DoD employees barred from testifying about terrorist data-mining effort

The mystery over why a military intelligence unit destroyed information linking hijackers to convicted terrorists before they could share the information with federal law enforcers deepened Wednesday during a Senate Judiciary Committee hearing.

Two individuals formerly involved in a Defense Department data-mining project known as Able Danger were barred from testifying. They are Lt. Col. Anthony Shaffer, a former intelligence operations officer, and government contractor John Smith.

Shaffer received a letter from the Defense Intelligence Agency on Monday instructing him not to testify. His lawyer, Mark Zaid, spoke for him before the committee. His security clearance also was revoked at that time, said Rep. Curt Weldon, R-Pa., who also testified. Weldon was a catalyst for the hearing and is a champion of data-mining projects.

According to Shaffer's statements in press reports, Able Danger launched in 1999 to gather and analyzed publicly available information, as well as information bought from commercial data brokerages. Project members identified several of the Sept. 11, 2001, hijackers as potential terrorists before the attacks. But Defense Department lawyers prevented the intelligence unit from sharing the information with the FBI because they were concerned that the data-mining activity violated federal rules governing military intelligence activities on "U.S. persons."

The collective testimony of Wednesday's witnesses implied that federal privacy and civil-liberties regulations governing military intelligence operations may have been the reason that contractors were asked to destroy the information.

Erik Kleinsmith, the army's former chief of intelligence for its Land Information Warfare Activity unit, said Army Intelligence and Security Command General Counsel Tony Gentry told him to destroy the information. Kleinsmith said Gentry told him that under federal rules, any information collected by military intelligence operations that was doubtful must be destroyed within 90 days.

"Remember to delete the data -- or you'll go to jail," Kleinsmith recalled Gentry advising in a joking manner.

William Dugan, Defense's acting assistant to the secretary for intelligence oversight, said in written testimony, "If the intelligence component is unsure if the information they have obtained is proper for them to keep, the intelligence oversight rules allow them to temporarily retain the information for 90 days solely to determine whether it may be permanently retained."

When pressed by Judiciary Committee Chairman Arlen Specter, R-Pa., on why the information was destroyed, Dugan said, "I assume because of the 90-day rule and because the information didn't fit into the 13 categories" of allowable information for permanent retention.

Zaid said the current line of inquiry should not focus on assigning blame, but should instead encourage law enforcers to monitor the individuals who Able Danger identified in order to prevent further terrorism attacks and to allow future projects to go ahead.

"This isn't a partisan issue," he said. "There's enough blame to go around."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download
  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download

When you download a report, your information may be shared with the underwriters of that document.