TECH How a Secret Cyberwar Program Worked - Stuxnet

alchemike

Veteran Member
http://www.nytimes.com/2012/06/01/w...d-wave-of-cyberattacks-against-iran.html?_r=1

June 1, 2012
Obama Order Sped Up Wave of Cyberattacks Against Iran
By DAVID E. SANGER

WASHINGTON — From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.

Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.

At a tense meeting in the White House Situation Room within days of the worm’s “escape,” Mr. Obama, Vice President Joseph R. Biden Jr. and the director of the Central Intelligence Agency at the time, Leon E. Panetta, considered whether America’s most ambitious attempt to slow the progress of Iran’s nuclear efforts had been fatally compromised.

“Should we shut this thing down?” Mr. Obama asked, according to members of the president’s national security team who were in the room.

Told it was unclear how much the Iranians knew about the code, and offered evidence that it was still causing havoc, Mr. Obama decided that the cyberattacks should proceed. In the following weeks, the Natanz plant was hit by a newer version of the computer worm, and then another after that. The last of that series of attacks, a few weeks after Stuxnet was detected around the world, temporarily took out nearly 1,000 of the 5,000 centrifuges Iran had spinning at the time to purify uranium.

This account of the American and Israeli effort to undermine the Iranian nuclear program is based on interviews over the past 18 months with current and former American, European and Israeli officials involved in the program, as well as a range of outside experts. None would allow their names to be used because the effort remains highly classified, and parts of it continue to this day.

These officials gave differing assessments of how successful the sabotage program was in slowing Iran’s progress toward developing the ability to build nuclear weapons. Internal Obama administration estimates say the effort was set back by 18 months to two years, but some experts inside and outside the government are more skeptical, noting that Iran’s enrichment levels have steadily recovered, giving the country enough fuel today for five or more weapons, with additional enrichment.

Whether Iran is still trying to design and build a weapon is in dispute. The most recent United States intelligence estimate concludes that Iran suspended major parts of its weaponization effort after 2003, though there is evidence that some remnants of it continue.

Iran initially denied that its enrichment facilities had been hit by Stuxnet, then said it had found the worm and contained it. Last year, the nation announced that it had begun its own military cyberunit, and Brig. Gen. Gholamreza Jalali, the head of Iran’s Passive Defense Organization, said that the Iranian military was prepared “to fight our enemies” in “cyberspace and Internet warfare.” But there has been scant evidence that it has begun to strike back.

The United States government only recently acknowledged developing cyberweapons, and it has never admitted using them. There have been reports of one-time attacks against personal computers used by members of Al Qaeda, and of contemplated attacks against the computers that run air defense systems, including during the NATO-led air attack on Libya last year. But Olympic Games was of an entirely different type and sophistication.

It appears to be the first time the United States has repeatedly used cyberweapons to cripple another country’s infrastructure, achieving, with computer code, what until then could be accomplished only by bombing a country or sending in agents to plant explosives. The code itself is 50 times as big as the typical computer worm, Carey Nachenberg, a vice president of Symantec, one of the many groups that have dissected the code, said at a symposium at Stanford University in April. Those forensic investigations into the inner workings of the code, while picking apart how it worked, came to no conclusions about who was responsible.

A similar process is now under way to figure out the origins of another cyberweapon called Flame that was recently discovered to have attacked the computers of Iranian officials, sweeping up information from those machines. But the computer code appears to be at least five years old, and American officials say that it was not part of Olympic Games. They have declined to say whether the United States was responsible for the Flame attack.

Mr. Obama, according to participants in the many Situation Room meetings on Olympic Games, was acutely aware that with every attack he was pushing the United States into new territory, much as his predecessors had with the first use of atomic weapons in the 1940s, of intercontinental missiles in the 1950s and of drones in the past decade. He repeatedly expressed concerns that any American acknowledgment that it was using cyberweapons — even under the most careful and limited circumstances — could enable other countries, terrorists or hackers to justify their own attacks.

“We discussed the irony, more than once,” one of his aides said. Another said that the administration was resistant to developing a “grand theory for a weapon whose possibilities they were still discovering.” Yet Mr. Obama concluded that when it came to stopping Iran, the United States had no other choice.

If Olympic Games failed, he told aides, there would be no time for sanctions and diplomacy with Iran to work. Israel could carry out a conventional military attack, prompting a conflict that could spread throughout the region.

A Bush Initiative

The impetus for Olympic Games dates from 2006, when President George W. Bush saw few good options in dealing with Iran. At the time, America’s European allies were divided about the cost that imposing sanctions on Iran would have on their own economies. Having falsely accused Saddam Hussein of reconstituting his nuclear program in Iraq, Mr. Bush had little credibility in publicly discussing another nation’s nuclear ambitions. The Iranians seemed to sense his vulnerability, and, frustrated by negotiations, they resumed enriching uranium at an underground site at Natanz, one whose existence had been exposed just three years before.

Iran’s president, Mahmoud Ahmadinejad, took reporters on a tour of the plant and described grand ambitions to install upward of 50,000 centrifuges. For a country with only one nuclear power reactor — whose fuel comes from Russia — to say that it needed fuel for its civilian nuclear program seemed dubious to Bush administration officials. They feared that the fuel could be used in another way besides providing power: to create a stockpile that could later be enriched to bomb-grade material if the Iranians made a political decision to do so.

Hawks in the Bush administration like Vice President Dick Cheney urged Mr. Bush to consider a military strike against the Iranian nuclear facilities before they could produce fuel suitable for a weapon. Several times, the administration reviewed military options and concluded that they would only further inflame a region already at war, and would have uncertain results.

For years the C.I.A. had introduced faulty parts and designs into Iran’s systems — even tinkering with imported power supplies so that they would blow up — but the sabotage had had relatively little effect. General James E. Cartwright, who had established a small cyberoperation inside the United States Strategic Command, which is responsible for many of America’s nuclear forces, joined intelligence officials in presenting a radical new idea to Mr. Bush and his national security team. It involved a far more sophisticated cyberweapon than the United States had designed before.

The goal was to gain access to the Natanz plant’s industrial computer controls. That required leaping the electronic moat that cut the Natanz plant off from the Internet — called the air gap, because it physically separates the facility from the outside world. The computer code would invade the specialized computers that command the centrifuges.

The first stage in the effort was to develop a bit of computer code called a beacon that could be inserted into the computers, which were made by the German company Siemens and an Iranian manufacturer, to map their operations. The idea was to draw the equivalent of an electrical blueprint of the Natanz plant, to understand how the computers control the giant silvery centrifuges that spin at tremendous speeds. The connections were complex, and unless every circuit was understood, efforts to seize control of the centrifuges could fail.

Eventually the beacon would have to “phone home” — literally send a message back to the headquarters of the National Security Agency that would describe the structure and daily rhythms of the enrichment plant. Expectations for the plan were low; one participant said the goal was simply to “throw a little sand in the gears” and buy some time. Mr. Bush was skeptical, but lacking other options, he authorized the effort.

Breakthrough, Aided by Israel

It took months for the beacons to do their work and report home, complete with maps of the electronic directories of the controllers and what amounted to blueprints of how they were connected to the centrifuges deep underground.

Then the N.S.A. and a secret Israeli unit respected by American intelligence officials for its cyberskills set to work developing the enormously complex computer worm that would become the attacker from within.

The unusually tight collaboration with Israel was driven by two imperatives. Israel’s Unit 8200, a part of its military, had technical expertise that rivaled the N.S.A.’s, and the Israelis had deep intelligence about operations at Natanz that would be vital to making the cyberattack a success. But American officials had another interest, to dissuade the Israelis from carrying out their own pre-emptive strike against the Iranian nuclear facilities. To do that, the Israelis would have to be convinced that the new line of attack was working. The only way to convince them, several officials said in interviews, was to have them deeply involved in every aspect of the program.

Soon the two countries had developed a complex worm that the Americans called “the bug.” But the bug needed to be tested. So, under enormous secrecy, the United States began building replicas of Iran’s P-1 centrifuges, an aging, unreliable design that Iran purchased from Abdul Qadeer Khan, the Pakistani nuclear chief who had begun selling fuel-making technology on the black market. Fortunately for the United States, it already owned some P-1s, thanks to the Libyan dictator, Col. Muammar el-Qaddafi.

When Colonel Qaddafi gave up his nuclear weapons program in 2003, he turned over the centrifuges he had bought from the Pakistani nuclear ring, and they were placed in storage at a weapons laboratory in Tennessee. The military and intelligence officials overseeing Olympic Games borrowed some for what they termed “destructive testing,” essentially building a virtual replica of Natanz, but spreading the test over several of the Energy Department’s national laboratories to keep even the most trusted nuclear workers from figuring out what was afoot.

Those first small-scale tests were surprisingly successful: the bug invaded the computers, lurking for days or weeks, before sending instructions to speed them up or slow them down so suddenly that their delicate parts, spinning at supersonic speeds, self-destructed. After several false starts, it worked. One day, toward the end of Mr. Bush’s term, the rubble of a centrifuge was spread out on the conference table in the Situation Room, proof of the potential power of a cyberweapon. The worm was declared ready to test against the real target: Iran’s underground enrichment plant.

“Previous cyberattacks had effects limited to other computers,” Michael V. Hayden, the former chief of the C.I.A., said, declining to describe what he knew of these attacks when he was in office. “This is the first attack of a major nature in which a cyberattack was used to effect physical destruction,” rather than just slow another computer, or hack into it to steal data.

“Somebody crossed the Rubicon,” he said.

Getting the worm into Natanz, however, was no easy trick. The United States and Israel would have to rely on engineers, maintenance workers and others — both spies and unwitting accomplices — with physical access to the plant. “That was our holy grail,” one of the architects of the plan said. “It turns out there is always an idiot around who doesn’t think much about the thumb drive in their hand.”

In fact, thumb drives turned out to be critical in spreading the first variants of the computer worm; later, more sophisticated methods were developed to deliver the malicious code.

The first attacks were small, and when the centrifuges began spinning out of control in 2008, the Iranians were mystified about the cause, according to intercepts that the United States later picked up. “The thinking was that the Iranians would blame bad parts, or bad engineering, or just incompetence,” one of the architects of the early attack said.

The Iranians were confused partly because no two attacks were exactly alike. Moreover, the code would lurk inside the plant for weeks, recording normal operations; when it attacked, it sent signals to the Natanz control room indicating that everything downstairs was operating normally. “This may have been the most brilliant part of the code,” one American official said.

Later, word circulated through the International Atomic Energy Agency, the Vienna-based nuclear watchdog, that the Iranians had grown so distrustful of their own instruments that they had assigned people to sit in the plant and radio back what they saw.

“The intent was that the failures should make them feel they were stupid, which is what happened,” the participant in the attacks said. When a few centrifuges failed, the Iranians would close down whole “stands” that linked 164 machines, looking for signs of sabotage in all of them. “They overreacted,” one official said. “We soon discovered they fired people.”

Imagery recovered by nuclear inspectors from cameras at Natanz — which the nuclear agency uses to keep track of what happens between visits — showed the results. There was some evidence of wreckage, but it was clear that the Iranians had also carted away centrifuges that had previously appeared to be working well.

But by the time Mr. Bush left office, no wholesale destruction had been accomplished. Meeting with Mr. Obama in the White House days before his inauguration, Mr. Bush urged him to preserve two classified programs, Olympic Games and the drone program in Pakistan. Mr. Obama took Mr. Bush’s advice.

The Stuxnet Surprise

Mr. Obama came to office with an interest in cyberissues, but he had discussed them during the campaign mostly in terms of threats to personal privacy and the risks to infrastructure like the electrical grid and the air traffic control system. He commissioned a major study on how to improve America’s defenses and announced it with great fanfare in the East Room.

What he did not say then was that he was also learning the arts of cyberwar. The architects of Olympic Games would meet him in the Situation Room, often with what they called the “horse blanket,” a giant foldout schematic diagram of Iran’s nuclear production facilities. Mr. Obama authorized the attacks to continue, and every few weeks — certainly after a major attack — he would get updates and authorize the next step. Sometimes it was a strike riskier and bolder than what had been tried previously.

“From his first days in office, he was deep into every step in slowing the Iranian program — the diplomacy, the sanctions, every major decision,” a senior administration official said. “And it’s safe to say that whatever other activity might have been under way was no exception to that rule.”

But the good luck did not last. In the summer of 2010, shortly after a new variant of the worm had been sent into Natanz, it became clear that the worm, which was never supposed to leave the Natanz machines, had broken free, like a zoo animal that found the keys to the cage. It fell to Mr. Panetta and two other crucial players in Olympic Games — General Cartwright, the vice chairman of the Joint Chiefs of Staff, and Michael J. Morell, the deputy director of the C.I.A. — to break the news to Mr. Obama and Mr. Biden.

An error in the code, they said, had led it to spread to an engineer’s computer when it was hooked up to the centrifuges. When the engineer left Natanz and connected the computer to the Internet, the American- and Israeli-made bug failed to recognize that its environment had changed. It began replicating itself all around the world. Suddenly, the code was exposed, though its intent would not be clear, at least to ordinary computer users.

“We think there was a modification done by the Israelis,” one of the briefers told the president, “and we don’t know if we were part of that activity.”

Mr. Obama, according to officials in the room, asked a series of questions, fearful that the code could do damage outside the plant. The answers came back in hedged terms. Mr. Biden fumed. “It’s got to be the Israelis,” he said. “They went too far.”

In fact, both the Israelis and the Americans had been aiming for a particular part of the centrifuge plant, a critical area whose loss, they had concluded, would set the Iranians back considerably. It is unclear who introduced the programming error.

The question facing Mr. Obama was whether the rest of Olympic Games was in jeopardy, now that a variant of the bug was replicating itself “in the wild,” where computer security experts can dissect it and figure out its purpose.

“I don’t think we have enough information,” Mr. Obama told the group that day, according to the officials. But in the meantime, he ordered that the cyberattacks continue. They were his best hope of disrupting the Iranian nuclear program unless economic sanctions began to bite harder and reduced Iran’s oil revenues.

Within a week, another version of the bug brought down just under 1,000 centrifuges. Olympic Games was still on.

A Weapon’s Uncertain Future

American cyberattacks are not limited to Iran, but the focus of attention, as one administration official put it, “has been overwhelmingly on one country.” There is no reason to believe that will remain the case for long. Some officials question why the same techniques have not been used more aggressively against North Korea. Others see chances to disrupt Chinese military plans, forces in Syria on the way to suppress the uprising there, and Qaeda operations around the world. “We’ve considered a lot more attacks than we have gone ahead with,” one former intelligence official said.

Mr. Obama has repeatedly told his aides that there are risks to using — and particularly to overusing — the weapon. In fact, no country’s infrastructure is more dependent on computer systems, and thus more vulnerable to attack, than that of the United States. It is only a matter of time, most experts believe, before it becomes the target of the same kind of weapon that the Americans have used, secretly, against Iran.

This article is adapted from “Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power,” to be published by Crown on Tuesday.
 

raven

TB Fanatic
How is this not a declaration of war?

Well, because it was not declared.
It is an act of war - whether it is or isn't is really solely up to Iran
well maybe not - I guess the UN could say it - but neither will

Iran could very well file suit in international court for damages.
 

Adino

paradigm shaper
Exactly what i was thinking...

o)<

mike

Me three.

Do they really expect to make this announcement and not have Iran/Russia do something about this?

What kinda stupid throws an admission like this out there?

eta: iirc hasn't there been a warning about grid hack attacks here in CONUS by Iran if we were to do something that they considered an act of war?
 

Heliobas Disciple

TB Fanatic
How is this not a declaration of war?

Exactly what i was thinking...

Me three.

Me four.

ETA: Is O so desperate to appear like he's 'winning' the war on terror for campaign reasons that he is boasting and bragging about things that should never have been released publically? He just admitted doing a cyberattack on a sovereign nation. ?!

Between this admission and the whole 8 page NYT Drone article - the word 'amateur' doesn't even begin to describe it. Oh and throw in the General who said we were parachuting into NK - that's 3 war 'secrets' that had no business being made public.

HD
 

alchemike

Veteran Member
This story also comes out right on the heels of the newly discovered flame/skywiper virus...
Hmmmm...

o)<

mike
 

Heliobas Disciple

TB Fanatic
ETA: Is O so desperate to appear like he's 'winning' the war on terror for campaign reasons that he is boasting and bragging about things that should never have been released publically? He just admitted doing a cyberattack on a sovereign nation. ?!

Between this admission and the whole 8 page NYT Drone article - the word 'amateur' doesn't even begin to describe it. Oh and throw in the General who said we were parachuting into NK - that's 3 war 'secrets' that had no business being made public.

HD

Quoting myself because I just found this blog post/article that agrees with the sentiment and says it so much better than I could have.

http://hotair.com/archives/2012/06/02/cnn-why-cant-the-white-house-keep-a-secret/
(fair use applies)

An even better question
: do they want to keep secrets? Adam Levine analyzes the Stuxnet leak, as well as other recent leaks, and asks why this administration has suddenly turned into a sieve:

The level of detail spilling out through media reports about crucial national security operations is raising the question of whether President Barack Obama’s administration can keep a secret – or in some cases even wants to.

In just the past week, two tell-all articles about Obama’s leadership as commander-in-chief have been published, dripping with insider details about his sleeves-rolled-up involvement in choosing terrorist targets for drone strikes and revelations about his amped-up cyber war on Iran.

Each article notes the reporters spoke to “current and former” American officials and presidential advisers, as well as sources from other countries.

“This is unbelievable … absolutely stunning,” a former senior intelligence official said about the level of detail contained in the cyberattack story.

The official noted that the article cited participants in sensitive White House meetings who then told the reporter about top secret discussions. The article “talks about President Obama giving direction for a cyberweapons attack during a time of peace against a United Nations member state.”

The article follows on the heels of what many considered dangerous leaking of details about a mole who helped foil a plot by al Qaeda in Yemen. The revelations of the British national threatened what was described at the time as an ongoing operation.


Is this really such a mystery? The White House has been leaking classified material for over a year, as long as it make Obama himself look awesome. The most ridiculous part of this particular leak is that the cyberattack plan came from the Bush administration and their partnership with Israel; Obama wisely chose to continue the program, but didn’t originate it. The leakers made sure that the New York Times and Washington Post gave Obama the headlines, though, mentioning Bush’s involvement only as a subsidiary fact to Obama’s alpha-male status.

This leak will complicate matters for the next administration, as CNN explains below. Now that we’ve committed acts of cyberwarfare and have begun bragging about it, allies with more vulnerability than the US — such as Israel — might think twice about assisting us in the future. It’s almost certainly going to complicate whatever negotiations take place with rogue nations in the future that might otherwise be inclined to reform. But hey, as long as Obama can make himself look good, then why worry, right?

(go to link for video from CNN)


Update: Senators Marco Rubio, Richard Burr, and Dan Coats blast the White House for their lack of discretion in today’s Washington Post:

Sitting in a prison cell in Pakistan is one of those foreigners who trusted us. Shakil Afridiserved as a key informant to the United States in the raid that killed Osama bin Laden. This brave physician put his life on the line to assist U.S. efforts to track down the most-wanted terrorist in the world, yet our government left him vulnerable to the Pakistani tribal justice system, which sentenced him to 33 years for treason. The imprisonment and possible torture of this courageous man — for aiding the United States in one of the most important intelligence operations of our time — coincides with a deeply damaging leak in another case.

The world learned a few weeks ago that U.S. intelligence agencies and partners had disrupted an al-Qaeda plot to blow up a civilian aircraft using an explosive device designed by an affiliate in Yemen. This disclosure revealed sources and methods that could make future successes more difficult to achieve. The public release of information surrounding such operations also risks the lives of informants and makes it more difficult to maintain productive partnerships with other intelligence agencies. These incidents paint a disappointing picture of this administration’s judgment when it comes to national security.

The stakes are high: success or failure in our campaign to defeat plots by al-Qaeda. These leaks are inexcusable, and those responsible should be held accountable. FBI and CIA investigations are a good start, but more must be done to prevent intelligence disclosures of this magnitude.

The problem stems in part from the media’s insatiable desire for real-world information that makes intelligence operations look like those of filmmakers’ imaginations. That is understandable, but this hunger is fed by inexcusable contributions from current and former U.S. officials.
 

Heliobas Disciple

TB Fanatic
Here are the two articles referred to above:

http://security.blogs.cnn.com/2012/06/01/loose-lips-and-the-obama-national-security-ship/?hpt=hp_c1
(fair use applies)

Loose lips and the Obama national security ship
By Adam Levine, with reporting from Pam Benson and Ann Colwell
June 1st, 2012
07:09 PM ET

The level of detail spilling out through media reports about crucial national security operations is raising the question of whether President Barack Obama's administration can keep a secret - or in some cases even wants to.

In just the past week, two tell-all articles about Obama's leadership as commander-in-chief have been published, dripping with insider details about his sleeves-rolled-up involvement in choosing terrorist targets for drone strikes and revelations about his amped-up cyber war on Iran.

Each article notes the reporters spoke to "current and former" American officials and presidential advisers, as well as sources from other countries.

"This is unbelievable ... absolutely stunning," a former senior intelligence official said about the level of detail contained in the cyberattack story.

The official noted that the article cited participants in sensitive White House meetings who then told the reporter about top secret discussions. The article "talks about President Obama giving direction for a cyberweapons attack during a time of peace against a United Nations member state."

The article follows on the heels of what many considered dangerous leaking of details about a mole who helped foil a plot by al Qaeda in Yemen. The revelations of the British national threatened what was described at the time as an ongoing operation.

"The leak really did endanger sources and methods," Sen. Dianne Feinstein, D-California and chair of the Intelligence Committee, told Fox News.

The Yemen plot had many intelligence and national security officials flummoxed and angered by its public airing. Despite that, a senior administration official then briefed network counterterrorism analysts, including CNN's Frances Townsend, about parts of the operation.

But such briefings are an "obligation" for the administration once a story like the Yemen plot is publicized, insisted National Security Council spokesman Tommy Vietor.

"The reason that we brief former counterterrorism officials is because they are extremely conscientious about working with us about what can and cannot be said or disclosed," Vietor told Security Clearance. "They understand that there is an obligation for the U.S. to be transparent with American people about potential threats but will work with us to protect operational equities because they've walked in our shoes."

Subsequently, the intelligence committee initiated a review of its agencies to assess the leak. The FBI launched an investigation as well.

Perhaps the highest profile intelligence coup for the administration, the killing of Osama bin Laden, was followed almost immediately by criticism of how much detail was leaking out. Then-Secretary of Defense Robert Gates complained that after officials agreed in the Situation Room not to reveal operational details, it was mere hours before that agreement was broken.

"The leaks that followed the successful bin Laden mission led to the arrest of Pakistanis and put in danger the mission's heroes and their families," Rep. Peter King, R-New York, said in an interview on CNN's "Erin Burnett OutFront."

Questions were raised about why details of documents and other articles that were seized during the raid were discussed even before the intelligence community had time to review what they were holding.

Leon Panetta, who at the time was the director of the CIA and is now the defense secretary, penned a letter to CIA staff warning against loose lips.

In the letter, obtained by CNN, Panetta wrote that the operation, "led to an unprecedented amount of very sensitive - in fact, classified - information making its way into the press."

"Disclosure of classified information to anyone not cleared for it - reporters, friends, colleagues in the private sector or other agencies, former agency officers - does tremendous damage to our work. At worst, leaks endanger lives," the letter said.

In the latest case, the White House denied it was orchestrating the leak. Asked Friday if the Times' story detailing the cyberattack on Iran was an "authorized leak," White House spokesman Josh Earnest disagreed "in the strongest possible terms."

"That information is classified for a reason. Publicizing it would pose a threat to our national security," Earnest told reporters.

But the White House has tried to be more open about what have been secretive programs. The president himself became the first administration official to acknowledge U.S. drones were conducting attacks in Pakistan when he made a comment to a supporter in an online chat, even though officials through all the years of the program had never said publicly they were being conducted.

Then, in April, the president's assistant for homeland security and counterterrorism, John Brennan, publicly blew the cover off the drone program, saying in a speech that "yes, in full accordance with the law - and in order to prevent terrorist attacks on the United States and to save American lives - the United States government conducts targeted strikes against specific al Qaeda terrorists, sometimes using remotely piloted aircraft, often referred to publicly as drones."

But that speech, Vietor told CNN's Security Clearance last month, was carefully considered for how revealing it could be.

"I'm not going to get into internal deliberations, but as a general matter we obviously push to be as transparent as we can while being mindful of our national security equities," Vietor said.


http://www.washingtonpost.com/opini...t-be-plugged/2012/05/31/gJQAr2RQ5U_story.html
(fair use applies)

National-security leaks must be plugged
By Dan Coats, Richard Burr and Marco Rubio, The Washington Post
5/31/12


Espionage is a dangerous business often seen only through a Hollywood lens. Yet the real-world operations, and lives, that inspire such thrillers are highly perishable. They depend on hundreds of hours of painstaking work and the ability to get foreigners to trust our government.

Sitting in a prison cell in Pakistan is one of those foreigners who trusted us. Shakil Afridi served as a key informant to the United States in the raid that killed Osama bin Laden. This brave physician put his life on the line to assist U.S. efforts to track down the most-wanted terrorist in the world, yet our government left him vulnerable to the Pakistani tribal justice system, which sentenced him to 33 years for treason. The imprisonment and possible torture of this courageous man — for aiding the United States in one of the most important intelligence operations of our time — coincides with a deeply damaging leak in another case.

The world learned a few weeks ago that U.S. intelligence agencies and partners had disrupted an al-Qaeda plot to blow up a civilian aircraft using an explosive device designed by an affiliate in Yemen. This disclosure revealed sources and methods that could make future successes more difficult to achieve. The public release of information surrounding such operations also risks the lives of informants and makes it more difficult to maintain productive partnerships with other intelligence agencies. These incidents paint a disappointing picture of this administration’s judgment when it comes to national security.

The stakes are high: success or failure in our campaign to defeat plots by al-Qaeda. These leaks are inexcusable, and those responsible should be held accountable. FBI and CIA investigations are a good start, but more must be done to prevent intelligence disclosures of this magnitude.

The problem stems in part from the media’s insatiable desire for real-world information that makes intelligence operations look like those of filmmakers’ imaginations. That is understandable, but this hunger is fed by inexcusable contributions from current and former U.S. officials.

For example, why did the Obama administration hold a conference call May 7 with a collection of former government officials, some of whom work as TV contributors and analysts, to discuss the foiled bomb threat? In doing so, the White House failed to safeguard sensitive intelligence information that gave us an advantage over an adversary. Broadcasting highly classified information notifies every enemy of our tactics and every current and future partner of our inability to provide them the secrecy that often is the difference between life and death.

An underlying problem that can and must be fixed is the role of former national security officials who leave government and take jobs as talking heads for television networks. This common transition should be examined by Congress. Media outlets understandably value such officials because of their influential contacts, insights on security topics, and the provocative details and analysis they can add to a broadcast.

When they leave Capitol Hill, former members of Congress and their staff are, by law, prohibited from petitioning their former congressional colleagues for up to two years. Yet nothing restricts former security officials from using their government contacts and experience to provide live commentary on breaking news stories.

Furthermore, nothing limits current officials from using their media contacts to control a story — or to even promote a big-budget movie. We were shocked to learn that the White House has also leaked classified details of the bin Laden raid to Hollywood filmmakers, including the confidential identities of elite U.S. military personnel.

In almost all areas, we believe in the public’s right to full information. But national security often requires that intelligence operations remain under wraps. This can be the case especially when an operation has been a spectacular success and thus is enticing to the media.

As members of the Senate intelligence committee, we are exploring proposals to tighten restrictions on the way those who work in national security can exploit their contacts and experience after leaving public service so that damaging disclosures of intelligence do not occur. The keepers of our secrets need to be held to stricter standards. Of course, any congressional action must strike the proper balance of protecting First Amendment freedoms while safeguarding the intelligence that keeps our country safe.

Reckless disclosures of top-secret information compromise national security operations, undermine the hard work of our intelligence officers and overseas partners, and risk innocent lives. Congress’s intelligence oversight committees will not tolerate it, nor should the American people.

Dan Coats, Richard Burr and Marco Rubio, all Republicans, represent Indiana, North Carolina and Florida, respectively, in the U.S. Senate and are members of the Senate Select Committee on Intelligence.
 

Wildweasel

F-4 Phantoms Phorever
... "Is this really such a mystery? The White House has been leaking classified material for over a year, as long as it make Obama himself look awesome." ...

A move made by politicians who find themselves looking weak on defense; leaking secrets to make themselves look better on the military issue while weakening the US military by leaking the sevrets.

President Johnson revealing the existence of the SR-71 to blunt Goldwater's charges of Johnson being weak on defense. President Carter revealing the existence of the development of stealth aircraft programs to try and blunt Reagan's charges of Carter being weak on defense.

Both were cases of the existence of very classified programs that gave the Soviet Union a heads-up on what areas of research they needed to pursue to counter our newest weapons. The head start they got in both cases was in the realm of years.

It would have been like back in 1942, Rosevelt telling the Japanese we were building atomic bombs and were going to drop them using B-29s flying solo missions, not the usual mass formations American bombers used. You could bet that come 1945 any B-29 that flew into Japanese airspace by itself would be sure to get shot down.

Johnson's leak alerted the Russians that they needed to keep going with their Mig 25 Foxbat development program. That even though they thought to cancel the Foxbat after the US cancelled the B-70 bomber the Foxbat was specifically designed to intercept.

Carter's leak spurred the Russians to develop their latest series of surface-to-air (SAM) missile systems. The resulting S-300 and S-400 SAMs are extremely deadly to the US military's non-stealth aircraft and are being sold world-wide to Russian client states. Whether they are deadly to stealth bombers is probably the next secret Obobo will blab try and to gain votes.

Meanwhile, this leak tells America's opponents a whole lot about how to prevent and contain future such attacks on their systems. We can only hope their people are as dumb and stubborn regarding computer security as our folks are, so future attacks will be successful.

Contaminated thumb drives have bitten both sides and supposedly trained, intelligent, personnel were the ones who plugged them into the affected computers, not some Mission Impossible team sneaking into the facilities to carry out the attacks. Just get a batch of thumbdrives with the virus loaded on them into the computer stores near the target and unsuspecting workers will do the job themselves.

WW
 

knepper

Veteran Member
Larry Klayman has a good article on WND today where he blasts Zero for committing high treason by deliberately leaking this top secret information. This might have been the best chance we had at stopping Iran's nuclear program, and the Mansourian Candidate scuttled the program by letting the enemy know how it works.
If they succeed in developing a nuke and detonate it on a bunch of innocents, Obama will be partly to blame.
 
Top