Attempt to lead CIA into age of cyberwar
When America goes to the polls on Nov 8, according to current and former US intelligence officials, it will likely experience the culmination of a new form of information war. A months-long campaign backed by the Russian government to undermine the credibility of the US presidential election - through hacking, cyber attacks and disinformation campaigns - is likely to peak on voting day, the officials said.
Russian officials deny any such effort. But current and former US officials warn that hackers could post fictional evidence online of widespread voter fraud, slow the Internet to a crawl through cyber attacks and release a final tranche of hacked emails, including some that could be doctored. “Don’t underestimate what they can do or will do. We have to be prepared,” said Leon Panetta, who served as CIA director and defense secretary in President Barack Obama’s first term. “In some ways, they are succeeding at disrupting our process. Until they pay a price, they will keep doing it.”
John Brennan, the current CIA director, declined to comment on the Russian efforts. But he said Russian intelligence operatives have a long history of marrying traditional espionage with advances in technology. More broadly, Brennan said, the digital age creates enormous opportunities for espionage. But it also creates vulnerabilities. Citing an array of new cyber, conventional and terrorist threats, Brennan announced the most sweeping reforms of the CIA in its 69-year history 18 months ago.
Weakening the role of the Directorate of Operations, the agency’s long-dominant arm responsible for gathering intelligence and conducting covert operations, Brennan created 10 new “mission centers” where CIA spies, analysts and hackers work together in teams focused on specific regions and issues. He also created a new Directorate for Digital Innovation to maximize the agency’s use of technology, data analytics and online spying.
The information age “has totally transformed the way we are able to operate and need to operate,” Brennan told Reuters in a series of interviews. “Most human interactions take place in that digital domain. So the intelligence profession needs to flourish in that domain. It cannot avoid it.”
When a new American diplomat arrives for duty at the US embassy in Moscow or Beijing, CIA official say, Russian and Chinese intelligence operatives run data analytics programs that check the “digital dust” associated with his or her name. If the newcomer’s footprint in that dust - social media posts, cell phone calls, debit card payments - is too small, the “diplomat” is flagged as an undercover CIA officer.
The Russian-backed campaign to discredit the US election is not isolated. Hackers believed to have links to Chinese intelligence began stealing the personal information of 22 million federal employees and job applicants in 2014, the worst known data breach in US government history. Islamic State’s online propagandists continue to inspire lone wolf attacks in the United States even as the group loses territory. A senior official from the Directorate of Operations, who backs the shake-up, said the agency is experiencing its greatest test in decades.
The Digital Debate
“The amount of threats and challenges that are facing this organization and this nation are greater than at any time in the last 30 years,” said the official, who declined to be named. “The days of a black passport, a fistful of dollars and a Browning pistol are over.” James Clapper, the Director of National Intelligence, praised Brennan and his efforts to retool the CIA for a new era in an interview. So did Lisa Monaco, Brennan’s successor as the President Obama’s Homeland Security and Counterterrorism adviser.
But some current and former officials question Brennan’s strategy, arguing his reforms are too digitally focused and will create a more cautious, top-heavy spy agency. At a time when the agency needs to refocus its efforts on human espionage, they say, the concentration of power in the new mission centers weakens the ability of the Directorate of Operations to produce a new generation of elite American spies.
The reforms have hurt morale, created confusion and consumed time and attention at a time of myriad threats, according to interviews with ten former officials. Glenn Carle, a former CIA covert officer, supports Brennan and his reforms but said they have sparked a mixed reaction among directorate of operations officials who believe human intelligence is getting short shrift. “The value the CIA can fundamentally add is to steal secrets, and the ultimate secret is intention,” the often inscrutable aims of foreign leaders, Carle said. “Obtaining that is a human endeavor.”
At the same time, Brennan has stirred a different sort of criticism that he has defied Congressional oversight. Liberal Democrats and libertarian Republicans in Congress say the Brennan-Obama tenure has been tarnished by a lack of transparency with congressional oversight committees and the public regarding surveillance, drone strikes and the agency’s use of torture against terrorism suspects during the administration of George W. Bush.
“While I think John’s overall legacy will be as a reformer, that legacy will suffer from his refusal to come to grips with the CIA’s troubled torture program,” said Senator Dianne Feinstein, D-Calif, vice chair of the Senate’s intelligence committee. “I think the new president’s CIA director must prioritize a high level of trust between the CIA and Congress to insure proper oversight is conducted.”
It’s unclear how closely the country’s next president will hew to Brennan’s strategy. The front-runner, Democrat Hillary Clinton, has an incentive to beef up American cyber-espionage: US intelligence officials blame the continuing leak of emails from her campaign on Russian-backed hacking. Clinton also expressed support for covert action in a transcript of a 2013 speech she gave to Goldman Sachs that was recently released by Wikileaks.
Republican Donald Trump, meanwhile, pledged to make cybersecurity a top priority in his administration in an October 3 speech. “For non-state terror actors, the United States must develop the ability - no matter how difficult - to track down and incapacitate those responsible and do it rapidly,” Trump said. “We should turn cyber warfare into one of our greatest weapons against the terrorists.”
In interviews at agency headquarters in Langley, Virginia, Brennan declined to comment on either candidate or discuss operational details of the CIA. But he and eight other senior CIA officials gave the most detailed description yet of their rationale for the most radical revamp of the agency since its founding in 1947. “I look out at the next 10, 20, 30 years, and I look at technology, I look at complexity, I look at the global environment,” Brennan said. “I think CIA really needs to up its game.”
Brennan, a 61-year-old native of north New Jersey, looks like a linebacker but talks like a technocrat. He speaks excitedly about how the CIA and other government bureaucracies can be configured in “a way to ensure optimal outcomes”. The son of devout-Catholic Irish immigrants, Brennan speaks reverently of CIA officers as public servants who risk their lives without public accolades. He joined the agency in 1980, at the age of 24, after receiving a Master’s Degree in government with a concentration in Middle Eastern studies from the University of Texas.
Educated in various Catholic schools, including Fordham University, Brennan says he is an adherent of just-war theory - a centuries-old Christian theological argument that war is justified when it is waged in self defense, as a last resort and minimizes civilian casualties. Those beliefs, he says, have guided him in one of the most controversial aspects of his tenure in the Obama administration.
As Obama’s White House counter-terrorism adviser and CIA director, Brennan played a central role in carrying out 473 US airstrikes outside conventional war zones between 2009 and 2015, primarily by drone. US officials estimate the attacks have killed 2,372 to 2,581 people, including 64 to 116 civilians. Human rights groups say the totals are vastly higher. Last year, for instance, a US drone strike in Pakistan accidentally killed American aid worker Warren Weinstein and Italian aid worker Giovanni Lo Porto, who were both being held captive by al Qaeda.
Brennan declined to comment on specific strikes, but said, “I still can look myself in the mirror every day and believe that I have tried to do what is morally right, what is necessary, and what is important to keep this country safe.” He also acknowledged mistakes. “You question yourself. You beat yourself up. You try to learn from it,” Brennan said, in a rare display of emotions. “But you also recognize that if you’re not prepared to make the tough decisions in the jobs that have been entrusted to you, you shouldn’t be in those jobs.”
Today, Brennan says the United States faces the most complex array of threats he has seen since joining the agency 36 years ago. As a CIA analyst, operative and executive, he has lived through the Cold War espionage duels of the 1980s; the disintegration of nation-states after the 1989 fall of the Berlin Wall; the rise of non-state terrorist groups since 2001; and the current digital disruption. Now, he says, all four dynamics are converging at once.
Bold and Innovative Rivals
CIA officials say their greatest state competitors are the Russian and Chinese intelligence services. While smaller countries or terrorist groups may want to strike at the United States, Russia and China are the only two adversaries with the combination of skills, resources and motivation needed to challenge Washington. In recent years, Moscow’s Federal Security Service, or FSB, has become adept at waging “gray zone” conflicts in Ukraine, Crimea and Syria, the officials said. In all three countries, Russian intelligence operatives have deftly shrouded protagonists, objectives and war crimes in ambiguity.
One target is America’s increasingly politically polarized democracy. As Russian-backed hacking unfolded this summer, the Obama White House’s response fueled frustration among law enforcement and intelligence officials, according to current and former officials. The administration, they said, seemed to have no clear policy for how to respond to a new form of information warfare with no rules, norms or, it seemed, limits.
White House officials said the administration is still considering various methods of responding, but the responses won’t necessarily be made public. China presents another challenge. Chinese businessmen and students continue trying to scoop up American state and economic secrets. In one bright spot, Beijing appears to be abiding by a 2015 pact signed by Obama and Chinese leader Xi Jinping that the two governments would not conduct economic espionage against one another. Chinese hacking appears to have slowed from the voracious rate of the past, which included hacking into the computers of the 2008 presidential campaigns of John McCain and Barack Obama but not releasing what was found.
“The question is whether or not it is due to greater care in terms of covering one’s tracks,” Brennan said of the apparent change. “Or whether or not they realize that they’re brand is being tarnished by this very rapacious appetite for vacuuming up things.” Regional powers are also increasing their digital espionage efforts. In 2014, the Obama administration blamed North Korea for the hacking of Sony Pictures’ computer system. This spring, US prosecutors indicted seven Iranian hackers for allegedly trying to shut down a New York dam and conducting a cyber attack on dozens of US banks. They also indicted three Syrian members of the “Syrian Electronic Army,” a pro-Syrian government group, who hacked into the websites of US government agencies, corporations and news organizations.
In a 2015 case that US officials said marks a worrying new trend, federal prosecutors indicted a 20-year-old hacker from Kosovo. With the help of a criminal hacker, Ardit Ferizi stole the home addresses of 1,300 members of the US military, providing the information to Islamic State and posting it online, and calling for attacks on the individuals. Ferizi was arrested in Malaysia, where he was studying computer science. In September, he pleaded guilty in a US federal court and was sentenced to 20 years in prison.
“This blend of the criminal actor, the nation-state actor and the terrorist actor, that’s going to be the trend over the next five years,” said John Carlin, who recently stepped down as head of the Justice Department division that monitors foreign espionage in the United States.
But some active clandestine officers argue that the intelligence community has grown too reliant on technology, a trend they trace back four decades to the directorship of Stansfield Turner. Satellite photography, remote sensors and communications intercepts have become more sophisticated, but so have encryption techniques and anti-satellite weapons.
More important, they argue, is that technology is no substitute for “penetrations” - planting or recruiting human spies in foreign halls of power. The CIA missed India’s 1998 nuclear tests and misjudged Saddam Hussein’s arsenal in 2003 because it lacked spies in the right places.
Today, these current and former CIA officials contend, American policymakers have little insight into the thinking of Vladimir Putin’s inner circle. Presidents, kings and dictators often don’t share their true intentions electronically, putting this valuable information largely beyond the scope of digital spying. The best sources are still people, and these officials believe the agency is not mounting the kind of bold human spying operations it did in the past.
Brennan and other CIA officials flatly denied downplaying human intelligence. They said aggressive, high-risk human spying is under way but they cannot go into operational detail. One of Brennan’s predecessors, Michael Hayden, former CIA chief under President George W Bush, says the agency strayed from its core mission during the Bush years. After the Al Qaeda attacks of Sept. 11, 2001, Hayden said, the CIA had shift to become a paramilitary organization that devoted its most talented officers to tracking and killing terrorists. It now needs to reverse that trend by focusing on espionage against rival nations, he said.
“The constant combat of the last 15 years has pushed the expertise of the case officer in the direction of the battlefield and in the direction of collecting intelligence to create physical effects,” said Hayden, using an intelligence euphemism for killing. “At the expense of what the old guys called long-range, country-on-country intelligence gathering.”
Brennan and the eight other senior CIA officials made the case that their modernization effort will address the needs and threats described by Hayden and others. Technological advances, they said, have leveled the intelligence playing field. The web’s low cost of entry, creativity and speed benefits governments, hackers and terrorists alike.
A veteran covert operative who runs a new CIA mission center compared Brennan’s reforms to the Goldwater-Nichols Act. The landmark 1986 legislation reorganized the US military into a half dozen regional commands where the Army, Navy, Air Force and Marines work together. It was a response to inter-service rivalries that bedeviled the American military in Vietnam.
The CIA equivalent involves having the agency’s five main directorates - Operations (covert spies), Analysis (trends and prediction), Science and Technology (listening devices and other gadgetry) and Digital Innovation (online sleuthing) and Support (logistics) - provide the personnel needed by each regional mission center.
Andrew Hallman, director of the new Directorate for Digital Innovation, said the CIA has embraced cloud computing as a way to better share intelligence. In a move that shocked insiders and outsiders, the CIA awarded an $600 million contract to Amazon in 2013 to build a secure cloud computing system where multiple CIA databases can be quickly accessed.
For decades, different directorates maintained their own separate databases as a security measure, said Hallman. Some of the applications the agency used were so old - up to 30 years - that the manufacturer was no longer in business. Turning to Amazon was designed to immediately put private-sector computing advances at the fingertips of CIA operatives. It was also an admission that it was easier for the agency to buy innovation from the private sector than try to create it internally. —Reuters