@War: The Rise of the Military-Internet Complex (37 page)

Read @War: The Rise of the Military-Internet Complex Online

Authors: Shane Harris

Tags: #Computers, #Non-Fiction, #Military, #History

BOOK: @War: The Rise of the Military-Internet Complex
6.14Mb size Format: txt, pdf, ePub

[>]
Iraqi civilian deaths:
Ibid.,
http://www.iraqbodycount.org/database/
.

[>]
By September 2004:
Dana Priest, “NSA Growth Fueled by Need to Target Terrorists,”
Washington Post
, July 21, 2013,
http://www.washingtonpost.com/world/national-security/nsa-growth-fueled-by-need-to-target-terrorists/2013/07/21/24c93cf4-f0b1-11e2-bed3-b9b6fe264871_story.html
.

[>]
“This trend presents”:
David E. Peterson, “Surveillance Slips into Cyberspace,”
Signal
, February 2005,
http://www.afcea.org/content/?q=node/629
.

[>]
Their center of operations:
The description comes from several sources, including an interview with a former senior military officer, other military and intelligence officers who worked in Iraq, and press accounts, including Priest, “NSA Growth”; and Joby Warrick and Robin Wright, “US Teams Weaken Insurgency in Iraq,”
Washington Post
, September 6, 2008,
http://articles.washingtonpost.com/2008-09-06/world/36869600_1_salim-abdallah-ashur-abu-uthman-iraqi-insurgents
. See also David H. Petraeus, “How We Won in Iraq,”
Foreign Policy
, October 29, 2013,
http://www.foreignpolicy.com/articles/2013/10/29/david_petraeus_how_we_won_the_surge_in_iraq?page=0,3
; and Stanley A. McChrystal, “It Takes a Network,”
Foreign Policy
, February 22, 2011,
http://www.foreignpolicy.com/articles/2011/02/22/it_takes_a_network
.

[>]
In September 2007:
See Eric Schmitt and Thom Shanker,
Counterstrike: The Untold Story of America's Secret Campaign Against Al Qaeda
(New York: Times Books, 2011).

[>]
The NSA also developed a tool:
Scott Shane, “No Morsel Too Minuscule for All-Consuming NSA,”
New York Times
, November 2, 2013,
http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?_r=2&pagewanted=all&&pagewanted=print
.

[>]
Local Christians who had lived:
Ned Parker, “Christians Chased Out of District,”
Los Angeles Times
, June 27, 2007,
http://articles.latimes.com/2007/jun/27/world/fg-christians27
.

[>]
The operation began in June 2007:
“US Launches Major Iraq Offensive,” BBC News, June 19, 2007,
http://news.bbc.co.uk/2/hi/middle_east/6766217.stm
; and “Start of ‘Arrowhead Ripper' Highlights Iraq Operations,” American Forces Press Service, June 19, 2007,
http://www.defense.gov/News/NewsArticle.aspx?ID=46459
.

[>]
By one account
,
it aided:
Warrick and Wright, “US Teams Weaken Insurgency.”

[>]
There were 28 bombings:
Ibid.

[>]
Petraeus credited this new:
National Security Agency statement on surveillance programs, August 9, 2013,
http://cryptome.org/2013/08/nsa-13-0809.pdf
. See also Petraeus, “How We Won in Iraq.”

 

2. RTRG

 

[>]
The NSA's headquarters had moved:
60 Years of Defending Our Nation
, an official NSA history, published in 2012 for the agency's anniversary,
http://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf
.

[>]
A twenty-four-hour watch center:
The description of the so-called President's Surveillance Program and Stellar Wind is drawn from multiple interviews with former government officials, as well as a report by the NSA's inspector general,
ST-09-002
Working Draft
, March 24, 2009, which was disclosed by Edward Snowden. A copy of the document is available at
http://www.theguardian.com/world/interactive/2013/jun/27/nsa-inspector-general-report-document-data-collection
. See also the author's book
The Watchers: The Rise of America's Surveillance State
(New York: Penguin Press, 2010).

[>]
In the litany of NSA code words:
Precisely how the NSA comes up with code words is a bit of a mystery. In the 1960s a single NSA employee was responsible for selecting new code words, apparently at random, suggesting that the choice of name has little to do with what the program actually does. See Tom Bowman, “Why Does the NSA Keep an EGOTISTICALGIRAFFE? It's Top Secret,” NPR News, November 10, 2013,
http://www.npr.org/2013/11/10/244240199/why-does-the-nsa-keep-an-egotisticalgiraffe-its-top-secret
.

[>]
“This is the kind of guy”:
Matt Schudel, “Pedro Luis Rustan, 65, “Pedro Luis Rustan, 65, Aerospace and Surveillance Innovator,” Obituaries,
Washington Post
, July 7, 2012,
http://articles.washingtonpost.com/2012-07-07/local/35486174_1_nro-spy-satellites-national-reconnaissance-office
.

[>]
In a 2010 interview with a trade publication:
“Change Agent,”
C4ISR Journal
, October 8, 2010,
http://www.defensenews.com/article/20101008/C4ISR01/10080311/
.

[>]
“Clearly establishing in the eyes of the Iraqi people”:
David H. Petraeus, “How We Won in Iraq,”
Foreign Policy
, October 29, 2013,
http://www.foreignpolicy.com/articles/2013/10/29/david_petraeus_how_we_won_the_surge_in_iraq?page=0,3
.

[>]
The agency's elite hacker unit:
Craig Whitlock and Barton Gellman, “To Hunt Osama bin Laden, Satellites Watched over Abbottabad, Pakistan, and Navy SEALs,”
Washington Post
, August 29, 2013,
http://articles.washingtonpost.com/2013-08-29/world/41712137_1_laden-s-osama-bin-laden
.

 

3. Building the Cyber Army

 

[>]
The army got in:
Author interview with former military intelligence officer.

[>]
His old patron Dick Cheney informed:
The author conducted a series of interviews with McConnell in his office in 2009.

[>]
Just over a month later:
The list of companies subject to Prism surveillance comes from an NSA presentation disclosed by the former contractor Edward Snowden, first published by the
Washington Post
and the
Guardian
, and subsequently republished by numerous journalistic organizations. Details about Prism surveillance also come from author interviews with current and former intelligence officials.

[>]
After Senator Barack Obama won:
McConnell interview.

[>]
Later, in a private meeting with Bush:
See David Sanger,
Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power
(New York: Crown, 2012).

[>]
To find out, on May 7, 2010:
Accounts of the Schriever Wargame 2010, and the lessons the military learned, come from three sources: author interview with Lieutenant General Michael Basla, the air force's chief for information dominance and its chief information officer;
High Frontier: The Journal for Space and Cyberspace Professionals
7, no. 1, which was entirely devoted to describing and analyzing the game,
http://www.afspc.af.mil/shared/media/document/AFD-101116-028.pdf
; and Robert S. Dudney, “Hard Lessons at the Schriever Wargame,”
Air Force Magazine
94, no. 2 (February 2011),
http://www.airforcemag.com/MagazineArchive/Pages/2011/February%202011/0211wargame.aspx
.

[>]
But privately, some intelligence officials:
Author interviews with government officials, industry experts, and business executives. Those interviewed about China's cyber capabilities included Tim Bennett, former president of the Cyber Security Industry Alliance, a leading trade group; Stephen Spoonamore, former CEO of Cybrinth, a cyber security firm with government and corporate clients; and Joel Brenner, head of counterintelligence under the director of national intelligence. See Shane Harris, “China's Cyber-Militia,”
National Journal
, May 31, 2008,
http://www.nationaljournal.com/magazine/china-s-cyber-militia-20080531
.

[>]
“The hacker was probably”:
Author interview.

[>]
It was six years after lawmakers':
Author interviews with congressional staff and investigators, as well as a confidential briefing prepared by security experts in the House of Representatives, obtained by the author. See Shane Harris, “Hacking the Hill,”
National Journal
, December 20, 2008,
http://www.nationaljournal.com/magazine/hacking-the-hill-20081220
.

[>]
The US Chamber of Commerce:
US Chamber of Commerce officials made many comments to this effect. See
http://www.pcworld.com/article/260267/senate_delays_maybe_kills_cybersecurity_bill.html
.

[>]
And the separate directive, known as PDD-20:
A list of Obama's presidential decision directives can be found on the website of the Federation of American Scientists,
http://www.fas.org/irp/offdocs/ppd/.PDD-20
, which pertains to cyber operations of the military, was leaked by the former NSA contractor Edward Snowden and published in its entirety in June 2013.

[>]
“There aren't enough”:
Major General John Davis, speech at the Armed Forces Communications and Electronics Association (AFCEA) International Cyber Symposium, Baltimore Convention Center, June 25, 2013,
http://www.dvidshub.net/video/294716/mg-davis-afcea#.UpSILmQ6Ve6#ixzz2lkc87oRy
.

[>]
An NSA unit known as:
Scott Shane, “No Morsel Too Minuscule for All-Consuming N.S.A.,”
New York Times
, November 2, 2013,
http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html
.

[>]
In a remarkable shift:
See Chairman of the Joint Chiefs of Staff,
Joint Targeting
, Joint Publication 3-60, January 31, 2013,
http://cfr.org/content/publications/attachments/Joint_Chiefs_of_Staff-Joint_Targeting_31_January_2013.pdf
.

[>]
The attack is launched:
Lieutenant General Herbert Carlisle, then the air force's deputy chief of staff for operations, told a 2012 defense conference in Washington about the Chinese tactics. See David Fulghum, “China, US Chase Air-to-Air Cyberweapon,”
Aviation Week
, March 9, 2012.

[>]
“There is a tremendous amount”:
Dune Lawrence and Michael Riley, “A Chinese Hacker's Identity Unmasked,”
Bloomberg Businessweek
, February 14, 2013,
http://www.businessweek.com/articles/2013-02-14/a-chinese-hackers-identity-unmasked
.

[>]
“There aren't enough”:
Davis speech.

[>]
“Universities don't want to touch”:
Jason Koebler, “NSA Built Stuxnet, but Real Trick Is Building Crew of Hackers,”
US News & World Report
, June 8, 2012,
http://www.usnews.com/news/articles/2012/06/08/nsa-built-stuxnet-but-real-trick-is-building-crew-of-hackers
.

 

4. The Internet Is a Battlefield

 

[>]
The agency's best-trained:
For more on TAO, see the work of intelligence historian and journalist Matthew Aid, who has written extensively about the unit, including “The NSA's New Code Breakers,”
Foreign Policy
, October 16, 2013,
http://www.foreignpolicy.com/articles/2013/10/15/the_nsa_s_new_codebreakers?page=0%2C1#sthash.jyc1d12P.dpbs
.

[>]
Edward Snowden told Chinese journalists:
Lana Lam, “NSA Targeted China's Tsinghua University in Extensive Hacking Attacks, Says Snowden,”
South China Morning Post
, June 22, 2013,
http://www.scmp.com/news/china/article/1266892/exclusive-nsa-targeted-chinas-tsinghua-university-extensive-hacking?page=all
.

[>]
According to one international study:
QS World University Rankings, 2013,
http://www.topuniversities.com/university-rankings/university-subject-rankings/2013/computer-science-and-information-systems
.

[>]
That year
they also were recognized:
Matthew Aid,
Secret Sentry: The Untold History of the National Security Agency
(New York: Bloomsbury Press, 2009),
http://www.amazon.com/The-Secret-Sentry-National-Security/dp/B003L1ZX4S
.

[>]
Matthew Aid writes: Matthew Aid, “Inside the NSA's Ultra-Secret China Hacking Group,”
Foreign Policy
, October 15, 2013
,
http://www.foreignpolicy.com/articles/2013/06/10/inside_the_nsa_s_ultra_secret_china_hacking_group
. Matthew Aid, “Inside the NSA's Ultra-Secret China Hacking Group,” Foreign Policy, October 15, 2013,
http://www.foreignpolicy.com/articles/2013/06/10/inside_the_nsa_s_ultra_secret_china_hacking_group
.

[>]
In the second half of 2009:
This account was provided by a former employee at the Hawaii center who worked on the operation.

[>]
In a top-secret summary:
The Flatliquid operation was first reported by
Der Spiegel
, based on documents provided by former NSA contractor Edward Snowden. See Jens Glüsing et al., “Fresh Leak on US Spying: NSA Accessed Mexican President's Email,”
Spiegel Online
, International edition, October 20, 2013,
http://www.spiegel.de/international/world/nsa-hacked-e-mail-account-of-mexican-president-a-928817.html
.

[>]
Several dozen clandestine:
Matthew Aid, “The CIA's New Black Bag Is Digital,”
Foreign Policy
, August 18, 2013,
http://www.foreignpolicy.com/articles/2013/07/16/the_cias_new_black_bag_is_digital_nsa_cooperation#sthash.XUr4mt5h.dpbs
.

Other books

Hunted Wolf: Moonbound Series, Book Eight by Camryn Rhys, Krystal Shannan
I Saw You by Elena M. Reyes
The Greengage Summer by Rumer Godden
The Snack Thief by Andrea Camilleri
TORCH by Rideout, Sandy, Collins, Yvonne
The Survival Kit by Donna Freitas
Wilful Behaviour by Donna Leon
Celia's House by D. E. Stevenson
To Play the King by Michael Dobbs