DoD employees barred from testifying about terrorist data-mining effort

The mystery over why a military intelligence unit destroyed information linking hijackers to convicted terrorists before they could share the information with federal law enforcers deepened Wednesday during a Senate Judiciary Committee hearing.

Two individuals formerly involved in a Defense Department data-mining project known as Able Danger were barred from testifying. They are Lt. Col. Anthony Shaffer, a former intelligence operations officer, and government contractor John Smith.

Shaffer received a letter from the Defense Intelligence Agency on Monday instructing him not to testify. His lawyer, Mark Zaid, spoke for him before the committee. His security clearance also was revoked at that time, said Rep. Curt Weldon, R-Pa., who also testified. Weldon was a catalyst for the hearing and is a champion of data-mining projects.

According to Shaffer's statements in press reports, Able Danger launched in 1999 to gather and analyzed publicly available information, as well as information bought from commercial data brokerages. Project members identified several of the Sept. 11, 2001, hijackers as potential terrorists before the attacks. But Defense Department lawyers prevented the intelligence unit from sharing the information with the FBI because they were concerned that the data-mining activity violated federal rules governing military intelligence activities on "U.S. persons."

The collective testimony of Wednesday's witnesses implied that federal privacy and civil-liberties regulations governing military intelligence operations may have been the reason that contractors were asked to destroy the information.

Erik Kleinsmith, the army's former chief of intelligence for its Land Information Warfare Activity unit, said Army Intelligence and Security Command General Counsel Tony Gentry told him to destroy the information. Kleinsmith said Gentry told him that under federal rules, any information collected by military intelligence operations that was doubtful must be destroyed within 90 days.

"Remember to delete the data -- or you'll go to jail," Kleinsmith recalled Gentry advising in a joking manner.

William Dugan, Defense's acting assistant to the secretary for intelligence oversight, said in written testimony, "If the intelligence component is unsure if the information they have obtained is proper for them to keep, the intelligence oversight rules allow them to temporarily retain the information for 90 days solely to determine whether it may be permanently retained."

When pressed by Judiciary Committee Chairman Arlen Specter, R-Pa., on why the information was destroyed, Dugan said, "I assume because of the 90-day rule and because the information didn't fit into the 13 categories" of allowable information for permanent retention.

Zaid said the current line of inquiry should not focus on assigning blame, but should instead encourage law enforcers to monitor the individuals who Able Danger identified in order to prevent further terrorism attacks and to allow future projects to go ahead.

"This isn't a partisan issue," he said. "There's enough blame to go around."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.