Latest Snowden Leaks Detail The 'Black Budget' And How Much The Gov't Wastes On Useless Surveillance
from the i-could-use-me-a-black-budget-too dept
Barton Gellman and Greg Miller over at the Washington Post have the latest scoops from the Ed Snowden leaks, in which it appears they've been able to go through the details of the infamous "black budget," detailing the money that is spent on intelligence operations. Apparently, the total budget is around $52.6 billion this year (which actually is a bit lower than I would have expected, but is apparently twice what the budget was back in 2001). There's also another $23 billion spent on "intelligence programs that more directly support the U.S. military."Not surprisingly, the Post agreed to leave most of the document unpublished and is careful not to reveal anything really damaging (i.e., sources and methods), but the results are still quite revealing. Of course, Director of National Intelligence James Clapper is still angry, arguing that any info from the budget "could provide insight for foreign intelligence services to discern our top national priorities, capabilities and sources and methods." Blah, blah, blah. Someone doesn't like being held accountable. Others point out that discussing the budget seems quite reasonable. The post quotes Lee Hamilton, the former chair of the 9/11 commission (and former chair of the House Intelligence Committee), who argues that having this info public is important to having an informed public debate on the surveillance state. That's the only way that the intelligence community can be held accountable.
And, actually, what the budget reveals is a rather stunning lack of accountability for the budget -- much of it going to the CIA. While many people had assumed that the CIA had been diminishing in power and authority within the intelligence community (especially in relation to the NSA), it turns out that its budget has been growing and growing, and is much more than the NSA's. Furthermore, the CIA has basically been transformed from an "intelligence" agency into a "paramilitary force."
And for all this funding, with so little accountability, it should come as no surprise to find out that much of this money appears to be wasted, and not particularly effective.
Throughout the document, U.S. spy agencies attempt to rate their efforts in tables akin to report cards, generally citing progress but often acknowledging that only a fraction of their questions could be answered — even on the community’s foremost priority, counter-terrorism.So, we're spending all of this money (our money) on top secret operations, including spying on pretty much every American... and so far it's been almost entirely useless against the actual threats we face. Well, that's comforting. Oh, and if you wondered about the failure to connect the dots on the Boston Marathon bombings? It's because the intelligence community and all that money have no idea how to figure out those kinds of attacks.
In 2011, the budget assessment says intelligence agencies made at least “moderate progress” on 38 of their 50 top counterterrorism gaps, the term used to describe blind spots. Several concern Lebanon’s Hezbollah movement, an enemy of Israel that has not attacked U.S. interests directly since the 1990s.
Other blank spots include questions about the security of Pakistan’s nuclear components when they are being transported, the capabilities of China’s next generation fighter aircraft, and how Russia’s government leaders are likely to respond “to potentially destabilizing events in Moscow, such as large protests and terrorist attacks.”
A chart outlining efforts to address key questions on biological and chemical weapons is particularly bleak. U.S. agencies set themselves annual goals of making progress in at least five categories of intelligence collection related to these weapons. In 2011, the agencies made headway on just two gaps; a year earlier the mark was zero.
The intelligence community seems particularly daunted by the emergence of “home grown” terrorists who plan attacks in the United States without direct support or instruction from abroad, a threat realized this year, after the budget was submitted, in twin bombings at the Boston Marathon.Also, the NSA is swimming in so much information that it asked for nearly $50 million to cope with the problem of having too much information. We've pointed out for years that the trick to finding the needles in haystacks isn't to build bigger haystacks, but that's long been the NSA's approach. However, those haystacks have become so big that the NSA asked for $48.6 million designated for "coping with information overload." Here's a simple, and cheaper, plan: don't collect so much irrelevant data. You can ship me half of the $48.6 million and keep the rest for something that's actually useful.
The National Counterterrorism Center has convened dozens of analysts from other agencies in attempts to identify “indicators” that could help law enforcement understand the path from religious extremism to violence. The FBI was in line for funding to increase the number of agents surreptitiously tracking activity on jihadist Web sites.
But a year before the bombings in Boston the search for meaningful insight into the stages of radicalization was described as one of “the more challenging intelligence gaps.”
Also, there's this:
The agencies had budgeted for a major counterintelligence initiative in fiscal 2012, but most of those resources were diverted to an all-hands, emergency response to successive floods of classified data released by the anti-secrecy group WikiLeaks.The budget, obviously, was submitted before Snowden absconded with it and gave it to the Post, so I would imagine that there have been some revisions to create yet another "all-hands, emergency response" to Snowden-like situations.
For this year, the budget promised a renewed “focus . . . on safeguarding classified networks” and a strict “review of high-risk, high-gain applicants and contractors” — the young, nontraditional computer coders with the skills the NSA needed
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: black budget, budget, cia, intelligence community, nsa, surveillance
Reader Comments
Subscribe: RSS
View by: Time | Thread
JFK
In other words, exactly what Kennedy was fighting against during his brief time in office. My, how nothing's changed....
[ link to this | view in chronology ]
Re: JFK
pretty sure that had nothing to do with his assassination...
pretty sure...
art guerrilla
aka ann archy
eof
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Add tens of billions for its self-funding "commercial" fronts.
http://rinf.com/alt-news/breaking-news/yahoo-to-users-let-us-read-your-emails-or-goodbye/3 8190/
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-inter net-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_print.html
http://thehill.com/blogs/congress-blog/technology/264685-googles-data-collecting-habits-drawing-more -scrutiny
Complete with howling lies from Eric Schmidt:
http://www.theregister.co.uk/2010/09/23/schmidt_on_colbert/
http://www.washingtonpost.c om/world/national-security/chinese-hackers-who-breached-google-gained-access-to-sensitive-data-us-of ficials-say/2013/05/20/51330428-be34-11e2-89c9-3be8095fe767_print.html
Guess that's enough. If you haven't got the picture by now that it's all ONE surveillance state, it's only because you resist facts.
[ link to this | view in chronology ]
This is either bullshit of the highest grade or an alarming admission of their incompetence.
See:
http://en.wikipedia.org/wiki/Domestic_terrorism_in_the_United_States
Hom e grown terrorism is not a recent development. They've had plenty of time to learn to cope with it.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
I wonder if anyone in government is brave enough to reduce NSA funding and increase research funding, to help alleviate the mentioned lack of research? It would be the most reasonable way to solve this worry, but the drama that would ensue...
[ link to this | view in chronology ]
Re:
If anyone had a solution acceptable to the government, (i.e. that does not involve significant foreign policy changes) you'd probably have heard of them by now. In other words, they want to destroy the threat without addressing the true cause. The hard line wins, but is ultimately only partially effective.
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Don't your mathematicians know about complex numbers?
One enabling trick is to assign an uncertainty metric to each item of intelligence. You then know not only the consensus of the evidence, but of the relative quality of the confounding evidence, all of which can be valuable inputs into the uncertainty metric of the answer to the question asked.
The other enabling trick is to recognize you're in intelligence, not in court. 100% accuracy is pointless and unachievable in the real world, so you work with what you got. 50%+1 constitutes probable cause, which is what you're looking for if you want authorization to watch someone more specifically/closely and aren't just playing tin-pot Kibo and grepping the Internet.
[ link to this | view in chronology ]
http://investigations.nbcnews.com/_news/2013/08/29/20234171-snowden-impersona ted-nsa-officials-sources-say?lite
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Passwords, lol
[ link to this | view in chronology ]
Re:
Let's say that you have three users in your Linux system: "bob", "alice" and "charlie".
Let's say that bob has root access, because...well...he's the sysadmin. "bob" needs to do some maintenance ("alice" messed up her settings, so "bob" needs to go fix them...or some other credible story), so he writes:
su alice
Wait, what's this? Now "bob" becomes "alice". OMG! "bob" is impersonating "alice"! What an f-king genius hacker!
Now, for his next trick, "bob" will impersonate "charlie" for no reason at all:
su charlie
OMFGROFL! "bob" became "charlie"! How does he do that!? He's an computer hacker!
Ahem...sorry.
Moral of the story? Reporters are morons. If Snowden was a proper sysadmin, and had root (super user) access, he had the ability to "switch user", that is, change his current identity in the system to "become" another user. System administrators sometimes require this ability for maintenance and support reasons. So, what NBC news is celebrating is the fact that Snowden had the capability to do what almost any Linux monkey is taught to do in his first lesson.
This is pure propaganda for the ignorant masses.
[ link to this | view in chronology ]
Oh come on, sure they do! Just watch for the Terror Threats to be broadcast on Twitter. See:
https://www.techdirt.com/articles/20100118/1051427801.shtml
and
http://www.techdirt.com/ar ticles/20130627/18205323645/yet-another-teen-making-stupid-jokes-social-media-now-faces-years-jail.s html
See, you can catch all of the terrorists just by watching for their pre-announcement on Twitter.......... /SARC
[ link to this | view in chronology ]
[ link to this | view in chronology ]
oh noes, al qaeda knows how many billions ? ? ?
oh noes !! !
what a crock of shit clapper is....
or all spooks...
art guerrilla
aka ann archy
eof
[ link to this | view in chronology ]
Of course, Director of National Intelligence James Clapper is still angry
[ link to this | view in chronology ]
Clap off *clap clap*
Clap on, clap off
The Clapper
[ link to this | view in chronology ]
Why should they care about accountability?
It's "other people's money" and who cares how it gets wasted?
Spend all of your allotted budget or else it will be cut back.
Doesn't matter how you do it, either.
[ link to this | view in chronology ]
Oh, so suddenly
huh.
I thought "it's just metadata", and it's not private or anything.
[ link to this | view in chronology ]
The Post should publish it ALL
The only people who don't have it are the public.
[ link to this | view in chronology ]
Tax Evasion
[ link to this | view in chronology ]
Do we think this really came from Snowden?
[ link to this | view in chronology ]
Re: Do we think this really came from Snowden?
Yes, this came from Snowden. Barton Gellman was one of the original reporters who got the documents from Snowden.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
dystopia
[ link to this | view in chronology ]
A bigger haystack? more like...
And it's more like multiple haystack... meaning more farms to sift through.
[ link to this | view in chronology ]
Fixing the Budget
[ link to this | view in chronology ]
Re: Fixing the Budget
[ link to this | view in chronology ]
Re: Re: Fixing the Budget
[ link to this | view in chronology ]
No informed debate needed
[ link to this | view in chronology ]
black budgets
[ link to this | view in chronology ]
Re: black budgets
[ link to this | view in chronology ]