Lebanon Reporter

Z_CNHI News Service

August 29, 2013

US spying successes, failures, objectives detailed in top secret 'black budget'

(Continued)

WASHINGTON —

— The CIA and NSA have launched aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as "offensive cyber operations."

— The NSA planned to investigate at least 4,000 possible insider threats in 2013, cases in which the agency suspected sensitive information may have been compromised by one of its own. The budget documents show that the U.S. intelligence community has sought to strengthen its ability to detect what it calls "anomalous behavior" by personnel with access to highly classified material.

— U.S. intelligence officials take an active interest in foes as well as friends. Pakistan is described in detail as an "intractable target," and counterintelligence operations "are strategically focused against [the] priority targets of China, Russia, Iran, Cuba and Israel."

— In words, deeds and dollars, intelligence agencies remain fixed on terrorism as the gravest threat to national security, which is listed first among five "mission objectives." Counterterrorism programs employ one in four members of the intelligence workforce and account for one-third of all spending.

— The governments of Iran, China and Russia are difficult to penetrate, but North Korea's may be the most opaque. There are five "critical" gaps in U.S. intelligence about Pyongyang's nuclear and missile programs, and analysts know virtually nothing about the intentions of North Korean leader Kim Jong Un.

Formally known as the Congressional Budget Justification for the National Intelligence Program, the "Top Secret" blueprint represents spending levels proposed to the House and Senate intelligence committees in February 2012. Congress may have made changes before the fiscal year began on Oct 1. Clapper is expected to release the actual total spending figure after the fiscal year ends on Sept. 30.

The document describes a constellation of spy agencies that track millions of individual surveillance targets and carry out operations that include hundreds of lethal strikes. They are organized around five priorities: combating terrorism, stopping the spread of nuclear and other unconventional weapons, warning U.S. leaders about critical events overseas, defending against foreign espionage and conducting cyber operations.

Text Only
Z_CNHI News Service
Featured items
Click below to browse and order photos


Photos from June 2014

Twitter Updates
Follow us on twitter
AP Video
Six Indicted in StubHub Hacking Scheme Former NTSB Official: FAA Ban 'prudent' EPA Gets Hip With Kardashian Tweet Bodies of MH17 Victims Arrive in the Netherlands Biden Decries Voting Restrictions in NAACP Talk Broncos Owner Steps Down Due to Alzheimer's US, UN Push Shuttle Diplomacy in Mideast Trump: DC Hotel Will Be Among World's Best Plane Crashes in Taiwan, Dozens Feared Dead Republicans Hold a Hearing on IRS Lost Emails Raw: Mourners Gather As MH17 Bodies Transported Robot Parking Valet Creates Stress-free Travel Raw: Fight Breaks Out in Ukraine Parliament Disabled Veterans Memorial Nearing Completion Last Mass Lynching in U.S. Remains Unsolved Home-sharing Programs Help Seniors Ex-NYC Mayor: US Should Allow Flights to Israel
Parade
Magazine

Click HERE to read all your Parade favorites including Hollywood Wire, Celebrity interviews and photo galleries, Food recipes and cooking tips, Games and lots more.
Hyperlocal Search
Premier Guide
Find a business

Walking Fingers
Maps, Menus, Store hours, Coupons, and more...
Premier Guide