Among the NSA documents
that have seen the light of day there are a series of articles from the NSA's
internal, private news site, SIDtoday which are being released in batches by
The Intercept. One of these internal documents from January 2004 provides
us an insider's glimpse at how the American forces were using intercepted
signals intelligence (SIGINT) in the Iraq War.
This top secret document entitled "A
Lesson in Personal Accountability" was written by Charles Berlin, the
Signals Intelligence Directorate Chief of Staff and was run in SIDtoday as part
of its "InSIDer's View of History" series (don't you just love the
clever use of the SID acronym?) with pertinent sections highlighted by me:
Mr. Berlin starts out by
recounting his experiences with signals intelligence during the Balkans War
(aka Operation Joint Endeavour) in the mid-1990s. He notes that the job
of the Signals Intelligence Directorate during the Balkans War was to select
targets for the U.S. military, providing them with a range of options for attacks.
He notes that there had "been some mistakes in previous bombings
(with civilian losses)". After personally approving the targets
provided by Mr. Berlin and his staff, the Commander in Chief, General Michael
Ryan informed Mr. Berlin that commanders now had the legal responsibility for
selecting military targets and that if a mistake was made, there was the
possibility of a war crimes charge.
In light of his
conversation with General Ryan, Mr. Berlin goes on to note the following:
"For us today this lesson
is especially important. The planning cycle for dropping a bomb has
compressed from a day to minutes and the criterion for the aiming point has
less and less review. As many of you know, our forces in Iraq are
dropping bombs on the strength of SIGINT alone. We are proud of their
confidence in us, but have you ever considered the enormous risk the commanders
are assuming in this regard? Are you ready to share that risk?" (my bold)
What SIGINT was being
used to select targets for the U.S. and coalition military forces?
According to another document from the SIDtoday internal NSA news site we
find this top secret document entitled
"The Rewards of Metadata":
As we can see from this
document, the NSA was using metadata (i.e. information about the communications
such as time, geographic location, length of call) rather than the
content of those communications) in a process that they define as "information
chaining". In one type of metadata tracking, call chaining, analysts
looked at which phone numbers were being called by phone numbers that they were
tracking, giving them even more phone numbers to track. This would allow
analysts to determine the relationships between certain groups of people (i.e.
in this case, suspected terrorists). According to the author of the
document, SID's use of communications metadata had led to the capture of
"bad guys" including al-Qaeda leader Khalid Sheikh Mohammed.
What is particularly
interesting is the volume of metadata/signals intelligence that the NSA had
collected. According to the author, the NSA's corporate call event
repository was known as FASCIA II and contained metadata records on telephone,
wireless, billing data, high-powered cordless phones and mobile over internet
protocol or MoIP. By early 2004, FASCIA II contained over 85 billion
metadata records with daily additions of 125 million records. FASCIA II
had over four years worth of online storage and it was anticipated that it
would be able to handle over 205 million metadata records daily and store up to
seven years of metadata records on-line and three years of metadata records in
storage.
All of this suggests that
the NSA was inundated with massive volumes of signals intelligence data that
had to be processed extremely quickly so that targets could be selected and
provided to coalition forces in Iraq so they could launch attacks before the
targets changed location. There was one significant fly in the ointment.
According to this document from SIDtoday in June 2004, the
NSA simply did not have enough Cryptologic Language Analysts with skills in
Arabic since that is the language of choice in the Muslim world:
Note that according to
the author, in 2004, only half of the missions that were part of the Global War
on Terror were being undertaken by NSA Crypotological Analysts that had the minimum
qualifications necessary to understand the complex communications used by the
"terrorists" that were being targeted.
Looking back to the first part of this posting, given what we know about the volume of data that the NSA was dealing with and the lack of linguistically capable analysts, it is rather shocking that the coalition forces in Iraq were comfortable using SIGINT alone to target where they wanted to drop
their bombs.
No comments:
Post a Comment