'Black budget' shows spying success, failure
WASHINGTON — U.S. spy agencies have built an intelligence-gathering colossus since the attacks of Sept. 11, 2001.
The $52.6 billion “black budget” for fiscal 2013, obtained by The Washington Post from former intelligence contractor Edward Snowden, maps a bureaucratic and operational landscape that has never been subject to public scrutiny.
Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses those funds or how it performs against the goals set by the president and Congress.
The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the intelligence community, which has 107,035 employees.
The summary describes cutting-edge technologies, agent recruiting and ongoing operations. The Post is withholding some information after consultation with officials who expressed concerns about the risk to intelligence sources and methods.
“The United States has made a considerable investment in the Intelligence Community since the terror attacks of 9/11, a time which includes wars in Iraq and Afghanistan, the Arab Spring, the proliferation of weapons of mass destruction technology, and asymmetric threats in such areas as cyber warfare,” Director of National Intelligence James Clapper said in response to inquiries.
“Our budgets are classified as they could provide insight for foreign intelligence services to discern our top national priorities, capabilities and sources and methods that allow us to obtain information to counter threats,” he said.
Among the notable revelations in the budget summary:
• Spending by the Central Intelligence Agency has surged past that of every other spy agency, with $14.7 billion in requested funding for 2013. The figure vastly exceeds outside estimates and is nearly 50 percent above that of the National Security Agency, which conducts eavesdropping operations and has long been considered the behemoth of the community.
• The CIA and NSA have initiated aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as “offensive cyber operations.”
• The NSA planned to investigate at least 4,000 possible insider threats in 2013, cases in which the agency suspected sensitive information may have been compromised by one of its own. The budget documents show that the intelligence community has sought to strengthen its ability to detect what it calls “anomalous behavior” by personnel with access to highly classified material.
• Intelligence officials take an active interest in foes as well as friends. Pakistan is described in detail as an “intractable target,” and counterintelligence operations “are strategically focused against (the) priority targets of China, Russia, Iran, Cuba and Israel.”
• In words, deeds and dollars, intelligence agencies remain fixed on terrorism as the gravest threat to national security, which is listed first among five “mission objectives.” Counterterrorism programs employ one in four members of the intelligence workforce and account for one-third of all spending.
• The governments of Iran, China and Russia are difficult to penetrate, but North Korea's may be the most opaque. There are five “critical” gaps in intelligence about Pyongyang's nuclear and missile programs, and analysts know virtually nothing about the intentions of North Korean leader Kim Jong Un.
• A chart outlining efforts to address key questions on biological and chemical weapons is particularly bleak. U.S. agencies set annual goals for at least five categories of intelligence-collection related to these weapons. In 2011, the agencies made headway on just two gaps; a year earlier, the mark was zero. The documents describe expanded efforts to “collect on Russian chemical warfare countermeasures” and assess the security of biological and chemical laboratories in Pakistan.
Formally known as the Congressional Budget Justification for the National Intelligence Program, the “Top Secret” blueprint represents spending levels proposed to the House and Senate intelligence committees in February 2012. Congress may have made changes before the fiscal year began on Oct 1. Clapper is expected to release the actual total spending figure after the fiscal year ends on Sept. 30.
The document describes a constellation of spy agencies that track millions of individual surveillance targets and carry out operations that include hundreds of lethal strikes. They are organized around five priorities: combating terrorism, stopping the spread of nuclear and other unconventional weapons, warning U.S. leaders about critical events overseas, defending against foreign espionage and conducting cyber operations.
Clapper said the threats confronting the country “virtually defy rank-ordering.” He warned of “hard choices” as the intelligence community — sometimes referred to as the “IC” — seeks to rein in spending after a decade of often double-digit budget increases.
Lee Hamilton, an Indiana Democrat who was a former chairman of the House Intelligence Committee and co-chairman of the commission that investigated the Sept. 11 attacks, said that access to budget figures has the potential to enable an informed public debate on intelligence spending for the first time.
“Nobody is arguing that we should be so transparent as to create dangers for the country,” Hamilton said. But, he added, “the burden of persuasion as to keeping something secret should be on the intelligence community; the burden should not be on the American public.”
Experts said access to such details on U.S. spy programs is without precedent.
“It was a titanic struggle just to get the top-line budget number disclosed, and that has only been done consistently since 2007,” said Steven Aftergood, an expert at the Federation of American Scientists, a Washington organization that provides analyses of national security issues. “But a real grasp of the structure and operations of the intelligence bureaucracy has been totally beyond public reach. This kind of material, even on a historical basis, has simply not been available.”
Show commenting policy
TribLive commenting policy
- 5 airports to handle all U.S.-bound travelers from Ebola-stricken nations
- American free of virus
- Wreckage of sunken WWII U-boat found off N.C. coast
- Ex-NSA chief drops deal with former aide to avoid appearance of conflict
- Wrongful imprisonment case ends in guilty plea
- Maryland man set for trial in killing erroneously released
- Man confesses to killing 7 women around Gary, Ind.; charges in other slayings possible
- North Korea releases Ohio man detained for 6 months
- Accused head of violent Mexican cartel nabbed
- Governor to form Ferguson Commission to study underlying social issues in shooting
- Teen’s pre-existing condition lead to death