DoD employees barred from testifying about terrorist data-mining effort

The mystery over why a military intelligence unit destroyed information linking hijackers to convicted terrorists before they could share the information with federal law enforcers deepened Wednesday during a Senate Judiciary Committee hearing.

Two individuals formerly involved in a Defense Department data-mining project known as Able Danger were barred from testifying. They are Lt. Col. Anthony Shaffer, a former intelligence operations officer, and government contractor John Smith.

Shaffer received a letter from the Defense Intelligence Agency on Monday instructing him not to testify. His lawyer, Mark Zaid, spoke for him before the committee. His security clearance also was revoked at that time, said Rep. Curt Weldon, R-Pa., who also testified. Weldon was a catalyst for the hearing and is a champion of data-mining projects.

According to Shaffer's statements in press reports, Able Danger launched in 1999 to gather and analyzed publicly available information, as well as information bought from commercial data brokerages. Project members identified several of the Sept. 11, 2001, hijackers as potential terrorists before the attacks. But Defense Department lawyers prevented the intelligence unit from sharing the information with the FBI because they were concerned that the data-mining activity violated federal rules governing military intelligence activities on "U.S. persons."

The collective testimony of Wednesday's witnesses implied that federal privacy and civil-liberties regulations governing military intelligence operations may have been the reason that contractors were asked to destroy the information.

Erik Kleinsmith, the army's former chief of intelligence for its Land Information Warfare Activity unit, said Army Intelligence and Security Command General Counsel Tony Gentry told him to destroy the information. Kleinsmith said Gentry told him that under federal rules, any information collected by military intelligence operations that was doubtful must be destroyed within 90 days.

"Remember to delete the data -- or you'll go to jail," Kleinsmith recalled Gentry advising in a joking manner.

William Dugan, Defense's acting assistant to the secretary for intelligence oversight, said in written testimony, "If the intelligence component is unsure if the information they have obtained is proper for them to keep, the intelligence oversight rules allow them to temporarily retain the information for 90 days solely to determine whether it may be permanently retained."

When pressed by Judiciary Committee Chairman Arlen Specter, R-Pa., on why the information was destroyed, Dugan said, "I assume because of the 90-day rule and because the information didn't fit into the 13 categories" of allowable information for permanent retention.

Zaid said the current line of inquiry should not focus on assigning blame, but should instead encourage law enforcers to monitor the individuals who Able Danger identified in order to prevent further terrorism attacks and to allow future projects to go ahead.

"This isn't a partisan issue," he said. "There's enough blame to go around."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.