Pauls Valley, OK, Pauls Valley Democrat

Community News Network

August 29, 2013

US spying successes, failures, objectives detailed in top secret 'black budget'

(Continued)

WASHINGTON —

The CIA is pursuing tracking systems "that minimize or eliminate the need for physical access and enable deep concealment operations against hard targets."

The agency has deployed new biometric sensors to confirm the identities and locations of al-Qaida operatives. The system has been used in the CIA's drone campaign.

The NSA is also planning high-risk covert missions, a lesser-known part of its work, to plant what it calls "tailored radio frequency solutions" in hostile territory — close-in sensors to intercept communications that do not pass through global networks.

Spending on satellite systems and almost every other category of collection are projected to remain stagnant or shrink in coming years, as Washington grapples with budget cuts across the government. But the 2013 intelligence budget called for increased investment in SIGINT.

The budget includes a lengthy section on funding for counter-intelligence programs designed to protect against the danger posed by foreign intelligence services as well as betrayals from within the U.S. spy ranks.

The document describes programs to "mitigate insider threats by trusted insiders who seek to exploit their authorized access to sensitive information to harm U.S. interests."

The agencies had budgeted for a major counterintelligence initiative in fiscal 2012, but most of those resources were diverted to an all-hands, emergency response to successive floods of classified data released by the anti-secrecy group WikiLeaks.

For this year, the budget promised a renewed "focus . . . on safeguarding classified networks" and a strict "review of high-risk, high-gain applicants and contractors" — the young, nontraditional computer coders with the skills the NSA needed.

Among them was Snowden, then a 29-year-old contract computer specialist who had been trained by the NSA to circumvent computer network security. He was copying thousands of highly classified documents at an NSA facility in Hawaii, and preparing to leak them, as the agency embarked on a security sweep.

"NSA will initiate a minimum of 4,000 periodic reinvestigations of potential insider compromise of sensitive information," according to the budget, scanning its systems for "anomalies and alerts."

Washington Post staff writer Julie Tate contributed to this report.

1 2 3 4 5 6 7 8
9
Text Only
Community News Network
Business Marquee

e-Edition
  • How You Want It When You Want It Today's Pauls Valley Democrat

    Now you can view and download the Democrat right to your desktop on the day the paper is published. Click here to get more information on the Democrat's e-Edition.

     

    CLICK HERE TO ACCESS THE E-EDITION SITE

     

    ATTENTION CURRENT DEMOCRAT SUBSCRIBERS TO START an e-EDITION

    e-mail request to sjohnson@pvdemocrat.com

    April 20, 2011 1 Photo 1 Link

AP Video
Renewed Violence Taking Toll on Gaza Residents 2 Americans Detained in North Korea Seek Help US Employers Add 209K Jobs, Rate 6.2 Pct House GOP Optimistic About New Border Bill Gaza Truce Unravels; Israel, Hamas Trade Blame Raw: Tunisia Closes Borders With Libya Four Rescued From Crashed Plane Couple Channel Grief Into Soldiers' Retreat WWI Aviation Still Alive at Aerodrome in NY Raw: Rescuers at Taiwan Explosion Scene Raw: Woman Who Faced Death Over Faith in N.H. Clinton Before 9-11: Could Have Killed Bin Laden Netanyahu Vows to Destroy Hamas Tunnels Obama Slams Republicans Over Lawsuit House Leaders Trade Blame for Inaction
Stocks
Facebook