Batesville Herald Tribune, Batesville, Indiana

Community News Network

August 29, 2013

US spying successes, failures, objectives detailed in top secret 'black budget'

(Continued)

WASHINGTON —

— The CIA and NSA have launched aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as "offensive cyber operations."

— The NSA planned to investigate at least 4,000 possible insider threats in 2013, cases in which the agency suspected sensitive information may have been compromised by one of its own. The budget documents show that the U.S. intelligence community has sought to strengthen its ability to detect what it calls "anomalous behavior" by personnel with access to highly classified material.

— U.S. intelligence officials take an active interest in foes as well as friends. Pakistan is described in detail as an "intractable target," and counterintelligence operations "are strategically focused against [the] priority targets of China, Russia, Iran, Cuba and Israel."

— In words, deeds and dollars, intelligence agencies remain fixed on terrorism as the gravest threat to national security, which is listed first among five "mission objectives." Counterterrorism programs employ one in four members of the intelligence workforce and account for one-third of all spending.

— The governments of Iran, China and Russia are difficult to penetrate, but North Korea's may be the most opaque. There are five "critical" gaps in U.S. intelligence about Pyongyang's nuclear and missile programs, and analysts know virtually nothing about the intentions of North Korean leader Kim Jong Un.

Formally known as the Congressional Budget Justification for the National Intelligence Program, the "Top Secret" blueprint represents spending levels proposed to the House and Senate intelligence committees in February 2012. Congress may have made changes before the fiscal year began on Oct 1. Clapper is expected to release the actual total spending figure after the fiscal year ends on Sept. 30.

The document describes a constellation of spy agencies that track millions of individual surveillance targets and carry out operations that include hundreds of lethal strikes. They are organized around five priorities: combating terrorism, stopping the spread of nuclear and other unconventional weapons, warning U.S. leaders about critical events overseas, defending against foreign espionage and conducting cyber operations.

Text Only
Community News Network
Featured Ads
AP Video
Arizona Prison Chief: Execution Wasn't Botched Calif. Police Investigate Peacock Shooting Death Raw: Protesters, Soldiers Clash in West Bank Police: Doctor Who Shot Gunman 'Saved Lives' 'Modern Family' Star on Gay Athletes Coming Out MN Twins Debut Beer Vending Machine DA: Pa. Doctor Fired Back at Hospital Gunman Raw: Iowa Police Dash Cam Shows Wild Chase Obama Seeks Limits on US Company Mergers Abroad Large Family to Share NJ Lottery Winnings U.S. Flights to Israel Resume After Ban Lifted Official: Air Algerie Flight 'probably Crashed' TSA Administrator on Politics and Flight Bans Raw: National Guard Helps Battle WA Wildfires Raw: Ukraine's Donetsk Residents Flee Senators Push to End Hamas Threat in Cease-Fire A Young Victim's Premonition, Hug Before MH17 Raw: Deadly Storm Hits Virginia Campground Death Penalty Expert: 'This is a Turning Point' Raw: MH17 Victim's Bodies Arrive in Netherlands
Seasonal Content
Hyperlocal Search
Premier Guide
Find a business

Walking Fingers
Maps, Menus, Store hours, Coupons, and more...
Premier Guide
Parade
Magazine

Click HERE to read all your Parade favorites including Hollywood Wire, Celebrity interviews and photo galleries, Food recipes and cooking tips, Games and lots more.
Facebook