May 19, 2014 | Abuses of Power, Black Technology, Leaks

Below is a listing of nicknames and codewords related to US Signals Intelligence (SIGINT) and Communications Security (COMSEC). Most of them are from the NSA, some are from other government or military agencies. Some of them also have an abbreviation which is shown in brackets.
NICKNAMES are generally unclassified. NSA uses single word nicknames, outside NSA they usually consist of two separate words, with the first word selected from alphabetical blocks that are assigned to different agencies by the Joint Staff. Usually, nicknames are printed using all capital letters.
CODEWORDS are always classified and always consist of a single word. Active codewords, or their three-letter abbreviations, which identify a classification compartment always need to be shown in the classification or banner line. Normally, codewords are printed using all capital letters.
Due to very strict secrecy, it’s not always clear whether we see a nickname or a codeword, but terms mentioned in public sources like job descriptions are of course unclassified nicknames.
Please keep in mind that a listing like this will always be work in progress (this list has been copied on some other websites and forums, but only this one is being updated frequently!).
See also the lists of Abbreviations and Acronyms and GCHQ Nicknames and Codewords
A
ACIDWASH – Covert access point for a mobile phone network in Afghanistan
ACORN – Retired SIGINT product codeword
ACCORDIAN – Type 1 Cryptographic algorithm used in a number of crypto products
AETHER – ONI tool “to correlate seemingly disparate entities and relationships, to identify networks of interest, and to detect patterns”
AGILITY – NSA internet information tool or database
AGILEVIEW – NSA internet information tool or database
AIRGAP – Database which deals with priority DoD missions
AIRHANDLER – NSA-G operations center for producing intelligence from Afghanistan
AIRSTEED – Cell phone tracking program of the Global Access Operations (GAO)
AIRWOLF – ?
ALAMITO – The mission of Mexico at the United Nations in New York
ALPHA – Retired SIGINT Exchange Designator for Great Britain
ALTEREGO – A type of Question-Focused Dataset based on E.164
AMBERJACK – SIGINT/EW collection and exploitation system
AMBLE – Retired SIGINT product codeword
AMBULANT (AMB) – SI-ECI compartment related to the BULLRUN program
ANCHORY – NSA software system which provides web access to textual intelligence documents
ANGRYNEIGHBOR – Family of radar retro-reflector tools used by NSA’s TAO division
APALATCHEE – The EU mission in New York
APERIODIC – SI-ECI compartment related to the BULLRUN program
APEX – IP packet reconstruction tool(?)
APPLE1 – Upstream collection site
APSTARS – NSA tool that provides “semantic integration of data from multiple sources in support of intelligence processing”
ARKSTREAM – Implant used to reflash BIOS, installed by remote access or intercepted shipping
ARTIFICE – SSO corporate partner (foreign?)
AUTOSOURCE – NSA tool or database
AQUACADE – A class of SIGINT spy satellites (formerly RHYOLITE)
AQUADOR – Merchant ship tracking tool
ARCA – SIGINT Exchange Designator for ?
ARGON – Satellite mapping program
ARTIFICE – SSO corporate partner under the STORMBREW program
ASPHALT – Project to increase the volume of satellite intercepts at Menwith Hill Station
ASPHALT-PLUS – See above
ASSOCIATION – NSA analytical tool or database
ATALANTA – EU anti-piracy operation
ATLAS – CSEC database
AUNTIE – SI-ECI compartment related to the BULLRUN program
AUTO ASSOCIATION – Second party database
B
BAMBOOSPRING – ?
BANANAGLEE – Software implant that allows remote Jetplow firmware installation
BANISTER – The Columbian trade bureau in New York
BANYAN – NSA tactical geospatial correlation database
BASECOAT – Program targeting the mobile phone network on the Bahamas
BASTE – Retired SIGINT product codeword
– Type 1 Block cipher algorithm, used with many crypto products
BEACHHEAD – Computer exploit delivered by the FERRETCANON system
BEAMER – ?
BELLTOPPER – NSA database
BELLVIEW – SIGINT reporting tool
– List of personnel cleared for access to highly sensitive information or operations
BINOCULAR – Former NSA intelligence dissemination tool
BIRCHWOOD – Upstream collection site
BLACKBOOK – ODNI tool for large-scale semantic data analysis
BLACKFOOT – The French mission at the United Nations in New York
BLACKHEART – Collection through FBI implants
BLACKMAGIC – NSA database or tool
BLACKPEARL – NSA database of survey/case notations(?)
BLACKWATCH – NSA reporting tool
– Program for intercepting phone and internet traffic at switches in the US (since 1978)
BLINDDATE – Hacking tools for WLAN collection, plus GPS
BLUEANCHOR – Partner providing a network access point for the YACHTSHOP program
BLUEFISH (BLFH) – Compartment of the KLONDIKE control system
BLUEZEPHYR – Sub-program of OAKSTAR
BOOTY – Retired SIGINT product codeword
– DNI and DNR metadata visualization tool
BOURBON – Joint NSA and GCHQ program for breaking Soviet encryption codes (1946-?)
BROKENRECORD – NSA tool
BROKENTIGO – Tool for computer network operations
BROADSIDE – Covert listening post in the US embassy in Moscow
BROOMSTICK – ?
BRUNEAU – Operation against the Italian embassy in Washington DC using LIFESAVER techniques
BRUTUS – Tool or program related to MARINA
BUFFALOGREEN – The name ORANGECRUSH was known to Polish partners
BULLDOZER – PCI bus hardware implant on intercepted shipping
– An NSA COI for decryption of network communications
BULLSEYE – NSG High-Frequency Direction-Finding (HF-DF) network (now called CROSSHAIR)
(BYE) – Retired SCI control system for overhead collection systems (1961-2005)
BYZANTINE – First word of nicknames for programs involving defense against Chinese cyber-warfare and US offensive cyber-warfare
BYZANTINE ANCHOR (BA) – A group of Chinese hackers which compromised multiple US government and defense contractor systems since 2003
BYZANTINE CANDOR (BC) – A group of Chinese hackers which compromised a US-based ISP and at least one US government agency
BYZANTINE FOOTHOLD (BF) – A group of Chinese hackers who attacked various international companies and internet services providers
BYZANTINE HADES (BH) – A concerted effort against Chinese hackers who attacked the Pentagon and military contractors. Probably renamed to the LEGION-series
C
CADENCE – NSA database with tasking dictionaries
CAJABLOSSOM – Automated system for analysing and profiling internet browsing histories
CALYPSO – Remote SATCOM collection facility
CANDYGRAM – Laptop mimicking GSM cell tower, sends out SMS whenever registered target enters its area, for tracking and ID of targets
– Class of COMINT spy satellites (1968-1977)
CANOE – Retired SIGINT product codeword
CANNON LIGHT – Counterintelligence database of the US Army
CAPRICORN – (former?) database for voice data
CAPTIVATEDAUDIENCE – Computer implant plug-in to take over a targeted computer’s microphone and record conversations taking place near the device
CARBOY – Second Party satellite intercept station at Bude, England
CARBOY II – Units of ECHELON which break down satellite links into telephone and telegraph channels
CARILLON – NSA high performance computing center, since 1976 made up of IBM 360s and later four IBM 3033s
CASport – NSA user authorization service
– Computer system capable of automatically analyzing the massive quantities of data gathered across the entire intelligence community
CENTER ICE – Data center for the exchange of intelligence regarding Afghanistan among the members of the 14-Eyes/SSEUR
CENTERMASS – NSA tool or database
CERF CALL MOSES1 – Contact Event Record Format – for certain telephony metadata
CHALKFUN – Analytic tool, used to search the FASCIA database
CHASEFALCON – Major program of the Global Access Operations (GAO)
CHEER – Retired SIGINT product codeword
CHESS – Compartment of TALENT KEYHOLE for the U-2 spy plane
CHEWSTICK – NSA tool or database
CHIMNEYPOOL – Framework or specification of GENIE-compliance for hardware/software implants
CHIPPEWA – Some communications network, involving Israel
CHUTE – Retired SIGINT product codeword
CIMBRI – Probably a metadata database
CINEPLEX – NSA tool or database
CLASSIC BULLSEYE – Worldwide ocean SIGINT surveillance system (1960’s-?)
CLEVERDEVICE – Upstream collection site
CLOUD – NSA database
COASTLINE – NSA tool or database
COBALTFALCON – Sub-program of OAKSTAR
COBRA FOCUS – NSA-G operations center for producing intelligence from Iraq
COGNOS – NSA tool or database
CORDOBA – Type 2 Cryptographic algorithm used in a number of crypto chips
COMBAT SENT – Reconaissance operation
COMMONDEER – Computer exploit for looking whether a computer has security software
COMMONVIEW – NSA database or tool
CONFIRM – NSA database for personell access
CONJECTURE – Network compatible with HOWLERMONKEY
CONTRAOCTAVE – NSA telephony tasking database Used to determine ‘foreigness’
CONVEYANCE – Voice content ingest processor
COPILOT – System that automatically scans digital data for things like language, phone and creditcard numbers and attachments
COPSE – Retired SIGINT product codeword
CORALINE – NSA satellite intercept station at Sabena Seca at Puerto Rico (closed)
CORALREEF – Database for VPN crypto attack data
– A series of photographic surveillance satellites (1959-1972)
CO-TRAVELER – Set of tools for finding unknown associates of intelligence targets by tracking movements based upon cell phone locations
COTTONMOUTH (CM) – Computer implant devices used by NSA’s TAO division
COTTONMOUTH-I (CM-I) – USB hardware implant providing wireless bridge into target network and loading of exploit software onto target PCs, formerly DEWSWEEPER
COTTONMOUTH-II (CM-II) – USB hardware host tap provides covert link over USP into target’s network co-located with long haul relay; dual-stacked USB connector, consists of CM-I digital hardware plus long haul relay concealed in chassis; hub with switches is concealed in a dual stacked USB connector and hard-wired to provide intra-chassis link.
COTTONMOUTH-III (CM-III) – Radio Frequency link for commands to software implants and data infiltration/exfiltration, short range inter-chassis link within RJ45 Dual Stacked USB connector
COURIERSKILL – NSA Collection mission system
COWBOY – The DICTIONARY computer used at the Yakima station of ECHELON
CRANKSHAFT – Codename for Osama bin Laden
CREAM – Retired SIGINT product codeword
CREDIBLE – Transport of intelligence materials to partner agencies
CREST – Database that automatically translates foreign language intercepts in English
CRISSCROSS – Database of telecommunications selectors
CROSSBEAM – GSM module mating commercial Motorola cell with WagonBed controller board for collecting voice data content via GPRS (web), circuit-switched data, data over voice, and DTMF to secure facility, implanted cell tower switch
CROSSHAIR – NSG High-Frequency Direction-Finding (HF-DF) network (formerly BULLSEYE)
CROSSBONES – Analytic tool
CRUMPET – Covert network with printer, server and desktop nodes
CULTWEAVE – Smaller size SIGINT database
CYBERTRANS – A common interface to a number of underlying machine translation systems
CYCLONE Hx9 – Base station router, network in a box using Typhon interface
D
DAFF – Codeword for products of satellite imagery
DAMEON – Remote SATCOM collection facility
DANCINGOASIS (DGO) – SSO program collecting data from fiber optic cables between Europe and the Far East (since 2011)
DANDERSPRITZ – Software tool that spoofs IP and MAC addresses, intermediate redirector node
DANGERMOUSE – Tactical SIGINT collecting system for like cell phone calls
DARDANUS – Remote SATCOM collection facility
DAREDEVIL – Shooter/implant as part of the QUANTUM system
DARKTHUNDER – SSO Corporate/TAO Shaping program
DARKQUEST – Automated FORNSAT survey system
DAUNT – Retired SIGINT product codeword
DECKPIN – NSA crisis cell activated during emergencies
DEEPDIVE – An XKEYSCORE related method
DEITYBOUNCE – Provides implanted software persistence on Dell PowerEdge RAID servers via motherboard BIOS using Intel’s System Management Mode for periodic execution, installed via ArkStream to reflash the BIOS
DELTA – Former SCI control system for intercepts from Soviet military operations
DENIM – Retired SIGINT product codeword
DESPERADO – NSA software tool to prepare reports
DEWSWEEPER – Technique to tap USB hardware hosts
DIKTER – SIGINT Exchange Designator for Norway
DINAR – Retired compartment for intercepts from foreign embassies in Washington
DIONYSUS – Remote SATCOM collection facility
DIRESCALLOP – Method to circumvent commercial products that prevent malicious software from making changes to a computer system
DISCOROUTE – A tool for targeting passively collected telnet sessions
– NSA database for text messages (SMS)
DISTANTFOCUS – A pod for tactical SIGINT and precision geolocation (since 2005)
DIVERSITY – SIGINT Exchange Designator for ?
DOBIE – The South African consulate and mission at the UN in New York
DOCKETDICTATE – Something related to NSA’s TAO division
DOGCOLLAR – A type of Question-Focussed Dataset based on the Facebook display name cookie
DOGHUT – Upstream collection site
DOUBLEARROW – One of NSA’s voice processing databases?
DRAGGABLEKITTEN – An XKEYSCORE Map/Reduce analytic
DREADNOUGHT – NSA operation focused on Ayatollah Khamenei
– Passive collection of emanations (e.g. from printers or faxes) by using a radio frequency antenna
DROPOUTJEEP – STRAITBIZARRE-based software implant for iPhone, initially close access but later remotely
– System for processing data from mobile communication networks
DRUID – SIGINT Exchange Designator for third party countries
– A US military numeral cipher/authentication system
DRYTORTUGAS – Analytic tool
DYNAMO – SIGINT Exchange Designator for Denmark
E
EAGLE – Upstream collection site
– A SIGINT collection network run by Australia, Canada, New Zealand, the United Kingdom, and the United States
ECHO – SIGINT Exchange Designator for Australia
ECRU (EU) – Compartment of the ENDSEAL control system
EDEN – Upstream collection site
EGOTISTICALGIRAFFE (EGGI) – NSA program for exploiting the TOR network
EGOTISTICALGOAT (EGGO) – NSA tool for exploiting the TOR network
EIDER – Retired SIGINT product codeword
EINSTEIN – Cell phone network intercepting equipment used by SCS units
– Intrusion detection system for US government network gateways (deployed in 2004)
EINSTEIN 2 – Second version of the EINSTEIN program for detecting malicious network activity
EINSTEIN 3 – Third version of the EINSTEIN program that will monitor government computer traffic on private sector sites too
ELEGANTCHAOS – Large scale FORNSAT data analysis system
EMBRACEFLINT – Tool for computer network operations
ENDSEAL (EL) – SCI control system
ENDUE – A COI for sensitive decrypts of the BULLRUN program
ENTOURAGE – Directional finder for line of bearing for GSM, UMTS, CDMA, FRS signals, works with NEBULA active interrogator within GALAXY program
EPICSHELTER – Sophisticated data backup system designed by Edward Snowden
ERRONEOUSINGENUITY (ERIN) – NSA tool for exploiting the TOR network
EVENINGEASEL – Program for surveillance of phone and text communications from Mexico’s cell phone network
EVILOLIVE – Iinternet geolocation tool
EVOLVED MUTANT BROTH – Second party database
EYESPY – System that scans data for logos of companies, political parties and other organizations, as well for pictures with faces for facial recognition
F
FACELIFT – Codeword related to NSA’s Special Source Operations division
– NSA corporate partner with access to international cables, routers, and switches (since 1985)
FAIRVIEWCOTS – System for processing telephony metadata collected under the FAIRVIEW program
FALLENORACLE – NSA tool or database
FALLOUT – DNI metadata ingest processor/database
– DNR metadata ingest processor/database
FASCINATOR – Series of Type 1 encryption modules for Motorola digital-capable voice radios
FASHIONCLEFT (FC) – Wrapper used to exfiltrate data of VPN and VoIP communications
FASTBAT – Telephony related database?
FASTFOLLOWER – Tool to identify foreign agents who might tail American case officers overseas by correlating cellphone signals
FASTSCOPE – NSA database
FEEDTROUGH – Software implant for unauthorized access to Juniper firewall models N5XT, NS25, NS50, NS200, NS500, ISG1000
FERRETCANON – Subsystem of the FOXACID system
FINKDIFFERENT (FIDI) – Tool used for exploiting TOR networks
FIRE ANT – Open Source visualisation tool
– NSA key generation scheme, used for exchanging EKMS public keys
FIRETRUCK – SIGINT tool or database
FIREWALK -Bidirectional network implant, passive gigabit ethernet traffic collector and active ethernet packet injector within RJ45 Dual Stacked USB connector, digital core used with HOWLERMONKEY, formerly RADON
– NSA program for securing commercial smartphones
FLARE – Retired SIGINT product codeword
FLATLIQUID – TAO operation against the office of the Mexican president
FLEMING – The embassy of Slovakia in Washington DC
FLINTLOCK – The DICTIONARY computer used at the Waihopai station of ECHELON
FLUXBABBITT – Hardware implant for Dell PowerEdge RAID servers using Xeon processors
FOGGYBOTTOM – Computer implant plug-in that records logs of internet browsing histories and collects login details and passwords used to access websites and email accounts
FOREMAN – Tactical SIGINT database? Used to determine ‘foreigness’
FOURSCORE – (former?) database for fax and internet data
FOXACID (FA?) – System of secret internet servers used to attack target computers
FOXSEARCH – Tool for monitoring a QUANTUM target which involves FOXACID servers
FOXTRAIL – NSA tool or database
FRIARTUCK – VPN Events tool or database (CSEC?)
FREEFLOW-compliant – Supported by TURBULENCE architecture
FREEZEPOST – Something related to NSA’s TAO division
FRONTO – Retired SIGINT Exchange Designator for ?
FROSTBURG – Connection Machine 5 (CM-5) supercomputer, used by NSA from 1991-1997
FROTH – Retired SIGINT product codeword
FRUGALSHOT – FOXACID servers for receiving callbacks from computers infected with NSA spying software
G
GALACTICHALO – Remote SATCOM collection facility
GALAXY – Find/fix/finish program of locating signal-emitting devices of targets
GAMMA (G) – Compartment for highly sensitive communication intercepts
GAMUT – NSA collection tasking tool or database
GARLIC – The NSA satellite intercept station at Bad Aibling (Germany)
GATEKEEPER – NSA user account management system
GAVEL – Retired SIGINT product codeword
GECKO II – System consisting of hardware implant MR RF or GSM, UNITEDRAKE software implant, IRONCHEF persistence back door
GEMINI – Remote SATCOM collection facility
GENESIS – Modified GSM handset for covert network surveys, recording of RF spectrum use, and handset geolocation based on software defined radio
GENIE – Overall close-access program, collection by Sigads US-3136 and US-3137
GHOSTMACHINE – NSA’s Special Source Operations cloud analytics platform
GINSU – Provides software persistence for the CNE implant KONGUR having PCI bus hardware implant BULLDOZER on MS desktop PCs
GILGAMESH – Predator-based NSA geolocation system used by JSOC
GISTQEUE (GQ) – NSA software or database
GJALLER – NSA tool or database
GLINT – Retired SIGINT product codeword
GLOBALBROKER – NSA tool or database
GM-PLACE – Database for the BOUNDLESSINFORMANT tool
GODLIKELESION – Modernization program for NSA’s European Technical Center (ETC) in Wiesbaden in 2011
GODSURGE – Runs on FLUXBABBITT circuit board to provide software persistence by exploiting JTAG debugging interface of server processors, requires interdiction and removal of motherboard of JTAG scan chain reconnection
GOPHERSET – Software implant on GMS SIM phase 2+ Toolkit cards that exfiltrates contact list, SMS and call log from handset via SMS to user-defined phone; malware loaded using USB smartcard reader or over-the-air.
GOSSAMER – SIGINT/EW collection and exploitation system
GOTHAM – Processor for external monitor recreating target monitor from red video
GOURMETTROUGH – Configurable implant for Juniper NetScreen firewalls including SSG type, minimal beaconing
GOUT – Subcompartment of GAMMA for intercepts of South Vietnamese government communications
GOVPORT – US government user authentication service
GRAB – SIGINT satellite program
GREY FOX – The 2003 covername of the Mission Support Activity (MSA) of JSOC
GREYSTONE (GST) – CIA’s highly secret rendition and interrogation programs
GROK – Computer implant plug-in used to log keystrokes
GUMFISH – Computer implant plug-in to take over a computer’s webcam and snap photographs
GUPY – Subcompartment of GAMMA for intercepts from Soviet leadership car phones (1960’s-70’s)
H
HALLUXWATER – Software implant as boot ROM upgrade for Huawei Eudemon firewalls, finds patch points in inbound packet processing, used in O2, Vodafone and Deutsche Telekom
HAMMERCHANT – Implant for network routers to intercept and perform exploitation attacks against data sent through a Virtual Private Network (VPN) and/or phone calls via Skype and other VoIP software
HAMMERMILL – Insertion Tool controls HEADWATER boot ROM backdoor
HAMMERSTEIN – Implant for network routers to intercept and perform exploitation attacks against data sent through a Virtual Private Network (VPN) and/or phone calls via Skype and other VoIP software
HAPPYFOOT – Program that intercepts traffic generated by mobile apps that send a smartphone’s location to advertising networks
HARD ASSOCIATION – Second party database
– An IBM supercomputer used by NSA from 1962-1976
HAVE BLUE – Development program of the F-117A Stealth fighter-bomber
HAVE QUICK (HQ) – Frequency-hopping system protecting military UHF radio traffic
HEADWATER – Permanent backdoor in boot ROM for Huawei routers stable to firmware updates, installed over internet, capture and examination of all IP packets passing through host router, controlled by Hammermill Insertion Tool
HEMLOCK – Operation against the Italian embassy in Washington DC using HIGHLANDS techniques
HERCULES – CIA terrorism database
HERETIC – NSA tool or database
HEREYSTITCH – Collaboration program between NSA units T1222 and SSG
HERMOS – Joint venture between the German BND and another country with access for NSA (2012)
HERON – Retired SIGINT product codeword
HIGHCASTLE – Tactical database?
HIGHLANDS – Technique for collection from computer implants
HIGHTIDE – NSA tool or database
HOBGOBLIN – NSA tool or database
HOLLOWPOINT – Software defined radio platform
HOMEBASE – Database which allows analysts to coordinate tasking with DNI mission priorities
HOMEMAKER – Upstream collection site
HOMINGPIGEON – Program to intercept communications from airplane passengers
HOTZONE – ?
HOWLERMONKEY (HM) – Generic radio frequency (RF) transceiver tool used for various applications
HUFF – System like FOXACID?
HYSON – Retired SIGINT product codeword
I
ICEBERG – Major NSA backbone project
ICREACH – Tool that uses telephony metadata
IDITAROD (IDIT) – Compartment of the KLONDIKE control system
INCENSER – A joint NSA-GCHQ high-volume cable tapping operation, part of the WINDSTOP program
INDIA – SIGINT Exchange Designator for New Zealand (retired)
– Satellite intercept station near Khon Khaen, Thailand (1979-ca. 2000)
INTREPID SPEAR – The 2009 covername of the Mission Support Activity (MSA) of JSOC
– Series of ELINT and COMINT spy satellites (since 2009)
IRATEMONK – Hard drive firmware providing software persistence for desktops and laptops via Master Boot Record substitution, for Seagate Maxtor Samsung file systems FAR NRFS EXT3 UFS, payload is implant installer, shown at internet cafe
IRONAVENGER – NSA hacking operation against an ally and an adversary (2010)
IRONCHEF – Provides access persistence back door exploiting BIOS and SMM to communicate with a 2-way RF hardware implant
IRONSAND – Second Party satellite intercept station in New Zealand
ISHTAR – SIGINT Exchange Designator for Japan (retired)
ISLANDTRANSPORT – Internal messaging service, as part of the QUANTUM system
IVORY – Retired SIGINT product codeword
IVY BELLS – NSA, CIA and Navy operation to place wire taps on Soviet underwater communication cables
J
JACKKNIFE – The NSA satellite intercept station at Yakima (US)
JACKPOT – Internal NSA process improvement program (early 1990s – early 2000s)
JETPLOW – Persistent firmware back door for Cisco PIX and ASA firewall and routers, modifies OS at boot time
JOLLYROGER – NSA database
JOSEKI-1 – Classified Suite A algorithm
JOURNEYMAN – Major NSA backbone project
JUGGERNAUT – Ingest system for processing signals from (mobile?) phone networks
– Class of SIGINT reconnaissance satellites (1971-1983)
JUNIORMINT – Implant digital core, either mini printed circuit board or ultra-mini Flip Chip Module, contains ARM9 micro-controller, FPGA Flash SDRAM and DDR2 memories
K
KAMPUS – SIGINT Exchange Designator for ? (retired)
KANDIK (KAND) – Compartment of the KLONDIKE control system
KARMA POLICE – Second party database
KATEEL – The Brazilian embassy in Washington
KEA – Asymmetric-key Type 2 algorithm used in products like Fortezza, Fortezza Plus
KEELSON – Internet metadata processing system
KEYCARD – Database for VPN key exchange IP packet addresses
KEYRUT – SIGINT Exchange Designator for ? (retired)
KILTING – ELINT database
KIMBO – Retired SIGINT product codeword
KLIEGLIGHT (KL) – Tactical SIGINT reports
KLONDIKE (KDK) – Control system for sensitive geospatial intelligence
KLONDIKE – The embassy of Greece in Washington DC
KNIGHTHAWK – Probably a military SIGINT tool
– Method for summarizing very large textual data sets
KONGUR – Software implant restorable by GINSU after OS upgrade or reinstall
KRONE – Retired SIGINT product codeword
L
(LAC) – Retired NSA dissemination control marking
LADYLOVE – The NSA satellite intercept station at Misawa, Japan (since 1982)
LANYARD – Reconaissance satellite program
LARUM – Retired SIGINT product codeword
LEGION AMBER – Chinese hacking operation against a major US software company
LEGION JADE – A group of Chinese hackers
LEGION RUBY – A group of Chinese hackers
LEGION YANKEE – Chinese hacking operation against the Pentagon and defense contractors (2011)
LEMONWOOD – NSA satellite intercept station in Thailand
LEXHOUND – Tool for targeting social networking?
LIBERTY – First word of nicknames for collection and analysis programs used by JSOC and other sensitive DOD activities
LIBERTY BLUE – Modified RC-12 Guardrail surveillance airplane used by JSOC’s Mission Support Activity (MSA)
LIFESAVER – Technique which images the hard drive of computers
LIONSHARE – Internal NSA process improvement program (2003-2008)
LITHIUM – Facility to filter and gather data at a major (foreign?) telecommunications company under the BLARNEY program
LODESTONE – NSA’s CRAY-1 supercomputer
LOGGERHEAD – Device to collect contents of analog cell phone calls (made by Harris Corp.)
LOMA – SCI control system for Foreign Instrumentation and Signature Intelligence
LOPERS – Software application for Public Switched Telephone Networks or some kind of hardware
LOUDAUTO – An ANGRYNEIGHBOR radar retro-reflector, microphone captures room audio by pulse position modulation of square wave
M
MACHINESHOP – ?
MADCAPOCELOT – Sub-program of STORMBREW for collection of internet metadata about Russia and European terrorism
MAESTRO-II – Mini digital core implant, standard TAO implant architecture
MAGIC – Codeword for decrypted high-level diplomatic Nazi messages
– A keystroke logging software developed by the FBI
MAGNES – Remote SATCOM collection facility
MAGNETIC – Technique of sensor collection of magnetic emanations
– Series of SIGINT spy satellites (since 1985)
MAGOTHY – The embassy of the European Union in Washington DC
MAILORDER – Data transfer tool (SFTP-based?)
– Federal database of personal and financial data of suspicious US citizens
– NSA database of bulk phone metadata
MANASSAS – Former NSA counter-encryption program, succeeded by BULLRUN
– NSA database of bulk internet metadata
MARKHAM – NSA data system?
MARTES – NSA software tool to prepare reports
MASTERLINK – NSA tasking source
MASTERSHAKE – NSA tool or database
MATRIX – Some kind of data processing system
MAYTAG – Upstream collection site
MEDLEY – Classified Suite A algorithm
MENTOR – Class of SIGINT spy satellites (since 1995)
MERCED – The Bulgarian embassy in Washington DC
MERCURY – Soviet cipher machine partially exploited by NSA in the 1960’s
MERCURY – Remote SATCOM collection facility
MESSIAH – NSA automated message handling system
METAWAVE – Warehouse of unselected internet metadata
METROTUBE – Analytic tool for VPN data
METTLESOME – NSA Collection mission system
MIDAS – Satellite program
MIDDLEMAN – TAO covert network
MILKBONE – Question-Focused Dataset used for text message collection
– A sister project to Project SHAMROCK (1967-1973)
MINERALIZE – Technique for collection through LAN implants
MIRANDA – Some kind of number related to NSA targets
MIRROR – Interface to the ROADBED system
MOCCASIN – A hardware implant, permanently connected to a USB keyboard
MONKEYCALENDAR – Software implant on GMS SIM cards that exfiltrates user geolocation data
MONKEYROCKET – Sub-program of OAKSTAR for collecting internet metadata and content through a foreign access point
MOONLIGHTPATH (EGL?) – SSO collection facility
MOONPENNY – The NSA satellite intercept station at Harrogate (Great Britain)
MORAY – Compartment for the least sensitive COMINT material, retired in 1999
MORPHEUS – Program of the Global Access Operations (GAO)
MOTHMONSTER – NSA tool for exploiting the TOR network
MOVEONYX – Tool related to CASPORT
MULBERRY – The mission of Japan at the United Nations in New York
(JPM?) – Joint NSA-GCHQ operation to tap the cables linking Google and Yahoo data clouds to the internet Part of WINDSTOP
MUSKET – Retired SIGINT Exchange Designator for ?
MUSKETEER – NSA’s Special Signal Collection unit
– SSO unilateral voice interception program
– Presidential Global Communications System
N
NASHUA – The mission of India at the United Nations in New York
NAVAJO – The mission of Vietnam at the United Nations in New York
NAVARRO – The embassy of Georgia in Washington DC
NEBULA – Base station router similar to CYCLONE Hx9
NECTAR – SIGINT Exchange Designator for ? (retired)
NELEUS – Remote SATCOM collection facility
NEMESIS – SIGINT satellite
– Operation to kill or capture Osama bin Laden (2011)
NETBOTZ – Remote monitoring tool
NEWSDEALER – NSA’s internal intelligence news network
NIAGARAFILES – Data transfer tool (SFTP-based?)
NIGHTSTAND – 802.11 wireless packet injection tool that runs on standalone x86 laptop running Linux Fedora Core 3 and exploits windows platforms running Internet Explorer, from 8 miles away
NIGHTWATCH – Portable computer in shielded case for recreating target monitor from progressive-scan non-interlaced VAGRANT signals
NINJANIC – Something related to TURMOIL
NITESURF – NSA tool or database
NITRO – Remote SATCOM collection facility
NOCON – NSA dissemination marking or COI
NONBOOK (NK) – Compartment of the ENDSEAL control system
NORMALRUN – NSA tool or database
NUCLEON – Database for contents of phone calls
NYMROD – Automated name recognition system
O
– Umbrella program to filter and gather information at major telecommunications companies (since 2004)
OCEAN – Optical collection system for raster-based computer screens
OCEANARIUM – Database for SIGINT from NSA and intelligence sharing partners around the world
OCEANFRONT – Part of the communications network for ECHELON
OCEAN SHIELD – NATO anti-piracy operation
OCEANSURF – Engineering hub of the Global Access Operations (GAO)
OCELOT – Actual name: MADCAPOCELOT
OCTAVE – NSA tool for telephone network tasking (succeeded by the UTT?)
OCTSKYWARD – Collection of GSM data from flying aircraft
OILSTOCK – A system for analyzing air warning and surveillance data
– CSEC tool for discovering and identifying telephone and computer connections
OLYMPIC – First word of nicknames for programs involving defense against Chinese cyber-warfare and US offensive cyber-warfare
OLYMPIC GAMES – Joint US and Israel operation against the Iranian nuclear program (aka Stuxnet)
OLYMPUS – Software component of VALIDATOR/SOMBERKNAVE used to communicate via wireless LAN 802.11 hardware
OMNIGAT – Field network component
ONEROOF – Main tactical SIGINT database, with raw and unfiltered intercepts
– Newer units of the LACROSSE reconaissance satellites
ORANGEBLOSSOM – Sub-program of OAKSTAR for collection from an international transit switch (sigad: US-3251)
ORANGECRUSH – Sub-program of OAKSTAR for collecting metadata, voice, fax, phone and internet content through a foreign access point
ORION – SIGINT satellite
ORLANDOCARD – NSA operation thtat attracted visits from 77,413 foreign computers and planted spyware on more than 1,000 by using a ‘honeypot’ computer
OSAGE – The embassy of India in Washington DC
OSCAR – SIGINT Exchange Designator for the USA
OSWAYO – The embassy annex of India in Washington DC
– The Lockheed A-12 program (better known as SR-71)
P
PACKAGEDGOODS – Program which tracks the ‘traceroutes’ through which data flows around the Internet
PACKETSCOPE – Internet cable tapping system
PACKETSWING – NSA tool or database
PACKETWRENCH – Computer exploit delivered by the FERRETCANON system
PADSTONE – Type 1 Cryptographic algorithm used in several crypto products
PAINTEDEAGLE – SI-ECI compartment related to the BULLRUN program
PALANTERRA – A family of spatially and analytically enabled Web-based interfaces used by the NGA
PANGRAM (PM) – Alleged SCI control system
PANTHER – The embassy of Vietnam in Washington DC
PARCHDUSK (PD) – Productions Operation of NSA’s TAO division
PARTNERMALL PROGRAM (PMP) – A single collaboration environment, to be succeeded by the Global Collaboration Environment (GCE)
PARTSHOP – ?
PATHFINDER – SIGINT analysis tool (developed by SAIC)
PATHWAY – NSA’s former main computer communications network
– Call chaining analysis tool (developed by i2)
PAWLEYS – SI-ECI compartment related to the BULLRUN program
PEARL – Retired SIGINT product codeword
PEDDLECHEAP – Computer exploit delivered by the FERRETCANON system
PENDLETON – SI-ECI compartment related to the BULLRUN program
PEPPERBOX – Tool or database for targeting Requests (CSEC?)
PERDIDO – The mission of the European Union at the United Nations in New York
PERFECTMOON – An out-sites covering system
PHOTOANGLO – A continuous wave generator and receiver. The bugs on the other end are ANGRYNEIGHBOR class
PIEDMONT – SI-ECI compartment related to the BULLRUN program
PICARESQUE (PIQ) – SI-ECI compartment related to the BULLRUN program
PICASSO – Modified GSM handset that collects user data plus room audio
PINUP – Retired SIGINT product codeword
– Database for recorded signals intercepts/internet content
PITCHFORD – SI-ECI compartment related to the BULLRUN program
PIVOT – Retired SIGINT product codeword
PIXIE – Retired SIGINT product codeword
PLATFORM – Computer system linking the ECHELON intercept sites
PLUS – NSA SIGINT production feedback program
POCOMOKE – The Brazilian Permanent Mission to the UN in New York
POISON NUT – CES VPN attack orchestrator
POLARBREEZE – NSA technique to tap into nearby computers
POPPY – SIGINT satellite program
POPTOP – Collection system for telephony data
POWELL – The Greek mission at the United Nations in New York
PREFER – System for identifying and extracting text messages (SMS) from the DISHFIRE database
PRESSUREPORT – Software interface related to PRESSUREWAVE
PRESSUREWAVE – NSA cloud database for VPN and VoIP content and metadata
PRIMECANE – American high-tech company cooperating in providing a network access point for the ORANGECRUSH program
– Program for collecting foreign internet data from US internet companies
PROFORMA – Intelligence derived from computer-based data
– Mobile tactical SIGINT collection system
PROTEIN – SIGINT Exchange Designator for ?
PROTON – SIGINT database for time-sensitive targets/counterintelligence
PROTOSS – Local computer handling radio frequency signals from implants
PURPLE – Codename for a Japanese diplomatic cryptosystem during WWII
– US military OPSEC program (since 1966)
PUTTY – NSA tool or database
PUZZLECUBE – NSA tool or database
PYLON – SIGINT Exchange Designator for ?
Q
QUADRANT – A crypto implementation code
QUADRESPECTRE PRIME – ?
– A consolidated QUANTUMTHEORY platform to reduce latencies by co-locating passive sensors with local decisioning and traffic injection (under development in 2011)
– Secret servers placed by NSA at key places on the internet backbone; part of the TURMOIL program
QUANTUMBISCUIT – Enhancement of QUANTUMINSERT for targets which are behind large proxies
QUANTUMBOT – Method for taking control of idle IRC bots and botnets)
QUANTUMBOT2 – Combination of Q-BOT and Q-BISCUIT for webbased botnets
QUANTUMCOOKIE – Method to force cookies onto target computers
QUANTUMCOPPER – Method for corrupting file uploads and downloads
QUANTUMDNS – DNS injection/redirection based off of A record queries
QUANTUMHAND – Man-on-the-side technique using a fake Facebook server
QUANTUMINSERT (QI) – Man-on-the-side technique that redirects target internet traffic to a FOXACID server for exploitation
QUANTUMMUSH – Targeted spam exploitation method
QUANTUMNATION – Umbrella for COMMONDEER and VALIDATOR computer exploits
QUANTUMPHANTOM – Hijacks any IP address to use as covert infrastructure
QUANTUMSKY – Malware used to block targets from accessing certain websites through RST packet spoofing
QUANTUMSMACKDOWN – Method for using packet injection to block attacks against DoD computers
QUANTUMSPIN – Exploitation method for instant messaging
QUANTUMSQUEEL – Method for injecting MySQL persistant database connections
QUANTUMSQUIRREL – Using any IP address as a covert infrastructure
QUANTUMTHEORY (QT) – Computer hacking toolbox used by NSA’s TAO division, which dynamically injects packets into target’s network session
QUANTUM LEAP – CIA tool to “find non-obvious linkages, new connections, and new information” from within a dataset
QUARTERPOUNDER – Upstream collection site
– Relay satellite for reconaissance satellites
QUEENSLAND – Upstream collection site
R
RADIOSPRING – ?
RADON – Host tap that can inject Ethernet packets
RAGEMASTER – Part of ANGRYNEIGHBOR radar retro-reflectors, for red video graphics array cable in ferrite bead RFI chokers between video card and monitor, target for RF flooding and collection of VAGRANT video signal
(RGT) – ECI compartment for call and e-mail content collected under FISA authority
RAILHEAD – NCTC database project
RAISIN – NSA database or tool
RAMPART – NSA operational branches that intercept heads of state and their closest aides. Known divisions are RAMPART-A, RAMPART-I and RAMPART-T. Also mentioned as a suite of programs for assuring system functionality
RAVEN – SIGINT satellite
REACTOR – Tool or program related to MARINA?
REBA – Major NSA backbone project
REDHAWK – NSA tool
REDROOF – NSA tool
REMATION – Joint NSA-GCHQ counter-TOR workshop
RENOIR – NSA telephone network visualization tool
REQUETTE – A Taiwanese TECO in New York
RESERVE (RSV) – Control system for the National Reconnaissance Office (NRO)
RESERVEVISION – Remote monitoring tool
RESOLUTETITAN – Internet cable access program?
RETRO – see RETROSPECTIVE
RETROSPECTIVE – 30-day retrospective retrieval tool for SCALAWAG
RETURNSPRING – High-side server shown in UNITEDRAKE internet cafe monitoring graphic
RHINEHEART – NSA tool or database
– Class of SIGINT spy satellites (in 1975 changed to AQUACADE)
RICHTER – SIGINT Exchange Designator for Germany
RIPCORD – ?
RIVET JOINT – Reconaissance operation
ROADBED – Probably a military SIGINT database
ROCKYKNOB – Optional DSP when using Data Over Voice transmission in CROSSBEAM
RONIN – NSA tool for detecting TOR-node IP-addresses
RORIPA – SIGINT Exchange Designator for ?
ROYALNET – Internet exploitation tool
RUFF – Compartment of TALENT KEYHOLE for IMINT satellites
RUMBUCKET – Analytic tool
RUTLEY – Network of SIGINT satellites launched in 1994 and 1995
S
SABRE – Retired SIGINT product codeword
SALEM – ?
SALVAGERABBIT – Computer implant plug-in that exfiltrates data from removable flash drives that connect to an infected computer
SAMOS – Reconnaissance satellite program
SAPPY – Retired SIGINT product codeword
SARATOGA – SSO access facility (since 2011)
SARDINE – SIGINT Exchange Designator for Sweden
– Narrow band voice encryption for radio and telephone communication
SAVIN – Retired SIGINT product codeword
SCALAWAG – Collection facility under the MYSTIC program
SCALLION – Upstream collection site
SCAPEL – Second Party satellite intercept station in Nairobi, Kenia
SCHOOLMONTANA – Software implant for Juniper J-series routers used to direct traffic between server, desktop computers, corporate network and internet
SCIMITAR – A tool to create contact graphs?
SCISSORS – System used for separating different types of data and protocols
SCORPIOFORE – SIGINT reporting tool
SEABOOT – SIGINT Exchange Designator for ?
SEADIVER – Collection system for telephony data
SEAGULLFARO – High-side server shown in UNITEDRAKE internet cafe monitoring graphic
SEARCHLITE – Tactical SIGINT collecting system for like cell phone calls
SEASONEDMOTH (SMOTH) – Stage0 computer implant which dies after 30 days, deployed by the QUANTUMNATION method
SECONDDATE – Method to influence real-time communications between client and server in order to redirect web-browsers to FOXACID malware servers
SECUREINSIGHT – A software framework to support high-volume analytics
SEMESTER – NSA SIGINT reporting tool
– Transportable suite of ISR equipment (since 1991)
– Radome on top of the U2 to relay SIGINT data to ground stations
SENTINEL – NSA database security filter
SERENADE – SSO corporate partner (foreign?)
SERUM – Bank of servers within ROC managing approvals and ticket system
SETTEE – SIGINT Exchange Designator for ?
– Operation for intercepting telegraphic data going in or out the US (1945-1975)
SHAREDVISION – Mission program at Menwith Hill satellite station
SHARKFIN – Sweeps up all-source communications intelligence at high speed and volumes
SHARPFOCUS (SF2) – Productions Operation of NSA’s TAO division
SHELLTRUMPET – NSA metadata processing program (since December 2007)
SHENANIGANS – Aircraft-based NSA geolocation system used by CIA
SHIFTINGSHADOW – Sub-program of OAKSTAR for collecting telephone metadata and voice content from Afghanistan through a foreign access point
SHILLELAGH – Classified Suite A algorithm
SHORTSHEET – NSA tool for Computer Network Exploitation
SHOTGIANT – NSA operation for hacking and monitoring the Huawei network (since 2009)
SIERRAMONTANA – Software implant for Juniper M-series routers used by enterprises and service providers
SIGINT NAVIGATOR – NSA database
SIGSALY – The first secure voice system from World War II
SILKWORTH – A software program used for the ECHELON system
SILLYBUNNY – Some kind of webbrowser tag which can be used as selector
SILVER – Soviet cipher machine partially exploited by NSA in the 1960’s
SILVERCOMET – SIGINT satellites?
SILVERZEPHYR (SZ) – Sub-program of OAKSTAR for collecting phone and internet metadata and content from Latin and South America through an international transit switch
SIRE – A software program used for the ECHELON system(?)
– Type 2 Block cipher algorithms used in various crypto products
SKOPE – SIGINT analytical toolkit
SKYSCRAPER – Interface to the ROADBED system
SKYWRITER – NSA tool to prepare (internet) intelligence reports
SLICKERVICAR – Used with UNITEDRAKE or STRAITBIZARRE to upload hard drive firmware to implant IRATEMONK
SLINGSHOT – End Product Reports (CSEC?)
SMOKEYSINK – SSO access facility (since 2011?)
SNICK – 2nd Party satellite intercept station in Oman
SNORT – Repository of computer network attack techniques/coding
SOAPOPERA – (former?) database for voice, end product and SRI information
SOMBERKNAVE – Windows XP wireless software implant providing covert internet connectivity, routing TCP traffic via an unused 802.11 network device allowing OLYMPUS or VALIDATOR to call home from air-gapped computer
SORTING HAT – ?
SORTING LEAD – ?
SOUFFLETROUGH – Software implant in BIOS Juniper SSG300 and SSG500 devices, permanent backdoor, modifies ScreenOS at boot, utilizes Intel’s System Management Mode
SOUNDER – Second Party satellite intercept station at Cyprus
SPARKLEPONY – Tool or program related to MARINA
SPARROW II – Airborne wireless network detector running BLINDDATE tools via 802.11
SPECTRE – SCI control system for intelligence on terrorist activities
SPECULATION – Protocol for over-the-air communication between COTTONMOUTH computer implant devices, compatible with HOWLERMONKEY
SPHINX – Counterintelligence database of the Defense Intelligence Agency
SPINNERET (SPN) – SSO collection facility
SPLITGLASS – NSA analytical database
SPLUNK – Tool used for SIGINT Development
SPOKE – Compartment for less sensitive COMINT material, retired in 1999
SPOTBEAM – ?
SPORTCOAST – Upstream collection site
SPRIG – Retired SIGINT product codeword
SPRINGRAY – Some kind of internal notification system
SPYDER – Analytic tool for selected content of text messages from the DISHFIRE database
STARBURST – The initial code word for the STELLARWIND compartment
STARLIGHT – Analyst tool
STARPROC – User lead that can be uses as a selector
STARSEARCH – Target Knowledge tool or database (CSEC?)
STATEROOM – Covert SIGINT collection sites based in US diplomatic facilities
STEELFLAUTA – SSO Corporate/TAO Shaping program
STEELKNIGHT – (foreign?) partner providing a network access point for the SILVERZEPHYR program
STEELWINTER – A supercomputer acquired by the Norwegian military intelligence agency
STELLAR – Second Party satellite intercept station at Geraldton, Australia
STELLARWIND (STLW) – SCI compartment for the President’s Surveillance Program information
STEPHANIE – Covert listening post in the Canadian embassy in Moscow (est. 1972)
STINGRAY – Device for tracking the location of cell phones (made by Harris Corp.) STONEGHOST – DIA network for information exchange with UK, Canada, Australia and New Zealand (TS/SCI)
STORMBREW – Program for collection from an international transit switches and cables (since 2001)
STRAIGHTBIZARRE – Software implant used to communicate through covert channels
STRATOS – Tool or databse for GPRS Events (CSEC?)
STRAWHAT – NSA datalinks between field sites and processing centers (1969-?)
STRIKEZONE – Device running HOWLERMONKEY personality
STRONGMITE – Computer at remote operations center used for long range communications
STRUM – (see abbreviations)
STUCCOMONTANA – Software implant for Juniper T-Series routers used in large fixed-line, mobile, video, and cloud networks, otherwise just like SCHOOLMONTANA
STUMPCURSOR – Foreign computer accessing program of the NSA’s Tailored Access Operations
SUBSTRATUM – Upstream collection site
SUEDE – Retired SIGINT product codeword
SULPHUR – The mission of South Korea at the United Nations in New York
SUNSCREEN – Tool or database
SURFBOARD – NSA tool or database
SURLEYSPAWN – Data RF retro-reflector, gathers keystrokes FSK frequency shift keyed radar retro-reflector, USB or IBM keyboards
SURPLUSHANGAR – High to low diode, part of the QUANTUM system
SURREY – Main NSA requirements database, where tasking instructions are stored and validated, used by the FORNSAT, SSO and TAO divisions
SUTURESAILOR – Printed circuit board digital core used with HOWLERMONKEY
SWAMP – NSA data system?
SWAP – Implanted software persistence by exploiting motherboard BIOS and hard drive Host Protected Area for execution before OS loads, operative on windows linux, freeBSD Solaris
– NSA data model for analyzing target connections
T
TACOSUAVE – ?
TALENT KEYHOLE (TK) – Control system for space-based collection platforms
TALK QUICK – An interim secure voice system created to satisfy urgent requirements imposed by conditions to Southeast Asia. Function was absorbed by AUTOSEVOCOM
TAPERLAY – Covername for Global Numbering Data Base (GNDB), used for looking up the registered location of a mobile device
TARMAC – Improvement program at Menwith Hill satellite station
TAROTCARD – NSA tool or database
TAWDRYYARD – Beacon radio frequency radar retro-reflector used to positionally locate deployed RAGEMASTER units
TEMPEST – Investigations and studies of compromising electronic emanations
– GCHQ program for intercepting internet and telephone traffic
THESPIS – SIGINT Exchange Designator for ?
THINTREAD – NSA program for wiretapping and sophisticated analysis of the resulting data
THUMB – Retired SIGINT product codeword
THUNDERCLOUD – Collaboration program between NSA units T1222 and SSG
TIAMAT – Joint venture between the German BND and another country with access for NSA
TICKETWINDOW – System that makes SSO collection available to 2nd Party partners
TIDALSURGE – Router Configurations tool (CSEC?)
TIDEWAY – Part of the communications network for ECHELON
TIMBERLINE – The NSA satellite intercept station at Sugar Grove (US)
TINMAN – Database related to air warning and surveillance
TITAN POINTE – Upstream collection site
– Presumably Chinese attacks on American computer systems (since 2003)
TITLEHOLDER – NSA tool
TOPAZ – Satellite program
TOTECHASER – Software implant in flash ROM windows CE for Thuraya 2520 satellite/GSM/web/email/MMS/GPS
TOTEGHOSTLY – Modular implant for windows mobile OS based on SB using CP framework, Freeflow-compliant so supported by TURBULENCE architecture
TOWERPOWER – NSA tool or database
TOXICARE – NSA tool
TOYGRIPPE – NSA’s CES database for VPN metadata
TRACFIN – NSA database for financial data like credit card purchases
TRAFFICTHIEF – Part of the TURBULENCE and the PRISM programs
TRAILBLAZER – NSA Program to analyze data carried on communications networks
TRAILMAPPER – NSA tool or database
TRANSX – NSA database
TREACLEBETA – TAO hacking against the Pakistani terrorist group Lashkar-e-Taiba
TREASUREMAP – NSA internet traffic visualization tool
TREASURETROVE – Analytic tool
TRIBUTARY – NSA provided voice threat warning network
TRIGGERFISH – Device to collect the content of digital cell phone calls (made by Harris Corp.)
TRINE – Predecessor of the UMBRA compartment for COMINT
TRINITY – Implant digital core concealed in COTTONMOUTH-I, providing ARM9 microcontroller, FPGA Flash and SDRAM memories
TRITON – Tool or database for TOR Nodes (CSEC?)
– Series of ELINT reconnaissance satellites (1994-2008)
TRYST – Covert listening post in the British embassy in Moscow
TUBE – Database for selected internet content?
TUMULT – Part of the TURBULENCE program
TUNINGFORK – Sustained collection linked to SEAGULLFARO, previously NSA database or tool for protocol exploitation
TURBINE – Active SIGINT: centralized automated command/control system for managing a large network of active computer implants for intelligence gathering (since 2010)
TURBOPANDA – The Turbopanda Insertion Tool allows read/write to memory, execute an address or packet; joint NSA/CIA project on Huawei network equipment
TURBULENCE (TU) – Integrate NSA architecture with several layers and sub-programs to detect threats in cyberspace (since 2005)
TURMOIL – Passive SIGINT sensors: high speed collection of foreign target satellite, microwave and cable communications, part of the TURBULENCE program Maybe for selecting common internet encryption technologies to exploit.
TURTLEPOWER -NSA tool
TUSKATTIRE – Ingest system for cleaning and processing DNR (telephony) data
TUTELAGE – Active defense system to monitor network traffic in order to detect malicious code and network attacks, part of the TURBULENCE program
TWEED – Retired SIGINT product codeword
TWISTEDKILT – Writes to Host Protected area on hard drive to implant Swap and its implant installer payload
TWISTEDPATH – NSA tool or database
TYPHON HX – GSM base station router network in box for tactical Sigint geolocating and capturing user
U
ULTRA – Decrypted high-level military Nazi messages, like from the Enigma machine
UMBRA – Retired compartment for the most sensitive COMINT material
UNIFORM – SIGINT Exchange Designator for Canada
UNITEDRAKE – Computer exploit delivered by the FERRETCANON system
USHER – Retired SIGINT product codeword
V
VAGRANT – Radar retro-reflector technique on video cable to reproduce open computer screens
VALIDATOR – Computer exploit delivered by the FERRETCANON system for looking whether a computer has security software, runs as user process on target OS, modified for SCHOOLMONTANA, initiates a call home, passes to SOMBERKNAVE, downloads OLYMPUS and communicates with remote operation center
– Decrypted intercepts of messages from Soviet intelligence agencies
VERDANT (VER) – Alleged SCI control system
VESUVIUS – Prototype quantum computer, situated in NSA’s Utah Data Center
VICTORYDANCE – Joint NSA-CIA operation to map WiFi fingerprints of nearly every major town in Yemen
VIEWPLATE – Processor for external monitor recreating target monitor from red video
VINTAGE HARVEST – Probably a military SIGINT tool
VITALAIR – NSA tool
VOICESAIL – Intelligence database
– Class of SIGINT spy satellites (1978-1989)
VOXGLO – Multiple award contract providing cyber security and enterprise computing, software development, and systems integration support
W
WABASH – The embassy of France in Washington DC
WAGONBED – Hardware GSM controller board implant on CrossBeam or HP Proliant G5 server that communicates over I2C interface
WALBURN – High-speed link encryption, used in various encryption products
WARPDRIVE – Joint venture between the German BND and another country with access for NSA (2013)
WATERWITCH – Hand-held tool for geolocating targeted handsets to last mile
WAVELEGAL – Authorization service that logs data queries
WEALTHYCLUSTER – Program to hunt down tips on terrorists in cyberspace (2002- )
WEASEL – Type 1 Cryptographic algorithm used in SafeXcel-3340
WEBCANDID – NSA tool or database
WESTPORT – The mission of Venezuela at the United Nations in New York
WILLOWVIXEN – Method to deploy malware by sending out spam emails that trick targets into clicking a malicious link
WISTFULTOLL – Plug-in for UNITEDRAKE and STRAITBIZARRE used to harvest target forensics via Windows Management Instrumentation and Registry extractions, can be done through USB thumb drive
WHIPGENIE (WPG) – ECI compartment for details about the STELLARWIND program
WHITEBOX – Program for intercepting the public switched telephone network?
WHITELIST – NSA tool
WHITETAMALE – Operation for collecting e-mails from Mexico’s Public Security Secretariat
WINDCHASER – Tool or program related to MARINA
WINDSORBLUE – Supercomputer program at IBM
WINDSTOP – Joint NSA-GCHQ unilateral high-volume cable tapping program
WINTERLIGHT – A QUANTUM computer hacking program in which Sweden takes part
WIRESHARK – Database with malicious network signatures
WITCH – Retired SIGINT product codeword
WITCHHUNT – ?
WOLFPOINT – SSO corporate partner under the STORMBREW program
WORDGOPHER – Platform to enable demodulation of low-rate communication carriers
WRANGLER – Database or system which focuses on Electronic Intelligence
X
– Program for finding key words in foreign language documents
XKEYSCORE (XKS) – Program for analysing SIGINT traffic
Y
YACHTSHOP – Sub-program of OAKSTAR for collecting internet metadata
YELLOWPIN – Printed circuit board digital core used with HOWLERMONKEY
YELLOWSTONE – NSA analytical database
YUKON – The embassy of Venezuela in Washington DC
Z
ZAP – (former?) database for texts
ZARF – Compartment of TALENT KEYHOLE for ELINT satellites, retired in 1999
ZESTYLEAK – Software implant that allows remote JETPLOW firmware installation, used by NSA’s CES unit
– See also this list of NSA codewords from 2002
Links and Sources
– List of NSA Code Names Revealed
– About What the NSA’s Massive Org Chart (Probably) Looks Like
– About Code Names for U.S. Military Projects and Operations
– National Reconnaissance Office: Review and Redaction Guide (pdf)
– About How Codes Names Are Assigned
– Wikipedia article about the Secret Service codename
– List of crypto machine designators
– Wikipedia article about the CIA cryptonym
– Article about Security Clearances and Classifications
– Listing in German: Marjorie-Wiki: SIGDEV
– William M. Arkin, Code Names, Deciphering U.S. Military Plans, Programs, adn Operations in the 9/11 World, Steerforth Press, 2005.
via Electrospaces.Blogspot.com
Jan 31, 2012 | Activism, Leaks
Is Thomas Drake an enemy of the state?
by Jane Mayer May 23, 2011
Drake, a former senior executive at the National Security Agency, faces some of the gravest charges that can be brought against an American citizen. Photograph by Martin Schoeller.
On June 13th, a fifty-four-year-old former government employee named Thomas Drake is scheduled to appear in a courtroom in Baltimore, where he will face some of the gravest charges that can be brought against an American citizen. A former senior executive at the National Security Agency, the government’s electronic-espionage service, he is accused, in essence, of being an enemy of the state. According to a ten-count indictment delivered against him in April, 2010, Drake violated the Espionage Act—the 1917 statute that was used to convict Aldrich Ames, the C.I.A. officer who, in the eighties and nineties, sold U.S. intelligence to the K.G.B., enabling the Kremlin to assassinate informants. In 2007, the indictment says, Drake willfully retained top-secret defense documents that he had sworn an oath to protect, sneaking them out of the intelligence agency’s headquarters, at Fort Meade, Maryland, and taking them home, for the purpose of “unauthorized disclosure.” The aim of this scheme, the indictment says, was to leak government secrets to an unnamed newspaper reporter, who is identifiable as Siobhan Gorman, of the Baltimore Sun. Gorman wrote a prize-winning series of articles for the Sun about financial waste, bureaucratic dysfunction, and dubious legal practices in N.S.A. counterterrorism programs. Drake is also charged with obstructing justice and lying to federal law-enforcement agents. If he is convicted on all counts, he could receive a prison term of thirty-five years.
The government argues that Drake recklessly endangered the lives of American servicemen. “This is not an issue of benign documents,” William M. Welch II, the senior litigation counsel who is prosecuting the case, argued at a hearing in March, 2010. The N.S.A., he went on, collects “intelligence for the soldier in the field. So when individuals go out and they harm that ability, our intelligence goes dark and our soldier in the field gets harmed.”
Top officials at the Justice Department describe such leak prosecutions as almost obligatory. Lanny Breuer, the Assistant Attorney General who supervises the department’s criminal division, told me, “You don’t get to break the law and disclose classified information just because you want to.” He added, “Politics should play no role in it whatsoever.”
When President Barack Obama took office, in 2009, he championed the cause of government transparency, and spoke admiringly of whistle-blowers, whom he described as “often the best source of information about waste, fraud, and abuse in government.” But the Obama Administration has pursued leak prosecutions with a surprising relentlessness. Including the Drake case, it has been using the Espionage Act to press criminal charges in five alleged instances of national-security leaks—more such prosecutions than have occurred in all previous Administrations combined. The Drake case is one of two that Obama’s Justice Department has carried over from the Bush years.
Gabriel Schoenfeld, a conservative political scientist at the Hudson Institute, who, in his book “Necessary Secrets” (2010), argues for more stringent protection of classified information, says, “Ironically, Obama has presided over the most draconian crackdown on leaks in our history—even more so than Nixon.”
One afternoon in January, Drake met with me, giving his first public interview about this case. He is tall, with thinning sandy hair framing a domed forehead, and he has the erect bearing of a member of the Air Force, where he served before joining the N.S.A., in 2001. Obsessive, dramatic, and emotional, he has an unwavering belief in his own rectitude. Sitting at a Formica table at the Tastee Diner, in Bethesda, Drake—who is a registered Republican—groaned and thrust his head into his hands. “I actually had hopes for Obama,” he said. He had not only expected the President to roll back the prosecutions launched by the Bush Administration; he had thought that Bush Administration officials would be investigated for overstepping the law in the “war on terror.”
“But power is incredibly destructive,” Drake said. “It’s a weird, pathological thing. I also think the intelligence community coöpted Obama, because he’s rather naïve about national security. He’s accepted the fear and secrecy. We’re in a scary space in this country.”
The Justice Department’s indictment narrows the frame around Drake’s actions, focussing almost exclusively on his handling of what it claims are five classified documents. But Drake sees his story as a larger tale of political reprisal, one that he fears the government will never allow him to air fully in court. “I’m a target,” he said. “I’ve got a bull’s-eye on my back.” He continued, “I did not tell secrets. I am facing prison for having raised an alarm, period. I went to a reporter with a few key things: fraud, waste, and abuse, and the fact that there were legal alternatives to the Bush Administration’s ‘dark side’ ”—in particular, warrantless domestic spying by the N.S.A.
The indictment portrays him not as a hero but as a treacherous man who violated “the government trust.” Drake said of the prosecutors, “They can say what they want. But the F.B.I. can find something on anyone.”
Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists, says of the Drake case, “The government wants this to be about unlawfully retained information. The defense, meanwhile, is painting a picture of a public-interested whistle-blower who struggled to bring attention to what he saw as multibillion-dollar mismanagement.” Because Drake is not a spy, Aftergood says, the case will “test whether intelligence officers can be convicted of violating the Espionage Act even if their intent is pure.” He believes that the trial may also test whether the nation’s expanding secret intelligence bureaucracy is beyond meaningful accountability. “It’s a much larger debate than whether a piece of paper was at a certain place at a certain time,” he says.
Jack Balkin, a liberal law professor at Yale, agrees that the increase in leak prosecutions is part of a larger transformation. “We are witnessing the bipartisan normalization and legitimization of a national-surveillance state,” he says. In his view, zealous leak prosecutions are consonant with other political shifts since 9/11: the emergence of a vast new security bureaucracy, in which at least two and a half million people hold confidential, secret, or top-secret clearances; huge expenditures on electronic monitoring, along with a reinterpretation of the law in order to sanction it; and corporate partnerships with the government that have transformed the counterterrorism industry into a powerful lobbying force. Obama, Balkin says, has “systematically adopted policies consistent with the second term of the Bush Administration.”
On March 28th, Obama held a meeting in the White House with five advocates for greater transparency in government. During the discussion, the President drew a sharp distinction between whistle-blowers who exclusively reveal wrongdoing and those who jeopardize national security. The importance of maintaining secrecy about the impending raid on Osama bin Laden’s compound was likely on Obama’s mind. The White House has been particularly bedevilled by the ongoing release of classified documents by WikiLeaks, the group led by Julian Assange. Last year, WikiLeaks began releasing a vast trove of sensitive government documents allegedly leaked by a U.S. soldier, Bradley Manning; the documents included references to a courier for bin Laden who had moved his family to Abbottabad—the town where bin Laden was hiding out. Manning has been charged with “aiding the enemy.”
Danielle Brian, the executive director of the Project on Government Oversight, attended the meeting, and said that Obama’s tone was generally supportive of transparency. But when the subject of national-security leaks came up, Brian said, “the President shifted in his seat and leaned forward. He said this may be where we have some differences. He said he doesn’t want to protect the people who leak to the media war plans that could impact the troops.” Though Brian was impressed with Obama’s over-all stance on transparency, she felt that he might be misinformed about some of the current leak cases. She warned Obama that prosecuting whistle-blowers would undermine his legacy. Brian had been told by the White House to avoid any “ask”s on specific issues, but she told the President that, according to his own logic, Drake was exactly the kind of whistle-blower who deserved protection.
As Drake tells it, his problems began on September 11, 2001. “The next seven weeks were crucial,” he said. “It’s foundational to why I am a criminal defendant today.”
The morning that Al Qaeda attacked the U.S. was, coincidentally, Drake’s first full day of work as a civilian employee at the N.S.A.—an agency that James Bamford, the author of “The Shadow Factory” (2008), calls “the largest, most costly, and most technologically sophisticated spy organization the world has ever known.” Drake, a linguist and a computer expert with a background in military crypto-electronics, had worked for twelve years as an outside contractor at the N.S.A. Under a program code-named Jackpot, he focussed on finding and fixing weaknesses in the agency’s software programs. But, after going through interviews and background checks, he began working full time for Maureen Baginski, the chief of the Signals Intelligence Directorate at the N.S.A., and the agency’s third-highest-ranking official.
Even in an age in which computerized feats are commonplace, the N.S.A.’s capabilities are breathtaking. The agency reportedly has the capacity to intercept and download, every six hours, electronic communications equivalent to the contents of the Library of Congress. Three times the size of the C.I.A., and with a third of the U.S.’s entire intelligence budget, the N.S.A. has a five-thousand-acre campus at Fort Meade protected by iris scanners and facial-recognition devices. The electric bill there is said to surpass seventy million dollars a year.
Nevertheless, when Drake took up his post the agency was undergoing an identity crisis. With the Cold War over, the agency’s mission was no longer clear. As Drake puts it, “Without the Soviet Union, it didn’t know what to do.” Moreover, its technology had failed to keep pace with the shift in communications to cellular phones, fibre-optic cable, and the Internet. Two assessments commissioned by General Michael Hayden, who took over the agency in 1999, had drawn devastating conclusions. One described the N.S.A. as “an agency mired in bureaucratic conflict” and “suffering from poor leadership.” In January, 2000, the agency’s computer system crashed for three and a half days, causing a virtual intelligence blackout.
Agency leaders decided to “stir up the gene pool,” Drake says. Although his hiring was meant to signal fresh thinking, he was given a clumsy bureaucratic title: Senior Change Leader/Chief, Change Leadership & Communications Office, Signals Intelligence Directorate.
The 9/11 attacks caught the U.S.’s national-security apparatus by surprise. N.S.A. officials were humiliated to learn that the Al Qaeda hijackers had spent their final days, undetected, in a motel in Laurel, Maryland—a few miles outside the N.S.A.’s fortified gates. They had bought a folding knife at a Target on Fort Meade Road. Only after the attacks did agency officials notice that, on September 10th, their surveillance systems had intercepted conversations in Afghanistan and Saudi Arabia warning that “the match begins tomorrow” and “tomorrow is Zero Hour.”
Drake, hoping to help fight back against Al Qaeda, immediately thought of a tantalizing secret project he had come across while working on Jackpot. Code-named ThinThread, it had been developed by technological wizards in a kind of Skunk Works on the N.S.A. campus. Formally, the project was supervised by the agency’s Signals Intelligence Automation Research Center, or SARC.
While most of the N.S.A. was reeling on September 11th, inside SARC the horror unfolded “almost like an ‘I-told-you-so’ moment,” according to J. Kirk Wiebe, an intelligence analyst who worked there. “We knew we weren’t keeping up.” SARC was led by a crypto-mathematician named Bill Binney, whom Wiebe describes as “one of the best analysts in history.” Binney and a team of some twenty others believed that they had pinpointed the N.S.A.’s biggest problem—data overload—and then solved it. But the agency’s management hadn’t agreed.
Binney, who is six feet three, is a bespectacled sixty-seven-year-old man with wisps of dark hair; he has the quiet, tense air of a preoccupied intellectual. Now retired and suffering gravely from diabetes, which has already claimed his left leg, he agreed recently to speak publicly for the first time about the Drake case. When we met, at a restaurant near N.S.A. headquarters, he leaned crutches against an extra chair. “This is too serious not to talk about,” he said.
Binney expressed terrible remorse over the way some of his algorithms were used after 9/11. ThinThread, the “little program” that he invented to track enemies outside the U.S., “got twisted,” and was used for both foreign and domestic spying: “I should apologize to the American people. It’s violated everyone’s rights. It can be used to eavesdrop on the whole world.” According to Binney, Drake took his side against the N.S.A.’s management and, as a result, became a political target within the agency.
Binney spent most of his career at the agency. In 1997, he became the technical director of the World Geopolitical and Military Analysis Reporting Group, a division of six thousand employees which focusses on analyzing signals intelligence. By the late nineties, the N.S.A. had become overwhelmed by the amount of digital data it was collecting. Binney and his team began developing codes aimed at streamlining the process, allowing the agency to isolate useful intelligence. This was the beginning of ThinThread.
In the late nineties, Binney estimated that there were some two and a half billion phones in the world and one and a half billion I.P. addresses. Approximately twenty terabytes of unique information passed around the world every minute. Binney started assembling a system that could trap and map all of it. “I wanted to graph the world,” Binney said. “People said, ‘You can’t do this—the possibilities are infinite.’ ” But he argued that “at any given point in time the number of atoms in the universe is big, but it’s finite.”
As Binney imagined it, ThinThread would correlate data from financial transactions, travel records, Web searches, G.P.S. equipment, and any other “attributes” that an analyst might find useful in pinpointing “the bad guys.” By 2000, Binney, using fibre optics, had set up a computer network that could chart relationships among people in real time. It also turned the N.S.A.’s data-collection paradigm upside down. Instead of vacuuming up information around the world and then sending it all back to headquarters for analysis, ThinThread processed information as it was collected—discarding useless information on the spot and avoiding the overload problem that plagued centralized systems. Binney says, “The beauty of it is that it was open-ended, so it could keep expanding.”
Pilot tests of ThinThread proved almost too successful, according to a former intelligence expert who analyzed it. “It was nearly perfect,” the official says. “But it processed such a large amount of data that it picked up more Americans than the other systems.” Though ThinThread was intended to intercept foreign communications, it continued documenting signals when a trail crossed into the U.S. This was a big problem: federal law forbade the monitoring of domestic communications without a court warrant. And a warrant couldn’t be issued without probable cause and a known suspect. In order to comply with the law, Binney installed privacy controls and added an “anonymizing feature,” so that all American communications would be encrypted until a warrant was issued. The system would indicate when a pattern looked suspicious enough to justify a warrant.
But this was before 9/11, and the N.S.A.’s lawyers deemed ThinThread too invasive of Americans’ privacy. In addition, concerns were raised about whether the system would function on a huge scale, although preliminary tests had suggested that it would. In the fall of 2000, Hayden decided not to use ThinThread, largely because of his legal advisers’ concerns. Instead, he funded a rival approach, called Trailblazer, and he turned to private defense contractors to build it. Matthew Aid, the author of a heralded 2009 history of the agency, “The Secret Sentry,” says, “The resistance to ThinThread was just standard bureaucratic politics. ThinThread was small, cost-effective, easy to understand, and protected the identity of Americans. But it wasn’t what the higher-ups wanted. They wanted a big machine that could make Martinis, too.”
The N.S.A.’s failure to stop the 9/11 plot infuriated Binney: he believed that ThinThread had been ready to deploy nine months earlier. Working with N.S.A. counterterrorism experts, he had planned to set up his system at sites where foreign terrorism was prevalent, including Afghanistan and Pakistan. “Those bits of conversations they found too late?” Binney said. “That would have never happened. I had it managed in a way that would send out automatic alerts. It would have been, Bang!”
Meanwhile, there was nothing to show for Trailblazer, other than mounting bills. As the system stalled at the level of schematic drawings, top executives kept shuttling between jobs at the agency and jobs with the high-paying contractors. For a time, both Hayden’s deputy director and his chief of signals-intelligence programs worked at SAIC, a company that won several hundred million dollars in Trailblazer contracts. In 2006, Trailblazer was abandoned as a $1.2-billion flop.
Soon after 9/11, Drake says, he prepared a short, classified summary explaining how ThinThread “could be put into the fight,” and gave it to Baginski, his boss. But he says that she “wouldn’t respond electronically. She just wrote in a black felt marker, ‘They’ve found a different solution.’ ” When he asked her what it was, she responded, “I can’t tell you.” Baginski, who now works for a private defense contractor, recalls her interactions with Drake differently, but she declined to comment specifically.
In the weeks after the attacks, rumors began circulating inside the N.S.A. that the agency, with the approval of the Bush White House, was violating the Foreign Intelligence Surveillance Act—the 1978 law, known as FISA, that bars domestic surveillance without a warrant. Years later, the rumors were proved correct. In nearly total secrecy, and under pressure from the White House, Hayden sanctioned warrantless domestic surveillance. The new policy, which lawyers in the Justice Department justified by citing President Bush’s executive authority as Commander-in-Chief, contravened a century of constitutional case law. Yet, on October 4, 2001, Bush authorized the policy, and it became operational by October 6th. Bamford, in “The Shadow Factory,” suggests that Hayden, having been overcautious about privacy before 9/11, swung to the opposite extreme after the attacks. Hayden, who now works for a security-consulting firm, declined to respond to detailed questions about the surveillance program.
When Binney heard the rumors, he was convinced that the new domestic-surveillance program employed components of ThinThread: a bastardized version, stripped of privacy controls. “It was my brainchild,” he said. “But they removed the protections, the anonymization process. When you remove that, you can target anyone.” He said that although he was not “read in” to the new secret surveillance program, “my people were brought in, and they told me, ‘Can you believe they’re doing this? They’re getting billing records on U.S. citizens! They’re putting pen registers’ ”—logs of dialled phone numbers—“ ‘on everyone in the country!’ ”
Drake recalled that, after the October 4th directive, “strange things were happening. Equipment was being moved. People were coming to me and saying, ‘We’re now targeting our own country!’ ” Drake says that N.S.A. officials who helped the agency obtain FISA warrants were suddenly reassigned, a tipoff that the conventional process was being circumvented. He added, “I was concerned that it was illegal, and none of it was necessary.” In his view, domestic data mining “could have been done legally” if the N.S.A. had maintained privacy protections. “But they didn’t want an accountable system.”
Aid, the author of the N.S.A. history, suggests that ThinThread’s privacy protections interfered with top officials’ secret objective—to pick American targets by name. “They wanted selection, not just collection,” he says.
A former N.S.A. official expressed skepticism that Drake cared deeply about the constitutional privacy issues raised by the agency’s surveillance policies. The official characterizes him as a bureaucrat driven by resentment of a rival project—Trailblazer—and calls his story “revisionist history.” But Drake says that, in the fall of 2001, he told Baginski he feared that the agency was breaking the law. He says that to some extent she shared his views, and later told him she feared that the agency would be “haunted” by the surveillance program. In 2003, she left the agency for the F.B.I., in part because of her discomfort with the surveillance program. Drake says that, at one point, Baginski told him that if he had concerns he should talk to the N.S.A.’s general counsel. Drake claims that he did, and that the agency’s top lawyer, Vito Potenza, told him, “Don’t worry about it. We’re the executive agent for the White House. It’s all been scrubbed. It’s legal.” When he pressed further, Potenza told him, “It’s none of your business.” (Potenza, who is now retired, declined to comment.)
Drake says, “I feared for the future. If Pandora’s box was opened, what would the government become?” He was not about to drop the matter. Matthew Aid, who describes Drake as “brilliant,” says that “he has sort of a Jesus complex—only he can see the way things are. Everyone else is mentally deficient, or in someone’s pocket.” Drake’s history of whistle-blowing stretches back to high school, in Manchester, Vermont, where his father, a retired Air Force officer, taught. When drugs infested the school, Drake became a police informant. And Watergate, which occurred while he was a student, taught him “that no one is above the law.”
Drake says that in the Air Force, where he learned to capture electronic signals, the FISA law “was drilled into us.” He recalls, “If you accidentally intercepted U.S. persons, there were special procedures to expunge it.” The procedures had been devised to prevent the recurrence of past abuses, such as Nixon’s use of the N.S.A. to spy on his political enemies.
Drake didn’t know the precise details, but he sensed that domestic spying “was now being done on a vast level.” He was dismayed to hear from N.S.A. colleagues that “arrangements” were being made with telecom and credit-card companies. He added, “The mantra was ‘Get the data!’ ” The transformation of the N.S.A., he says, was so radical that “it wasn’t just that the brakes came off after 9/11—we were in a whole different vehicle.”
Few people have a precise knowledge of the size or scope of the N.S.A.’s domestic-surveillance powers. An agency spokesman declined to comment on how the agency “performs its mission,” but said that its activities are constitutional and subject to “comprehensive and rigorous” oversight. But Susan Landau, a former engineer at Sun Microsystems, and the author of a new book, “Surveillance or Security?,” notes that, in 2003, the government placed equipment capable of copying electronic communications at locations across America. These installations were made, she says, at “switching offices” that not only connect foreign and domestic communications but also handle purely domestic traffic. As a result, she surmises, the U.S. now has the capability to monitor domestic traffic on a huge scale. “Why was it done this way?” she asks. “One can come up with all sorts of nefarious reasons, but one doesn’t want to think that way about our government.”
Binney, for his part, believes that the agency now stores copies of all e-mails transmitted in America, in case the government wants to retrieve the details later. In the past few years, the N.S.A. has built enormous electronic-storage facilities in Texas and Utah. Binney says that an N.S.A. e-mail database can be searched with “dictionary selection,” in the manner of Google. After 9/11, he says, “General Hayden reassured everyone that the N.S.A. didn’t put out dragnets, and that was true. It had no need—it was getting every fish in the sea.”
Binney considers himself a conservative, and, as an opponent of big government, he worries that the N.S.A.’s data-mining program is so extensive that it could help “create an Orwellian state.” Whereas wiretap surveillance requires trained human operators, data mining is automated, meaning that the entire country can be watched. Conceivably, U.S. officials could “monitor the Tea Party, or reporters, whatever group or organization you want to target,” he says. “It’s exactly what the Founding Fathers never wanted.”
On October 31, 2001, soon after Binney concluded that the N.S.A. was headed in an unethical direction, he retired. He had served for thirty-six years. His wife worked there, too. Wiebe, the analyst, and Ed Loomis, a computer scientist at SARC, also left. Binney said of his decision, “I couldn’t be an accessory to subverting the Constitution.”
Not long after Binney quit the N.S.A., he says, he confided his concerns about the secret surveillance program to Diane Roark, a staff member on the House Permanent Select Committee on Intelligence, which oversees the agency. Roark, who has flowing gray hair and large, wide-set eyes, looks like a waifish poet. But in her intelligence-committee job, which she held for seventeen years, she modelled herself on Machiavelli’s maxim that it is better to be feared than loved. Within the N.S.A.’s upper ranks she was widely resented. A former top N.S.A. official says of her, “In meetings, she would just say, ‘You’re lying.’ ”
Roark agrees that she distrusted the N.S.A.’s managers. “I asked very tough questions, because they were trying to hide stuff,” she says. “For instance, I wasn’t supposed to know about the warrantless surveillance. They were all determined that no one else was going to tell them what to do.”
Like Drake and Binney, Roark was a registered Republican, skeptical about bureaucracy but strong on national defense. She had a knack for recruiting sources at the N.S.A. One of them was Drake, who introduced himself to her in 2000, after she visited N.S.A. headquarters and gave a stinging talk on the agency’s failings; she also established relationships with Binney and Wiebe. Hayden was furious about this back channel. After learning that Binney had attended a meeting with Roark at which N.S.A. employees complained about Trailblazer, Hayden dressed down the critics. He then sent out an agency-wide memo, in which he warned that several “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow. . . . Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.” Roark says of the memo, “Hayden brooked no opposition to his favorite people and programs.”
Roark, who had substantial influence over N.S.A. budget appropriations, was an early champion of Binney’s ThinThread project. She was dismayed, she says, to hear that it had evolved into a means of domestic surveillance, and felt personally responsible. Her oversight committee had been created after Watergate specifically to curb such abuses. “It was my duty to oppose it,” she told me. “That is why oversight existed, so that these things didn’t happen again. I’m not an attorney, but I thought that there was no way it was constitutional.” Roark recalls thinking that, if N.S.A. officials were breaking the law, she was “going to fry them.”
She soon learned that she was practically alone in her outrage. Very few congressional leaders had been briefed on the program, and some were apparently going along with it, even if they had reservations. Starting in February, 2002, Roark says, she wrote a series of memos warning of potential illegalities and privacy breaches and handed them to the staffers for Porter Goss, the chairman of her committee, and Nancy Pelosi, its ranking Democrat. But nothing changed. (Pelosi’s spokesman denied that she received such memos, and pointed out that a year earlier Pelosi had written to Hayden and expressed grave concerns about the N.S.A.’s electronic surveillance.)
Roark, feeling powerless, retired. Before leaving Washington, though, she learned that Hayden, who knew of her strong opposition to the surveillance program, wanted to talk to her. They met at N.S.A. headquarters on July 15, 2002. According to notes that she made after the meeting, Hayden pleaded with her to stop agitating against the program. He conceded that the policy would leak at some point, and told her that when it did she could “yell and scream” as much as she wished. Meanwhile, he wanted to give the program more time. She asked Hayden why the N.S.A. had chosen not to include privacy protections for Americans. She says that he “kept not answering. Finally, he mumbled, and looked down, and said, ‘We didn’t need them. We had the power.’ He didn’t even look me in the eye. I was flabbergasted.” She asked him directly if the government was getting warrants for domestic surveillance, and he admitted that it was not.
In an e-mail, Hayden confirmed that the meeting took place, but said that he recalled only its “broad outlines.” He noted that Roark was not “cleared to know about the expanded surveillance program, so I did not go into great detail.” He added, “I assured her that I firmly believed that what N.S.A. was doing was effective, appropriate, and lawful. I also reminded her that the program’s success depended on it remaining secret, that it was appropriately classified, and that any public discussion of it would have to await a later day.”
During the meeting, Roark says, she warned Hayden that no court would uphold the program. Curiously, Hayden responded that he had already been assured by unspecified individuals that he could count on a majority of “the nine votes”—an apparent reference to the Supreme Court. According to Roark’s notes, Hayden told her that such a vote might even be 7–2 in his favor.
Roark couldn’t believe that the Supreme Court had been adequately informed of the N.S.A.’s transgressions, and she decided to alert Chief Justice William H. Rehnquist, sending a message through a family friend. Once again, there was no response. She also tried to contact a judge on the FISA court, in Washington, which adjudicates requests for warrants sanctioning domestic surveillance of suspected foreign agents. But the judge had her assistant refer the call to the Department of Justice, which had approved the secret program in the first place. Roark says that she even tried to reach David Addington, the legal counsel to Vice-President Dick Cheney, who had once been her congressional colleague. He never called back, and Addington was eventually revealed to be one of the prime advocates for the surveillance program.
“This was such a Catch-22,” Roark says. “There was no one to go to.” In October, 2003, feeling “profoundly depressed,” she left Washington and moved to a small town in Oregon.
Drake was still working at the N.S.A., but he was secretly informing on the agency to Congress. In addition to briefing Roark, he had become an anonymous source for the congressional committees investigating intelligence failures related to 9/11. He provided Congress with top-secret documents chronicling the N.S.A.’s shortcomings. Drake believed that the agency had failed to feed other intelligence agencies critical information that it had collected before the attacks. Congressional investigators corroborated these criticisms, though they found greater lapses at the C.I.A. and the F.B.I.
Around this time, Drake recalls, Baginski warned him, “Be careful, Tom—they’re looking for leakers.” He found this extraordinary, and asked himself, “Telling the truth to congressional oversight committees is leaking?” But the N.S.A. has a rule requiring employees to clear any contact with Congress, and in the spring of 2002 Baginski told Drake, “It’s time for you to find another job.” He soon switched to a less sensitive post at the agency, the first of several.
As for Binney, he remained frustrated even in retirement about what he considered the misuse of ThinThread. In September, 2002, he, Wiebe, Loomis, and Roark filed what they thought was a confidential complaint with the Pentagon’s Inspector General, extolling the virtues of the original ThinThread project and accusing the N.S.A. of wasting money on Trailblazer. Drake did not put his name on the complaint, because he was still an N.S.A. employee. But he soon became involved in helping the others, who had become friends. He obtained documents aimed at proving waste, fraud, and abuse in the Trailblazer program.
The Inspector General’s report, which was completed in 2005, was classified as secret, so only a few insiders could read what Drake describes as a scathing document. Possibly the only impact of the probe was to hasten the end of Trailblazer, whose budget overruns had become indisputably staggering. Though Hayden acknowledged to a Senate committee that the costs of the Trailblazer project “were greater than anticipated, to the tune of, I would say, hundreds of millions,” most of the scandal’s details remained hidden from the public.
In December, 2005, the N.S.A.’s culture of secrecy was breached by a stunning leak. The Times reporters James Risen and Eric Lichtblau revealed that the N.S.A. was running a warrantless wiretapping program inside the United States. The paper’s editors had held onto the scoop for more than a year, weighing the propriety of publishing it. According to Bill Keller, the executive editor of the Times, President Bush pleaded with the paper’s editors to not publish the story; Keller told New York that “the basic message was: You’ll have blood on your hands.” After the paper defied the Administration, Bush called the leak “a shameful act.” At his command, federal agents launched a criminal investigation to identify the paper’s source.
The Times story shocked the country. Democrats, including then Senator Obama, denounced the program as illegal and demanded congressional hearings. A FISA court judge resigned in protest. In March, 2006, Mark Klein, a retired A.T. & T. employee, gave a sworn statement to the Electronic Frontier Foundation, which was filing a lawsuit against the company, describing a secret room in San Francisco where powerful Narus computers appeared to be sorting and copying all of the telecom’s Internet traffic—both foreign and domestic. A high-capacity fibre-optic cable seemed to be forwarding this data to a centralized location, which, Klein surmised, was N.S.A. headquarters. Soon, USA Today reported that A.T. & T., Verizon, and BellSouth had secretly opened their electronic records to the government, in violation of communications laws. Legal experts said that each instance of spying without a warrant was a serious crime, and that there appeared to be hundreds of thousands of infractions.
President Bush and Administration officials assured the American public that the surveillance program was legal, although new legislation was eventually required to bring it more in line with the law. They insisted that the traditional method of getting warrants was too slow for the urgent threats posed by international terrorism. And they implied that the only domestic surveillance taking place involved tapping phone calls in which one speaker was outside the U.S.
Drake says of Bush Administration officials, “They were lying through their teeth. They had chosen to go an illegal route, and it wasn’t because they had no other choice.” He also believed that the Administration was covering up the full extent of the program. “The phone calls were the tip of the iceberg. The really sensitive stuff was the data mining.” He says, “I was faced with a crisis of conscience. What do I do—remain silent, and complicit, or go to the press?”
Drake has a wife and five sons, the youngest of whom has serious health problems, and so he agonized over the decision. He researched the relevant legal statutes and concluded that if he spoke to a reporter about unclassified matters the only risk he ran was losing his job. N.S.A. policy forbids initiating contact with the press. “I get that it’s grounds for ‘We have to let you go,’ ” he says. But he decided that he was willing to lose his job. “This was a violation of everything I knew and believed as an American. We were making the Nixon Administration look like pikers.”
Drake got in touch with Gorman, who covered the N.S.A. for the Baltimore Sun. He had admired an article of hers and knew that Roark had spoken to her previously, though not about anything classified. He got Gorman’s contact information from Roark, who warned him to be careful. She knew that in the past the N.S.A. had dealt harshly with people who embarrassed it.
Drake set up a secure Hushmail e-mail account and began sending Gorman anonymous tips. Half in jest, he chose the pseudonym The Shadow Knows. He says that he insisted on three ground rules with Gorman: neither he nor she would reveal his identity; he wouldn’t be the sole source for any story; he would not supply her with classified information. But a year into the arrangement, in February, 2007, Drake decided to blow his cover, surprising Gorman by showing up at the newspaper and introducing himself as The Shadow Knows. He ended up meeting with Gorman half a dozen times. But, he says, “I never gave her anything classified.” Gorman has not been charged with wrongdoing, and declined, through her lawyer, Laura Handman, to comment, citing the pending trial.
Starting on January 29, 2006, Gorman, who now works at the Wall Street Journal, published a series of articles about problems at the N.S.A., including a story describing Trailblazer as an expensive fiasco. On May 18, 2006, the day that Hayden faced Senate confirmation hearings for a new post—the head of the C.I.A.—the Sun published Gorman’s exposé on ThinThread, which accused the N.S.A. of rejecting an approach that protected Americans’ privacy. Hayden, evidently peeved, testified that intelligence officers deserved “not to have every action analyzed, second-guessed, and criticized on the front pages of the newspapers.”
At the time, the government did not complain that the Sun had crossed a legal line. It did not contact the paper’s editors or try to restrain the paper from publishing Gorman’s work. A former N.S.A. colleague of Drake’s says he believes that the Sun stories revealed government secrets. Others disagree. Steven Aftergood, the secrecy expert, says that the articles “did not damage national security.”
Matthew Aid argues that the material Drake provided to the Sun should not have been highly classified—if it was—and in any case only highlighted that “the N.S.A. was a management nightmare, which wasn’t a secret in Washington.” In his view, Drake “was just saying, ‘We’re not doing our job, and it’s having a deleterious effect on mission performance.’ He was right, by the way.” The Sun series, Aid says, was “embarrassing to N.S.A. management, but embarrassment to the U.S. government is not a criminal offense in this country.” (Aid has a stake in this debate. In 1984, when he was in the Air Force, he spent several months in the stockade for having stored classified documents in a private locker. The experience, he says, sensitized him to issues of government secrecy.)
While the Sun was publishing its series, twenty-five federal agents and five prosecutors were struggling to identify the Times’ source. The team had targeted some two hundred possible suspects, but had found no culprits. The Sun series attracted the attention of the investigators, who theorized that its source might also have talked to the Times. This turned out not to be true. Nevertheless, the investigators quickly homed in on the Trailblazer critics. “It’s sad,” an intelligence expert says. “I think they were aiming at the Times leak and found this instead.”
Roark was an obvious suspect for the Times leak. Everyone from Hayden on down knew that she had opposed the surveillance program. After the article appeared, she says, “I was waiting for the shoe to drop.” The F.B.I. eventually contacted her, and in February, 2007, she and her attorney met with the prosecutor then in charge, Steven Tyrrell, who was the head of the fraud section at the Justice Department. Roark signed an affidavit saying that she was not a source for the Times story or for “State of War,” a related book that James Risen wrote. She also swore that she had no idea who the source was. She says of the experience, “It was an interrogation, not an interview. They treated me like a target.”
Roark recalls that the F.B.I. agents tried to force her to divulge the identity of her old N.S.A. informants. They already seemed to know about Drake, Binney, and Wiebe—perhaps from the Inspector General’s report. She refused to coöperate, arguing that it was improper for agents of the executive branch to threaten a congressional overseer about her sources. “I had the sense that N.S.A. was egging the F.B.I. on,” she says. “I’d gotten the N.S.A. so many times—they were going to get me. The N.S.A. hated me.” (The N.S.A. and the Justice Department declined to comment on the investigations.)
In the months that followed, Roark heard nothing. Finally, her lawyer placed the case in her “dead file.”
On July 26, 2007, at 9 A.M. Eastern Standard Time, armed federal agents simultaneously raided the houses of Binney, Wiebe, and Roark. (At Roark’s house, in Oregon, it was six o’clock.) Binney was in the shower when agents arrived, and recalls, “They went right upstairs to the bathroom and held guns on me and my wife, right between the eyes.” The agents took computer equipment, a copy of the Inspector General complaint and a copy of a commercial pitch that Binney had written with Wiebe, Loomis, and Roark. In 2001, the N.S.A. indicated to Binney that he could pursue commercial projects based on ThinThread. He and the others thought that aspects of the software could be used to help detect Medicare fraud.
Binney professed his innocence, and he says that the agents told him, “We think you’re lying. You need to implicate someone. ” He believed that they were trying to get him to name Roark as the Times’ source. He suggested that if they were looking for criminal conspirators they should focus on Bush and Hayden for allowing warrantless surveillance. Binney recalls an agent responding that such brazen spying didn’t happen in America. Looking over the rims of his owlish glasses, Binney replied, “Oh, really?”
Roark was sleeping when the agents arrived, and didn’t hear them until “it sounded as if they were going to pull the house down, they were rattling it so badly.” They took computers and a copy of the same commercial pitch. Her son had been interested in collaborating on the venture, and he, too, became a potential target. “They believed everybody was conspiring,” Roark says. “For years, I couldn’t talk to my own son without worrying that they’d say I was trying to influence his testimony.” Although she has been fighting cancer, she has spoken with him only sparingly since the raid.
The agents seemed to think that the commercial pitch contained classified information. Roark was shaken: she and the others thought they had edited it scrupulously to insure that it did not. Agents also informed her that a few scattered papers in her old office files were classified. After the raid, she called her lawyer and asked, “If there’s a disagreement on classification, does intent mean anything?” The question goes to the heart of the Drake case.
Roark, who always considered herself “a law-and-order person,” said of the raid, “This changed my faith.” Eventually, the prosecution offered her a plea bargain, under which she would plead guilty to perjury, for ostensibly lying to the F.B.I. about press leaks. The prosecutors also wanted her to testify against Drake. Roark refused. “I’m not going to plead guilty to deliberately doing anything wrong,” she told them. “And I can’t testify against Tom because I don’t know that he did anything wrong. Whatever Tom revealed, I am sure that he did not think it was classified.” She says, “I didn’t think the system was perfect, but I thought they’d play fair with me. They didn’t. I felt it was retribution.”
Wiebe, the retired analyst, was the most surprised by the raid—he had not yet been contacted in connection with the investigation. He recalls that agents locked his two Pembroke Welsh corgis in a bathroom and commanded his daughter and his mother-in-law, who was in her bathrobe, to stay on a couch while they searched his house. He says, “I feel I’m living in the very country I worked for years to defeat: the Soviet Union. We’re turning into a police state.” Like Roark, he says of the raid, “It was retribution for our filing the Inspector General complaint.”
Under the law, such complaints are confidential, and employees who file them are supposed to be protected from retaliation. It’s unclear if the Trailblazer complaint tipped off authorities, but all four people who signed it became targets. Jesselyn Radack, of the Government Accountability Project, a whistle-blower advocacy group that has provided legal support to Drake, says of his case, “It’s the most severe form of whistle-blower retaliation I have ever seen.”
A few days after the raid, Drake met Binney and Wiebe for lunch, at a tavern in Glenelg, Maryland. “I had a pretty good idea I was next,” Drake says. But it wasn’t until the morning of November 28, 2007, that he saw armed agents streaming across his lawn. Though Drake was informed of his right to remain silent, he viewed the raid as a fresh opportunity to blow the whistle. He spent the day at his kitchen table, without a lawyer, talking. He brought up Trailblazer, but found that the investigators weren’t interested in the details of a defunct computer system, or in cost overruns, or in the constitutional conflicts posed by warrantless surveillance. Their focus was on the Times leak. He assured them that he wasn’t the source, but he confirmed his contact with the Sun, insisting that he had not relayed any classified information. He also disclosed his computer password. The agents bagged documents, computers, and books, and removed eight or ten boxes of office files from his basement. “I felt incredibly violated,” he says.
For four months, Drake continued coöperating. He admitted that he had given Gorman information that he had cut and pasted from secret documents, but stressed that he had not included anything classified. He acknowledged sending Gorman hundreds of e-mails. Then, in April, 2008, the F.B.I. told him that someone important wanted to meet with him, at a secure building in Calverton, Maryland. Drake agreed to the appointment. Soon after he showed up, he says, Steven Tyrrell, the prosecutor, walked in and told him, “You’re screwed, Mr. Drake. We have enough evidence to put you away for most of the rest of your natural life.”
Prosecutors informed Drake that they had found classified documents in the boxes in his basement—the indictment cites three—and discovered two more in his e-mail archive. They also accused him of shredding other documents, and of deleting e-mails in the months before he was raided, in an attempt to obstruct justice. Further, they said that he had lied when he told federal agents that he hadn’t given Gorman classified information.
“They had made me into an enemy of the state just by saying I was,” Drake says. The boxes in his basement contained copies of some of the less sensitive material that he had procured for the Inspector General’s Trailblazer investigation. The Inspector General’s Web site directs complainants to keep copies. Drake says that if the boxes did, in fact, contain classified documents he didn’t realize it. (The indictment emphasizes that he “willfully” retained documents.) The two documents that the government says it extracted from his e-mail archive were even less sensitive, Drake says. Both pertained to a successor to Trailblazer, code-named Turbulence. One document listed a schedule of meetings about Turbulence. It was marked “unclassified/for official use only” and posted on the N.S.A.’s internal Web site. The government has since argued that the schedule should have been classified, and that Drake should have known this. The other document, which touted the success of Turbulence, was officially declassified in July, 2010, three months after Drake was indicted. “After charging him with having this ostensibly serious classified document, the government waved a wand and decided it wasn’t so classified after all,” Radack says.
Clearly, the intelligence community hopes that the Drake case will send a message about the gravity of exposing government secrets. But Drake’s lawyer, a federal public defender named James Wyda, argued in court last spring that “there have never been two documents so benign that are the subject of this kind of prosecution against a client whose motives are as salutary as Tom’s.”
Drake insists, too, that the only computer files he destroyed were routine trash: “I held then, and I hold now, I had nothing to destroy.” Drake, who left the N.S.A. in 2008, and now works at an Apple Store outside Washington, asks, “Why didn’t I erase everything on my computer, then? I know how to do it. They found what they found.”
Not everyone familiar with Drake’s case is moved by his plight. A former federal official knowledgeable about the case says, “To his credit, he tried to raise these issues, and, to an extent, they were dealt with. But who died and left him in charge?”
In May, 2009, Tyrrell proposed a plea bargain: if Drake pleaded guilty to one count of conspiring to violate the Espionage Act and agreed to coöperate against the others, he would get a maximum of five years in prison. “They wanted me to reveal a conspiracy that didn’t exist,” Drake says. “It was all about the Times, but I had no knowledge of the leak.” Drake says that he told prosecutors, “I refuse to plea-bargain with the truth.”
That June, Drake learned that Tyrrell was leaving the government. Tyrrell was a Republican, and Drake was hopeful that a prosecutor appointed by the Obama Administration would have a different approach. But Drake was dismayed to learn that Tyrrell’s replacement, William Welch, had just been transferred from the top spot in the Justice Department’s public-integrity section, after an overzealous prosecution of Ted Stevens, the Alaska senator. A judge had thrown out Stevens’s conviction, and, at one point, had held Welch in contempt of court. (Welch declined to comment.)
In April, 2010, Welch indicted Drake, shattering his hope for a reprieve from the Obama Administration. But the prosecution’s case had shrunk dramatically from the grand conspiracy initially laid out by Tyrrell. (Welch accidentally sent the defense team an early draft of the indictment, revealing how the case had changed.) Drake was no longer charged with leaking classified documents, or with being part of a conspiracy. He is still charged with violating the Espionage Act, but now merely because of unauthorized “willful retention” of the five documents. Drake says that when he learned that, even with the reduced charges, he still faced up to thirty-five years in prison, he “was completely aghast.”
Morton Halperin, of the Open Society Institute, says that the reduced charges make the prosecution even more outlandish: “If Drake is convicted, it means the Espionage Law is an Official Secrets Act.” Because reporters often retain unauthorized defense documents, Drake’s conviction would establish a legal precedent making it possible to prosecute journalists as spies. “It poses a grave threat to the mechanism by which we learn most of what the government does,” Halperin says.
The Espionage Act has rarely been used to prosecute leakers and whistle-blowers. Drake’s case is only the fourth in which the act has been used to indict someone for mishandling classified material. “It was meant to deal with classic espionage, not publication,” Stephen Vladeck, a law professor at American University who is an expert on the statute, says.
The first attempt to apply the law to leakers was the aborted prosecution, in 1973, of Daniel Ellsberg, a researcher at the RAND Corporation who was charged with disclosing the Pentagon Papers—a damning secret history of the Vietnam War. But the case was dropped, owing, in large part, to prosecutorial misconduct. The second such effort was the case of Samuel L. Morison, a naval intelligence officer who, in 1985, was convicted for providing U.S. photographs of a Soviet ship to Jane’s Defence Weekly. Morison was later pardoned by Bill Clinton. The third case was the prosecution, in 2005, of a Defense Department official, Lawrence Franklin, and two lobbyists for the American-Israel Public Affairs Committee. Franklin pleaded guilty to a lesser charge, and the case against the lobbyists collapsed after the presiding judge insisted that prosecutors establish criminal intent. Unable to prove this, the Justice Department abandoned the case, amid criticism that the government had overreached.
Drake’s case also raises questions about double standards. In recent years, several top officials accused of similar misdeeds have not faced such serious charges. John Deutch, the former C.I.A. director, and Alberto Gonzales, the former Attorney General, both faced much less stringent punishment after taking classified documents home without authorization. In 2003, Sandy Berger, Clinton’s national-security adviser, smuggled classified documents out of a federal building, reportedly by hiding them in his pants. It was treated as a misdemeanor. His defense lawyer was Lanny Breuer—the official overseeing the prosecution of Drake.
Jack Goldsmith, a Harvard law professor who served in the Bush Justice Department, laments the lack of consistency in leak prosecutions. He notes that no investigations have been launched into the sourcing of Bob Woodward’s four most recent books, even though “they are filled with classified information that he could only have received from the top of the government.” Gabriel Schoenfeld, of the Hudson Institute, says, “The selectivity of the prosecutions here is nightmarish. It’s a broken system.”
Mark Feldstein, a professor of media and public affairs at George Washington University, warns that, if whistle-blowers and other dissenters are singled out for prosecution, “this has gigantic repercussions. You choke off the information that the public needs to judge policy.”
Few people are more disturbed about Drake’s prosecution than the others who spoke out against the N.S.A. surveillance program. In 2008, Thomas Tamm, a Justice Department lawyer, revealed that he was one of the people who leaked to the Times. He says of Obama, “It’s so disappointing from someone who was a constitutional-law professor, and who made all those campaign promises.” The Justice Department recently confirmed that it won’t pursue charges against Tamm. Speaking before Congress, Attorney General Holder explained that “there is a balancing that has to be done . . . between what our national-security interests are and what might be gained by prosecuting a particular individual.” The decision provoked strong criticism from Republicans, underscoring the political pressures that the Justice Department faces when it backs off such prosecutions. Still, Tamm questions why the Drake case is proceeding, given that Drake never revealed anything as sensitive as what appeared in the Times. “The program he talked to the Baltimore Sun about was a failure and wasted billions of dollars,” Tamm says. “It’s embarrassing to the N.S.A., but it’s not giving aid and comfort to the enemy.”
Mark Klein, the former A.T. & T. employee who exposed the telecom-company wiretaps, is also dismayed by the Drake case. “I think it’s outrageous,” he says. “The Bush people have been let off. The telecom companies got immunity. The only people Obama has prosecuted are the whistle-blowers.” ♦
http://www.newyorker.com/reporting/2011/05/23/110523fa_fact_mayer?currentPage=all