I assured him that we were working on it, but then said, “Charlie, let me give you another way of thinking about this. You give me a little action and I’ll give you a lot more intelligence.” In other words, we needed operational moves to poke at the enemy, make him move and communicate, so we could learn more about him. Operations could be designed to generate information. Over time we more and more settled into that pattern.
• • •
AFTER 9/11, a lot of people wanted to help us, especially our closest friends, what NSA calls second parties—those English-speaking democracies, the members of the Five Eyes community (Australia, Canada, New Zealand, the United Kingdom, and ourselves) whose SIGINT roots go back to Bletchley Park and breaking the German Enigma code in Europe or to similar efforts and locations in the Pacific.
These loyalties run deep. There is a general consensus between British and American SIGINTers that the two countries’ special political relationship began in the parlor office of the Bletchley manor house when American cryptologists arrived and were briefed by their British counterparts on what they knew (and did not know) of the Enigma code.
On 9/11 a new arrival in the New Zealand liaison section was in his Fort Meade office. He was directed to evacuate. He refused to leave and continued to keep his capital updated. “Friends do not leave friends at moments like this,” he later told me.
Almost within hours of the attack, the heads of Britain’s intelligence services came to the United States. They needed special permission and even a special escort to penetrate American airspace. On landing they went to Langley, where they met with George Tenet and others of us on his team. The instructions to our guests from their prime minister were clear: help the Americans however you can.
There are permanent structures to facilitate this cooperation. Every year, the Five Eyes intelligence services customarily get together; the United States is represented at these meetings by the heads of CIA, NSA, and FBI. Not every partner parallels our structure; we routinely have thirteen agencies there from the five countries. The first meeting after 9/11 was in March 2002 on New Zealand’s South Island. New Zealand’s hosting had been long planned, but the session had been delayed and then stripped of much of its social agenda. We narrowed the staffs who would attend too. Security demands would be high; we didn’t need to make them a nightmare.
We all knew one another. Despite the disparity in budget and size and power among our organizations, personal relationships reflected a professional egalitarianism. There was no superpower strutting. Except at the airport. The heads of CIA and FBI arrived in their own jets, setting off rampant speculation in the local papers about who these guys were and what might be going on.
We quickly dove into the work. How could we best keep our citizens safe? There were operational conversations to be sure, but also something more. All of us were both the defenders and the products of democracies. Eliza Manningham-Buller, then deputy head of Britain’s MI5 with extensive experience working against IRA terrorism, struck a chord with her blunt description of our operational and constitutional challenge. How were we to deal with the not-yet-guilty? After all, we were in the business of preventing terror, not just punishing it.
Implicit in her question was a potential recalibration of the traditional balance between liberty and security. Indeed, in September 2005, following the London Tube bombings, Manningham-Buller (now chief of MI5) advocated that “there needs to be a debate on whether some erosion of civil liberties we all value may be necessary to improve the chances of our citizens not being blown apart as they go about their daily lives.”
I realized later that (at least American) political elites were not really anxious to take on Manningham-Buller’s question. Far easier to criticize intelligence agencies for not doing enough when they feel in danger, while reserving the right to criticize those agencies for doing too much when they feel safe again.
That’s a pity. Avoiding the hard choices creates a whipsaw effect, based on the perceptions of the moment, and ultimately costs us both freedom and security.
As close as the Five Eyes nations are, there are differences. En route home from Queenstown, I stopped in Wellington and met with Prime Minister Helen Clark. She could not have been more gracious or more supportive—mildly surprising, since she had been largely responsible in the 1980s for New Zealand’s nuclear-free policy that had strained the ANZUS alliance to near dysfunction. Now she was supportive, but with a cautious concern about the contours of American counterterrorist actions. She feared that aggressive moves on our part would erode the international norms and processes on which small nations like hers depended. No specific issues. Just discomfort. Looking back, I/we could have been more sensitive to such concerns.
We later had a more dramatic discussion with, of all people, the British. Folks in GCHQ, Britain’s NSA counterpart, were apparently conflicted (as some of the NSA workforce would be) about the wisdom of the war in Iraq. In early 2003 one of them, Katharine Gun, leaked to the London Observer what appeared to be an e-mail exchange between NSA and GCHQ calling for SIGINT coverage of UN delegations in the run-up to a crucial Security Council vote authorizing war. Gun referred to herself as a kind of “third culture kid,” a term that describes children raised in a culture outside their parents’ culture for a significant portion of their development years. She thought of herself far more as a citizen of the world than of Great Britain, having spent her early years living in Taiwan. Indeed, it was her Chinese-language skills that made her attractive to GCHQ.
Katharine Gun should have been a sign about changing mores in our societies. We didn’t pick up on it. It became a lot more clear a decade later with Edward Snowden.
The Gun incident was far more an irritant than a crisis, at least for us. Even if her allegations were true, intercepting diplomatic communications to achieve a political objective was hardly novel. Britain’s use of German foreign minister Zimmermann’s telegram in 1917 to goad the United States into war comes to mind. And we could hardly condemn a foreign partner for an occasional leak, not with our own challenges in that area. (Good thing, too, since little more than a decade later, American Edward Snowden dumped a ton of GCHQ secrets into the public domain.)
But in 2004, my GCHQ counterpart David Pepper confided to me that he had moved some people off the Iraq mission because of their personal discomfort with it. He proposed a discussion of “values” at an upcoming bilateral meeting.
I think a Brit would have described me as gobsmacked at the concept that people in a SIGINT agency could opt out of missions in wartime. Admittedly we had some linguists reluctant to voice-identify targets for a kill (see chapter 4), and GCHQ was completely civilian and under the Ministry of Foreign Affairs, whereas NSA was 50 percent military and a combat support agency within the Department of Defense. I quickly agreed to David’s proposal, as much out of curiosity as friendship.
NSA and GCHQ senior leadership meet annually, alternating which side of the Atlantic would host. GCHQ generally finds a country estate near London and hosts us in elegance. Coming this way they are lucky to get a Motel 6 in Glen Burnie, although one year we did stay at a Sheraton adjacent to the Gettysburg battlefield, which formed a nice backdrop to our discussion. I still recall our partners’ reaction when the US Army War College docent, about to lead us along the path of Pickett’s Charge, reflected, “In the next ninety minutes here, more Americans died than would die at Normandy eighty-one years later.”
Our 2004 meeting was held at Chevening, a beautiful English country house. Benjamin Franklin had really enjoyed its charms, judging from the thank-you note he had sent his host, still on display there. We filled our day with the usual operational and technical discussions and then, after dinner, retired to the library with brandy glasses in hand for David’s requested discussion.
It was truly among friends but, on balance, we Americans spent a fair amount of time explaining ourselves. Such as explai
ning our views on the use of force in international relations. Differences were more stark with many Continental Europeans, of course, but we were representing a government and (I think) a people with, let’s say, a more robust view of the utility of force than even our British cousins.
One surprising aspect of the discussion was movies, specifically one movie, High Noon, which shows up routinely on American lists of great films. The movie’s protagonist, Marshal Will Kane (Gary Cooper), is one of the American Film Institute’s top five cinema heroes of all time. Although the film was little known to our partners, this classic western plays to American mythology about itself. Kane—with a murderous gang descending on him, his new Quaker wife, and the town—rejects compromise or flight, acts against the prevailing view, and in the end relies on righteous violence to survive. Not exactly contemporary European fare.
Near the end of the evening, as we were draining our brandy snifters, I summarized some cultural differences with a bit of hyperbole: “Most Americans own a gun and most Americans go to church on Sunday.”*
It was a good evening. If any air needed clearing, we cleared it. Besides, GCHQ was having its own issues with Britain’s growing “European-ness.” The overlay of the European Convention on Human Rights onto British law, policy, and practice was a broad issue for the government. For GCHQ it meant additional administrative burdens and procedures to be able to demonstrate compliance.
The Australians suffer from no such European overhang. I once volunteered to Prime Minister Rudd that this was the most comfortable intelligence relationship we had, bar none. I don’t know if that devolved out of parallel immigrant histories, similar frontier experiences, or common pragmatic cultures. Whatever it was, it worked. The Australians were good, and although their services were small, they had more than enough critical mass to be well worth our time.
Through a careful division of labor, NSA relied on reporting from DSD (Australia’s Defense Signals Directorate) for certain areas of the world. We even bent NSA collection pipes on some overseas regions to Canberra, to be worked there, and although the possibility of sweeping up US person communications wasn’t quite zero, we had full confidence that DSD analysts would respect the US person privacy protections on which we had trained them. It’s hard to have more confidence in a partner than the proposition “If he screws up, I go to jail.” (In October 2014 the Australian ambassador hosted a reception commemorating the sixtieth anniversary of Canberra’s relationship with CIA. Not every country commemorates that sort of thing.)
We had other trusting relationships. One of our Northern European partners once inadvertently intercepted an American government fax that revealed sensitive details about presidential travel. The partner had enough confidence in the relationship (that we would not assume that they were intentionally targeting us), that they actually showed the fax to us, warning that if they were able to intercept it, others could too. We thanked them and alerted the Secret Service. That’s a pretty good friend.
We were a good friend too. We helped a European ally when several of its citizens were taken hostage in North Africa. We worked hard at it. In the end they said that we acted like the hostages were Americans.
I thought that we could do more. One of my predecessors had organized key NATO countries in a more cooperative SIGINT relationship targeting the Soviets. Although the Soviets were long gone, the construct—called SIGINT Seniors—continued. Meetings were held annually rotating among the members, and with each trying to outdo the other in hospitality, they were always delightful. Progress on operational matters, however, was glacial or, as one perceptive wag observed, it was measured in what he called “NATO time units.”
The director of NSA was permanent chair of this group, and although it wasn’t our turn to host, I called an out-of-cycle meeting in early December 2001. We would host it, not in the United States because of security and travel burdens, but at an installation in Europe that NSA used for logistics and technical support. It would be on European soil and the Europeans were fully supportive. The British were not the only services that had quietly slipped into the United States after the attacks to offer help.
There was no ceremony, fine food, or wine at this particular session. We were candid and tactical and operational to an unprecedented degree. It was pretty much our transmitting what we were doing. We told our friends the details of terrorist-related communications we had discovered entering or leaving their countries. Let me repeat this, in light of the furor over Edward Snowden’s later revelations: we were telling our European friends what numbers in their countries were in contact with numbers we believed were associated with terrorism. Their response in 2001 was to take notes.
We covered our collection posture—where we thought we were strong and where we needed help. We didn’t have to convince them to put their shoulder to this wheel. Of course, they would all have to do this consistent with their laws and their own political guidance, but we got the result we wanted: everyone was ready to help.
Over time in Afghanistan we developed something called Center Ice, an American initiative to tie these SIGINT partners into a single tactical network. Our investment wasn’t much more than laptops and secure communications, but it allowed us to coordinate and de-conflict collection across national units.
We also didn’t hesitate to be creative about our choice of partners. Even before 9/11 we approached some Central Asian states for cooperative relationships. The Soviet Union’s old site at Termez in Uzbekistan looked right down the throat at Mazar-i-Sharif in northern Afghanistan. Even with parts of the site still tied into the Russian SIGINT system, geography mattered.
Beyond SIGINT, NATO took a dramatic if largely symbolic step in the fall of 2001. The alliance invoked Article 5, which states that an attack against one is an attack against all, and deployed NATO AWACS (an airborne command and control platform) to North America for this continent’s defense. I had spent thirty years thinking about how to move military power in the other direction, and the first real-world example of common defense was Europe coming to our aid. Strange feeling.
• • •
OF COURSE, at NSA we also had to tend to our own defense. The agency has always had people in harm’s way. SIGINT aircraft have been shot down by the Soviet Union and North Korea in the past, and the Israeli Air Force strafed a SIGINT ship in 1967. But we had always figured that being in garrison, like being at Fort Meade or some other field station, was also being in sanctuary. The 9/11 attack showed that this was no longer true.
The traffic jam generated by my order to evacuate nonessential personnel on 9/11 showed very clearly that we were not prepared to defend in place. And too many of our buildings were too close to public lands and highways.
Many of our people sensed that. I know that their families did. I tried to allay some of the concern with a letter we sent home with all of our employees. “Please be assured,” I wrote, “that . . . every effort is being made to ensure the safety of our employees. We will protect ourselves—but, most importantly, we will protect the nation.”
Fortunately, we had a program called PSAT (perimeter security anti-terrorism) already under way, so we accelerated that. We were moving to treat NSA as a secure campus (like CIA), rather than isolated buildings each approachable via public roads. Now, in addition, large boulders were placed all around our perimeter so that vehicle-borne explosives could not get close to our structures. We enlisted local reserve units to intimidate would-be attackers with the visibly threatening presence of armored personnel carriers, weapons mounted, at our vehicle entrances. Our youngest son was courting his now wife at that time, and one of her first introductions to the family was going through such a checkpoint to get to our quarters.
The state of Maryland worked very hard to protect us, particularly our buildings near Route 50, which they eventually rerouted. We also pumped up CONFIRM, the system that recorded the badge swipes of people entering and leavin
g our facilities. Now such data would be kept off-site. In the event of catastrophic destruction, we could at least determine who was and was not in our buildings.
But this had to be about more than protecting our physical plant or even our personnel. We also had to protect our digital infrastructure and our intellectual property. What would the nation do if we lost our computer complex or our source code to a determined attacker?
We never wanted to have to answer that question, so we set out to build an alternative facility where much of this would be preserved. We got a boost from Congressman David Obey from Wisconsin, who earmarked money to preserve our supercomputing capacity. It was no accident that the congressman was from Wisconsin, where our Cray computers were built. It was still a very good idea. But we also knew that preserving our supercomputing capacity was not enough. We had to preserve our assets from end to end. The challenge was how to duplicate NSA. Quickly.
We hurried to set up an alternative site, a physically separate complex that allowed us to replicate about 80 percent of NSA’s capability with about 20 percent of its capacity. That wasn’t a perfect world, but at least it preserved us against catastrophic failure. We decrypted our first message at the new facility in late September 2003. For us it felt a little like driving the golden spike at Promontory Summit in 1869. It let us breathe a little easier.
We had one final option to exercise for continuity of operations. As we approached one holiday season with a particularly high quotient of background terrorist chatter, I called David Pepper of GCHQ to tell him that in the event of catastrophic loss at Fort Meade, we would entrust the management of the US SIGINT system to him and to our senior representative in London. The long pause on the other end of the secure line betrayed both the gravity of the threat and the enormous burden I was imposing on a friend.
Playing to the Edge: American Intelligence in the Age of Terror Page 5