Pharos-Tribune

Community News Network

August 29, 2013

US spying successes, failures, objectives detailed in top secret 'black budget'

(Continued)

WASHINGTON —

— The CIA and NSA have launched aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as "offensive cyber operations."

— The NSA planned to investigate at least 4,000 possible insider threats in 2013, cases in which the agency suspected sensitive information may have been compromised by one of its own. The budget documents show that the U.S. intelligence community has sought to strengthen its ability to detect what it calls "anomalous behavior" by personnel with access to highly classified material.

— U.S. intelligence officials take an active interest in foes as well as friends. Pakistan is described in detail as an "intractable target," and counterintelligence operations "are strategically focused against [the] priority targets of China, Russia, Iran, Cuba and Israel."

— In words, deeds and dollars, intelligence agencies remain fixed on terrorism as the gravest threat to national security, which is listed first among five "mission objectives." Counterterrorism programs employ one in four members of the intelligence workforce and account for one-third of all spending.

— The governments of Iran, China and Russia are difficult to penetrate, but North Korea's may be the most opaque. There are five "critical" gaps in U.S. intelligence about Pyongyang's nuclear and missile programs, and analysts know virtually nothing about the intentions of North Korean leader Kim Jong Un.

Formally known as the Congressional Budget Justification for the National Intelligence Program, the "Top Secret" blueprint represents spending levels proposed to the House and Senate intelligence committees in February 2012. Congress may have made changes before the fiscal year began on Oct 1. Clapper is expected to release the actual total spending figure after the fiscal year ends on Sept. 30.

The document describes a constellation of spy agencies that track millions of individual surveillance targets and carry out operations that include hundreds of lethal strikes. They are organized around five priorities: combating terrorism, stopping the spread of nuclear and other unconventional weapons, warning U.S. leaders about critical events overseas, defending against foreign espionage and conducting cyber operations.

Text Only | Photo Reprints
Community News Network
Hyperlocal Search
Premier Guide
Find a business

Walking Fingers
Maps, Menus, Store hours, Coupons, and more...
Premier Guide
Poll

The Pence administration continues to cut Indiana agency budgets despite a state surplus of $2 billion. Is this wise management of state funds?

Yes
No
Not sure
     View Results
Featured Ads
AP Video
Judge Ponders Overturning Colo. Gay Marriage Ban Airlines Halt Travel to Israel Amid Violence NYPD Chief Calls for 'use of Force' Retraining VA Nominee McDonald Goes Before Congress Bush: Don't Worry, Sugarland Isn't Breaking Up US Official: Most Migrant Children to Be Removed Police Probing Brooklyn Bridge Flag Switch CDC Head Concerned About a Post-antibiotic Era Raw: First Lady Says `Drink Up' More Water Courts Conflicted Over Healthcare Law Holder Urges Bipartisanship on Immigration Raw: Truck, Train Crash Leads to Fireball US Airlines Cancel Israel Flights Obama Signs Workforce Training Law Crash Victims' Remains Reach Ukraine-held City Diplomatic Push Intensifies to End War in Gaza Cat Fans Lap Up Feline Film Festival Michigan Plant's Goal: Flower and Die Veteran Creates Job During High Unemployment
Parade
Magazine

Click HERE to read all your Parade favorites including Hollywood Wire, Celebrity interviews and photo galleries, Food recipes and cooking tips, Games and lots more.