Document:The Terrorists Among US- Traitors and Terror 3
George Eliason interviews professor Michael Jasinski about the dire effects of outsourcing intelligence gathering and information dissemination. |
Subjects: CIA, Intelligence Agencies, Cyberwarfare
Example of: Interview
Source: The Saker Blog (Link)
★ Start a Discussion about this document
The Terrorists Among US- Traitors and Terror 3
The second part in this series showed clearly that the US Intel community has been overrun by untrainable and undependable people. [1]
The more facts that come out, the worse the situation looks. We trust these people to dissect and analyze critical pieces of information and based on their experience advise the President of the United States whether or not diplomacy, spying, and covert action, sanctions, or even military engagement is warranted.
So, the big question in part 2 became, how do you induct over 3 million new employees with no previous experience into what is supposed to be one of the most complicated professions on the planet? Can this be done in less than 5 years? The answer is you can’t.
Most of the Intel the US is using right now comes from private sector sources. Over 80% of the current NSA budget goes to subcontractors that can hire and layoff on a per-project basis. There is no loyalty to employees or government service. Loyalties are bought and sold by the highest bidders as part of the daily grind to just make a living.
One day Jimmy the 1st year apprentice Intel guy might work for the US government. Two weeks later he might work for the Ukrainian lobby doing Oppo-research. Three weeks later he might work for a company that has both for clients. He takes all the software packages with him as well as insight into the data he’s gained or if it’s OSINT, the data itself can change hands if it does so before being labeled “secret.”- The Unthinkable Consequences of Outsourcing US Intel [2]
Since 2015, I’ve watched the Intel industry go through radical changes in a very short time. This started long before I interviewed Michael Jasinski (MJ), the Assistant Professor, Department of Political Science University of Wisconsin–Oshkosh about this.
The following is professor Jasinski’s remarks from the 2017 article and following that the interview we did the other day. In literally 2 years the Intel community hiring standards have gone from university researchers with at least some experience and education in the field down to Jimmy who used to work at Walmart and is now an intern at the CIA, FBI, DIA, DOD or fill in another agency of your choice.
Professor Jasinski had oversight over researchers that were later hired by US Intel agencies following 9/11 and provided evaluations of them prior to their employment.
“Considering how the intelligence community is depicted in the media or in the movies (and clearly CIA “outreach” plays a role here), you’d think Jedi Knights. The Justice League. Gandalf. But if you ever had personal contact with the “three-letter agencies” for any period of time, you’d think different. My most recent experience with the “intelligence” community was at MIIS, post-9/11 when the agencies were coming there to hire, and they were hiring big. They hired many of my research assistants–I was doing what might be termed “open-source intelligence” on WMD proliferation–and in the process, they’d ask me, their immediate supervisor, for my opinion. So I’d tell them point-blank: can’t read, can’t write, can’t analyze. I don’t care what their CV says, the only language they can function in at any level in English. No matter, they’d get hired anyway. Drug convictions? No matter, they’d get hired anyway (at least at the time, the CIA would hire you if you didn’t have any drug convictions within the last 3 years). Scary political views they wore on their sleeve? No matter, they’d get hired anyway. All of my good assistants went to work for the UN, IAEA, major NGOs. The dregs went to “intelligence.” So now when I see a) the “Russian interference” stories and b) the inability to safeguard, and presumably use responsibly, your own cyber-warfare arsenal, I can’t say I’m exactly surprised. But there are no shortcuts in this kind of work. If you rapidly expand at the cost of dramatically lowering standards, you (and the country) are going to pay a price. We’re paying it right now.”- The Private Contractors Using Vault 7 Tools for US Gov: US Intel Needs a Ground-Up Rebuild Part 1 [3]
GE – Professor Jasinski, how do you feel about the idea of can’t read, can’t write the language analyst types gaining NSA size tools and being sent to spy into Russian infrastructure as bounty hunters looking for threats?
GE - How would you feel about these same analysts gaining manager positions in the agencies and as the private contractor counterparts?
GE - If this type of activity occurred in say Russia’s nuclear sector where bounty hunter hackers with rancid political views gained access, how bad could this be?
GE - Is there any governmental or industrial sector that is hiring private hackers, IO pros, and private spies which could prove beneficial and not cost the US its status in the world or have international repercussions?
GE'- What is the potential of bounty hunter hackers, IO pros, and private spies fomenting war outside of all government policy or oversight?
GE remarks - Professor Jasinski’s point is well taken. What would the world be like if anyone could get their hands on aggressive NSA state-level tools and point them at their neighbor?
When he taught the people that would eventually become CIA and FBI OSINT agents and managers, the transition from State to privatized Intel was in its infancy. Part 2 of the series showed Richard Clarke made the US Agency transitions to the privatization of Intel. UK PM David Cameron labeled the man that got the job transitioning US agencies to privatized Intel an idiot. That was Steve Emerson and his sidekick and former gift shop cashier, the lovely Rita Katz.
From the 1990s into the 2000s and 2010s, all of the elite hack, defense, and attack tools were purposely labeled freeware for anyone that decided to pick them up. This means the scenario professor Jasinski labeled as a nightmare is already coming true.
A researcher made an elite hacking tool out of the info in the Vault 7 leak. Cite error: Closing </ref>
missing for <ref>
tag
So said the security luminary Bruce Schneier at BBC Future’s World-Changing Ideas Summit in October [4] …With so many cheap or free tools out there, it is easy for anyone to set up their own NSA-esque operations and collect all this data. – American Jihadi Starts Private NSA And Attacks America [5]
This has been gradually developing into the norm in America. Your safety and the safety of your loved ones, not to mention the rest of the world is in the hands of otherwise unhireable people that are learning as they go to hack and attack foreign countries and domestic civilians.
“In a Sept. 2013 Reuters article, Jameel Jaffer, deputy legal director at the American Civil Liberties Union, said the reported incidents of NSA employees’ violations of the law are likely “the tip of the iceberg” of lax data safeguards. The laws guiding the NSA’s spying authority in the first place are a bigger issue, he said. “If you only focus on instances in which the NSA violated those laws, you’re missing the forest for the trees,” Jaffer said. “The bigger concern is not with willful violations of the law but rather with what the law itself allows.” –NSA staff used spy tools on spouses, ex-lovers: watchdog [6]
The companies and individual actors sell information. For some, this is the basis of how they market their services. They spy on other companies – on regular people – commit espionage and run legally dubious information operations against civilians.
But because of the work they do for both the U.S. government and private corporations, few restrictions are placed on them. Where they are supposed to be supervised by the Director of National Intelligence (DNI), in some cases they are supervising themselves and other companies and training DNI agencies to act like them. –Intel-for-Hire Undermines U.S. Intelligence (Part 2) [7]
It is only along this line, the NYT article U.S. Escalates Online Attacks on Russia’s Power Grid [8] can be comprehended. Why is the military leaving the nation’s Commander in Chief blinded from what has the potential to spark a hot war? How?
While Jimmy works at the ODNI this week, the DOD uses 1st year Intel intern Jimmy’s brother Gary. Gary has a solid 6 months behind him as a privatized operator to carry out OSINT against Russian assets.
Do you think I’m exaggerating? My first thought is ole’ Gary made a mess the US government was going to get taken behind the shed for. But, why would the DOD get behind this hacking operation and alienate their Commander in Chief? Why not invoke plausible deniability? Do they think Trump will take the ODNI use of private sector apprentices to heart and fire them?
This is part of an ODNI and DOD Intel policy change. The DOD has been using private citizens like ole’ Gary for a while. Now, it almost seems like they bring these guys into a room and really chat them up before letting them loose to wreak havoc on society.
Ole’ Gary, you are a supa’ spy! Yes, you are. Yes, you are! Now go get me sum red Ruskies!
The US Needs Bounty Hunters For Cyber: Ex-DoD Officials Say [9]
To defend 21st-century networks, should the US use the model of 18th-century privateers?
It seems Ole’ Gary and the Podunk crew received new and improved titles. They are bounty hunters and privateers. This is immensely important and will be the subject of the next article in the series.
All they need to do is go back to the room and get chatted up again and they can start their new careers. I’ve been researching this cottage industry and watching it develop since 2015. The Privatized NSA Army is Attacking YOU!
According to the DOD, this function is supposed to do exactly what the DOD just did. The problem is it is more of an embarrassment to let ole’ Gary and Jimmy loose in the press than it is to embarrass their direct commander and the highest executive according to the Constitution.
CIA morale plummets as Trump becomes president and CIA veterans say spat with Trump could have real-world consequences. [10]
The problem is most of the morale slump is coming from private contractors that are doing the actual work. Contrary to popular belief, the CIA would be relegated to the level of Keystone Cops if they had real agents face forward online every day. So, what does this mean?
Ole Jimmy and Gary want to feel the part. They want to dress the part. They want to live the part. Their lack of GEDs just won’t allow it to happen. Sorry, Jimmy. Sorry, Gary. The CIA doesn’t offer apprenticeships. [11] But, because they do work indirectly for the CIA, they pretend they are CIA and use their real CIA tools on their neighbors. We’ll get into that in the next article.
If U.S. intelligence is questionable and untrustworthy, there is no single greater threat to the planet today. Members of an intelligence community who try to circumvent the democratic process should be prosecuted no matter who they are or who they are trying to undermine.- U.S. Intelligence Crisis Poses a Threat to the World (Part 1) [12]
It’s time for a quiz and let’s see who’s paying attention
Were Hackers Targeting Nuclear Facilities like Homeland Security Dept. and F.B.I. Say? [13]
Or was it Jimmy and Gary again?
If you said yes, you may just win and the US goes back to the things we were all taught to value.
Agents like Jimmy and Gary provide most of the OSINT and Intel for the FBI and Homeland Security.
The next article in the series is mind-boggling because it opens up the reality of cyber privateering and bounty hunting. The reality of the situation and the deviant turns it’s taken make the dire predictions professor Jasinksi made look very tame and optimistic.
References
- ↑ https://washingtonsblog.com/2019/06/the-terrorists-among-us-2-private-intel-turned-on-people-they-pretend-to-protect.html
- ↑ https://www.opednews.com/articles/The-Unthinkable-Consequen-by-George-Eliason-Intelligence-Agencies_Intelligence-Services_NATO_Outsourcing-180217-241.html
- ↑ https://washingtonsblog.com/2017/03/private-contractors-using-vault-7-tools-us-gov-us-intel-needs-ground-rebuild-part-1.html
- ↑ http://www.bbc.com/future/story/20141027-the-hidden-ways-youre-tracked
- ↑ http://rinf.com/alt-news/editorials/american-jihadi-starts-private-nsa-and-attacks-america/
- ↑ https://www.reuters.com/article/us-usa-surveillance-watchdog/nsa-staff-used-spy-tools-on-spouses-ex-lovers-watchdog-idUSBRE98Q14G20130927
- ↑ https://consortiumnews.com/2018/02/13/how-intel-for-hire-is-undermining-u-s-intelligence-part-2/
- ↑ http://thesaker.is/the-terrorists-among-us-traitors-and-terror-3/archive.is/aFVzg
- ↑ https://breakingdefense.com/2019/05/us-needs-bounty-hunters-for-cyber-ex-dod-officials-say/
- ↑ https://www.mcclatchydc.com/latest-news/article127632934.html?fbclid=IwAR1RK9Qj0Iq8Z7As7h2XJgWA6cTB2TMR8szUf0IfghN84ywh5z66j4WivdM
- ↑ https://www.cio.com/article/3309059/more-tech-companies-drop-college-degree-requirement.html
- ↑ https://consortiumnews.com/2018/02/11/u-s-intelligence-crisis-poses-a-threat-to-the-world/
- ↑ https://www.nytimes.com/2017/07/06/technology/nuclear-plant-hack-report.html?action=click&contentCollection=Technology&module=inline®ion=Marginalia&pgtype=article