'Black budget' shows spying success, failure
By The Washington Post
Published: Friday, Aug. 30, 2013, 12:01 a.m.
WASHINGTON — U.S. spy agencies have built an intelligence-gathering colossus since the attacks of Sept. 11, 2001.
The $52.6 billion “black budget” for fiscal 2013, obtained by The Washington Post from former intelligence contractor Edward Snowden, maps a bureaucratic and operational landscape that has never been subject to public scrutiny.
Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses those funds or how it performs against the goals set by the president and Congress.
The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the intelligence community, which has 107,035 employees.
The summary describes cutting-edge technologies, agent recruiting and ongoing operations. The Post is withholding some information after consultation with officials who expressed concerns about the risk to intelligence sources and methods.
“The United States has made a considerable investment in the Intelligence Community since the terror attacks of 9/11, a time which includes wars in Iraq and Afghanistan, the Arab Spring, the proliferation of weapons of mass destruction technology, and asymmetric threats in such areas as cyber warfare,” Director of National Intelligence James Clapper said in response to inquiries.
“Our budgets are classified as they could provide insight for foreign intelligence services to discern our top national priorities, capabilities and sources and methods that allow us to obtain information to counter threats,” he said.
Among the notable revelations in the budget summary:
• Spending by the Central Intelligence Agency has surged past that of every other spy agency, with $14.7 billion in requested funding for 2013. The figure vastly exceeds outside estimates and is nearly 50 percent above that of the National Security Agency, which conducts eavesdropping operations and has long been considered the behemoth of the community.
• The CIA and NSA have initiated aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as “offensive cyber operations.”
• The NSA planned to investigate at least 4,000 possible insider threats in 2013, cases in which the agency suspected sensitive information may have been compromised by one of its own. The budget documents show that the intelligence community has sought to strengthen its ability to detect what it calls “anomalous behavior” by personnel with access to highly classified material.
• Intelligence officials take an active interest in foes as well as friends. Pakistan is described in detail as an “intractable target,” and counterintelligence operations “are strategically focused against (the) priority targets of China, Russia, Iran, Cuba and Israel.”
• In words, deeds and dollars, intelligence agencies remain fixed on terrorism as the gravest threat to national security, which is listed first among five “mission objectives.” Counterterrorism programs employ one in four members of the intelligence workforce and account for one-third of all spending.
• The governments of Iran, China and Russia are difficult to penetrate, but North Korea's may be the most opaque. There are five “critical” gaps in intelligence about Pyongyang's nuclear and missile programs, and analysts know virtually nothing about the intentions of North Korean leader Kim Jong Un.
• A chart outlining efforts to address key questions on biological and chemical weapons is particularly bleak. U.S. agencies set annual goals for at least five categories of intelligence-collection related to these weapons. In 2011, the agencies made headway on just two gaps; a year earlier, the mark was zero. The documents describe expanded efforts to “collect on Russian chemical warfare countermeasures” and assess the security of biological and chemical laboratories in Pakistan.
Formally known as the Congressional Budget Justification for the National Intelligence Program, the “Top Secret” blueprint represents spending levels proposed to the House and Senate intelligence committees in February 2012. Congress may have made changes before the fiscal year began on Oct 1. Clapper is expected to release the actual total spending figure after the fiscal year ends on Sept. 30.
The document describes a constellation of spy agencies that track millions of individual surveillance targets and carry out operations that include hundreds of lethal strikes. They are organized around five priorities: combating terrorism, stopping the spread of nuclear and other unconventional weapons, warning U.S. leaders about critical events overseas, defending against foreign espionage and conducting cyber operations.
Clapper said the threats confronting the country “virtually defy rank-ordering.” He warned of “hard choices” as the intelligence community — sometimes referred to as the “IC” — seeks to rein in spending after a decade of often double-digit budget increases.
Lee Hamilton, an Indiana Democrat who was a former chairman of the House Intelligence Committee and co-chairman of the commission that investigated the Sept. 11 attacks, said that access to budget figures has the potential to enable an informed public debate on intelligence spending for the first time.
“Nobody is arguing that we should be so transparent as to create dangers for the country,” Hamilton said. But, he added, “the burden of persuasion as to keeping something secret should be on the intelligence community; the burden should not be on the American public.”
Experts said access to such details on U.S. spy programs is without precedent.
“It was a titanic struggle just to get the top-line budget number disclosed, and that has only been done consistently since 2007,” said Steven Aftergood, an expert at the Federation of American Scientists, a Washington organization that provides analyses of national security issues. “But a real grasp of the structure and operations of the intelligence bureaucracy has been totally beyond public reach. This kind of material, even on a historical basis, has simply not been available.”
Show commenting policy
TribLive commenting policy
You are solely responsible for your comments and by using TribLive.com you agree to our Terms of Service.
We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information.
While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers.
We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments either by the same reader or different readers.
We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites.
We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation.
We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly.
We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article.
- Drug crime reclassification to help ex-cons get vote rights
- First date in New Jersey ends with him pilfering her TV and Yorkshire terrier
- Fox fires exec who used email to plan aid
- Automaker GM’s wait on Saturn Ion safety recall took years
- Ohio couple married for 70 years dies just 15 hours apart
- Recovery expert believes wreckage of missing plane located
- SpaceX supply ship makes Easter cargo delivery to space station
- Authorities say they have trove of evidence against Dzhokhar Tsarnaev in Boston Marathon bombing
- Vermont Senate OKs GMO labels as industry insists genetically modified crops are safe
- Grandmother left vengeful note in boys’ slayings, then committed suicide, police say
- Colorado deaths stoke marijuana worries