Fedblog FedblogFedblog
Government Executive Editor in Chief Tom Shoop, along with other editors and staff correspondents, look at the federal bureaucracy from the outside in.

Banqueters and the Spying News Bombshell

Director for National Intelligence James Clapper Director for National Intelligence James Clapper Manuel Balce Ceneta/AP File Photo

No one planned it that way, but the twin blockbuster stories exposing national security agencies’ collection of domestic telephone logs and foreigners’ Web traffic made for some surreal juxtapositions on Friday at the annual banquet of the Intelligence and National Security Alliance.

With the current and past directors of national intelligence at the Omni Shoreham to honor former CIA and National Security Agency chief Michael Hayden, the result in speeches and interviews with intel professionals was a gumbo of outrage, worry and humor.

Director of National Intelligence James Clapper told the black-tie crowd of more than 700 he would “address the elephant in the room” and proceeded, to applause, to denounce “the unauthorized leaks as reprehensible and egregious.” Clapper characterized the program as completely legal, debated and reauthorized by Congress under strict oversight and by court order “to make our nation safe and secure.”

He then cracked a few jokes. “Some of you expressed surprise that I showed up—so many emails to read!” Clapper said. Greeting fellow banqueter John Pistole, the administrator of the Transportation Security Administration who recently reversed a planned policy to permit air travelers to carry certain knives on planes, Clapper said, “John, can I borrow your pocket knife?”

INSA Chairman John Negroponte, the nation’s first director of national Intelligence, commended Clapper for focusing on his job despite “a number of distractions that have been circulating in Washington for the last few days.”

In a session with reporters, Negroponte, now a private consultant, said he was not surprised by the revelations, since “none of this is inconsistent with what I understood the practices to be.” The intel agencies are sticking to “metadata, not the content of phone calls—like knowing what’s on the outside of an envelope,” he said. The program was approved by the Federal Intelligence Surveillance Court, and there are no restrictions on gathering intelligence about foreigners, Negroponte said.

Asked if he could cite any examples of how enemies of the United States might exploit the exposure of the secret data captures, Negroponte said no, but “two months ago, we really did miss something in Boston [in the fatal bombing at the Marathon], and we were asked why didn’t we see it . So we’re dammed if we do and damned if we don’t, but that doesn’t mean we don’t explain policy.”

Negroponte and newly installed INSA president Joseph DeTrani stressed to reporters that INSA, a membership organization of veteran diplomats, academics and corporate thinkers, is geared not to matching the news cycle but to think pieces and policy analysis in such crucial areas as cybersecurity.

The tributes to Hayden, winner of INSA’s 29th annual William Oliver Baker award (named for a Bell Labs inventor and statesman), included such biographical factoids as his having put himself through Dusquesne University working as a bellhop, caddy and Fuller Brush salesman. His hometown of Pittsburgh recently named a street for him.

Now doing private-sector consulting in Washington, Hayden said he still gets the morning CIA email news summary and when he awoke one day last week, he’d gotten the biggest clip file ever, some 180 pages with “words like PRISM and metadata.” He told himself, “It’s a great day to be a former senior intelligence leader. “

Getting serious, Hayden said the newly exposed telecommunications data-monitoring program is a “direct descendent” of a program he started at the NSA in 2002, adding that “the political elite will criticize us for not doing enough when danger threatens, but then after we’ve made us safer, the same people will criticize us for doing too much.”

Being CIA director, Hayden said, “was the best job I ever had. I could make a decision at 8:30 at night and come in by morning and find [all the relevant] pictures on my desk. “ True, the job involves “an awful lot of 2:00 a.m. phone calls,” he added, “but I would tell myself, Hayden, whatever you decide, you’re going to live with it for the rest of your life. Then, I would put my arms around the one human being who gives me unconditional love no matter what decision I made,” his wife Jeanine.

In perhaps the evening’s most unusual moment, DNI Clapper, after aides had passed out lyric sheets, led the crowd in a teasing summary of Hayden’s career sung to the tune of the hymns of the four military services. He was accompanied on electric guitar by INSA member Jeff “Skunk” Baxter, a defense technology enthusiast and former member of the Doobie Brothers and Steely Dan.

Charlie Clark joined Government Executive in the fall of 2009. He has been on staff at The Washington Post, Congressional Quarterly, National Journal, Time-Life Books, Tax Analysts, the Association of Governing Boards of Universities and Colleges, and the National Center on Education and the Economy. He has written or edited online news, daily news stories, long features, wire copy, magazines, books and organizational media strategies.

Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.