Phase Zero: Week in Review 4.17.15

The following posts appeared on Phase Zero this week:

Memo: Saudi Arabia in Charge of Stopping Money Flow to ISIS!

The Creepy New Security Credit Score for Spotting “Insider Threats”

Why is CENTCOM so stupid?

Memo: How CENTCOM Gets It Done

ISIS, Mexico, How News Circulates and What’s Fucked Up About Gawker

The Creepy New Security Credit Score for Spotting “Insider Threats”

“Almost two years after Edward Snowden climbed the world stage, the intelligence community is just now putting the finishing touches on a computer-driven system for catching insider threats– one that promises not just to detect future Snowdens and Mannings in the act, but also to predict who the next leakers will be.

The new method, meant to identify leakers of classified information but also homegrown terrorists, drug financiers, school ground shooters, and even sexual predators, builds the security equivalent of a “credit score.” It would secretly attach to every individual, while automatically generating and changing scores as behaviors and associations trigger indicators of anomalous activity.”

Read more on Phase Zero.

Edward Snowden[Photo: AP Images]

 

John Brennan Can’t see the Ground from the Ivory Tower

CIA Director John Brennan spoke at the Kennedy School of Government at Harvard on Tuesday. As per usual, I have opinions regarding his speech, and I’ve published a post on Phase Zero to that effect. I hope you’ll find it thoughtful. Read it here.

Washington Post Ninja Warriors

William M. Arkin

Monday, June 5, 2000

“We should be proud of the men and women of our armed forces who stopped the ethnic cleansing in Kosovo, enabling a million people to return to their homes,” President Clinton said in his State of the Union address in January. The president then proceeded to place Capt. John Cherrey’s life in danger.

Cherrey flew the airplane involved in the rescue of a downed F-16 inside Yugoslavia in April 1999 and was invited by the White House to sit in the Capitol balcony during the president’s annual speech. Introduced by Clinton, he stood up for all the world to see.

Clinton got his Reagan-like moment of fake intimacy with a member of the armed services, but security types in the Pentagon fret that because of access to information on the Internet, service men and women are uniquely threatened by this very type of exposure. Thus they have successfully argued that the names of military people involved in combat overseas should not be revealed to thwart terrorists or just hostile individuals who could hunt down and harass military people and their families. The Pentagon says such incidents have already happened.

No Names Please

Seventy-eight days of bombing and Capt. Cherrey is the exception rather than the rule. One can count on two hands the number of pilots and aircrew who have been mentioned by name in the media during and after the war. The no-names policy was dictated by Gen. Wesley Clark, the NATO European and American commander, and supported by the White House.

But senior officers worry that because “no names” is increasingly applied to all air operations worldwide these days, the military is becoming a faceless Ninja force. They believe the anonymity harms morale and recruiting, and potentially severs the most important link between a volunteer military and the American people. The human link.

“I don’t think we want to perpetuate or foment the notion of us as disassociated anonymous mercenary warriors,” a senior public affairs officer says.

Without names, how is it that anyone can be proud of the men and women in the armed forces, as President Clinton asks? And more important, how can the public consent to the use of force when secrecy denies even the most basic information about U.S. military activities?

Fly Havoc

On the first night of Operation Allied Force, USA Today Pentagon correspondent Steven Komarow scored a journalistic coup as the first reporter to ride along in a B-52 bomber as it fired cruise missiles at Yugoslav targets. To security types, he also opened the Pandora’s box.

In Komarow’s gripping story, five of the Air Force crew members aboard Havoc 12, the 39-year-old bomber, were mentioned by name. The Air Force now says that after the story, the crew members’ families received threatening phone calls and e-mails, leading the military to decide that no more names would be used in stories about the war.

No one particularly blames Komarow, and he makes the argument as to why the military should allow names to be used. “We in the media get criticized enough for having anonymous sources,” Komarow said in December in a presentation at Scott Air Force Base in Illinois.

“We’re talking about real Americans with real hometowns with real families, real kids,” he said. “If you have no names, then we have an anonymous military.”

Anonymous and Invisible

An anonymous military, of course, goes along with anonymous military power. Warfare via cruise missile and air power is inherently remote and faceless, and that is the reason that it is also an all too frequent and standard tool for use by the government. For the White House and Defense Department leadership, secrecy is a convenient way of avoiding public debate and of perpetuating a web of covert entanglements overseas.

For the military, nevertheless, operational secrecy taken to the extreme doesn’t just protect airmen, soldiers and sailors. Excessive secrecy on top of a shrinking volunteer military guarantees that the public is denied any connection to its armed forces. An absence of human faces and stories in overseas operations, and particularly in combat, suggests not only insensitivity on the part of the bombers but also that the military has something to hide.

Without a human element, without a compelling air war story in the case of Yugoslavia last year, the Pentagon readily admits that it was always on the defensive. The United States and NATO ultimately had to cede the telling of the story on the ground to Yugoslav propagandists.

Who Was That Masked Man?

These days, since the public is buffeted by a frantic dose of new threats – human rights enforcement, terrorism, biological weapons, cyber-warfare – it is no wonder it is also constantly being told that the Pentagon is suffering recruitment and retention problems and that U.S. forces are stretched too thin. Given the supposed threats, it isn’t a surprise that we are witnessing a particularly strong season of fundraising appeals for higher military pay and a larger military share of the federal budget.

I, for one, am not sympathetic to the “hollow” military arguments. The true problem is not pay or overall spending. It is that invisible warriors are permanently imprisoned in a long list of equally nameless countries at nameless locations that for political reasons can’t even be called overseas bases anymore.

In the Middle East alone, according to a Central Command briefing, the United States maintains 439 separate “combatant” sites in seven countries from Egypt to Oman. Huge non-bases have been continuously occupied in Saudi Arabia and Kuwait for a decade, yet because of host nation “sensitivities,” we can’t officially know, and certainly can’t debate, what’s going on there.

Thus we have an anonymous and dehumanized U.S. military present at all corners of the globe. This, and an aura of military impunity, is the very genesis of the hatred and frustration that might drive someone to want to target members of the legion. Maybe in “Zorro” when people asked, “Who was that masked man?” the connotation was that good was being done. But with an invisible military, the suggestion is that something is being hidden.

Phase Zero: Spying on the U.S. Submarine That Spies For the NSA and CIA

As many of you now know, last week saw the launch of my national security site, Phase Zero, with Gawker Media. We’ll be posting some great material on that platform, and I encourage all of you to create a Kinja account in order to comment, share and above all, discuss the stories I’m hoping to bring to the public attention. My goal remains the same as it has always been: to engage, expose and explain the shadow world of spying and killing.  

Today’s story, a piece written by myself and Adam Weinstein, is timely and unique.  We’ve discovered that the submarine USS Annapolis, one of the crown jewels of the US Navy, conducts missions on behalf of the NSA and the CIA, and that it’s voyage last year included spying on Israel, Yemen, and Iran, just to name a few countries.  The story is important because of more than just exposing the capabilities of this submarine to collect on (and hack into) wireless routers and cell phones.   It’s also important because it is so rare for anyone to report, in real time, on submarine activity- that is, what they actually “do” out there, other than make port calls and participate in exercises.  These “hunter killer” submarines, as they are often called, may or may not play an important role in counter-terrorism or cyber war; they play some role.  But to appreciate their value, and thus the value of submarines in today’s world, a lot more transparency and reporting would be required.  Take a look at the story to learn more about why the Silent Service is such an integral piece of the cybersecurity realm, and why there should be more reporting tracking their stealth movements.

You can contact me at william.arkin@gawker.com, and follow us at @gawkerphasezero. If you are into the theater of being underground, you can anonymously deliver tips through the Gawker Media SecureDrop. I’ve got a book on drones coming out in July called Unmanned: Drones, Data and the Illusion of Perfect Warfare. I’m open to your input and your questions, tough questions.

The Destruction of Gilgamesh at the Mosul Museum and Why It’s about so Much More than Artifacts

The sad part of this story is that neither ISIS nor anyone in the West really understands the importance of Gilgamesh. I ruminate about this extensively in my upcoming book, Unmanned: Drones, Data, and the Illusion of Perfect Warfare. As I say in conclusion:

“The Epic of Gilgamesh is about what it means to be human. In the original Sumerian version, laid down before Babylonian times, the king finds Utanapishti and receives not just the story of the flood but also long-lost information on practices and rituals that had fallen out of use after the deluge. Gilgamesh returns to Uruk to restore the old ways and be more civilized, which means, amongst other things, ruling wisely and caring for a human community. A hero who at the beginning of the Epic is clearly closer to the gods than to ordinary mortals, a bumbling superpower labeled a “wild bull on the rampage,” grows and learns that he is not all-powerful or all-knowing, that he will not live forever. He is a man, after all, even if he is divine. Beginning and ending with stanzas that emphasize the magnificence of the walls of Uruk, the whole narrative exudes the message that what man leaves behind is his only hope for immortality.”

Gilgamesh is also a crucial black box on American drones. One of those magic devices that has convinced us that what we are doing in the war on terrorism is logical and precise. We are all-seeing; they are all-seeing. No wonder we are in an era of perpetual warfare.

Click here to pre-order your copy.

Announcing Unmanned: Drones, Data and the Illusion of Perfect Warfare

My next book, Unmanned, will be available through Little Brown (a subsidiary of Hatchette Book Group), on July 28, 2015. It is an in-depth examination of why seemingly successful wars never seem to end, as well as the impact of drones and the inevitable disconnect that occurs when wars are fought based on the need to accumulate data through any means. To read a more thorough review of the book, click here. To pre-order your copy through Amazon, click here.

Unmanned