Weatherford Democrat

Online Only

August 29, 2013

US spying successes, failures, objectives detailed in top secret 'black budget'

(Continued)

WASHINGTON —

— The CIA and NSA have launched aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as "offensive cyber operations."

— The NSA planned to investigate at least 4,000 possible insider threats in 2013, cases in which the agency suspected sensitive information may have been compromised by one of its own. The budget documents show that the U.S. intelligence community has sought to strengthen its ability to detect what it calls "anomalous behavior" by personnel with access to highly classified material.

— U.S. intelligence officials take an active interest in foes as well as friends. Pakistan is described in detail as an "intractable target," and counterintelligence operations "are strategically focused against [the] priority targets of China, Russia, Iran, Cuba and Israel."

— In words, deeds and dollars, intelligence agencies remain fixed on terrorism as the gravest threat to national security, which is listed first among five "mission objectives." Counterterrorism programs employ one in four members of the intelligence workforce and account for one-third of all spending.

— The governments of Iran, China and Russia are difficult to penetrate, but North Korea's may be the most opaque. There are five "critical" gaps in U.S. intelligence about Pyongyang's nuclear and missile programs, and analysts know virtually nothing about the intentions of North Korean leader Kim Jong Un.

Formally known as the Congressional Budget Justification for the National Intelligence Program, the "Top Secret" blueprint represents spending levels proposed to the House and Senate intelligence committees in February 2012. Congress may have made changes before the fiscal year began on Oct 1. Clapper is expected to release the actual total spending figure after the fiscal year ends on Sept. 30.

The document describes a constellation of spy agencies that track millions of individual surveillance targets and carry out operations that include hundreds of lethal strikes. They are organized around five priorities: combating terrorism, stopping the spread of nuclear and other unconventional weapons, warning U.S. leaders about critical events overseas, defending against foreign espionage and conducting cyber operations.

Text Only
Online Only
Must Read
Top News
House Ads
AP Video
Kerry: Humanitarian Cease-fire Efforts Continue Raw: Corruption Trial Begins for Former Va Gov. The Carbon Trap: US Exports Global Warming UN Security Council Calls for Gaza Cease-fire Traditional African Dishes Teach Healthy Eating 13 Struck by Lightning on Calif. Beach Baseball Hall of Famers Inducted Israel, Hamas Trade Fire Despite Truce in Gaza Italy's Nibali Set to Win First Tour De France Raw: Shipwrecked Concordia Completes Last Voyage Raw: Sea Turtle Hatchlings Emerge From Nest Raw: Massive Dust Storm Covers Phoenix 12-hour Cease-fire in Gaza Fighting Begins Raw: Bolivian Dancers Attempt to Break Record Raw: Israel, Palestine Supporters Rally in US Raw: Air Algerie Flight 5017 Wreckage Virginia Governor Tours Tornado Aftermath Judge Faces Heat Over Offer to Help Migrant Kids Kangaroo Goes Missing in Oklahoma More M17 Bodies Return, Sanctions on Russia Grow