NoI or CAIR to Lead the DNC? Bring Back HUAC

Congressman Ellison has introduced several pieces of legislation that have never advanced.

Washington (CNN)Rep. Keith Ellison, the first Muslim elected to Congress and one of only two members in the Capitol, said Wednesday that in the wake of anti-Muslim rhetoric after the Paris attacks, Muslims are feeling a need to assert even more how patriotic they are.

The Minnesota Democrat said when he hears other lawmakers suggesting Christian Syrian refugees should be allowed into the country but Muslim Syrian refugees should not, it reminds him that the First Amendment to the Constitution establishes freedom of religion. More here.
Congressman Ellison attends the Masjid An-Nur mosque in Minneapolis and his visit to Mogadishu fulfilled a request from his constituents with ties to Somalia. Minnesota has one of the largest populations of Somali-Americans in the U.S. April of 2015, six Somali-Americans from Minneapolis were arrested for attempting to travel to Syria and link up with the Islamic State, also referred to as ISIS or ISIL. All were young men between the ages of 19 and 21. Zacharia Yusuf Abdurahman, 19, Adnan Farah, 19, Hanad Mustafe Musse, 19, and Guled Ali Omar, 20,  were arrested in Minneapolis while Abdirahman Yasin Daud, 21, and Mohamed Abdihamid Farah, 21, were arrested trying to buy fake passports in San Diego. The criminal complaint is here.

Who is Keith Ellison? Left-wing congressman with past ties to Nation of Islam wants DNC job

FNC: In an attempt to stave off a civil war in the ranks, Democratic leaders are scrambling to unite behind a candidate for the party’s chairmanship – and have landed for now on a Louis Farrakhan-linked congressman who once called for Dick Cheney’s impeachment and compared George W. Bush to Hitler.

Rep. Keith Ellison, D-Minn., the first Muslim elected to Congress and a leading progressive among House Democrats, already has picked up the backing of both the Democratic Party’s left – with support from Sens. Bernie Sanders and Elizabeth Warren – and its establishment, receiving endorsements from Senate leaders Chuck Schumer, D-N.Y., and retiring Harry Reid, D-Nev.

Ellison is firmly on the party’s left – he has a fax line in his office, but his website says they will not respond to faxes “for environmental reasons.” He backed Bernie Sanders during the primaries, even introducing him at the convention.

“Bernie sparked the beginning of a revolution y’all,” Ellison said at his address during the Democratic National Convention in Philadelphia. “Together we call for climate justice, racial justice, wage justice.”

Sanders has given strong backing to Ellison in return, sending out a fundraising email saying an Ellison-led Democratic Party that will stand up to Wall Street greed and corporate America is “the Democratic Party we need.”

Ellison is expected to formally announce his bid Monday. On Sunday, Ellison hinted he would run and said the party needs to focus on middle- and working-class Americans and less on donors.

“I love the donors and we thank them, but it has to be that the guys in the barber shop, the lady at the diner, the folks who are worried about whether that plant is going to close, they’ve got to be our focus,” he said on ABC’s “This Week.”

Some strategists feel this economic message is exactly what the party needs to reach out to white working-class voters who pulled the lever for Trump.

“You can’t stand up for middle-class families if you are so closely associated with Wall Street and I think that was the issue with Clinton, her ties to Goldman Sachs, and I think that’s shown by how much money we raised from Wall Street,” Brad Bannon, Democratic strategist and CEO of Bannon Communications Research, told FoxNews.com. “We have to become more oriented to working-class families if we’re going to survive and prosper, because we blew the industrial Midwest.”

However, Ellison’s past associations and comments may trouble more moderate voters.

Ellison’s 2006 run for his seat was plunged into controversy after the conservative PowerLineBlog.com found he had once identified with Farrakhan’s Nation of Islam and in 1998 was referring to himself as Keith X Ellison and Keith Ellison-Muhammed.

The Washington Post reported that Ellison had defended Farrakhan against accusations of anti-Semitism in 1989 and in 1990 had called affirmative action a “sneaky” form of compensation for slavery, calling instead for reparations.

When the controversy erupted in 2006, Ellison acknowledged he had worked with the group, but only for 18 months to help organize Farrakhan’s 1995 Million Man March. He distanced himself from both Farrakhan and the Nation of Islam, and said he hadn’t scruitinized the group’s anti-Semitic positions appropriately.

“They were and are anti-Semitic, and I should have come to that conclusion earlier than I did,” he said.

Yet it isn’t the only controversy for Ellison. In 2007, Ellison made a comparison between Bush and 9/11 to Hitler and the 1933 Reichstag fire.

“9/11 is the juggernaut in American history and it allows… it’s almost like, you know, the Reichstag fire,” Ellison said, according to a Daily Telegraph report at the time. “After the Reichstag was burned, they blamed the Communists for it, and it put the leader of that country [Hitler] in a position where he could basically have authority to do whatever he wanted.”

He later clarified that he did indeed believe that Usama bin Laden was responsible for the terror attacks. But it wasn’t the only controversy for Ellison in 2007, as he also backed a movement to impeach then-Vice President Dick Cheney over his alleged fabrication of intelligence about weapons of mass destruction in Iraq.

However, Bannon believes that Ellison’s Muslim heritage could be a boost not a burden, especially in light of Trump’s elevation Sunday of controversial Breitbart boss Steve Bannon to chief strategist.

“[Steve] Bannon propagates Muslim conspiracy theories,” Brad Bannon, who is not related to the Breitbart head, said. “Ellison is the perfect guy to counter that. Ellison is exactly what we need to prove we aren’t the party of hate and racism.”

Ellison would have competition for the job. Former DNC chairman and ex-presidential candidate Howard Dean has put his name in the running. Former Maryland Gov. Martin O’Malle

y also said he’s considering a run.

Foreign Spies on our College Campuses

International Espionage on Campus

Bishop/CB: The idyllic American university campus conjures the image of a safe and open academic environment where students spend four or more years learning new ideas and preparing for future careers.  Professors challenge eager students to open their minds to old and new perspectives in science, mathematics, business, and of course, the arts and humanities.  Universities nurture an atmosphere where academics and scientists can engage in groundbreaking research, make advances in technology, and publish on novel theories and discoveries.

For many students, college may be the first time they are living on their own, allowing them to explore not only academic freedom but personal freedom. For parents coping with their children leaving home, some comfort is found in the expectation that while students are on campus the university will be actively taking measures to protect them from physical harm and risks that could affect their future.  Parents don’t realize that for some students, college may be the first time students are exposed to the clandestine world of international espionage.

Espionage knows no boundaries.  Foreign intelligence officers and spies lurk wherever there is information of value to be had or people with access to it. Information does not have to be a government secret for a foreign intelligence service to want to steal it.  Nation states play the Great Game to gain an advantage, whether political or economic, over their adversaries.  And there is plenty of information of value on American college campuses to attract the attention of adversary nations.  From advanced research in sciences and technology to professors with access to U.S. government officials, American universities are a target-rich environment for intelligence collection, intellectual property theft, and the illicit transfer of research and technology.   The welcoming nature of American universities—from unlocked entrances to university facilities, minimal investigation into the backgrounds of students enrolling in classes, and open admission to conferences, seminars, and other campus events—creates the perfect opportunity for undercover foreign intelligence officers or their human sources to slip onto campus and search for students who have potential for entering sensitive positions in the U.S. government or landing jobs with American companies engaged in the development and production of emerging and advanced technologies.

While the threat of espionage may not be apparent to parents and students, American universities have little excuse for not knowing about it.  Federal law enforcement agencies like the FBI regularly attempt to advise universities of the potential espionage threats on campus, and the media also has reported extensively on them.  The risks are real, knowable, and preventable, and universities that ignore the threats could face potentially devastating consequences to their reputations, relationships, and financial well being.  For students who do not fully appreciate the risk and get wrapped up on the wrong side of the clandestine world, the impact on their futures can be tremendous and irreversible.  Espionage on campus and the often-related illicit transfer of research and technology from school laboratories also contribute to immediate and long-term decline of U.S. national security interests and the competitive advantage the United States possesses in sciences and technology.  The university campus has been part of the Great Game chessboard for years. This is nothing new and not much has changed.

In 1930s Great Britain, five college students with communist sympathies came under the spell of espionage at the University of Cambridge.  Donald MacLean, Guy Burgess, Anthony Blunt, John Cairncross, and Kim Philby were in their undergraduate years when the NKVD, the Soviet precursor to the KGB, recruited them to serve the communist cause.  At the time, none of the students had access to information of value or persons of interest, but the NKVD believed these men, who came from the right social class, would find their way into positions of influence and access. They all did.

MacLean landed key positions in the UK’s foreign office, the equivalent of the U.S. Department of State.  Burgess held positions with the foreign office, the BBC, and MI6.  Blunt spent some time in MI5, served as the Surveyor of the King’s Pictures, and used his standing in academic and social circles to spot other potential Soviet spies. Cairncross made the rounds at MI6 and Bletchley Park, the precursor to the UK’s Government Communication Headquarters (GCHQ).  Kim Philby was the prize of the five.  While starting his espionage as a freelance journalist in the Spanish Civil War, which gave him access to pro-Franco forces—the ideological enemies of the Soviet Union—Philby returned to the UK and entered MI6.  There, he steadily rose through the ranks, eventually overseeing MI6’s counterintelligence operations against the Soviet Union. The Cambridge spies, most notably Philby, are still considered to be some of the most damaging spies in UK espionage history. The notoriety of these men is well known in England, and their association with the University of Cambridge as the Cambridge Ring or Cambridge Five will forever be remembered.

American universities have not been immune to the espionage efforts of foreign intelligence services.  In 1984, a student-spy working for the Cuban intelligence service and studying at Johns Hopkins University “spotted” Ana Montes as a potential Cuban recruit.  After being introduced to Cuban intelligence officers, Montes agreed to spy for Cuba while still a graduate student at Johns Hopkins.  She later became an intelligence analyst at the Defense Intelligence Agency (DIA), focusing on Cuban issues.  She was arrested in 2001 and sentenced to 20 years in prison.

Other known espionage or technology/research theft cases affecting the American university community include:

  • In 2002, Qingqiang Yin, a former Cornell University researcher was arrested before boarding a flight to Shanghai from New York.  He was carrying numerous bacteria samples and yeast cultures belonging to the university.  The FBI investigation revealed Yin was seeking a job with a research facility in China and offered to bring the bacteria and yeast cultures to China for commercial enzyme production.  He was sentenced to 12 months’ imprisonment for conspiracy to defraud the U.S. government.
  • In 2006, Carlos Alvarez, a psychology professor at Florida International University, admitted during a plea hearing that he had been a Cuban spy for nearly 30 years, gathering and transmitting information about Cuban exile groups to Cuban intelligence agents.  His wife Elsa, also a professor, admitted knowing of her husband’s conduct.  They were sentenced to five and three years’ imprisonment, respectively.  
  • In 2012, the FBI arrested 12 deep-cover Russian SVR intelligence officers who were engaged in espionage against various American targets.  One of the SVR officers was Cynthia Murphy, a.k.a. Lydia Guryeva, who while studying for a master’s degree at Columbia University, was tasked by the SVR to develop relationships with classmates and professors who have or will acquire access to secret information and to report on their backgrounds and characteristics, providing assessments on their vulnerability for recruitment as spies. The SVR also directed Guryeva to collect information on students seeking employment with the CIA.  After pleading guilty to failing to register as an agent of a foreign government, the United States returned Guryeva (and the other deep-cover officers) to Russia in exchange for prisoners held there. 
  •  
  • In 2013, Hua Jun Zhao, a Chinese research assistant at the Medical College of Wisconsin, was arrested and charged with economic espionage after stealing cancer research compounds and shipping them to China, where he allegedly planned to take them to a Chinese university for further development.  He pleaded guilty to the lesser charge of illegally downloading research data and was sentenced to time served (four-and-a-half months).
  •    Image result for Hua Jun Zhao
  • Since 2004, the Chinese government has opened numerous Confucius Institutes at universities across the world, including approximately 64 institutes at American universities.  While the stated mission of the institutes is to promote the study of Chinese language and culture abroad, concerns have been raised about the ulterior motives of these institutes.  Allegations have also surfaced that the institutes may be Trojan Horses used by the Chinese government to conduct espionage activities. Regardless of the public evidence available on the alleged intelligence function of these institutes, from this former intelligence officer’s perspective, they are the perfect front for penetrating American universities and targeting their students.  

Again, these are only examples of the espionage threats facing American universities.  These incidents and others have been well documented in the public domain, and American universities dedicated to risk management should know about them, if not for their own protection, then for the benefit of their donors and students and U.S. national security.

Today’s American university receives funding from a variety of sources, including alumni, businesses, philanthropic organizations, and federal and state governments.  Research grants from the public and private sectors are a significant source of income for universities, and donors want the university to reap the benefits of their contributions.  No donor wants to see years of research and funding illegally diverted to a foreign government or competitor.  A university that does not take this risk seriously could begin to see expected research grants and contributions being provided to other schools or facilities, especially when the U.S. government is the funding source.

Universities should also consider the disruption a law enforcement investigation into espionage on campus can have on its day-to-day operations, reputation, and ability to maintain investor (philanthropic) confidence.  The media will undoubtedly provide thorough coverage of an espionage investigation, the accuracy of which is not guaranteed.

Investigators will be removing and combing through files and records.  Computers may be seized, and electronic files of all kinds will be requested.  Interviews of those with knowledge of the incident or perpetrators will be required, and if a public trial takes place, there will be more disruption and publicity.  A university wanting to maintain or salvage its reputation after the uncovering of espionage on its campus will find it advantageous if it can truthfully state it has been cooperating with law enforcement on the investigation rather than have a story surface that the university was one of the obstacles law enforcement had to overcome in order to put an end to the espionage. Having the university’s name negatively associated with a foreign espionage investigation is not the kind of publicity a university will find easy to overcome.
For students, the consequences of becoming entangled in espionage could be severe.   Students make easy targets, and their idealism and naiveté can often get in the way of their judgment.  Once a student is recruited as a spy, his opportunities for reversing course without consequence are limited.  One only needs to look at the choices made by Glenn Duffie Shriver, an American just out of college and living in China, who was slowly manipulated by Chinese intelligence to seek employment with the CIA.  Shriver was arrested and sentenced to four years’ imprisonment after pleading guilty to conspiracy to commit unlawful conveyance of national defense information.  Shriver was released from prison in 2013, but he will be forever remembered as a Chinese spy.  Not a great resume builder.

From a national security perspective, espionage on campus also contributes to the perpetual and long-term decline of the United States’ competitive advantage over its adversaries.  The technology and research lost to other countries through espionage and theft robs the American economy of the commercial and economic benefits it would have derived in terms of jobs, profits, and scientific and technological advancement.  The stolen knowledge increases the commercial and economic standing of the countries that committed the theft to the detriment of the United States.  If the stolen technologies and research have military, defense, or security applications, then the losses also contribute to the threats the United States faces from countries and adversaries who seek to challenge or harm its national security interests.

Universities are a soft target for espionage and offer potentially lucrative rewards for our adversaries’ intelligence targeting efforts.  Every loss resulting from espionage or foreign theft at an American university is a gain for the adversaries of the United States. These risks and potential consequences transcend the inerrant concept of the open, academic environment.

Nadhmi Auchi is Back, Preventing War Crimes on Assad?

-الأنبار-629x330.jpg Militant fighters of the Islamic State. File photo
As we witness tragedy beyond definition in Syria, it is becoming clear why Barack Obama has been largely absent on a policy in Syria. He has an old Chicago friend in the mix.

WikiLeaks: 29 Feb 1960 Foreign Service Dispatch from the US Embassy in Baghdad to the US Department of State, six scanned pages, declassified.

The document reports the terms of imprisonment and other sentences, imposed as a result of the 7 Oct 1959 Baath party assassination plot against the then Iraqi Prime Minister, Abdul al-Karim Qassim.

Notable figures sentenced include Saddam Hussien (“Saddam Husayn al-Tikriti”, Trial Group I) and the British-based Iraqi billionaire, Nadhmi Auchi, who was sentenced to three years “rigorous imprisonment” (“Nadhmi Shakir Awji”, Trial Group IV). More here. 

ARANews: Raqqa – A top security official in the ranks of the Islamic State (ISIS) radical group was reported dead on Sunday, after a US-led coalition hit his car with an airstrike in the western countryside of Raqqa Governorate, in northeastern Syria.

“The airstrike killed at least five ISIS members, including al-Othman who used to lead the ISIS security department in Tabqa,” local media activist Abdulkarim al-Yousef told ARA News.

The raid comes as part of the coalition’s policy to target and hunt ISIS jihadi leaders.

“The drone attack was carried out based on information from local sources trusted by the Syrian Democratic Forces,” an SDF spokesman told ARA News.

The strike coincided with the announcement of the battle for Raqqa by the Kurdish-Arab alliance of the Syrian Democratic Forces (SDF).

Raqqa is deemed a de-facto capital for the ISIS’ self-declared Caliphate.

The US-backed SDF has established a new operations room to coordinate the battle for Raqqa against the Islamic State (ISIS). “On November 5th, the SDF established a new operations room known as the Euphrates Wrath to intensify coordination between the various military factions participating in the battle for Raqqa.”

Reporting by: Jamil Mukarram | Source: ARA News

Syrian propagandists have found the ideal launderers for their message: Western journalists

Tablet: Bashar al-Assad’s regime has pulled off a grotesque PR coup by corralling a number of prominent American journalists from outlets like The New York Times, National Public Radio, The Washington Post, and The New Yorker to participate in a conference designed to legitimize the rule of Syria’s genocidal head of state. The conference held Sunday and Monday in Damascus, was organized by the British Syrian Society, a “foundation” chaired by Assad’s father-in-law, the London-based physician Fawaz Ahkras. The larger purpose of the conference appears to be raising money for the regime and its war effort, in part by relieving sanctions against major regime figures.

Many of the participants (here is a partial list of attendees) are British journalists, like Christina Lamb of The Sunday Times, and other UK figures drawn from Akhras’ London contacts. Indeed, the conference is meant to have something of a British ambiance, which is why it’s being conducted according to “Chatham House rules”—a phrase that misleadingly (and hilariously) suggests that the British foreign office is convening the panels. It seems unlikely that the Syrian intelligence officers speaking at the event, like Col. Samer, know Chatham House Rules from Hama Rules, nor do they care. The point is to legitimize the regime’s message with a vague atmosphere of Western ideas and methods—which is why having Western journalists in the audience, and even on panels, is important to the regime. Attending a conference that features at least four Syrian regime officials who are currently sanctioned for their role in Assad’s war crimes, are, among others, the New York Times’ Beirut correspondent Anne Barnard, NPR’s Alison Meuse, and Dexter Filkins of The New Yorker

The stated purpose of the Damascus conference is to “facilitate a better understanding of a very complicated crisis.” And presumably journalists in attendance have rationalized their participation to their editors along those exact lines: Since we’re covering the other side of a war, they’re no doubt explaining, it’s a good thing to hear the Assad regime’s side of the story. And since we can’t get into Damascus safely otherwise, it’s fine if we go under the protection of the regime. How else could we get in there?

There’s a simple test for whether such excuses are valid: Will the Assad government provide access to non-regime figures, like the citizens that Assad and his allies have starved in the town of Madaya? Will the regime provide them access to the countless opposition figures, including peaceful activists, the regime has put in prison and tortured? The answers are “of course not” and “under no circumstances.”

So, why go? For the camaraderie? For the sheer joy of doing journalism with other journalists in comfortable surroundings, while 200,000 Syrians are trapped, starving and under military assault, in the ruined city of Aleppo? For the great Middle Eastern food?

To get a sense of what attending a conference put on by a genocidal regime is like, here are some pictures from the twitter feed of Suzan Haidamous of The Washington Post, one of the journalists attending the Damascus conference. She deleted them after posting the pictures Sunday, the first day of the conference, perhaps after one of the subjects expressed concern that pictures of journalists being fed lavishly in the middle of Damascus—perhaps courtesy of the Syrian regime—as Assad and his allies starved Syrian civilians close by might damage the reputations of those depicted in the photos.

In the first picture, from left to right, are Dexter Filkins of The New Yorker; Haidamous; Nour Samaha, who has written for Foreign Policy and The Atlantic, Rania Abouzeid, who has contributed to TIME and The New Yorker; and Nabih Bulos, a special correspondent with the Los Angeles Times. Hashtags for this picture included #Goodtimes and #journalism.

*** Suzan Haidamous, who was enthusiastically promoting her participation in the Assad whitewash “conference” in Damascus, deleted these pics 1/

So, here they are, for the record: with Dexter Filkins, Haidamous, Nour Samaha, Rania Abouzeid, and Nabih Bulos. 2/

In the second picture, from left to right, are Anne BarnardThe New York Times Beirut bureau chief, Heba Saleh of the Financial Times; Hwaida Saad of The New York Times; and Haidamous. Hashtags here included #news and #reporting

That one was posted with the hashtags and . A couple more appropriate ones were left out: 3/

And here’s the second deleted pic, with Haidamous, Hwaida Saad, Heba Saleh, and Anne Barnard. For the record. 4/4 pic.twitter.com/82fxmJ0lXu

That one was posted with the hashtags and . A couple more appropriate ones were left out: 3/

Slaughter in the playground: Six young children are killed on a break between lessons as ‘President Assad’s troops’ bomb a Syrian nursery school
A boy winces as he receives treatment at a hospital in Ghouta, an opposition-controlled suburb of the capital, Damascus, on Sunday

A boy winces as he receives treatment at a hospital in Ghouta, an opposition-controlled suburb of the capital, Damascus, on Sunday
The White Helmets volunteer group posted this photo on social media purportedly showing a victim of the nursery attack on Sunday 

The White Helmets volunteer group posted this photo on social media purportedly showing a victim of the nursery attack on Sunday

More here from DailyMailUK.

****

RCP: A British citizen of Iraqi descent, Mr. Auchi, 70, is a billionaire, the 279th richest man in the world, according to a Forbes magazine survey last year. A great deal of Mr. Auchi’s money was made doing business with the regime of Saddam Hussein, much of it under the table. In 1987, Mr. Auchi helped French and Italian firms win a huge oil pipeline contract in Iraq, chiefly by paying off Iraqi officials, according to testimony given by an Italian banker to prosecutors in Milan. In 2003, he was convicted for his role in what was then the largest scandal in French history, involving payoffs from executives of the oil company now known as Total to political figures in Spain, Germany and Africa.

“‘He has been able to collect British politicians the way other people collect stamps,’ wrote Nick Cohen in a 2003 profile of Mr. Auchi in the left wing British newspaper the Observer.

“Mr. Auchi was a leading supplier of arms to Saddam’s regime. A former Belgian ambassador to Luxembourgcharged that a bank in Luxembourg owned principally by Mr. Auchi laundered funds — including Oil-For-Food money — for Saddam and other Islamic dictators.

“‘The name Nadhmi Auchi was just another name for Saddam’s intelligence service, or so we thought,’ said Nibras Kazimi, a former Iraqi dissident who is now a visiting scholar at the Hudson Institute in WashingtonD.C.

“Mr. Auchi is a business partner of Syrian-born businessman Antoin ‘Tony’ Rezko, who has supported Mr. Obama financially since his first run for the Illinois state senate in 1996.

“Mr. Rezko currently is in jail awaiting trial on charges he extorted money from firms seeking to do business with the state of Illinois…. Rezko’s bail was revoked Jan. 28 when the trial judge learned that he, friends and relatives had been wired $3.5 million [in May 2005] from firms in Lebanon controlled by Mr. Auchi. The judge feared Mr. Rezko was about to flee the country….

“Mr. Rezko has described Mr. Auchi as a ‘close friend.’ Mr. Auchi says they have only a business relationship. They’ve been partners in a chain of pizza restaurants in Wisconsin and in a major real estate development inRiverside Park in Chicago.

“The connection between Mr. Auchi and Sen. Obama is tenuous. But given Mr. Auchi’s shady past, his history of bribing politicians, it’s not unreasonable to ask if [he], through Mr. Rezko, was trying to buy influence with a rising political star [Obama].”

 

 

The Road of Terror Leading into Mosul, Iraq

Matt Cetti-Roberts photo

On the Road to Mosul With Iraq’s Golden Brigade

Elite Iraqi troops retake town of Bartella

by MATT CETTI-ROBERTS

WiB: A soldier from the Iraqi Army’s Golden Brigade ushers a party of journalists down a dusty side street in the town of Bartella and points to a flattened pile of concrete. The rubble is all that’s left of a building after a coalition air strike.

When the bomb hit, at least one Islamic State militant was hiding in the structure. We know this because a large blackened piece of a foot lies baking in the midday sun.

It has been sitting there for at least two days. The smell is ripe.

One member of our group, a translator called Ali, starts happily taking pictures with his iPhone. Six months ago, he barely escaped Mosul with his wife and children.

The journey involved sneaking through Islamic State lines and luckily finding a safe path through the minefields that surround Iraq’s second largest city. Ali still has relatives living in Mosul under the brutal terrorist group’s rule.

For him, this is personal.

Golden Brigade soldiers travel through Bartella on the back of an armored Humvee. Matt Cetti-Roberts photo

On Oct. 21, 2016, the Golden Brigade, one of Iraq’s elite special operations units, recaptured Bartella. Islamic State fighters took over the town as they pushed into the Nineveh plains in August 2014. At that time, approximately 30,000 Iraqis lived here, mainly Christians and Assyrians.

Situated on the main highway between Erbil and Mosul, Bartella is a strategic point. On Oct. 17, 2016, the Iraqi Army’s started down the route as part of a multi-pronged push towards Islamic State’s de facto capital in the country.

This marking on the door of a former Islamic State headquarters warns troops there is an improvised bomb inside. Matt Cetti-Roberts photo

The Golden Brigade found that two years of Islamic State occupation were not kind to Bartella. Many streets are full of rubble and overgrown weeds. We see the occasional burned-out shop and a lot of militant graffiti.

Right now, the town is still a front line. Before residents can return and rebuild, someone will have to remove hundreds of improvised explosive devices and other dangerous ordnance the extremists left behind.

Iraqi soldiers put up this Christian cross after retaking Bartella, a now routine practice after liberating Christian and Assyrian towns. Matt Cetti-Roberts photo

Beyond Bartella, in other parts of the Nineveh Governorate, the Iraqi Army and Kurdish Peshmerga have gradually retaken more ground from Islamic State. Christian and Assyrian militias contributed to some of the operations.

Many of these local troops escaped just before the extremists arrived. Some fled Mosul after militants demanded non-Muslims convert to Islam, pay a tax or suffer execution.

This stencil says the house is property of Islamic State. Below is the Arabic letter “nun,” which militants used to mark Christian or Assyrian homes. Matt Cetti-Roberts photo

After seizing Bartella and other towns, Islamic State disparagingly branded non-Muslim homes with the Arabic letter nun. In some passages, the Koran refers to Christians as Nasarah, or inhabitants of Nazareth, the birthplace of Jesus Christ. The symbol is reminiscent of the Nazis marking Jews with a yellow Star of David.

Golden Brigade soldiers relax in the shade. Matt Cetti-Roberts photo

During War Is Boring’s visit to Bartella, some of the Golden Brigade troops were resting, while others were still clearing portions of the town. Soldiers mentioned a militant appeared that morning, shot at their comrades and then disappeared.

An Iraqi Army engineer deals with a discarded suicide belt. Matt Cetti-Roberts photo

Islamic State hid improvised bombs throughout Bartella. Trying to advance quickly toward Mosul, the Iraqi Army couldn’t stop to disarm all of the devices. Someone else will have to clear the rest out later.

Iraqi Army engineers disarmed this improvised explosive device inside Bartella’s Mart Shmony Church. Matt Cetti-Roberts photo

Although rigged with explosives, Islamic State left the Mart Shmony Church standing as the Golden Brigade approached Bartella. Despite the well-publicized demolition of churches in Mosul, the terrorists used this Christian house of worship for their own purposes.

A list of banal tasks for ISIS fighters on a whiteboard in the Mart Shmony Church. Matt Cetti-Roberts photo

Empty ammunition boxes, stripper clips and bandoliers lie on a floor of the Mart Shmony Church. Matt Cetti-Roberts photo

Militants drew this flag on a wall of the Mart Shmony Church. After Iraqi troops liberated the town, someone came hit it with a boot as an insult. Matt Cetti-Roberts photo

A Christian card saying “Do not be afraid, I am with you” lies on a tiled floor outside the ransacked library. Matt Cetti-Roberts photo

A Golden Brigade stands near a defaced statue in Bartella. Matt Cetti-Roberts photo

Islamic State fighters blotted out the faces on this Christian mural. Matt Cetti-Roberts photo

While in control of Bartella, Islamic State fighters defaced numerous statues, murals and other depictions of non-Muslim figures. The extremist group claimed these icons were an affront to their puritanical, exclusionary beliefs.

One of Islamic State’s home-built rocket sits abandoned in a graveyard attached to the Mart Shmony Church. Matt Cetti-Roberts photo

The militants also smashed Christian gravestones and vandalized parts of the church.

A Christian flag hangs in the chapel of the Mart Shmony Church on the day that high ranking priests were due to arrive for the first time since August 2014. Matt Cetti-Roberts photo

Empty shell cases and machine gun belt links litter the ground inside Bartella. Matt Cetti-Roberts

The Iraqi Army’s fight for the town and the surrounding area was not easy. Although we don’t have official casualty figures, Golden Brigade soldiers mentioned comrades who died in the battle.

This TOS-1 thermobaric rocket launcher in Bartella is ready to support the Iraqi Army push on toward Mosul. Matt Cetti-Roberts

Beheaded by extremists, this statue depicting the Virgin Mary perches on a dirt pile where it was placed by Iraqi soldiers. Matt Cetti-Roberts

The deserted main street of what was once Bartella’s bazaar. Matt Cetti-Roberts

It’s hard to work out how much damage militants wrought on Bartella before the Iraqi Army arrived to liberate the town. In spite of the fighting, most houses seem intact.

The resting place of an Islamic State fighter. His severed foot was out in the street. Matt Cetti-Roberts

Still, when we visited Bartella, the aftermath of battle was obvious. Pieces of clothing poked from under nearby rubble.

The remains of a body is in there somewhere, but no one is in a hurry to bury it. For now, the remains will mark the spot where the coalition hit its mark.

The smell in certain parts of town hints at more corpses hidden in the debris. When the front line has moved far enough beyond Bartella, troops will clear the bodies and bombs Islamic State abandoned in the city.

Only then will the town be ready for its displaced residents to return and begin again.

Defused improvised explosive devices sit by the side of highway from Erbil to Mosul. Matt Cetti-Roberts
 ****
A B-52 bomber refuels during a mission over Mosul in October 2016. U.S. Air Force photo

U.S. Military Blasts Islamic State’s Tunnels in Mosul

But getting at underground networks from the air is difficult

by JOSEPH TREVITHICK

WiB: On Oct. 17, 2016, Iraqi troops and Kurdish Peshmerga fighters — backed by American and other foreign forces — began to liberate Mosul and its surrounding environs from Islamic State. The offensive quickly uncovered extensive terrorist tunnels in the city.

The Pentagon responded by blasting the underground network for the sky.

“Many of you have seen and noted the enemy’s developed extensive tunneling networks in some of the areas that they use for tactical movement and to hide weapons,” U.S. Air Force Col. John Dorrian, a Pentagon spokesman, told reporters on Oct. 28, 2016.

In total, American strikes destroyed “46 of those tunnels since the liberation battle for Mosul started on October 17th, reducing the threat from a favored enemy tactic.”

However, despite decades of experience, destroying below-ground linkages from the air is still difficult, especially in areas full of innocent civilians. According to the U.S. Air Force, American planes didn’t drop any bunker busting bombs during these missions.

“The BLU-118, BLU-121 or BLU-122 warheads or the GBU-57 Massive Ordnance Penetrator have not been used in the Liberation of Mosul campaign,” Kiley Dougherty, the head of media operations for U.S. Air Force’s Central Command told War Is Boring by email. “ In fact, these weapons have not been used at all in support of Operation Inherent Resolve.”

Inherent Resolve is the Pentagon’s nickname for the campaign against Islamic State in Iraq and Syria.

The Mosul operation is not the Pentagon’s first experience with tunnels. During the Vietnam War, the Viet Cong insurgents famously dug wide-ranging subterranean mazes throughout South Vietnam.

In the 1970s, North Korea dug at least four large tunnels under the Demilitarized Zone to sneak spies and commandos into the South. The top American command on the peninsula created a “tunnel neutralization team” to assess and seal the passages.

Underground bunkers and cave complexes were features in the first Gulf War in 1991, the intervention in Afghanistan in 2001 and the invasion of Iraq in 2003. The Pentagon has taken note of Egyptian and Israeli efforts to stop Palestinian and other militants from digging under their borders.

In December 2001, the American commandos famously tried to flush out Osama Bin Laden and his cohorts from the Tora Bora caves near the Afghanistan-Pakistan border. Massive B-52 bombers pounded the mountains, but could only keep the terrorists hunkered down.

“Entire lines of defense were immolated by cascades of precisely directed 2,000-lb. bombs,” U.S. Army historians wrote in 2005. “But the depths of the caves and extremes of relief limited their effectiveness considerably.”

Air Force MC-130 special operations transports dropped 15,000 pound “Daisy Cutter” bombs, but couldn’t uproot the militants. The Al Qaeda leader eventually slipped across the border to settle near the Pakistani city of Abbottabad.

The last Daisy Cutter bomb explodes on a training range in Utah in 2008. U.S. Air Force photo

Within two years, the Pentagon had flown similar missions in Iraq. Despite the bombardment, on Dec. 13, 2003, a team of regular and elite U.S. troops found long-time Iraqi dictator Saddam Hussein very much alive in a makeshift bunker outside the city of Tikrit.

By November 2015, tunnels again appeared as a factor in the fight against Islamic State. Faced with deadly American air strikes, the terrorists had literally gone to ground.

“In November 2015, when Kurdish forces entered Sinjar, Iraq, … they found that ISIL had adapted to air attacks by building a network of tunnels that connected houses,” U.S. Army analysts explained in a February 2016 report, using a common acronym for Islamic State.

“The sandbagged tunnels, about the height of a person, contained ammunition, prescription drugs, blankets, electrical wires leading to fans and lights, and other supplies.”

War Is Boring obtained this and other Army reviews of enemy tactics through the Freedom of Information Act.

But by the time the terrorist tunnels became an issue in Iraq and Syria, the U.S. Air Force had replaced the Vietnam-era Daisy Cutters. Instead, American crews had access to a number of newer specialized bombs.

Shortly after the Tora Bora debacle, American fliers received the first BLU-118s. Pentagon weaponeers cooked up the 2,000 pound thermobaric bombs specifically to blow up caves and tunnels.

Thermobaric warheads create massive, fireball-like explosions. If you can get one into a bunker or other confined space, the blast will bounce off the walls for an even more devastating effect.

In 2005, the Pentagon bought improved BLU-121s with a new delay fuze. This meant the bomb could bury itself deeper inside a tunnel before going off, causing maximum damage. Crews can fit both weapons with laser guidance kits for precise attacks.

And then there are bunker-busters such as the BLU-122 and GBU-57. These bombs have specialized features to break through reinforced sites, deep underground. Only the B-52 and B-2 bombers can carry the 30,000 pound Massive Ordnance Penetrator.

Sailors on the carrier USS ‘Dwight D. Eisenhower’ prepare bombs for strikes on Islamic State in October 2016. U.S. Navy photo

All of these weapons are great for attacking remote caves or isolated, underground military bases. They’re not necessarily good for attacking small tunnels in urban areas.

Even out in the open, fliers generally need powerful sensors or help from troops on the ground just to spot subterranean sites from the air. Though laser and GPS-guided bombs can strike within feet of a specific target, tunnel entrances might not be much larger than a person’s shoulders.

On top of that, in a densely packed city, any errant bombs have a greater chance of hitting unintended targets. A tunnel network under a house or apartment block presents a particularly problematic situation.

Add a thermobaric warhead to the mix and the results could be even more disastrous. There are reports Islamic State turned to human shields to ward off air strikes and Baghdad’s own thermobaric rocket launchers and artillery.

“We have seen many instances in the past where Daesh have used human shields in order to try and facilitate their escape,” Dorrian noted in his press conference. “Right now they’re using human shields to make the Iraqi Security Forces’ advance more difficult.”

The Pentagon would have run into similar hurdles when hitting the terror group’s tunnels in Mosul. By using conventional bombs, American crews might have had a harder time hitting the mark, but could better avoid unnecessary collateral damage. At the same time, this dynamic no doubt serves to reinforce the value of tunnel networks to the Islamic State.

And any assault on the group’s de facto Syrian capital in Raqqa will likely turn up more tunnels.

“Over time, adversaries of the U.S. and its allies have repeatedly shown that they are extremely adept at their use of this type of environment,” U.S. Army experts declared in a review of Hezbollah’s use of tunnels during Israel’s incursion into Lebanon in 2006.

“[This] consequently presents a situation in which, despite the U.S.’s technological superiorities, a threat could potentially gain an advantage over the U.S. and achieve victory.”

Thankfully, so far, Islamic State’s tunnels have only delayed Baghdad’s troops and their American partners.

  • Cyber CIA: Brennan Rebuilt the Agency for Digital Future

        

    NEW DIRECTION: John Brennan at a Senate Intelligence Committee hearing on his nomination to be the director of the CIA in 2013. Brennan has restructured the agency to REUTERS/Jason Reed

    John Brennan’s attempt to lead America’s spies into the age of cyberwar

    The CIA director has put the U.S. spy agency through a historic restructuring to cope with the era of digital warfare. Many in the agency are unhappy with the shake-up. In a series of interviews, Brennan outlines his strategy. “I think CIA really needs to up its game.”

    ReutersInvestigates:WASHINGTON – When America goes to the polls on Nov. 8, according to current and former U.S. intelligence officials, it will likely experience the culmination of a new form of information war.

    A months-long campaign backed by the Russian government to undermine the credibility of the U.S. presidential election – through hacking, cyber attacks and disinformation campaigns – is likely to peak on voting day, the officials said.

    Russian officials deny any such effort. But current and former U.S. officials warn that hackers could post fictional evidence online of widespread voter fraud, slow the Internet to a crawl through cyber attacks and release a final tranche of hacked emails, including some that could be doctored.

    “Don’t underestimate what they can do or will do. We have to be prepared,” said Leon Panetta, who served as CIA director and defense secretary in President Barack Obama’s first term. “In some ways, they are succeeding at disrupting our process. Until they pay a price, they will keep doing it.”

    John Brennan, the current CIA director, declined to comment on the Russian efforts. But he said Russian intelligence operatives have a long history of marrying traditional espionage with advances in technology. More broadly, Brennan said, the digital age creates enormous opportunities for espionage. But it also creates vulnerabilities.

    Citing an array of new cyber, conventional and terrorist threats, Brennan announced the most sweeping reforms of the CIA in its 69-year history 18 months ago.

    Weakening the role of the Directorate of Operations, the agency’s long-dominant arm responsible for gathering intelligence and conducting covert operations, Brennan created 10 new “mission centers” where CIA spies, analysts and hackers work together in teams focused on specific regions and issues. He also created a new Directorate for Digital Innovation to maximize the agency’s use of technology, data analytics and online spying.

    The information age “has totally transformed the way we are able to operate and need to operate,” Brennan told Reuters in a series of interviews. “Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”

    When a new American diplomat arrives for duty at the U.S. embassy in Moscow or Beijing, CIA official say, Russian and Chinese  intelligence operatives run data analytics programs that check the “digital dust” associated with his or her name. If the newcomer’s footprint in that dust – social media posts, cell phone calls, debit card payments – is too small, the “diplomat” is flagged as an undercover CIA officer.

    The Russian-backed campaign to discredit the U.S. election is not isolated. Hackers believed to have links to Chinese intelligence began stealing the personal information of 22 million federal employees and job applicants in 2014, the worst known data breach in U.S. government history. Islamic State’s online propagandists continue to inspire lone wolf attacks in the United States even as the group loses territory.

    A senior official from the Directorate of Operations, who backs the shake-up, said the agency is experiencing its greatest test in decades.

    “The amount of threats and challenges that are facing this organization and this nation are greater than at any time in the last 30 years,” said the official, who declined to be named. “The days of a black passport, a fistful of dollars and a Browning pistol are over.”

    INNER CIRCLE: President Barack Obama with Brennan and Chief of Staff Denis McDonough at the White House in 2013. The president and the CIA chief are criticized by some former agents for being overly cautious in Syria, Russia and elsewhere. Courtesy Pete Souza/The White House/Handout via REUTERS

    “Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”

    John Brennan, CIA director

    James Clapper, the Director of National Intelligence, praised Brennan and his efforts to retool the CIA for a new era in an interview. So did Lisa Monaco, Brennan’s successor as the President Obama’s Homeland Security and Counterterrorism adviser.

    But some current and former officials question Brennan’s strategy, arguing his reforms are too digitally focused and will create a more cautious, top-heavy spy agency. At a time when the agency needs to refocus its efforts on human espionage, they say, the concentration of power in the new mission centers weakens the ability of the Directorate of Operations to produce a new generation of elite American spies.

    The reforms have hurt morale, created confusion and consumed time and attention at a time of myriad threats, according to interviews with ten former officials.

    Glenn Carle, a former CIA covert officer, supports Brennan and his reforms but said they have sparked a mixed reaction among directorate of operations officials who believe human intelligence is getting short shrift.

    “The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention,” the often inscrutable aims of foreign leaders, Carle said. “Obtaining that is a human endeavor.”

    At the same time, Brennan has stirred a different sort of criticism – that he has defied Congressional oversight. Liberal Democrats and libertarian Republicans in Congress say the Brennan-Obama tenure has been tarnished by a lack of transparency with congressional oversight committees and the public regarding surveillance, drone strikes and the agency’s use of torture against terrorism suspects during the administration of George W. Bush.

    “While I think John’s overall legacy will be as a reformer, that legacy will suffer from his refusal to come to grips with the CIA’s troubled torture program,” said Senator Dianne Feinstein, D-Calif, vice chair of the Senate’s intelligence committee. “I think the new president’s CIA director must prioritize a high level of trust between the CIA and Congress to insure proper oversight is conducted.”

    It’s unclear how closely the country’s next president will hew to Brennan’s strategy.

    The front-runner, Democrat Hillary Clinton, has an incentive to beef up American cyber-espionage: U.S. intelligence officials blame the continuing leak of emails from her campaign on Russian-backed hacking. Clinton also expressed support for covert action in a transcript of a 2013 speech she gave to Goldman Sachs that was recently released by Wikileaks.

    Republican Donald Trump, meanwhile, pledged to make cybersecurity a top priority in his administration in an October 3 speech. “For non-state terror actors, the United States must develop the ability – no matter how difficult – to track down and incapacitate those responsible and do it rapidly,” Trump said. “We should turn cyber warfare into one of our greatest weapons against the terrorists.”

    In interviews at agency headquarters in Langley, Virginia, Brennan declined to comment on either candidate or discuss operational details of the CIA. But he and eight other senior CIA officials gave the most detailed description yet of their rationale for the most radical revamp of the agency since its founding in 1947.

    “I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan said. “I think CIA really needs to up its game.”

    JUST-WAR THEORIST

    Brennan, a 61-year-old native of north New Jersey, looks like a linebacker but talks like a technocrat. He speaks excitedly about how the CIA and other government bureaucracies can be configured in “a way to ensure optimal outcomes.”

    The son of devout-Catholic Irish immigrants, Brennan speaks reverently of CIA officers as public servants who risk their lives without public accolades. He joined the agency in 1980, at the age of 24, after receiving a Master’s Degree in government with a concentration in Middle Eastern studies from the University of Texas.

    “The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention. Obtaining that is a human endeavor.”

    Glenn Carle, former CIA covert officer

    Educated in various Catholic schools, including Fordham University, Brennan says he is an adherent of just war theory – a centuries-old Christian theological argument that war is justified when it is waged in self defense, as a last resort and minimizes civilian casualties. Those beliefs, he says, have guided him in one of the most controversial aspects of his tenure in the Obama administration.

    As Obama’s White House counter-terrorism adviser and CIA director, Brennan played a central role in carrying out 473 U.S. airstrikes outside conventional war zones between 2009 and 2015, primarily by drone. U.S. officials estimate the attacks have killed 2,372 to 2,581 people, including 64 to 116 civilians. Human rights groups say the totals are vastly higher. Last year, for instance, a U.S. drone strike in Pakistan accidentally killed American aid worker Warren Weinstein and Italian aid worker Giovanni Lo Porto, who were both being held captive by al Qaeda.

    Brennan declined to comment on specific strikes, but said, “I still can look myself in the mirror everyday and believe that I have tried to do what is morally right, what is necessary, and what is important to keep this country safe.” He also acknowledged mistakes.

    “You question yourself. You beat yourself up. You try to learn from it,” Brennan said, in a rare display of emotions. “But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”

    Today, Brennan says the United States faces the most complex array of threats he has seen since joining the agency 36 years ago. As a CIA analyst, operative and executive, he has lived through the Cold War espionage duels of the 1980s; the disintegration of nation-states after the 1989 fall of the Berlin Wall; the rise of non-state terrorist groups since 2001; and the current digital disruption. Now, he says, all four dynamics are converging at once.

    BOLD AND INNOVATIVE RIVALS

    CIA officials say their greatest state competitors are the Russian and Chinese intelligence services. While smaller countries or terrorist groups may want to strike at the United States, Russia and China are the only two adversaries with the combination of skills, resources and motivation needed to challenge Washington.

    In recent years, Moscow’s Federal Security Service, or FSB, has become adept at waging “gray zone” conflicts in Ukraine, Crimea and Syria, the officials said. In all three countries, Russian intelligence operatives have deftly shrouded protagonists, objectives and war crimes in ambiguity.

    GREAT RIVALS: U.S. President Barack Obama with his Chinese and Russian counterparts, Xi Jinping and Vladimir Putin, in Beijing in 2014. Washington has faced barrages of digital threats from Beijing and Moscow; CIA insiders say the two nations remain the biggest challenge for the United States. REUTERS/Pablo Martinez Monsivais

    “You beat yourself up…. But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”

    John Brennan, CIA director

    One target is America’s increasingly politically polarized democracy. As Russian-backed hacking unfolded this summer, the Obama White House’s response fueled frustration among law enforcement and intelligence officials, according to current and former officials. The administration, they said, seemed to have no clear policy for how to respond to a new form of information warfare with no rules, norms or, it seemed, limits.

    White House officials said the administration is still considering various methods of responding, but the responses won’t necessarily be made public.

    China presents another challenge. Chinese businessmen and students continue trying to scoop up American state and economic secrets. In one bright spot, Beijing appears to be abiding by a 2015 pact signed by Obama and Chinese leader Xi Jinping that the two governments would not conduct economic espionage against one another. Chinese hacking appears to have slowed from the voracious rate of the past, which included hacking into the computers of the 2008 presidential campaigns of John McCain and Barack Obama but not releasing what was found.

    “The question is whether or not it is due to greater care in terms of covering one’s tracks,” Brennan said of the apparent change. “Or whether or not they realize that they’re brand is being tarnished by this very rapacious appetite for vacuuming up things.”

    Regional powers are also increasing their digital espionage efforts.

    In 2014, the Obama administration blamed North Korea for the hacking of Sony Pictures’ computer system. This spring, U.S. prosecutors indicted seven Iranian hackers for allegedly trying to shut down a New York dam and conducting a cyber attack on dozens of U.S. banks. They also indicted three Syrian members of the “Syrian Electronic Army,” a pro-Syrian government group,  who hacked into the websites of U.S. government agencies, corporations and news organizations.

    In a 2015 case that U.S. officials said marks a worrying new trend, federal prosecutors indicted a 20-year-old hacker from Kosovo. With the help of a criminal hacker, Ardit Ferizi stole the home addresses of 1,300 members of the U.S. military, providing the information to Islamic State and posting it online, and calling for attacks on the individuals. Ferizi was arrested in Malaysia, where he was studying computer science. In September, he pleaded guilty in a U.S. federal court and was sentenced to 20 years in prison.

    “This blend of the criminal actor, the nation-state actor and the terrorist actor, that’s going to be the trend over the next five years,” said John Carlin, who recently stepped down as head of the Justice Department division that monitors foreign espionage in the United States.

    But some active clandestine officers argue that the intelligence community has grown too reliant on technology, a trend they trace back four decades to the directorship of Stansfield Turner. Satellite photography, remote sensors and communications intercepts have become more sophisticated, but so have encryption techniques and anti-satellite weapons.

    More important, they argue, is that technology is no substitute for “penetrations” – planting or recruiting human spies in foreign halls of power. The CIA missed India’s 1998 nuclear tests and misjudged Saddam Hussein’s arsenal in 2003 because it lacked spies in the right places.

    Today, these current and former CIA officials contend, American policymakers have little insight into the thinking of Vladimir Putin’s inner circle. Presidents, kings and dictators often don’t share their true intentions electronically, putting this valuable information largely beyond the scope of digital spying. The best sources are still people, and these officials believe the agency is not mounting the kind of bold human spying operations it did in the past.

    Brennan and other CIA officials flatly denied downplaying human intelligence. They said aggressive, high-risk human spying is under way but they cannot go into operational detail.

    One of Brennan’s predecessors, Michael Hayden, former CIA chief under President George W. Bush, says the agency strayed from its core mission during the Bush years. After the Al Qaeda attacks of Sept. 11, 2001, Hayden said, the CIA had to shift to become a paramilitary organization that devoted its most talented officers to tracking and killing terrorists. It now needs to reverse that trend by focusing on espionage against rival nations, he said.

    “The constant combat of the last 15 years has pushed the expertise of the case officer in the direction of the battlefield and in the direction of collecting intelligence to create physical effects,” said Hayden, using an intelligence euphemism for killing. “At the expense of what the old guys called long-range, country-on-country intelligence gathering.”

    ‘OPTIMIZING CAPABILITIES’

    Brennan and the eight other senior CIA officials made the case that their modernization effort will address the needs and threats described by Hayden and others. Technological advances, they said, have leveled the intelligence playing field. The web’s low cost of entry, creativity and speed benefits governments, hackers and terrorists alike.

    A veteran covert operative who runs a new CIA mission center compared Brennan’s reforms to the Goldwater-Nichols Act. The landmark 1986 legislation reorganized the U.S. military into a half dozen regional commands where the Army, Navy, Air Force and Marines work together. It was a response to inter-service rivalries that bedeviled the American military in Vietnam.

    The CIA equivalent involves having the agency’s five main directorates – Operations (covert spies), Analysis (trends and prediction), Science and Technology (listening devices and other gadgetry) and Digital Innovation (online sleuthing) and Support (logistics) – provide the personnel needed by each regional mission center.

    CORE MISSION: Former CIA Director Michael Hayden says the agency went deeply into anti-terrorist operations during the Bush years and needs to return to its traditional mission of spying. REUTERS/Brendan McDermid

    Andrew Hallman, director of the new Directorate for Digital Innovation, said the CIA has embraced cloud computing as a way to better share intelligence. In a move that shocked insiders and outsiders, the CIA awarded an $600 million contract to Amazon in 2013 to build a secure cloud computing system where multiple CIA databases can be quickly accessed.

    For decades, different directorates maintained their own separate databases as a security measure, said Hallman. Some of the applications the agency used were so old – up to 30 years – that the manufacturer was no longer in business.

    Turning to Amazon was designed to immediately put private-sector computing advances at the fingertips of CIA operatives. It was also an admission that it was easier for the agency to buy innovation from the private sector than try to create it internally.

    Several former CIA officials criticized the new team-focused system, saying it dilutes the cultures that made each agency directorate strong. The best analysts are deeply skeptical and need to be separated from covert operatives to avoid group-think, they said. And the best covert operatives are famously arrogant, a trait needed to carry out the extraordinarily difficult task of convincing foreigners to spy for America.

    Richard Blee, a former CIA clandestine officer, said the agency needed reform but highlighted a separate problem created by technological change. Instant secure communications between CIA headquarters and officers in the field has centralized decision-making in Washington, Blee said. And regardless of administration, senior officials in Washington are less willing to take a risk than field officers – virtually all of whom complain about headquarters’ excessive caution.

    “The mentality across the board in Washington is to take the lowest common denominator, the easiest option, the risk-free option,” Blee said. “The Chinese are taking tough decisions, the Russians are taking tough decisions and we are taking risk-averse decisions. And we are going to pay a price for that down the road.”

    Brennan says his reforms will empower CIA officers: The integrated teams in each new mission center will improve speed, adaptability and effectiveness.

    “To me, that’s going to be the secret of success in the future, not just for CIA but for other organizational structures,” Brennan said. “Taking full advantage of the tools, capabilities, people and expertise that you have.”

    The old ways of spycraft, Brennan argues, are no longer tenable. Asked what worries him most, he gave a technocratic answer: Twentieth century American government management practices are being rendered obsolete in the digital age.

    “U.S. decision making processes need to be streamlined and accelerated,” he said. “Because the problems are not going to wait for traditional discussions.”

    THE LONG VIEW: CIA headquarters in Langley, Virginia. “I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan says. “I think CIA really needs to up its game.” REUTERS/Jason Reed

    —————

    Digitizing the CIA

    By David Rohde

    Additional reporting by John Walcott and Jonathan Landay

    Video: Zachary Goelman

    Graphics: Christine Chan

    Photo editing: Barbara Adhiya

    Edited by Michael Williams