DoD employees barred from testifying about terrorist data-mining effort

The mystery over why a military intelligence unit destroyed information linking hijackers to convicted terrorists before they could share the information with federal law enforcers deepened Wednesday during a Senate Judiciary Committee hearing.

Two individuals formerly involved in a Defense Department data-mining project known as Able Danger were barred from testifying. They are Lt. Col. Anthony Shaffer, a former intelligence operations officer, and government contractor John Smith.

Shaffer received a letter from the Defense Intelligence Agency on Monday instructing him not to testify. His lawyer, Mark Zaid, spoke for him before the committee. His security clearance also was revoked at that time, said Rep. Curt Weldon, R-Pa., who also testified. Weldon was a catalyst for the hearing and is a champion of data-mining projects.

According to Shaffer's statements in press reports, Able Danger launched in 1999 to gather and analyzed publicly available information, as well as information bought from commercial data brokerages. Project members identified several of the Sept. 11, 2001, hijackers as potential terrorists before the attacks. But Defense Department lawyers prevented the intelligence unit from sharing the information with the FBI because they were concerned that the data-mining activity violated federal rules governing military intelligence activities on "U.S. persons."

The collective testimony of Wednesday's witnesses implied that federal privacy and civil-liberties regulations governing military intelligence operations may have been the reason that contractors were asked to destroy the information.

Erik Kleinsmith, the army's former chief of intelligence for its Land Information Warfare Activity unit, said Army Intelligence and Security Command General Counsel Tony Gentry told him to destroy the information. Kleinsmith said Gentry told him that under federal rules, any information collected by military intelligence operations that was doubtful must be destroyed within 90 days.

"Remember to delete the data -- or you'll go to jail," Kleinsmith recalled Gentry advising in a joking manner.

William Dugan, Defense's acting assistant to the secretary for intelligence oversight, said in written testimony, "If the intelligence component is unsure if the information they have obtained is proper for them to keep, the intelligence oversight rules allow them to temporarily retain the information for 90 days solely to determine whether it may be permanently retained."

When pressed by Judiciary Committee Chairman Arlen Specter, R-Pa., on why the information was destroyed, Dugan said, "I assume because of the 90-day rule and because the information didn't fit into the 13 categories" of allowable information for permanent retention.

Zaid said the current line of inquiry should not focus on assigning blame, but should instead encourage law enforcers to monitor the individuals who Able Danger identified in order to prevent further terrorism attacks and to allow future projects to go ahead.

"This isn't a partisan issue," he said. "There's enough blame to go around."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.


When you download a report, your information may be shared with the underwriters of that document.