Spies for Hire

Home > Other > Spies for Hire > Page 46
Spies for Hire Page 46

by Tim Shorrock


  22. “Defense Intelligence Agency…at a Glance,” DIA Web site, www.dia.gov.

  23. Robert K. Ackerman, “Defense Intelligence Assumes More Diverse Missions,” SIGNAL Magazine (AFCEA), April 2007.

  24. “Chalabi Meets with Rumsfeld, Cheney,” United Press International, November 14, 2005.

  25. I am indebted to a colleague who wishes to remain anonymous for her notes on the Defense Intelligence Acquisition Conference, which took place May 14–17, 2007, in Keystone, Colorado.

  26. Lt. Gen. Michael Maples, “Consolidating Our Intelligence Contracts,” Letter to the Editor, Washington Post, August 24, 2007.

  27. Donald L. Black, DIA, e-mail interview with author, January 29, 2008.

  28. Walter Pincus, “Defense Agency Proposes Outsourcing More Spying,” Washington Post, August 19, 2007.

  29. “Blanket Purchase Agreements,” FedMarket.com, http://www.fedmarket.com/articles/purchase-agreements-blanket.shtml.

  30. “DIESCON 3: Blanket Purchase Agreements/Program Management and Business Process Plan,” Defense Intelligence Agency, May 25, 2005.

  31. “Statement of Work,” DIA Information Technology Acquisition Support Center, www.dia.gov.

  32. Clive Thompson, “Open-Source Spying,” New York Times Magazine, December 3, 2006.

  33. All the information about BAE Systems is from the BAE Web site page, “About DIESCON 3,” http://www.bae-it.na.baesystems.com/wat.nsf/0/1967DA8A51EA2FFB85256DC200539DE2.

  34. Herbert Browne, interview with author, December 2006.

  35. Jeff Stein, “In NSA’s Shadow, Military Intelligence Rides the Edge of Domestic Spying,” CQ Homeland Security, January 27, 2006.

  36. Stenbit’s involvement in CIFA was described in his biography posted on the Web site of ViaSat, a wireless communications company where he serves as a director. “Former Assistant Secretary of Defense John Stenbit Named to Board of Directors,” ViaSat press release, August 30, 2004.

  37. Walter Pincus, “Pentagon Expanding Its Domestic Surveillance Activity,” Washington Post, November 27, 2005.

  38. Walter Pincus, “Pentagon’s Intelligence Authority Widens,” Washington Post, December 19, 2005.

  39. William M. Arkin, “Domestic Military Intelligence Is Back,” “Early Warning” column, Washington Post, October 29, 2005.

  40. Shane Harris, “Signals and Noise,” National Journal, June 17, 2006.

  41. “Counterintelligence Field Activity,” House report number 109-411, Intelligence Authorization Act for Fiscal Year 2007, February 2006.

  42. Privacy and Civil Liberties Oversight Board, 2007 Report to Congress, April 23, 2007, http://www.privacyboard.gov/reports/2007/congress2007.html.

  43. Walter Pincus, “Pentagon Agency’s Contracts Reviewed,” Washington Post, March 3, 2006.

  44. Jonathan S. Landay, “Pentagon Contracted for Satellite Photos of US Locations,” Knight Ridder, March 18, 2006.

  45. Walter Pincus, “Increase in Contracting Intelligence Jobs Raises Concerns,” Washington Post, March 20, 2006.

  46. “Intelligence Analyst Senior Staff,” job posting, Lockheed Martin, www.tech-centric.net.

  47. Job No. 194272 (Counterintelligence Analyst), Defense Engineers and Intelligence Careers, March/April 2005, www.intelligencecareers.com.

  48. “Analex—Major Clients/Defense and Intelligence,” www.analex.com.

  49. ManTech job posting (Intelligence Analyst, Senior), BaltimoreAdtaker.com, August 7, 2007; see also www.mantech.com/alliant-team_cap.asp.

  50. “Counterintelligence Field Activity (CIFA),” on Harris Web site, www.govcomm.harris.com.

  51. No longer on SRA Web site.

  52. Walter Pincus, “Counterintelligence Officials Resign,” Washington Post, August 10, 2006.

  53. Walter Pincus, “Gates May Rein In Pentagon Activities,” Washington Post, November 14, 2006.

  54. Siobhan Gorman, “Imagery Intelligence Agency Chief Being Forced from Post,” Baltimore Sun, January 6, 2006.

  55. Walter Pincus, “Pentagon to End Talon Data-Gathering Program,” Washington Post, April 25, 2007.

  56. “General Who Likened War on Terror to Battle with Satan to Retire,” Agence France-Presse, May 21, 2007.

  57. Pincus, “Gates May Rein In Pentagon Activities.”

  58. William Mathews, “Black US R&D Budget Estimated at $17.5 Billion,” Defense News, August 29, 2007.

  59. “Pentagon, DNI Kick Off Effort to Modernize Security Clearance System,” Inside the Army, June 4, 2007.

  60. “Raytheon Team Demonstrates Innovative Technologies at Empire Challenge 2007,” Raytheon press release, July 20, 2007.

  61. Walter Pincus, “Defense Agency Proposes Outsourcing More Spying,” Washington Post, August 19, 2007.

  62. Steven Aftergood, interview with author, January 2008.

  63. Walter F. Roche, “Defense Nominee’s Business Ties Raise Concerns,” Los Angeles Times, December 2, 2006.

  64. “Lieutenant General (USAF Ret.) James R. Clapper Joins 3001 Board,” CM Equity Partners press release, October 12, 2006.

  65. “MoD’s Suppliers Target American Market,” Intelligence Online, February 9, 2007; “Lt. Gen. Jim Clapper and Dr. Jim Blackwell Join DFI Government Services,” DFI press release, October 12, 2006; and DFI Web site, http://www.deticadfi.com/.

  66. “DeticaDFI Wins Key Position in World-wide US Defense Intelligence Framework,” DeticaDFI press release, September 8, 2007, http://www.deticadfi.com/internal.aspx?m=pressrelease&i=47; and “Major US Government Client Awards Contract to DeticaDFI,” Detica press release, September 7, 2007, http://www.detica.com/indexed/NewsItem_deticadficontractwin.htm.

  6. THE NSA, 9/11, AND THE BUSINESS OF DATA MINING

  1. Scott Shane and Tom Bowman, “America’s Fortress of Spies,” Baltimore Sun, December 3, 1995.

  2. Peter Spiegel, “U.S. Spy Chief Calls Warrantless Wiretapping Discussion a Threat,” Los Angeles Times, September 21, 2007.

  3. Frank Blanco, interview with author, Fort Meade, Maryland, 2005.

  4. Booz Allen Hamilton, “Annual Report 2001,” p. 22, available on Booz Allen Web site.

  5. Booz Allen Hamilton, “Annual Report 2001.”

  6. The NSA’s contracting out of background checks was described in a Senate Intelligence Committee report in January 2007. See “Intelligence Authorization Act for Fiscal Year 2007,” Senate Intelligence Committee, January 24, 2007.

  7. Shane and Bowman, “America’s Fortress of Spies.”

  8. Several operations run jointly by the NSA and CIA “caused much friction” between the two agencies, the commission reported. At the mid-and upper-management levels of the CIA and NSA, “struggles developed regarding which agency was in charge…when human intelligence and signals intelligence targets overlapped…. CIA perceived NSA as wanting to control technology deployment, while NSA was concerned that CIA was conducting NSA-type operations. See “OIG Report on CIA Accountability with Respect to the 9/11 Attacks,” online at www.fas.org/irp/cia/product/oig-911.pdf.

  9. Greg Miller and Josh Meyer, “Systematic Breakdown at CIA Before Sept. 11,” Los Angeles Times, August 22, 2007; and Michael Isikoff and Mark Hosenball, “Terror Watch: The CIA’s Withering 9/11 Intelligence Report,” Newsweek, August 21, 2007.

  10. Scott Shane, “NSA Technology Touches Far More than Spy World,” Baltimore Sun, December 10, 1995.

  11. Seymour Hersh, “The Intelligence Gap: How the Digital Age Left Our Spies out in the Cold,” The New Yorker, December 6, 1999. This article can still be found on the Web at http://cryptome.org/nsa-hersh.htm.

  12. Both of these episodes were reported in Scott Shane and Tom Bowman, “Rigging the Game,” Baltimore Sun, December 10, 1995.

  13. Hersh, “The Intelligence Gap: How the Digital Age Left Our Spies out in the Cold.”

  14. Transcript, 2007 Air Force Defense Strategy Seminar Series, General Michael V. Hayden, Director, Central Intelligence Agency, National Guard Association of the United States, June 19, 2007, http://
www.deticadfi.com/Internal.aspx?t=PreviousAirForceSeminars&1=244&s=108.

  15. CACI presentation to Friedman, Billings, Ramsey conference on defense investing, March 8, 2007.

  16. Statement by Director of Central Intelligence George J. Tenet before the House Permanent Select Committee on Intelligence, as prepared for delivery, April 12, 2000.

  17. A year later, in 2002, Beijing discovered that a Boeing 767 purchased for use as President Jiang Zemin’s official aircraft contained no fewer than twenty listening devices, including one in the presidential bed and another in the bathroom. The culprit was apparently the NSA’s Special Collection Service, a top secret unit within the Central Security Service that is tasked, jointly with the CIA, to eavesdrop on intelligence targets in hostile countries. “China Says President’s Jet Bugged,” Reuters, January 18, 2002.

  18. Michael Isikoff and David Corn, Hubris: The Inside Story of Spin, Scandal and the Selling of the Iraq War (New York: Crown, 2006), p. 186.

  19. James Risen, State of War: The Secret History of the CIA and the Bush Administration (New York: Free Press, 2005), pp. 42–60.

  20. Ibid., p. 48.

  21. Scott Shane and David Johnston, “Mining of Data Prompted Fight over U.S. Spying,” New York Times, July 29, 2007.

  22. Peter Swire, interview with author, June 2007.

  23. Statement of Lt. Gen. Michael V. Hayden, Director, National Security Agency, before the joint inquiry of the Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence, October 17, 2002.

  24. Bob Graham with Jeff Nussbaum, The CIA, the FBI, Saudi Arabia and the Failure of America’s War on Terror (New York: Random House, 2004), p. 70.

  25. National Security Agency/Central Security Service, Transition 2001, prepared for the incoming administration of George W. Bush, declassified document obtained in 2005 by Dr. Jeffrey Richelson, senior fellow at the National Security Archive. Available at the archive’s Web site, www.gwu.edu/~nsarchive/.

  26. Graham and Nussbaum, p. 71.

  27. The NSA’s “Transition 2001” report can be found at the National Security Agency Declassified/National Security Archive Electronic Briefing Book No. 24, edited by Jeffrey Richelson, posted January 13, 2000, and updated March 11, 2005, http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB24/index.htm.

  28. Stan Soloway, interview with author, February 2007.

  29. Statement of Lt. Gen. Michael V. Hayden, Director, National Security Agency, before the joint inquiry of the Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence, October 17, 2002; and “The Private Sector’s Role in Building the Intelligence Community of the 21st Century,” report published by Equity International and Chesapeake Innovation Center, March 3, 2005. The CIC is funded in part by the NSA.

  30. James Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency (New York: Doubleday, 2001).

  31. Noi Mahoney, “NSA Unveils Private Partnership,” The Capital (Annapolis, Maryland), August 3, 2001.

  32. Ellen McCarthy, “NSA Is Making No Secret of Its Technology Intent,” Washington Post, June 24, 2004.

  33. George Cahlink, “Security Agency Doubled Procurement Spending in Four Years,” Government Executive, June 1, 2004.

  34. “The Business of Connecting Dots: The $1 Billion Intelligence and Security Informatics/Analytics Market,” Chesapeake Innovation Center, November 17, 2005.

  35. Greg Schneider, “It’s Too Soon to Tell, but a Deathly Ill Columbia Company Has Color in Its Cheeks,” Baltimore Sun, June 28, 1998.

  36. Stephanie Wentworth, Baltimore Business Journal, October 16, 2006.

  37. Paul Richfield, “Northrop Grumman Acquires Essex, Moves Closer to NSA,” C4ISR/The Journal of Net-Centric Warfare/Defense News, November 9, 2006.

  38. Leonard Moodispaw, interview with author, January 2007.

  39. “National Security Agency Outsources Areas of Non-Mission Information Technology to CSC-Led Alliance Team,” NSA press release, July 31, 2001, http://www.nsa.gov/releases/relea00034.cfm.

  40. Dennis McCafferty, “CSC Has a Lock on Government Business,” VAR Business, September 30, 2002.

  41. Anitha Reddy, “Computer Systems Spur Growth for Contractors,” Technews.com, May 10, 2004.

  42. “National Security Agency Outsources Areas of Non-Mission Information Technology to CSC-Led Alliance Team.”

  43. “Logicon Brings Key Capabilities, Experience to NSA Groundbreaker Technology Contract,” Logicon press release, Northrop Grumman, August 6, 2001.

  44. Leonard Moodispaw, interview with author, January 2007.

  45. Siobhan Gorman, “Computer Ills Hinder NSA,” Baltimore Sun, February 26, 2006.

  46. “CSC-Led Alliance Receives Three-Year Option for NSA Groundbreaker Contract,” CSC press release, June 6, 2007, http://www.csc.com/investorrelations/news/9591.shtml.

  47. “Boeing Demonstrates Anti-Terrorism Integrated Tactical Solutions Using Multiple UAV,” Boeing press release, June 22, 2006.

  48. “Titan Feasts on Defense and Intelligence Budgets,” Intelligence Online, May 11, 2004.

  49. “L-3 Communications Gets $35 Million NSA Deal,” Associated Press (via the Houston Chronicle), December 21, 2006.

  50. Many of these companies were listed in an extensive public release of NSA contractors in 2007. The disclosure came about quite by accident, when the National Reconnaissance Office released its 2005 budget, along with its justification documents, as part of a Freedom of Information Act request filed by Steven Aftergood of the Federation of American Scientists. The document was highly redacted, but most of the pages listing contractors were left untouched, leaving a clean public record of thirteen key intelligence contractors. Specifically, these were companies providing services to the National and Military Operations Support project (NMOS), an effort funded by the classified National Intelligence Program of the IC’s annual budget. Its project is a “partnership” between the NRO and three major collection agencies—the NSA for signals, the NGA for imagery, and the DIA directorate for MASINT—and is the key “gateway” used by the NSA to transmit its intelligence to the rest of the government and the Intelligence Community. The NSA contractors are listed as follows: at the top level, three large firms provided the systems integration work for signals intelligence operations. They are Northrop Grumman, General Dynamics, and Booz Allen Hamilton. Below them, providing technical services, are American Management Systems Inc., a subsidiary of CACI International; CACI’s Technology Services unit; Electronic Data Systems; BearingPoint, the Virginia consulting company; Northrop Grumman Information Technology, or TASC, the primary intelligence subsidiary of the defense contractor; US Investigations Services (USIS), a wholly owned subsidiary of the Carlyle Group that does background checks on NSA employees and contractors; Boeing Service Company, Boeing’s security support company; PricewaterhouseCoopers, the financial auditing company; ManTech Aegis Research, one of the intelligence units of ManTech International; Lockheed Martin, the nation’s largest defense contractor; and L-3 Communications, which ranks sixth as a defense contractor.

  51. ManTech International Corp., 10-K, filed with the SEC on March 16, 2005.

  52. I heard an NSA consultant and two CACI engineers discuss this project at a workshop I attended in Northern Virginia in 2004. David Hall, a former Raytheon engineer turned NSA consultant, harked back to the “good old Soviet Union days,” when the United States used to have a huge advantage in IT. Now, he said, “almost anybody can transmit satellite data,” and noted that communications technology is even available to “our terrorist opponents.”

  53. A sound clip of this interview was posted for a time on CACI’s Web site, www.caci.com.

  54. Patrick Leahy, “Ensuring Liberty and Security Through Checks and Balances,” speech delivered to Georgetown University Law Center, Washington, D.C., December 13, 2006, http://leahy.senate.gov/press/200612/121306.html.

  55. The subpoenas were announced in a pres
s release from Senator Patrick Leahy, and can be downloaded from that page. See “Senate Judiciary Committee Issues Subpoenas for Legal Basis of Bush Administration’s Domestic Surveillance Program,” Office of Senator Leahy, June 27, 2007, http://leahy.senate.gov/press/200706/062707a.html.

  56. Interview with author, November 2006. For detailed (and contrasting) analyses of the FISA rules, readers should consult two Web sites. One is a podcast from the Federal Law Enforcement Training Center of the Department of Homeland Security that describes the FISA rules for monitoring U.S. persons as understood by the Bush administration. It can be found at http://www.fletc.gov/training/programs/legal-division/podcasts/hot-issues-podcasts/hot-issues-transcripts/foreign-intelligence-surveillance-act-fisa-part-1-podcast-transcript.html. The second analysis, a section-by-section analysis by the American Civil Liberties Union of the 2007 FISA legislation supported by the Bush administration and Senator Jay Rockefeller, the chairman of the Senate Intelligence Committee, can be found at http://www.aclu.org/safefree/general/32524leg20071102.html.

 

‹ Prev