The Herald Banner, Greenville, TX

Community News Network

August 29, 2013

US spying successes, failures, objectives detailed in top secret 'black budget'

(Continued)

WASHINGTON —

The CIA is pursuing tracking systems "that minimize or eliminate the need for physical access and enable deep concealment operations against hard targets."

The agency has deployed new biometric sensors to confirm the identities and locations of al-Qaida operatives. The system has been used in the CIA's drone campaign.

The NSA is also planning high-risk covert missions, a lesser-known part of its work, to plant what it calls "tailored radio frequency solutions" in hostile territory — close-in sensors to intercept communications that do not pass through global networks.

Spending on satellite systems and almost every other category of collection are projected to remain stagnant or shrink in coming years, as Washington grapples with budget cuts across the government. But the 2013 intelligence budget called for increased investment in SIGINT.

The budget includes a lengthy section on funding for counter-intelligence programs designed to protect against the danger posed by foreign intelligence services as well as betrayals from within the U.S. spy ranks.

The document describes programs to "mitigate insider threats by trusted insiders who seek to exploit their authorized access to sensitive information to harm U.S. interests."

The agencies had budgeted for a major counterintelligence initiative in fiscal 2012, but most of those resources were diverted to an all-hands, emergency response to successive floods of classified data released by the anti-secrecy group WikiLeaks.

For this year, the budget promised a renewed "focus . . . on safeguarding classified networks" and a strict "review of high-risk, high-gain applicants and contractors" — the young, nontraditional computer coders with the skills the NSA needed.

Among them was Snowden, then a 29-year-old contract computer specialist who had been trained by the NSA to circumvent computer network security. He was copying thousands of highly classified documents at an NSA facility in Hawaii, and preparing to leak them, as the agency embarked on a security sweep.

"NSA will initiate a minimum of 4,000 periodic reinvestigations of potential insider compromise of sensitive information," according to the budget, scanning its systems for "anomalies and alerts."

Washington Post staff writer Julie Tate contributed to this report.

1 2 3 4 5 6 7 8
9
Text Only
Community News Network
Featured Ads
Promotions
Poll

Does Dallas head coach Jason Garrett need for the Cowboys to make the playoffs during the 2014 football season to keep his job?

Yes
No
Who knows with Jerry Jones as owner?
     View Results
Facebook
Must Read
Photos


See more photos and purchase prints here.

AP Video
Dempsey: Putin May Light Fire and Lose Control In Case of Fire, Oxygen Masks for Pets Mobile App Gives Tour of Battle of Atlanta Sites Anti-violence Advocate Killed, but Not Silenced. Crashed Air Algerie Plane Found in Mali Arizona Prison Chief: Execution Wasn't Botched Calif. Police Investigate Peacock Shooting Death Raw: Protesters, Soldiers Clash in West Bank Police: Doctor Who Shot Gunman 'Saved Lives' 'Modern Family' Star on Gay Athletes Coming Out MN Twins Debut Beer Vending Machine DA: Pa. Doctor Fired Back at Hospital Gunman Raw: Iowa Police Dash Cam Shows Wild Chase Obama Seeks Limits on US Company Mergers Abroad Large Family to Share NJ Lottery Winnings U.S. Flights to Israel Resume After Ban Lifted Official: Air Algerie Flight 'probably Crashed' TSA Administrator on Politics and Flight Bans Raw: National Guard Helps Battle WA Wildfires Raw: Ukraine's Donetsk Residents Flee
Hyperlocal Search
Premier Guide
Find a business

Walking Fingers
Maps, Menus, Store hours, Coupons, and more...
Premier Guide