petition seemed odd to us, and so we looked at which accounts were promoting it on social media. We discovered that thousands of Russian-language bots had been repetitively tweeting links to the petition for weeks before it caught journalists’ attention.

Those were the days. Now, instead of pranking petitions, Russian influence networks online are interfering with the 2016 U.S. election. Many people, especially Hillary Clinton supporters, believe that Russia is actively trying to put Donald Trump in the White House.

And the evidence is compelling. A range of activities speaks to a Russian connection: the theft of emails from the Democratic National Committee and Clinton campaign officials, hacks surrounding voter rolls and possibly election machines, Putin’s overt praise for Trump, and the curious Kremlin connections of Trump campaign operatives Paul Manafort and Carter Page.

But most observers are missing the point. Russia is helping Trump’s campaign, yes, but it is not doing so solely or even necessarily with the goal of placing him in the Oval Office. Rather, these efforts seek to produce a divided electorate and a president with no clear mandate to govern. The ultimate objective is to diminish and tarnish American democracy. Unfortunately, that effort is going very well indeed.

Russia’s desire to sow distrust in the American system of government is not new. It’s a goal Moscow has pursued since the beginning of the Cold War. Its strategy is not new, either. Soviet-era “active measures” called for using the “force of politics” rather than the “politics of force”to erode American democracy from within.  What is new is the methods Russia uses to achieve these objectives.

We have been tracking Russian online information operations since 2014, when our interest was piqued by strange activity we observed studying online dimensions of jihadism and the Syrian civil war. When experts published content criticizing the Russian-supported Bashar al Assad regime, organized hordes of trolls would appear to attack the authors on Twitter and Facebook. Examining the troll social networks revealed dozens of accounts presenting themselves as attractive young women eager to talk politics with Americans, including some working in the national security sector. These “honeypot” social media accounts were linked to other accounts used by the Syrian Electronic Army hacker operation. All three elements were working together: the trolls to sow doubt, the honeypots to win trust, and the hackers (we believe) to exploit clicks on dubious links sent out by the first two.

Related reading: U.S. charges three suspected Syrian Electronic Army hackers

 

The Syrian network did not stand alone. Beyond it lurked closely interconnected networks tied to Syria’s allies, Iran and Russia. Many of these networks were aimed at U.S. political dissenters and domestic extremist movements, including militia groups, white nationalists, and anarchists.

Today, that network is still hard at work, running at peak capacity to destroy Americans’ confidence in their system of government. We’ve monitored more than 7,000 social media accounts over the last 30 months and at times engaged directly with them. Trump isn’t the end of Russia’s social media and hacking campaign against America, but merely the beginning.  Here is what we’ve learned.

The Russian Social Media Approach: Soviet Union’s “Active Measures” On Steroids

The United States and its European allies have always placed state-to-state relations at the forefront of their international strategies. The Soviet system’s effort to undermine those relations during the Cold War, updated now by modern Russia, were known as “active measures.”

A June 1992 U.S. Information Agency report on the strategy explained:

It was often very difficult for Westerners to comprehend this fundamentally different Soviet approach to international relations and, as a result, the centrality to the Soviets (now Russians) of active measures operations was gravely underappreciated.

Active measures employ a three-pronged approach that attempts to shape foreign policy by directing influence in the following ways: state-to-people, people-to-people, and state-to-state. More often than not, active measures sidestep traditional diplomacy and normal state-to-state relationships. The Russian government today employs the state-to-people and people-to-people approaches on social media and the internet, directly engaging U.S. and European audiences ripe for an anti-American message, including the alt-right and more traditional right-wing and fascist parties. It also targets left-wing audiences, but currently at a lower tempo.

Until recently, Western governments focused on state-to-state negotiations with Putin’s regime largely missed Russian state-to-people social media approaches. Russia’s social media campaigns seek five complementary objectives to strengthen Russia’s position over Western democracies:

  • Undermine citizen confidence in democratic governance;
  • Foment and exacerbate divisive political fractures;
  • Erode trust between citizens and elected officials and democratic institutions;
  • Popularize Russian policy agendas within foreign populations;
  • Create general distrust or confusion over information sources by blurring the lines between fact and fiction
  • In sum, these influence efforts weaken Russia’s enemies without the use of force. Russian social media propaganda pushes four general themes to advance Moscow’s influence objectives and connect with foreign populations they target.

    Political messages are designed to tarnish democratic leaders or undermine institutions. Examples include allegations of voter fraud, election rigging, and political corruption. Leaders can be specifically targeted, for instance by promoting unsubstantiated claims about Hillary Clinton’s health, or more obviously by leaking hacked emails.

Financial propaganda weakens citizen and investor confidence in foreign markets and posits the failure of capitalist economies. Stoking fears over the national debt, attacking institutions such as the Federal Reserve, and attempts to discredit Western financial experts and business leaders are all part of this arsenal.

In one example from August, Disneyland Paris was the site of a reported bomb scare. Social media accounts on Twitter reported that the park had been evacuated, and several news outlets — including Russian propaganda stations RT and Sputnik — published alarming stories based on the tweets, which escalated in hysteria as the afternoon stretched on. In fact, the park had not been evacuated. But that didn’t stop Disney’s stock from taking a temporary hit. This fluctuation could be exploited by someone who knew the fake scare was coming, but we do not have access to the data that would allow us to know whether this happened.

disney

Social issues currently provide a useful window for Russian messaging. Police brutality, racial tensions, protests, anti-government standoffs, online privacy concerns, and alleged government misconduct are all emphasized to magnify their scale and leveraged to undermine the fabric of society.

Finally, wide-ranging conspiracy theories promote fear of global calamity while questioning the expertise of anyone who might calm those fears. Russian propaganda operations since 2014 have stoked fears of martial law in the United States, for instance, by promoting chemtrails and Jade Helm conspiracy theories. More recently, Moscow turned to stoking fears of nuclear war between the United States and Russia.

For the Kremlin, this is not just focused on the outside world. Russian news organizations bombard Russian citizens with the same combination of content. Steve Rosenberg, a BBC News correspondent in Moscow, filmed the Russian domestic equivalent of this approach on November 1, showing Russian language news headlines inciting fears such as impending nuclear war, a U.S.-Russia confrontation in Syria, and the potential for an assassination of Donald Trump.

russia_active_measures

The Confluence of Information and Cyberspace

Russian active measures use a blend of overt and covert channels to distribute political, financial, social, and calamitous messages (see above). During the Soviet era, “white” active measures were overt information outlets directly attributable to the Central Committee of the Communist Party of the Soviet Union. Today, RT and Sputnik push Kremlin-approved English-language news on television and the Internet. These outlets broadcast a mix of true information (the vast majority of content), manipulated or skewed stories, and strategically chosen falsehoods. RT’s slogan, “Question More,” aptly fits their reporting style — seeding ideas of conspiracy or wrongdoing without actually proving anything.

This “white” content provides ammunition for “gray” measures, which employ less overt outlets controlled by Russia, as well as so-called useful idiots that regurgitate Russian themes and “facts” without necessarily taking direction from Russia or collaborating in a fully informed manner.

During the Cold War, gray measures used semi-covert Communist parties, friendship societies, and non-governmental organizations to engage in party-to-party and people-to-people campaigns. Today, gray measures on social media include conspiracy websites, data dump websites, and seemingly credible news aggregators that amplify disinformation and misinformation.

Conspiracy sites include outlets such as InfoWars and Zero Hedge, along with a host of lesser-known sites that repeat and repackage the same basic content for both right- and left-wing consumers. Sometimes, these intermediaries will post the same stories on sites with opposite political orientations.

Data dump websites, such as Wikileaks and DC Leaks, overtly claim to be exposing corruption and promoting transparency by uploading private information stolen during hacks. But the timing and targets of their efforts help guide pro-Russian themes and shape messages by publishing compromising information on selected adversaries.

The people who run these sites do not necessarily know they are participants in Russian agitprop, or at least it is very difficult to prove conclusively that they do. Some sites likely receive direct financial or operational backing, while others may be paid only with juicy information.

Sincere conspiracy theorists can get vacuumed up into the social networks that promote this material. In at least one case, a site described by its creator as parody was thoroughly adopted by Russian influence operators online and turned into an unironic component of their promoted content stream, at least as far as the network’s targeted “news” consumers are concerned.

A small army of social media operatives — a mix of Russian-controlled accounts, useful idiots, and innocent bystanders— are deployed to promote all of this material to unknowing audiences. Some of these are real people, others are bots, and some present themselves as innocent news aggregators, providing “breaking news alerts” to happenings worldwide or in specific cities. The latter group is a key tool for moving misinformation and disinformation from primarily Russian-influenced circles into the general social media population. We saw this phenomenon at play in recent reports of a second military coup in Turkey and unsubstantiated reports of an active shooter that led to the shutdown of JFK Airport. Some news aggregators may be directly controlled by Russia, while other aggregators that use algorithmic collection may be the victims of manipulation.

“Black” active measures are now easier to execute than they were for the Soviets. During the Cold War, according to the 1992 USIA report, these included:

… the use of agents of influence, forgeries, covert media placements and controlled media to covertly introduce carefully crafted arguments, information, disinformation, and slogans into the discourse in government, media, religious, business, economic, and public arenas in targeted countries.

Black active measures create both risks and costs. Agents deployed into the West must avoid detection or risk state-to-state consequences. The KGB’s Cold War efforts to keep these operations secret bore significant financial costs while producing little quantifiable benefit. Stories were difficult to place in mainstream media outlets, and the slow process made it challenging to create momentum behind any one theme.

On social media, this process is far easier, more effective, and relatively difficult to attribute. Without stepping foot in America, Russia’s coordinated hackers, honeypots, and hecklers influence Americans through people-to-people engagement.

Hackers provide the fuel for themes and narratives. Initially, hackers concentrated on defacements, denial of service, and misinformation posted on compromised social media accounts. By 2015, the Kremlin’s hacking efforts were much more sophisticated, coalescing into two distinct, competing hacking collectives: Fancy Bear (APT 28), possibly operated by Russian military intelligence (GRU), and Cozy Bear (APT 29), possibly operated by Russia’s foreign intelligence service (FSB).

The most notorious Russian-linked hacker, using the handle Guccifer2.0, targets current and former U.S. government officials, American security experts, and media personalities by seeking access to their private communications and records. Former Secretary of State Colin Powell and Clinton campaign chairman John Podesta provide two current examples, but there will be many more to come. Today, Guccifer2.0 posts threats of election meddling this coming Tuesday.

guccif
Guccifer 2.0 Warning on Election Posted to Social Media

In addition to phishing and cracking attacks, these hackers are aided by honeypots, a Cold War term of art referring to an espionage operative who sexually seduced or compromised targets. Today’s honeypots may include a component of sexual appeal or attraction, but they just as often appear to be people who share a target’s political views, obscure personal hobbies, or issues related to family history. Through direct messaging or email conversations, honeypots seek to engage the target in conversations seemingly unrelated to national security or political influence.

These honeypots often appear as friends on social media sites, sending direct messages to their targets to lower their defenses through social engineering. After winning trust, honeypots have been observed taking part in a range of behaviors, including sharing content from white and gray active measures websites, attempting to compromise the target with sexual exchanges, and most perilously, inducing targets to click on malicious links or download attachments infected with malware.

One of us directly experienced how social media direct messages from hackers or influencers seek to compromise or sway a target by using social engineering to build a rapport. Operators may engage the target’s friends or acquaintances, drawing them into conversations to encourage trust. Once conversations are started, an agent of influence will be introduced into the group and will subsequently post on Russian themes from grey outlets or introduce malicious links.

When targets click on malicious links, Fancy Bear and Cozy Bear extract personal information from public officials, media personalities, and American experts and selectively dump the content obtained at opportune times. The goal is to increase popular mistrust of political leaders and people with expertise or influence in specific circles of interest to Russia, such as national security. In some cases, experts criticizing Russia have had their computers mysteriously compromised by destructive malware and their research destroyed.

Online hecklers, commonly referred to as trolls, energize Russia’s active measures. Ringleader accounts designed to look like real people push organized harassment — including threats of violence — designed to discredit or silence people who wield influence in targeted realms, such as foreign policy or the Syrian civil war. Once the organized hecklers select a target, a variety of volunteers will join in, often out of simple antisocial tendencies. Sometimes, they join in as a result of the target’s gender, religion, or ethnic background, with anti-Semitic and misogynistic trolling particularly prevalent at the moment. Our family members and colleagues have been targeted and trolled in this manner via Facebook and other social media.

Hecklers and honeypots can also overlap. For instance, we identified hundreds of accounts of ostensibly American anti-government extremists that are actually linked to Russian influence operations. These accounts create noise and fear, but may also draw actual anti-government extremists into compromising situations. Based on our observations, the latter effort has not been widely successful so far among anti-government extremists, who tend to stay in their own social networks and are less likely to interact with Russian influence accounts, but our analysis points to greater overlap with networks involving American white nationalists.

Russia’s honeypots, hecklers, and hackers have run amok for at least two years, achieving unprecedented success in poisoning America’s body politic and creating deep dissent, including a rise in violent extremist activity and visibility. Posting hundreds of times a day on social media, thousands of Russian bots and human influence operators pump massive amounts of disinformation and harassment into public discourse.

This “computational propaganda,” a term coined by Philip Howard, has the cumulative effect of creating Clayton A. Davis at Indiana University calls a“majority illusion, where many people appear to believe something ….which makes that thing more credible.” The net result is an American information environment where citizens and even subject-matter experts are hard-pressed to distinguish fact from fiction. They are unsure who to trust and thus more willing to believe anything that supports their personal biases and preferences.

The United States disbanded the U.S. Information Agency after the Cold War and currently fields no apparatus to detect and mitigate Russia’s social media influence campaign. As seen in America’s disjointed counter narratives against the Islamic State, efforts to create any kind of U.S. information strategy are plagued by disparate and uncoordinated efforts strewn among many military, diplomatic, and intelligence commands. American cyber operations and hacking reside separately with the National Security Agency. Russia, on the other hand, seamlessly integrates the two efforts to devastating effect.

After Election Day: What to do about Russia’s Active Measures?

The most overwhelming element of Russia’s online active measures over the last year relate to the presidential campaign of Donald Trump. Russian promotion of Trump not only plagues Clinton, but likely helped sideline other GOP candidates in early 2016 with a more traditional anti-Russia view of foreign policy. It is impossible to assess whether Donald Trump is even fully aware of these efforts, let alone complicit. Setting aside that question for a moment, some readers will immediately ask how we are so sure all this activity goes back to Russia?

There are a number of technical indicators, most tellingly the synchronization of messaging and disinformation with “white” outlets such as RT and Sputnik, as well as the shocking consistency of messaging through specific social networks we have identified.

Dmitri Alperovich of the cyber-security firm Crowdstrike first attributed the DNC hacks to Russia. He explained in a recent War on the Rocks podcast:

The important thing about attribution…is that it’s not that much different from the physical world. Just like someone can plan a perfect bank heist and get away with it, you can do that in the cyber-domain, but you can almost never actually execute a series of bank heists over the course of many years and get away with it. In fact, the probability of you not getting caught is miniscule. And the same thing is true in cyber-space because eventually you make mistakes. Eventually you repeat tradecraft. It’s hard to sort of hide the targets you’re going after…

There are other, less subtle indications as well, for instance, a notification from Google: “We believe we detected government backed attackers trying to steal your password. This happens to less than 0.1% of all Gmail users.” When one of us receives these messages, we feel confident we’re on the right trail.

Foreign Spies on our College Campuses

International Espionage on Campus

Bishop/CB: The idyllic American university campus conjures the image of a safe and open academic environment where students spend four or more years learning new ideas and preparing for future careers.  Professors challenge eager students to open their minds to old and new perspectives in science, mathematics, business, and of course, the arts and humanities.  Universities nurture an atmosphere where academics and scientists can engage in groundbreaking research, make advances in technology, and publish on novel theories and discoveries.

For many students, college may be the first time they are living on their own, allowing them to explore not only academic freedom but personal freedom. For parents coping with their children leaving home, some comfort is found in the expectation that while students are on campus the university will be actively taking measures to protect them from physical harm and risks that could affect their future.  Parents don’t realize that for some students, college may be the first time students are exposed to the clandestine world of international espionage.

Espionage knows no boundaries.  Foreign intelligence officers and spies lurk wherever there is information of value to be had or people with access to it. Information does not have to be a government secret for a foreign intelligence service to want to steal it.  Nation states play the Great Game to gain an advantage, whether political or economic, over their adversaries.  And there is plenty of information of value on American college campuses to attract the attention of adversary nations.  From advanced research in sciences and technology to professors with access to U.S. government officials, American universities are a target-rich environment for intelligence collection, intellectual property theft, and the illicit transfer of research and technology.   The welcoming nature of American universities—from unlocked entrances to university facilities, minimal investigation into the backgrounds of students enrolling in classes, and open admission to conferences, seminars, and other campus events—creates the perfect opportunity for undercover foreign intelligence officers or their human sources to slip onto campus and search for students who have potential for entering sensitive positions in the U.S. government or landing jobs with American companies engaged in the development and production of emerging and advanced technologies.

While the threat of espionage may not be apparent to parents and students, American universities have little excuse for not knowing about it.  Federal law enforcement agencies like the FBI regularly attempt to advise universities of the potential espionage threats on campus, and the media also has reported extensively on them.  The risks are real, knowable, and preventable, and universities that ignore the threats could face potentially devastating consequences to their reputations, relationships, and financial well being.  For students who do not fully appreciate the risk and get wrapped up on the wrong side of the clandestine world, the impact on their futures can be tremendous and irreversible.  Espionage on campus and the often-related illicit transfer of research and technology from school laboratories also contribute to immediate and long-term decline of U.S. national security interests and the competitive advantage the United States possesses in sciences and technology.  The university campus has been part of the Great Game chessboard for years. This is nothing new and not much has changed.

In 1930s Great Britain, five college students with communist sympathies came under the spell of espionage at the University of Cambridge.  Donald MacLean, Guy Burgess, Anthony Blunt, John Cairncross, and Kim Philby were in their undergraduate years when the NKVD, the Soviet precursor to the KGB, recruited them to serve the communist cause.  At the time, none of the students had access to information of value or persons of interest, but the NKVD believed these men, who came from the right social class, would find their way into positions of influence and access. They all did.

MacLean landed key positions in the UK’s foreign office, the equivalent of the U.S. Department of State.  Burgess held positions with the foreign office, the BBC, and MI6.  Blunt spent some time in MI5, served as the Surveyor of the King’s Pictures, and used his standing in academic and social circles to spot other potential Soviet spies. Cairncross made the rounds at MI6 and Bletchley Park, the precursor to the UK’s Government Communication Headquarters (GCHQ).  Kim Philby was the prize of the five.  While starting his espionage as a freelance journalist in the Spanish Civil War, which gave him access to pro-Franco forces—the ideological enemies of the Soviet Union—Philby returned to the UK and entered MI6.  There, he steadily rose through the ranks, eventually overseeing MI6’s counterintelligence operations against the Soviet Union. The Cambridge spies, most notably Philby, are still considered to be some of the most damaging spies in UK espionage history. The notoriety of these men is well known in England, and their association with the University of Cambridge as the Cambridge Ring or Cambridge Five will forever be remembered.

American universities have not been immune to the espionage efforts of foreign intelligence services.  In 1984, a student-spy working for the Cuban intelligence service and studying at Johns Hopkins University “spotted” Ana Montes as a potential Cuban recruit.  After being introduced to Cuban intelligence officers, Montes agreed to spy for Cuba while still a graduate student at Johns Hopkins.  She later became an intelligence analyst at the Defense Intelligence Agency (DIA), focusing on Cuban issues.  She was arrested in 2001 and sentenced to 20 years in prison.

Other known espionage or technology/research theft cases affecting the American university community include:

  • In 2002, Qingqiang Yin, a former Cornell University researcher was arrested before boarding a flight to Shanghai from New York.  He was carrying numerous bacteria samples and yeast cultures belonging to the university.  The FBI investigation revealed Yin was seeking a job with a research facility in China and offered to bring the bacteria and yeast cultures to China for commercial enzyme production.  He was sentenced to 12 months’ imprisonment for conspiracy to defraud the U.S. government.
  • In 2006, Carlos Alvarez, a psychology professor at Florida International University, admitted during a plea hearing that he had been a Cuban spy for nearly 30 years, gathering and transmitting information about Cuban exile groups to Cuban intelligence agents.  His wife Elsa, also a professor, admitted knowing of her husband’s conduct.  They were sentenced to five and three years’ imprisonment, respectively.  
  • In 2012, the FBI arrested 12 deep-cover Russian SVR intelligence officers who were engaged in espionage against various American targets.  One of the SVR officers was Cynthia Murphy, a.k.a. Lydia Guryeva, who while studying for a master’s degree at Columbia University, was tasked by the SVR to develop relationships with classmates and professors who have or will acquire access to secret information and to report on their backgrounds and characteristics, providing assessments on their vulnerability for recruitment as spies. The SVR also directed Guryeva to collect information on students seeking employment with the CIA.  After pleading guilty to failing to register as an agent of a foreign government, the United States returned Guryeva (and the other deep-cover officers) to Russia in exchange for prisoners held there. 
  •  
  • In 2013, Hua Jun Zhao, a Chinese research assistant at the Medical College of Wisconsin, was arrested and charged with economic espionage after stealing cancer research compounds and shipping them to China, where he allegedly planned to take them to a Chinese university for further development.  He pleaded guilty to the lesser charge of illegally downloading research data and was sentenced to time served (four-and-a-half months).
  •    Image result for Hua Jun Zhao
  • Since 2004, the Chinese government has opened numerous Confucius Institutes at universities across the world, including approximately 64 institutes at American universities.  While the stated mission of the institutes is to promote the study of Chinese language and culture abroad, concerns have been raised about the ulterior motives of these institutes.  Allegations have also surfaced that the institutes may be Trojan Horses used by the Chinese government to conduct espionage activities. Regardless of the public evidence available on the alleged intelligence function of these institutes, from this former intelligence officer’s perspective, they are the perfect front for penetrating American universities and targeting their students.  

Again, these are only examples of the espionage threats facing American universities.  These incidents and others have been well documented in the public domain, and American universities dedicated to risk management should know about them, if not for their own protection, then for the benefit of their donors and students and U.S. national security.

Today’s American university receives funding from a variety of sources, including alumni, businesses, philanthropic organizations, and federal and state governments.  Research grants from the public and private sectors are a significant source of income for universities, and donors want the university to reap the benefits of their contributions.  No donor wants to see years of research and funding illegally diverted to a foreign government or competitor.  A university that does not take this risk seriously could begin to see expected research grants and contributions being provided to other schools or facilities, especially when the U.S. government is the funding source.

Universities should also consider the disruption a law enforcement investigation into espionage on campus can have on its day-to-day operations, reputation, and ability to maintain investor (philanthropic) confidence.  The media will undoubtedly provide thorough coverage of an espionage investigation, the accuracy of which is not guaranteed.

Investigators will be removing and combing through files and records.  Computers may be seized, and electronic files of all kinds will be requested.  Interviews of those with knowledge of the incident or perpetrators will be required, and if a public trial takes place, there will be more disruption and publicity.  A university wanting to maintain or salvage its reputation after the uncovering of espionage on its campus will find it advantageous if it can truthfully state it has been cooperating with law enforcement on the investigation rather than have a story surface that the university was one of the obstacles law enforcement had to overcome in order to put an end to the espionage. Having the university’s name negatively associated with a foreign espionage investigation is not the kind of publicity a university will find easy to overcome.
For students, the consequences of becoming entangled in espionage could be severe.   Students make easy targets, and their idealism and naiveté can often get in the way of their judgment.  Once a student is recruited as a spy, his opportunities for reversing course without consequence are limited.  One only needs to look at the choices made by Glenn Duffie Shriver, an American just out of college and living in China, who was slowly manipulated by Chinese intelligence to seek employment with the CIA.  Shriver was arrested and sentenced to four years’ imprisonment after pleading guilty to conspiracy to commit unlawful conveyance of national defense information.  Shriver was released from prison in 2013, but he will be forever remembered as a Chinese spy.  Not a great resume builder.

From a national security perspective, espionage on campus also contributes to the perpetual and long-term decline of the United States’ competitive advantage over its adversaries.  The technology and research lost to other countries through espionage and theft robs the American economy of the commercial and economic benefits it would have derived in terms of jobs, profits, and scientific and technological advancement.  The stolen knowledge increases the commercial and economic standing of the countries that committed the theft to the detriment of the United States.  If the stolen technologies and research have military, defense, or security applications, then the losses also contribute to the threats the United States faces from countries and adversaries who seek to challenge or harm its national security interests.

Universities are a soft target for espionage and offer potentially lucrative rewards for our adversaries’ intelligence targeting efforts.  Every loss resulting from espionage or foreign theft at an American university is a gain for the adversaries of the United States. These risks and potential consequences transcend the inerrant concept of the open, academic environment.

Fear of Russia, Tiny Estonia Trains Citizens for War Skills

In part from Free Beacon:

The service, known in Estonia as Kaitsepolitseiamet or “Kapo,” produces an Annual Review summarizing trends and internal threats to Estonia. The 2015 Annual Review, released last week, includes sections on cyber security, preventing international terrorism, and fighting corruption, among other issues.

However, the first page of the report makes it clear what the service considers the top threat to Estonian and European security: “In the context of Russian aggression, the security threat arising from a weakening of the European Union is many times greater than that arising from the refugees settling in Estonia.”

“This is the most important point,” Martin Arpo, Kapo’s deputy director general, told the Washington Free Beacon. “For Estonia, the report is a reminder: let’s think about real security threats, and not imaginary ones. The migration crisis is bringing focus away from real threats not only in Estonia but in Europe, as well. The only hope for Putin to fulfill his ambitions is that Europe and NATO are split or have controversies inside. The refugee crisis is really the only serious topic that can bring these controversies.”

The first page of the report references the Gerasimov Doctrine, a vision of war through non-military means published by Russian Chief of General Staff Valeriy Gerasimov in early 2013. More here.

****

Spooked by Russia, Tiny Estonia Trains a Nation of Insurgents

Members of the Estonian Defense League set off for a patrol competition near the town of Turi in central Estonia. The events, held nearly every weekend, are called war games, but they are not intended to be fun. Credit James Hill for The New York Times

NYT’s/TURI, Estonia — Her face puffy from lack of sleep, Vivika Barnabas peered down at the springs, rods and other parts of a disassembled assault rifle spread before her.

At last, midway through one of this country’s peculiar, grueling events known as patrol competitions, she had come upon an easy task.

Already, she and her three teammates had put out a fire, ridden a horse, identified medicinal herbs from the forest and played hide-and-seek with gun-wielding “enemies” in the woods at night.

By comparison, this would be easy. She knelt in the crinkling, frost-covered grass of a forest clearing and grabbed at the rifle parts in a flurry of clicks and snaps, soon handing the assembled weapon to a referee.

A team loaded and removed cartridges from rifle magazines in a timed test. Credit James Hill for The New York Times

“We just have to stay alive,” Ms. Barnabas said of the main idea behind the Jarva District Patrol Competition, a 24-hour test of the skills useful for partisans, or insurgents, to fight an occupying army, and an improbably popular form of what is called “military sport” in Estonia.

Continue reading the main story

The competitions, held nearly every weekend, are called war games, but are not intended as fun. The Estonian Defense League, which organizes the events, requires its 25,400 volunteers to turn out occasionally for weekend training sessions that have taken on a serious hue since Russia’s incursions in Ukraine two years ago raised fears of a similar thrust by Moscow into the Baltic States.

Estonia, a NATO member with a population of 1.3 million people and a standing army of about 6,000, would not stand a chance in a conventional war with Russia. But two armies fighting on an open field is not Estonia’s plan, and was not even before Donald J. Trump, the Republican presidential candidate, said European members of NATO should not count on American support unless they pay more alliance costs.

Since the Ukraine war, Estonia has stepped up training for members of the Estonian Defense League, teaching them how to become insurgents, right down to the making of improvised explosive devices, or I.E.D.s, the weapons that plagued the American military in Iraq and Afghanistan. Another response to tensions with Russia is the expansion of a program encouraging Estonians to keep firearms in their homes.

The Jarva competition entailed a 25-mile hike and 21 specific tasks, such as answering questions of local trivia — to sort friend from foe — hiding in a bivouac deep in the woods and correctly identifying types of Russian armored vehicles. On a recent weekend, 16 teams of four people had turned out, despite the bitter, late fall chill. The competition was open to men, women and teenagers.

Ms. Barnabas and her three teammates had spent the night hiding in a nest lined with pine needles and leaves on the forest floor, while men playing the occupying army stomped around, firing guns in the air and searching for them. Contestants who are found must hand over one of the 12 “life cards” they carry, which detracts from their final score.

“It’s cold and you lie on the ground, looking up at the stars and hearing shooting and footsteps nearby,” said Ms. Barnabas, a petite woman who is also a coordinator for the league in her day job. She was swathed in a few layers of long underwear and camouflage.

“It wasn’t so bad because we slept cuddled together,” she said, flirtatiously, of her female team. The footsteps came and went, and the women stayed quiet. “They didn’t find us.”

A team demonstrated its first-aid skills during the competition. Members bring their rifles and rucksacks packed with camping comfort foods like salami, Snickers bars and Gatorade, as well as first-aid kits.

Encouraging citizens to stash warm clothes, canned goods, boots and a rifle may seem a cartoonish defense strategy against a military colossus like Russia. Yet the Estonians say they need look no further than the wars in Iraq and Afghanistan to see the effectiveness today, as ever, of an insurgency to even the odds against a powerful army.

Estonia is hardly alone in striking upon the idea of dispersing guns among the populace to advertise the potential for widespread resistance, as a deterrent.

“The best deterrent is not only armed soldiers, but armed citizens, too,” Brig. Gen. Meelis Kiili, the commander of the Estonian Defense League, said in an interview in Tallinn, the capital.

A team of military cadets won the competition. Credit James Hill for The New York Times

The number of firearms, mostly Swedish-made AK-4 automatic rifles, that Estonia has dispersed among its populace is classified. But the league said it had stepped up the pace of the program since the Ukraine crisis began. Under the program, members must hide the weapons and ammunition, perhaps in a safe built into a wall or buried in the backyard.

For the competitions, members bring their rifles and rucksacks packed with camping comfort foods like salami, Snickers bars and Gatorade, as well as first-aid kits.

But why bother with the stocking caps, the hidden ammunition and the rucksacks if, under Article 5 of the NATO charter, the United States is obliged to send the full might of its military hurtling into Estonia in an attack?

The Estonian government says that ignores Article 3, which stipulates that each member should also prepare for individual defense. But skeptics cite another reason: fears that the United States and Europe might not have the stomach for a confrontation with Russia, even though they are currently building up their military presence in the Baltics. That would leave Estonia to fend for itself.

A member of the team that placed second sank to the ground to recuperate after crossing the finish line. Credit James Hill for The New York Times

Whatever the reason, training for underground warfare is going ahead here, where partisans are still glorified for fighting the Nazis and Soviets in World War II.

“The guerrilla activity should start on occupied territory straight after the invasion,” General Kiili said. “If you want to defend your country, we train you and provide conditions to do it in the best possible way.”

Members of the community also take part in the drills.

The competition to identify edible and medicinal herbs, for example, was run by a high school biology teacher. The fire department staged a competition to put out a small blaze in a barrel. A horseback-riding school for children tested moving a “wounded” colleague by horse.

Jaan Vokk, a retired corporal with the Estonian Army, ran the competition to identify armored vehicles on a slide show on his laptop. “Sometimes it feels like they are getting us ready for something,” he said ominously, while quizzing a teenage girl in camouflage to identify Russian tanks.

The girl was ready, rattling off the names as pictures flashed on the computer screen — “T-72 main battle tank, BTR-80 armored personnel carrier” — and earning a nearly perfect score.

“Partisan war is our way,” Mr. Vokk said. “We cannot equal their armor. We have to group in small units and do a lot of destruction of their logistics convoys. We needle them wherever we can.”

Mr. Vokk served with the army in Afghanistan, where, he said, he gained an appreciation for the effectiveness of I.E.D.s.

“They scared us,” he said. “And a Russian is just a human being as well. He would be scared.”

Cyber CIA: Brennan Rebuilt the Agency for Digital Future

    

NEW DIRECTION: John Brennan at a Senate Intelligence Committee hearing on his nomination to be the director of the CIA in 2013. Brennan has restructured the agency to REUTERS/Jason Reed

John Brennan’s attempt to lead America’s spies into the age of cyberwar

The CIA director has put the U.S. spy agency through a historic restructuring to cope with the era of digital warfare. Many in the agency are unhappy with the shake-up. In a series of interviews, Brennan outlines his strategy. “I think CIA really needs to up its game.”

ReutersInvestigates:WASHINGTON – When America goes to the polls on Nov. 8, according to current and former U.S. intelligence officials, it will likely experience the culmination of a new form of information war.

A months-long campaign backed by the Russian government to undermine the credibility of the U.S. presidential election – through hacking, cyber attacks and disinformation campaigns – is likely to peak on voting day, the officials said.

Russian officials deny any such effort. But current and former U.S. officials warn that hackers could post fictional evidence online of widespread voter fraud, slow the Internet to a crawl through cyber attacks and release a final tranche of hacked emails, including some that could be doctored.

“Don’t underestimate what they can do or will do. We have to be prepared,” said Leon Panetta, who served as CIA director and defense secretary in President Barack Obama’s first term. “In some ways, they are succeeding at disrupting our process. Until they pay a price, they will keep doing it.”

John Brennan, the current CIA director, declined to comment on the Russian efforts. But he said Russian intelligence operatives have a long history of marrying traditional espionage with advances in technology. More broadly, Brennan said, the digital age creates enormous opportunities for espionage. But it also creates vulnerabilities.

Citing an array of new cyber, conventional and terrorist threats, Brennan announced the most sweeping reforms of the CIA in its 69-year history 18 months ago.

Weakening the role of the Directorate of Operations, the agency’s long-dominant arm responsible for gathering intelligence and conducting covert operations, Brennan created 10 new “mission centers” where CIA spies, analysts and hackers work together in teams focused on specific regions and issues. He also created a new Directorate for Digital Innovation to maximize the agency’s use of technology, data analytics and online spying.

The information age “has totally transformed the way we are able to operate and need to operate,” Brennan told Reuters in a series of interviews. “Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”

When a new American diplomat arrives for duty at the U.S. embassy in Moscow or Beijing, CIA official say, Russian and Chinese  intelligence operatives run data analytics programs that check the “digital dust” associated with his or her name. If the newcomer’s footprint in that dust – social media posts, cell phone calls, debit card payments – is too small, the “diplomat” is flagged as an undercover CIA officer.

The Russian-backed campaign to discredit the U.S. election is not isolated. Hackers believed to have links to Chinese intelligence began stealing the personal information of 22 million federal employees and job applicants in 2014, the worst known data breach in U.S. government history. Islamic State’s online propagandists continue to inspire lone wolf attacks in the United States even as the group loses territory.

A senior official from the Directorate of Operations, who backs the shake-up, said the agency is experiencing its greatest test in decades.

“The amount of threats and challenges that are facing this organization and this nation are greater than at any time in the last 30 years,” said the official, who declined to be named. “The days of a black passport, a fistful of dollars and a Browning pistol are over.”

INNER CIRCLE: President Barack Obama with Brennan and Chief of Staff Denis McDonough at the White House in 2013. The president and the CIA chief are criticized by some former agents for being overly cautious in Syria, Russia and elsewhere. Courtesy Pete Souza/The White House/Handout via REUTERS

“Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”

John Brennan, CIA director

James Clapper, the Director of National Intelligence, praised Brennan and his efforts to retool the CIA for a new era in an interview. So did Lisa Monaco, Brennan’s successor as the President Obama’s Homeland Security and Counterterrorism adviser.

But some current and former officials question Brennan’s strategy, arguing his reforms are too digitally focused and will create a more cautious, top-heavy spy agency. At a time when the agency needs to refocus its efforts on human espionage, they say, the concentration of power in the new mission centers weakens the ability of the Directorate of Operations to produce a new generation of elite American spies.

The reforms have hurt morale, created confusion and consumed time and attention at a time of myriad threats, according to interviews with ten former officials.

Glenn Carle, a former CIA covert officer, supports Brennan and his reforms but said they have sparked a mixed reaction among directorate of operations officials who believe human intelligence is getting short shrift.

“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention,” the often inscrutable aims of foreign leaders, Carle said. “Obtaining that is a human endeavor.”

At the same time, Brennan has stirred a different sort of criticism – that he has defied Congressional oversight. Liberal Democrats and libertarian Republicans in Congress say the Brennan-Obama tenure has been tarnished by a lack of transparency with congressional oversight committees and the public regarding surveillance, drone strikes and the agency’s use of torture against terrorism suspects during the administration of George W. Bush.

“While I think John’s overall legacy will be as a reformer, that legacy will suffer from his refusal to come to grips with the CIA’s troubled torture program,” said Senator Dianne Feinstein, D-Calif, vice chair of the Senate’s intelligence committee. “I think the new president’s CIA director must prioritize a high level of trust between the CIA and Congress to insure proper oversight is conducted.”

It’s unclear how closely the country’s next president will hew to Brennan’s strategy.

The front-runner, Democrat Hillary Clinton, has an incentive to beef up American cyber-espionage: U.S. intelligence officials blame the continuing leak of emails from her campaign on Russian-backed hacking. Clinton also expressed support for covert action in a transcript of a 2013 speech she gave to Goldman Sachs that was recently released by Wikileaks.

Republican Donald Trump, meanwhile, pledged to make cybersecurity a top priority in his administration in an October 3 speech. “For non-state terror actors, the United States must develop the ability – no matter how difficult – to track down and incapacitate those responsible and do it rapidly,” Trump said. “We should turn cyber warfare into one of our greatest weapons against the terrorists.”

In interviews at agency headquarters in Langley, Virginia, Brennan declined to comment on either candidate or discuss operational details of the CIA. But he and eight other senior CIA officials gave the most detailed description yet of their rationale for the most radical revamp of the agency since its founding in 1947.

“I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan said. “I think CIA really needs to up its game.”

JUST-WAR THEORIST

Brennan, a 61-year-old native of north New Jersey, looks like a linebacker but talks like a technocrat. He speaks excitedly about how the CIA and other government bureaucracies can be configured in “a way to ensure optimal outcomes.”

The son of devout-Catholic Irish immigrants, Brennan speaks reverently of CIA officers as public servants who risk their lives without public accolades. He joined the agency in 1980, at the age of 24, after receiving a Master’s Degree in government with a concentration in Middle Eastern studies from the University of Texas.

“The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention. Obtaining that is a human endeavor.”

Glenn Carle, former CIA covert officer

Educated in various Catholic schools, including Fordham University, Brennan says he is an adherent of just war theory – a centuries-old Christian theological argument that war is justified when it is waged in self defense, as a last resort and minimizes civilian casualties. Those beliefs, he says, have guided him in one of the most controversial aspects of his tenure in the Obama administration.

As Obama’s White House counter-terrorism adviser and CIA director, Brennan played a central role in carrying out 473 U.S. airstrikes outside conventional war zones between 2009 and 2015, primarily by drone. U.S. officials estimate the attacks have killed 2,372 to 2,581 people, including 64 to 116 civilians. Human rights groups say the totals are vastly higher. Last year, for instance, a U.S. drone strike in Pakistan accidentally killed American aid worker Warren Weinstein and Italian aid worker Giovanni Lo Porto, who were both being held captive by al Qaeda.

Brennan declined to comment on specific strikes, but said, “I still can look myself in the mirror everyday and believe that I have tried to do what is morally right, what is necessary, and what is important to keep this country safe.” He also acknowledged mistakes.

“You question yourself. You beat yourself up. You try to learn from it,” Brennan said, in a rare display of emotions. “But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”

Today, Brennan says the United States faces the most complex array of threats he has seen since joining the agency 36 years ago. As a CIA analyst, operative and executive, he has lived through the Cold War espionage duels of the 1980s; the disintegration of nation-states after the 1989 fall of the Berlin Wall; the rise of non-state terrorist groups since 2001; and the current digital disruption. Now, he says, all four dynamics are converging at once.

BOLD AND INNOVATIVE RIVALS

CIA officials say their greatest state competitors are the Russian and Chinese intelligence services. While smaller countries or terrorist groups may want to strike at the United States, Russia and China are the only two adversaries with the combination of skills, resources and motivation needed to challenge Washington.

In recent years, Moscow’s Federal Security Service, or FSB, has become adept at waging “gray zone” conflicts in Ukraine, Crimea and Syria, the officials said. In all three countries, Russian intelligence operatives have deftly shrouded protagonists, objectives and war crimes in ambiguity.

GREAT RIVALS: U.S. President Barack Obama with his Chinese and Russian counterparts, Xi Jinping and Vladimir Putin, in Beijing in 2014. Washington has faced barrages of digital threats from Beijing and Moscow; CIA insiders say the two nations remain the biggest challenge for the United States. REUTERS/Pablo Martinez Monsivais

“You beat yourself up…. But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”

John Brennan, CIA director

One target is America’s increasingly politically polarized democracy. As Russian-backed hacking unfolded this summer, the Obama White House’s response fueled frustration among law enforcement and intelligence officials, according to current and former officials. The administration, they said, seemed to have no clear policy for how to respond to a new form of information warfare with no rules, norms or, it seemed, limits.

White House officials said the administration is still considering various methods of responding, but the responses won’t necessarily be made public.

China presents another challenge. Chinese businessmen and students continue trying to scoop up American state and economic secrets. In one bright spot, Beijing appears to be abiding by a 2015 pact signed by Obama and Chinese leader Xi Jinping that the two governments would not conduct economic espionage against one another. Chinese hacking appears to have slowed from the voracious rate of the past, which included hacking into the computers of the 2008 presidential campaigns of John McCain and Barack Obama but not releasing what was found.

“The question is whether or not it is due to greater care in terms of covering one’s tracks,” Brennan said of the apparent change. “Or whether or not they realize that they’re brand is being tarnished by this very rapacious appetite for vacuuming up things.”

Regional powers are also increasing their digital espionage efforts.

In 2014, the Obama administration blamed North Korea for the hacking of Sony Pictures’ computer system. This spring, U.S. prosecutors indicted seven Iranian hackers for allegedly trying to shut down a New York dam and conducting a cyber attack on dozens of U.S. banks. They also indicted three Syrian members of the “Syrian Electronic Army,” a pro-Syrian government group,  who hacked into the websites of U.S. government agencies, corporations and news organizations.

In a 2015 case that U.S. officials said marks a worrying new trend, federal prosecutors indicted a 20-year-old hacker from Kosovo. With the help of a criminal hacker, Ardit Ferizi stole the home addresses of 1,300 members of the U.S. military, providing the information to Islamic State and posting it online, and calling for attacks on the individuals. Ferizi was arrested in Malaysia, where he was studying computer science. In September, he pleaded guilty in a U.S. federal court and was sentenced to 20 years in prison.

“This blend of the criminal actor, the nation-state actor and the terrorist actor, that’s going to be the trend over the next five years,” said John Carlin, who recently stepped down as head of the Justice Department division that monitors foreign espionage in the United States.

But some active clandestine officers argue that the intelligence community has grown too reliant on technology, a trend they trace back four decades to the directorship of Stansfield Turner. Satellite photography, remote sensors and communications intercepts have become more sophisticated, but so have encryption techniques and anti-satellite weapons.

More important, they argue, is that technology is no substitute for “penetrations” – planting or recruiting human spies in foreign halls of power. The CIA missed India’s 1998 nuclear tests and misjudged Saddam Hussein’s arsenal in 2003 because it lacked spies in the right places.

Today, these current and former CIA officials contend, American policymakers have little insight into the thinking of Vladimir Putin’s inner circle. Presidents, kings and dictators often don’t share their true intentions electronically, putting this valuable information largely beyond the scope of digital spying. The best sources are still people, and these officials believe the agency is not mounting the kind of bold human spying operations it did in the past.

Brennan and other CIA officials flatly denied downplaying human intelligence. They said aggressive, high-risk human spying is under way but they cannot go into operational detail.

One of Brennan’s predecessors, Michael Hayden, former CIA chief under President George W. Bush, says the agency strayed from its core mission during the Bush years. After the Al Qaeda attacks of Sept. 11, 2001, Hayden said, the CIA had to shift to become a paramilitary organization that devoted its most talented officers to tracking and killing terrorists. It now needs to reverse that trend by focusing on espionage against rival nations, he said.

“The constant combat of the last 15 years has pushed the expertise of the case officer in the direction of the battlefield and in the direction of collecting intelligence to create physical effects,” said Hayden, using an intelligence euphemism for killing. “At the expense of what the old guys called long-range, country-on-country intelligence gathering.”

‘OPTIMIZING CAPABILITIES’

Brennan and the eight other senior CIA officials made the case that their modernization effort will address the needs and threats described by Hayden and others. Technological advances, they said, have leveled the intelligence playing field. The web’s low cost of entry, creativity and speed benefits governments, hackers and terrorists alike.

A veteran covert operative who runs a new CIA mission center compared Brennan’s reforms to the Goldwater-Nichols Act. The landmark 1986 legislation reorganized the U.S. military into a half dozen regional commands where the Army, Navy, Air Force and Marines work together. It was a response to inter-service rivalries that bedeviled the American military in Vietnam.

The CIA equivalent involves having the agency’s five main directorates – Operations (covert spies), Analysis (trends and prediction), Science and Technology (listening devices and other gadgetry) and Digital Innovation (online sleuthing) and Support (logistics) – provide the personnel needed by each regional mission center.

CORE MISSION: Former CIA Director Michael Hayden says the agency went deeply into anti-terrorist operations during the Bush years and needs to return to its traditional mission of spying. REUTERS/Brendan McDermid

Andrew Hallman, director of the new Directorate for Digital Innovation, said the CIA has embraced cloud computing as a way to better share intelligence. In a move that shocked insiders and outsiders, the CIA awarded an $600 million contract to Amazon in 2013 to build a secure cloud computing system where multiple CIA databases can be quickly accessed.

For decades, different directorates maintained their own separate databases as a security measure, said Hallman. Some of the applications the agency used were so old – up to 30 years – that the manufacturer was no longer in business.

Turning to Amazon was designed to immediately put private-sector computing advances at the fingertips of CIA operatives. It was also an admission that it was easier for the agency to buy innovation from the private sector than try to create it internally.

Several former CIA officials criticized the new team-focused system, saying it dilutes the cultures that made each agency directorate strong. The best analysts are deeply skeptical and need to be separated from covert operatives to avoid group-think, they said. And the best covert operatives are famously arrogant, a trait needed to carry out the extraordinarily difficult task of convincing foreigners to spy for America.

Richard Blee, a former CIA clandestine officer, said the agency needed reform but highlighted a separate problem created by technological change. Instant secure communications between CIA headquarters and officers in the field has centralized decision-making in Washington, Blee said. And regardless of administration, senior officials in Washington are less willing to take a risk than field officers – virtually all of whom complain about headquarters’ excessive caution.

“The mentality across the board in Washington is to take the lowest common denominator, the easiest option, the risk-free option,” Blee said. “The Chinese are taking tough decisions, the Russians are taking tough decisions and we are taking risk-averse decisions. And we are going to pay a price for that down the road.”

Brennan says his reforms will empower CIA officers: The integrated teams in each new mission center will improve speed, adaptability and effectiveness.

“To me, that’s going to be the secret of success in the future, not just for CIA but for other organizational structures,” Brennan said. “Taking full advantage of the tools, capabilities, people and expertise that you have.”

The old ways of spycraft, Brennan argues, are no longer tenable. Asked what worries him most, he gave a technocratic answer: Twentieth century American government management practices are being rendered obsolete in the digital age.

“U.S. decision making processes need to be streamlined and accelerated,” he said. “Because the problems are not going to wait for traditional discussions.”

THE LONG VIEW: CIA headquarters in Langley, Virginia. “I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan says. “I think CIA really needs to up its game.” REUTERS/Jason Reed

—————

Digitizing the CIA

By David Rohde

Additional reporting by John Walcott and Jonathan Landay

Video: Zachary Goelman

Graphics: Christine Chan

Photo editing: Barbara Adhiya

Edited by Michael Williams