Journal Express, Knoxville, IA

Community News Network

August 29, 2013

US spying successes, failures, objectives detailed in top secret 'black budget'

(Continued)

WASHINGTON —

— The CIA and NSA have launched aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as "offensive cyber operations."

— The NSA planned to investigate at least 4,000 possible insider threats in 2013, cases in which the agency suspected sensitive information may have been compromised by one of its own. The budget documents show that the U.S. intelligence community has sought to strengthen its ability to detect what it calls "anomalous behavior" by personnel with access to highly classified material.

— U.S. intelligence officials take an active interest in foes as well as friends. Pakistan is described in detail as an "intractable target," and counterintelligence operations "are strategically focused against [the] priority targets of China, Russia, Iran, Cuba and Israel."

— In words, deeds and dollars, intelligence agencies remain fixed on terrorism as the gravest threat to national security, which is listed first among five "mission objectives." Counterterrorism programs employ one in four members of the intelligence workforce and account for one-third of all spending.

— The governments of Iran, China and Russia are difficult to penetrate, but North Korea's may be the most opaque. There are five "critical" gaps in U.S. intelligence about Pyongyang's nuclear and missile programs, and analysts know virtually nothing about the intentions of North Korean leader Kim Jong Un.

Formally known as the Congressional Budget Justification for the National Intelligence Program, the "Top Secret" blueprint represents spending levels proposed to the House and Senate intelligence committees in February 2012. Congress may have made changes before the fiscal year began on Oct 1. Clapper is expected to release the actual total spending figure after the fiscal year ends on Sept. 30.

The document describes a constellation of spy agencies that track millions of individual surveillance targets and carry out operations that include hundreds of lethal strikes. They are organized around five priorities: combating terrorism, stopping the spread of nuclear and other unconventional weapons, warning U.S. leaders about critical events overseas, defending against foreign espionage and conducting cyber operations.

Text Only
Community News Network
Features
AP Video
Raw: House OKs Bill for Border Crisis Funds Rare Whale Fossil Pulled From Calif. Backyard Denver Celebrates Pot at the County Fair Escaping Email: Inspired Vision or Pipe Dream? Obama Calls on Hamas to Release Israeli Soldier Hispanic Caucus Slams GOP for Border Bill Shifts Obama: GOP Not Even Trying to Solve Immigration Emory Prepares to Treat American Ebola Cases US Employers Add 209K Jobs, Rate 6.2 Pct House GOP Optimistic About New Border Bill Four Rescued From Crashed Plane Clinton Before 9-11: Could Have Killed Bin Laden Couple Channel Grief Into Soldiers' Retreat WWI Aviation Still Alive at Aerodrome in NY Raw: Woman Who Faced Death Over Faith in N.H. Russell Simmons, LL Cool J Visit Youth at Jail Raw: Obama Gets Hug From Special Olympian US, UN Announce Deal on Gaza Cease-Fire Despite Moratorium, Detroit Water Worries Remain Faith Leaders Arrested at DC Deportation Protest
Facebook
Hyperlocal Search
Premier Guide
Find a business

Walking Fingers
Maps, Menus, Store hours, Coupons, and more...
Premier Guide
Poll

Upon completion and reopening of Third Street, should the City of Knoxville wait to start the next stage of the Streetscape and Infrastructure project until 2015?

Yes
No
     View Results