Book Read Free

The Watchers

Page 44

by Shane Harris


  76 He held up a glass jar full of rocks and asked the room, “How many of you would say this jar is full?”: Interview with David Johnson, attorney and telecommunications expert, in 2008.

  78 Freeh made the political call: Let’s take what we can get here: Interview with Kallstrom.

  78 He thought it looked like the Cadillac of wiretaps: Interview with Gidari. He also provided firsthand accounts of the tense meetings between federal officials and telecom employees.

  CHAPTER 6: THE GENOA PROJECT

  Unless otherwise noted, statements, thoughts, and actions attributed to John Poindexter in this chapter came from interviews conducted mostly in 2008, as well as from electronic message exchanges.

  81 He had occasion to thank George H. W. Bush personally for not pardoning him: “I’m glad I did it on my own”: This account of the White House encounter with Bush and Reagan comes from Robert Timberg, The Nightingale’s Song (New York: Simon & Schuster, 1995).

  82 “The buck stops here with me,” he intoned: See the “Final Report of the Independent Counsel for Iran/Contra Matters,” by Lawrence Walsh. This is perhaps Poindexter’s most memorable line.

  82 He smoked throughout the proceedings, lighting the bowl with a silver Zippo that was mailed to him by the owner of the company, an ardent political supporter: The lighter was a gift from Harriett Wick, who in addition to having the perfect name for the head of a lighter manufacturer was also the daughter of the Zippo’s inventor. Poindexter told me that during the Iran-Contra hearings Wick sent him a rare, solid-gold lighter that the company had manufactured to celebrate its fiftieth anniversary. She had apparently seen him smoking a pipe on television and offered the token as a show of support; it was engraved with his initials. Poindexter was still an active-duty military officer and unable to accept such an expensive gift—his lawyers had the lighter appraised at nine hundred dollars. He sent the Zippo back to Mrs. Wick with his thanks and regrets. She replied with a silver lighter valued at about ninety dollars, below the threshold of acceptable gifts to military officers. Poindexter kept this lighter and used it for years.

  84 One afternoon, Poindexter headed over to the DARPA offices to meet with Brian Sharkey, a taciturn ex-submarine hunter: Sharkey spoke to me about his history with Poindexter and their work together in 2004.

  86 In 1992, State’s inspector general chided Clarke: See “Arms-Export Reports Further Strain U.S.-Israeli Ties,” by Thomas Friedman in the New York Times, March 15, 1992. Also see “Israel Arms Sales Illegal, U.S. Finds,” by David Hoffman and R. Jeffrey Smith in the Washington Post, March 14, 1992.

  87 Clarke’s first test on terrorism came quickly: See Richard Clarke’s memoir, Against All Enemies: Inside America’s War on Terror (New York: Free Press, 2004).

  90 Officials also found three attaché cases containing liquid, fans, vents, and batteries in a Tokyo subway station: For a detailed chronology of the cult’s activities, see “Global Proliferation of Weapons of Mass Destruction: A Case Study on the Aum Shinrikyo” by the U.S. Senate Government Affairs Permanent Subcommittee on Investigations, from October 31, 1995, www.fas.org/irp/congress/1995_rpt/aum/index.html.

  91 Clarke would have understood as well as anyone how intelligence often was abused and misused by human analysts: As a seasoned security official, Clarke would have had many occasions to witness the political uses of intelligence. Perhaps the most famous instance occurred in the aftermath of the 9/11 attacks. In Clarke’s memoir, he describes at length his opinion that the Bush administration stretched the facts and cherry-picked intelligence in order to find a connection between Al Qaeda and the Iraqi government, one that he believed didn’t exist.

  92 But upon first glance, she thought he could have been an English professor as easily as a former national security adviser: Interview with Mary McCarthy in 2008.

  92 Poindexter briefly gave McCarthy the rundown on the Genoa program: Interviews with McCarthy and Poindexter.

  92 McCarthy had published articles connecting this systemic problem to high-profile intelligence failures: McCarthy’s writings are some of the most prescient essays on the future threat of terrorism to the United States that I’ve read. They are frequently cited by intelligence historians in academic and professional journals. See McCarthy’s papers “The National Warning System: Striving for an Elusive Goal,” published in the Defense Intelligence Journal in 1994, as well as “The Mission to Warn: Disaster Looms,” published in that journal’s fall 1998 edition.

  93 The team built another staging center near the DARPA building, hiring a Hollywood set designer and former head of Disney Imagineering to give the place a futuristic quality: Interview with Poindexter. Other officials who visited the center and saw the Genoa demos also recalled its location and its interior.

  CHAPTER 7: THE NEXT GENERATION

  95 When Curt Weldon picked up the phone to call George Tenet, the director of the CIA, he wasn’t expecting much: See the transcript of two of Weldon’s long speeches on the floor of the House of Representatives, in which he recounts much of the narrative about Dragomir Karic and the Information Dominance Center. The first was on May 21, 2002, at www.fas.org/irp/congress/2002_cr/h052102.html. The second was on June 27, 2005, at www.fas.org/irp/congress/2005_cr/s062705.html. I also wrote about the Karic case and quoted from Weldon’s remarks in a story for National Journal, “Intelligence Designs,” published December 3, 2005. I interviewed Weldon about these matters in his office in 2005. Then, in 2006 I interviewed him again and shadowed him around Washington for a day, as part of a profile I wrote for National Journal titled “The Troublemaker,” published on September 29, 2006.

  97 Weldon once walked out on a closed-door briefing by CIA officials: See “Missile-Threat Report ‘Politicized,’ GOP says,” by Rowan Scarborough and Bill Gertz in the Washington Times, January 30, 1996.

  98 When Erik Kleinsmith got the request from Weldon’s office to draw up a profile on the enigmatic Karic, he didn’t expect it to be an onerous task: Kleinsmith’s account of the work on the Karic program come from interviews conducted in 2005 and 2008. All descriptions of his early work at the Information Dominance Center and any statements, thoughts, and actions attributed to him also come from those interviews.

  103 The IDC was the next generation of intelligence, Weldon thought: Weldon’s fixation on intelligence is well known. For a good encapsulation of his thinking, which usually runs contrary to the norm, see his book Countdown to Terror: The Top-Secret Information That Could Prevent the Next Terrorist Attack on America . . . and How the CIA Has Ignored It (Washington, D.C.: Regnery Publishing, 2005).

  103 Over at the Pentagon, word was getting around about the IDC’s exploits: It was clear from interviews with Weldon and Kleinsmith that this was the case. Other interviews, especially with John Hamre, then the deputy secretary of defense, confirmed this. The IDC was an up-and-coming outfit.

  CHAPTER 8: THE CHINA EXPERIMENT

  104 The Defense Department had been aware for some time that hostile intelligence services were running agents against U.S. government facilities and military contractors: See the Defense Department inspector general’s report on the Able Danger program, “Alleged Misconduct by Senior DoD Officials Concerning the Able Danger Program and Lieutenant Colonel Anthony A. Shaffer, U.S. Army Reserve,” case number H05L97905217, dated September 18, 2006. It states: “In February 1999 Dr. John Hamre, former Deputy Secretary of Defense, proposed a ‘threat mapping model’ for industrial security. Dr. Hamre testified the proposal was a reaction to ‘an active espionage operation by a hostile intelligence force.’ ”

  I also interviewed Hamre about the Able Danger program, and about the Information Dominance Center and its work on industrial espionage, in 2005. We also exchanged a few follow-ups by e-mail.

  104 a special congressional committee had revealed that since at least the late 1970s, Chinese spies had stolen design information about advanced thermonuclear warheads from the U.S. national laboratories: This document, “U.S. N
ational Security and Military/Commercial Concerns with the People’s Republic of China,” is better known as the Cox Report, after its chairman and chief proponent, Christopher Cox, who was then a Republican congressman from California. The report was classified, but a redacted version was released publicly in May 1999, at www.house.gov/coxreport/. The report prompted renewed attention to the problem of industrial espionage, but it was not without its critics. Some accused the panel of overstating both the threat of Chinese espionage and the capability of the weapons for which designs were allegedly stolen. The report was also inextricably linked to questions of Chinese political influence on Democratic campaigns and President Bill Clinton. Nevertheless, I mention the report here because it laid bare publicly what senior officials in the Pentagon already knew: Chinese intelligence operations against the U.S. industrial base were in full swing. It is worth noting that less than a decade later intelligence officials would allege publicly that Chinese agents were stealing proprietary information again, but this time over the Internet, by hacking into the computers of U.S. government officials and business executives.

  105 Not long after, he reported his impressions back to Weldon: “It’s amazing what they’re doing down there”: Interview with Weldon. Hamre also confirmed that he shared his thoughts with the congressman.

  106 Hamre wanted to know whether he should invest in these cutting-edge tools for the new Joint Counterintelligence Assessment Group, or JCAG: Interview with Hamre. Also see the Defense Department inspector general’s report on Able Danger.

  106 Kleinsmith saw a perfect opportunity to impress the Pentagon brass: All the details about the IDC’s work on the China experiment came from interviews with Kleinsmith in 2005 and 2008. In 2005, I also interviewed a former employee of the IDC who worked for Kleinsmith but asked not to be named. The inspector general’s report also provides corroborating information about these accounts. Interviews with Hamre and a former congressional official also added important details about the reaction senior officials had to the IDC’s work.

  110 The FBI had set up a covert spying operation against the Black Panthers: In the course of my reporting I spoke with a former member of this FBI team who confirmed its mission and requested anonymity.

  112 That’s how the Army’s lawyers saw it, and they conveyed that concern to the Pentagon’s senior leadership: The Defense Department inspector general’s report documents this chain of reporting.

  113 Hamre wanted to come up to the Hill and talk to the staffers personally: This account comes from a 2008 interview with Tim Sample, who eventually became the staff director of the House Intelligence Committee under Porter Goss. Sample worked for the CIA as an imagery analyst before coming to the Hill.

  113 The committee staff also wondered why the IDC was on this job in the first place: Interview with Sample.

  CHAPTER 9: ABLE DANGER

  Unless otherwise noted, accounts of the IDC’s work on Able Danger come primarily from interviews with Kleinsmith and a former IDC employee who worked with him and asked not to be identified. Where other sources amplify certain passages, I note them.

  115 A pair of officers showed up unannounced, a Navy commander and a Marine captain: This encounter is also documented in the Defense Department inspector general’s report on Able Danger, “Alleged Misconduct by Senior DoD Officials Concerning the Able Danger Program and Lieutenant Colonel Anthony A. Shaffer, U.S. Army Reserve,” case number H05L97905217, dated September 18, 2006.

  116 When it came to Al Qaeda, Special Operations most wanted one thing: Boots on the ground to go after the terrorists: The report of the National Commission on Terrorist Attacks Upon the United States, better known as the 9/11 Commission, contains an authoritative history of Special Operations’ efforts against Al Qaeda during this time. See The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (New York: W.W. Norton, 2004).

  116 The military hadn’t seen anything comparable since the bombings in Beirut fifteen years earlier: While this is demonstrably true, I also note here that in the course of reporting over the years I interviewed a survivor of the bombing at the embassy in Kenya, Ambassador Prudence Bushnell. She provided vivid memories of the event, which helped underscore both the ferocity of the explosion and the extent of the damage.

  116 In October 1999, the chairman of the Joint Chiefs had directed Special Operations to map out Al Qaeda and all its support mechanisms, including its linchpin members: The 9/11 Commission’s report contains no mention of Able Danger, although its staff did interview officials who were involved in the program. The Defense Department inspector general’s report established that Able Danger began pursuant to the chairman of the Joint Chiefs’ orders to target Al Qaeda.

  117 Special Operations had ideas about how to hit Al Qaeda: This account is contained in the 9/11 Commission’s report.

  117 The agency had reestablished contacts more recently, and they were paying some dividends: The CIA’s lack of human intelligence-gathering capabilities in Afghanistan and other key counties is well documented. But the 9/11 Commission’s report also provides a well-sourced account of this problem. The report also documents the CIA’s plans for striking at Al Qaeda.

  118 Special Operations begged to differ: The turf war that erupted between Special Operations and the CIA is documented in the 9/11 Commission’s report. Kleinsmith and the former IDC employee also told me that by the time Special Operations reached out to their team, officers were fed up with the CIA’s approach to dealing with Al Qaeda and were prepared to try a new approach.

  120 They ran the usual sources—public information on the Internet, as well as the Joint Worldwide Intelligence Communications System: Interview with Kleinsmith. Also, in a separate discussion, a former intelligence employee who worked at the IDC but was not involved in the Able Danger program confirmed that the center had access to the joint communications system.

  123 Less than a month later, the staff of the House Intelligence Committee learned that Special Operations had tapped the IDC for data analysis: Interview with Tim Sample, who eventually became the staff director of the House Intelligence Committee under Porter Goss.

  123 In the winter of 2000, with the IDC several weeks into its Able Danger work, no one in the senior ranks of the Army or the Pentagon realized that Kleinsmith’s team was once again pulling in thousands of names of U.S. persons: The chronological record contained in the Defense Department inspector general’s report confirms this. Again, Kleinsmith was aware that legal concerns about the IDC’s work persisted, but they hadn’t yet impeded his work on Able Danger.

  124 Rear Admiral Michael Lohr, the legal counsel to the chairman of the Joint Chiefs of Staff, got involved: See the Defense Department inspector general’s report. It also contains excerpts from Lohr’s memo.

  124 Weeks before Lohr wrote his memo, Philpot briefed General Peter Schoomaker, the Special Operations commander: Ibid.

  127 At the time, the NSA was using Parentage to trace attacks on computer networks back to a discrete Internet address: See notes on research into “high confidence systems” on the Web site of the National Coordination Office for Networking and Information Technology Research and Development, at www.nitrd.gov/pubs/bluebooks/2000/hcs.html.

  CHAPTER 10: “YOU GUYS WILL GO TO JAIL”

  Unless otherwise noted, accounts of the IDC’s work on Able Danger come primarily from interviews with Kleinsmith and the former IDC employee who worked with him but asked not to be identified. Where other sources amplify certain passages, I note them.

  129 Colonel Tony Gentry, the top lawyer for the Intelligence and Security Command, had paid Kleinsmith a visit: Interviews with Kleinsmith in 2005 and 2008. The Defense Department inspector general also found that Kleinsmith was advised that he was facing a ninety-day deadline and would have to destroy information (“Alleged Misconduct by Senior DoD Officials Concerning the Able Danger Program and Lieutenant Colonel Anthony A. Shaffer, U.S. Army Rese
rve,” case number H05L97905217, dated September 18, 2006). Kleinsmith also testified before the Senate Judiciary Committee on September 21, 2005, about his meeting with Gentry.

  132 The analysis would move to a private facility, an intelligence operations center owned and operated by Raytheon in Garland, Texas: Interviews with Kleinsmith and the former IDC employee. Also see Defense Department inspector general report. Also discussed in interview with Curt Weldon in 2005.

  133 Back in the White House, Dick Clarke and the other career NSC staffers had been working furiously, and now they were in panic mode: See Dick Clarke’s memoir, Against All Enemies: Inside America’s War on Terror (New York: Free Press, 2004), and the 9/11 Commission’s report.

  133 What is it that fits? she asked herself. What is it that matters?: Interview with McCarthy.

  133 In June 2001, the intelligence community issued a warning that a major Al Qaeda attack would occur within the next several weeks: For a concise account of the frenzied months preceding the 9/11 attacks, see PBS’s Frontline: The Man Who Knew, a profile of former FBI special agent John O’Neill. He was one of the few at the bureau to give early warnings of the Al Qaeda threat. O’Neill died at the World Trade Center on September 11, 2001.

  134 Clarke held a meeting in his office during which CIA officials briefed domestic law enforcement agencies about the possibility of an attack in America: Ibid.

  134 McCarthy, as part of the professional staff, agreed to stay on board temporarily. But as she prepared to head back to the CIA, she worked up a memo for the new national security adviser, Condoleezza Rice: Interview with McCarthy.

  134 McCarthy asked Poindexter whether he had any advice for Rice, one adviser to another: Interviews with McCarthy and Poindexter.

 

‹ Prev